Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Finding logs to track Exchange 2010 room reservations

Posted on 2013-11-18
2
Medium Priority
?
1,206 Views
Last Modified: 2014-03-29
I was recently asked to find out who is causing problems with our meeting reservation system.  Users are reserving a conference room only to find that it has been canceled and replaced by another group.  I need to track down the events which show if a meeting was properly reserved and if someone else had deleted the reservation and made their own.  Can anyone assist in pointing me in the right direction with Exchange 2010?
0
Comment
Question by:First Last
2 Comments
 

Accepted Solution

by:
uffeh earned 1000 total points
ID: 39656495
Hi,

Maybe this will help?

http://support.microsoft.com/kb/971878
0
 
LVL 3

Assisted Solution

by:w_richard
w_richard earned 1000 total points
ID: 39658638
The above said link is recommendable and moreover please have a look at this links also..

http://support.microsoft.com/ph/13965

http://technet.microsoft.com/en-SG/exchange

Not soo sure as this is an comptaible for the echange server itself depending upon the sceneario.

Thanks.
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

MS Outlook undoubtedly is the most widely used email client.Its user-friendliness, cost effectiveness, and availability with Microsoft Office Suite make it the most popular email application.  Its compatibility with Microsoft applications like Exch…
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses
Course of the Month20 days, 21 hours left to enroll

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question