Interested to know what other organisations do when users need access to their colleagues mailboxes?
Our current policy dictates the mailbox owner must give written approval to IT support to gain access.
Obviously Directors or HR can over-ride this, again by written confirmation to IT support.
Once we receive the written confirmation we will grant full mailbox access using the Exchange management console.
Some users only want to give their colleague access for a day or week etc (whilst on holiday for example)
This means we have to grant the access, and then remember to remove it on the end date.
This is rather impractical, we support 100+ users. some of our staff's request are extreme.
For example... "I want Joe Bloggs to access my mailbox on Monday, and Jane Bloggs to access it on Tuesday and then Joe access it on Wednesday..."
What do you guys do?
We're using Exchange 2010 and Outlook 2010
Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a security breach made him wonder if the endpoint a…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it.
The vast majority of email clients display l…
The Email Laundry PDF encryption service allows companies to send confidential encrypted emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…