Solved

Exchange 2007 -  Duplicate emails......

Posted on 2015-02-02
1
71 Views
Last Modified: 2015-02-12
Hi Experts,

An odd issue that has occurred today, a user is receiving emails from external clients when the user is not within the list. When I use message tracker to track the message, I notice that the email entry is displayed 2x in the list but the entry that displays the users email (the one that shouldn't have received the email), its ReturnPath is the recipient that the sender sent it to.

Any ideas?

Regards,

introlux
0
Comment
Question by:introlux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 19

Accepted Solution

by:
Adam Farage earned 500 total points
ID: 40583927
If you are saying you are seeing two emails (and being split across two users when addressed to one) there could be something else going on that the user (or another admin) did..

- Check the mailbox for a forwarder. This would be under the mailbox settings within Exchange Management Shell (mail flow settings on the malbox)
- Check Outlook rules for the client. I would back them up within Outlook and then close outlook, then run Outlook.exe /CleanRules. Test and see what happens

There is also the possibility that the person sending the email is BCC'ing the other user.. but depending on how you did the message tracking you would see this.
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question