#Exchange public folder security group full
Three people are allowed full control of the entries therein.
We have a general public calendar, that the entire staff can see (when selected), and modify their own entries. Let me see if I can clarify it a little bit: I see that I can select "all" in the Edit and Delete areas, but wouldn't that allow them to Edit/Delete *anything* in the public folder, and not just entries created within the department/security group?Īny suggestions? Does this have to be done via a sub-folder within the main public folder? However, the members are still only able to modify/delete items their own items, not someone else's (within the security group). I've created a security group with the specific department members, and added that group into the office folder's properties (permissions). Right now, the users can only modify/delete items they have proposed themselves. What we need is the ability for members of a specific department to be able to modify/delete *any of their own* calendar items within the public calendar.
The entire office staff can select & view it (with a couple users given full access to modify & delete any of the entries via the calendar's permissions). However, Exchange 2003 isn't my strongpoint, so I'm looking for a solution to a requested function.
Replace with the address that you obtained in step 1.Recently our main admin moved on, and I've taken over most of his duties. Note: You must find the transport rule that's working on public folder hierarchy sync email messages. Here's how:įind the email address of the primary hierarchy mailbox by running the following Exchange Online PowerShell command: Get-Mailbox -PublicFolder |? | ft emailaddressesĪdd an exception in the Exchange transport rule by running the following cmdlet: Set-TransportRule -Identity "" -ExceptIfFrom "" Resolution 2: Exclude messages sent from the primary hierarchy mailboxĮxclude email messages that are sent from the primary hierarchy mailbox. In the Exchange admin center, go to Mail flow > Rules.Ĭheck the rules, and find the one that's acting on all messages.ĭouble-click the transport rule to open the rule editor window, select Add exception, and then select The subject includes in the Except if. list, as shown in the following screenshot. Resolution 1: Add an exception for the transport ruleĪdd an exception for the transport rule that processes all email messages in the organization to exclude messages that have the words "HierarchySync_" in the subject line. To fix this issue, use one of the following methods. If you're using global journaling, the behavior to see hierarchy sync email messages being sent to a journal recipient is by design. However, if you see these messages getting delivered to unintended recipients, this is because your organization has created a catch-all transport rule to process all email messages that are generated from the organization or that have enabled global journaling of email messages. Therefore, if you see email messages that have the "HierarchySync_" subject, you can trust that this behavior is by design, and you can safely ignore these email messages. For more information about the hierarchy sync, see Introduction to Public Folder Hierarchy Sync.īecause these notification messages are SMTP messages, they are displayed in message tracking reports. The message class of these notification email messages is "". The primary hierarchy mailbox sends hierarchy sync notification email messages to this special group. In the synchronization process, all public folder mailboxes in the organization are added to a special system group. The public folder hierarchy is synchronized by using SMTP messages that have subject lines that start at "HierarchySync_". This issue occurs if the public folder hierarchy synchronization messages are sent incorrectly. Email messages that have the "HierarchySync_" subject are displayed in message tracking, are flooding the queue, or are delivered to unintended recipients.