Solved

Can't Manage Full Access Permission on Mailbox Exchange 2007

Posted on 2014-02-10
4
1,500 Views
Last Modified: 2014-02-10
When trying to grant myself full access to a users mailbox I get the following error:

Warning:
The ACL for the object "CN=username,CN=OU,DC=Domain,DC=Domain" is not in canonical order (Deny/Allow/Inherited) and will be ignored.

Exchange Management Shell command completed:
Add-MailboxPermits -Identity  'CN=username,CN=OU,DC=Domain,DC=Domain' -User 'MyUsername' -AccessRights 'FullAccess'

Does anyone know how to resolve this?
0
Comment
Question by:Shawn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 35

Accepted Solution

by:
Joseph Daly earned 245 total points
ID: 39847910
This looks wrong to me. Are you using the console or shell?

'CN=username,CN=OU,DC=Domain,DC=Domain

Distinguished name should look like below.

CN=George\, Curious,OU=container,OU=Test,DC=domain,DC=com
0
 
LVL 53

Expert Comment

by:Will Szymkowski
ID: 39847911
This is probably a permission inheritance issue. Open ADSIEdit, select "default naming context" navigate to the location above and right click select properties and check to ensure that the permissions are inherited from the parent folder.

Will.
0
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 39847917
Assuming your distinguished name path above is correct this should be the correct form.

'CN=username,OU=OU,DC=Domain,DC=Domain
0
 
LVL 53

Expert Comment

by:Will Szymkowski
ID: 39847923
Read the post to fast, it is due to wrong format CN=username,OU=OUname,DC=domain,DC=com

Will.
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read this checklist to learn more about the 15 things you should never include in an email signature.
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question