Exchange 13 - Can't remove resource delegates

Posted on 2014-07-17
Last Modified: 2014-07-18
Recently migrated a client to Exchange 2013 from 2007. 2013 is running on SP1 (CU4).

The 10 resource mailboxes (all rooms) after the migration are not behaving properly. All of the resources had Booking Delegates on them. Per request, I removed the Booking Delegates and set it to auto accept/deny and not allow conflicts.

1st. If a user sends a calendar request to the room, they receive a confirmation email back but it still says it was on behalf of the booking delegate (despite them being removed as a delegate).

2nd. Free/busy doesn't seem to be working for the migrated ones as they always show as Free. In addition, it auto-accepts all requests even if there is a conflict.

I created a new room mailbox with default settings without a booking delegate, it behaved as expected and desired. Free/busy works for it too.
Question by:Schuyler Dorsey
    LVL 10

    Author Comment

    by:Schuyler Dorsey
    I did a get-mailbox and get-calendarprocessing and compared the new test one versus one of the problematic one and do not see any differences.
    LVL 10

    Accepted Solution

    After we removed the booking delegates, the room stopped working. Users would not receive email confirms, room was not accepted and it was never added to the calendar. Found that if we added a booking delegate back in, the room would start working again but the confirmation emails would still come from the OLD booking delegate.

    Spent 6 hours on phone with Microsoft Support over the course of two days and after all their diagnostics and troubleshooting, their final recommendation was to export the calendars, delete the mailbox, create a whole new one and import the data.

    We went through adsiedit, ldap, A.D., Exchange properties and found zero difference between the migrated non-working mailboxes and the 2 new test room mailboxes I created directly in Exch13 which worked correctly.
    LVL 10

    Author Closing Comment

    by:Schuyler Dorsey
    MS support provided the only answer.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Easy CSR creation in Exchange 2007,2010 and 2013
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    how to add IIS SMTP to handle application/Scanner relays into office 365.

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now