Additional configuration for Exchange 2010 hidden users and DLs, and address book policies

Article:TECH154813  |  Created: 2011-03-04  |  Updated: 2013-08-28  |  Article URL http://www.symantec.com/docs/TECH154813
NOTE: If you are experiencing this particular known issue, we recommend that you Subscribe to receive email notification each time this article is updated. Subscribers will be the first to learn about any releases, status changes, workarounds or decisions made.
Article Type
Technical Solution

Product(s)

Subject

Issue



This article applies to Enterprise Vault 10.0.1,10.0, 9.0.4, 9.0.3, 9.0.2, and to Enterprise Vault 9.0.1 with the following hotfix:
www.symantec.com/docs/TECH147417 (see Related Articles)

 

Note: Enterprise Vault 10.0.2 accommodates the issues described in this technical note. The workarounds described in the attached document are not required if you run Enterprise Vault 10.0.2 or later service pack.

 

Exchange Server 2010 introduced the address book service which prevents Enterprise Vault from accessing all the properties of users and distribution lists that are hidden from the Exchange address book. Without additional configuration, searches for the display name of hidden users produce no results, and messages sent to hidden distribution lists are moved to the "Failed DL Expansion" folder in the journal mailbox during journal archiving.

 

Exchange Server 2010 SP2 introduced address book policies which can alter the address book view that is visible to Enterprise Vault. If you apply an address book policy to the Vault Service account, searches for the display name of any users restricted by the policy produce no hits.
 


Solution



If you target Exchange 2010 servers and you are affected by the changes introduced by the address book service and address book policies, you must use one of the procedures in this technical note to work around the changes.


Attachments

Additional configuration for Exchange 2010 hidden users and DLs, and address book policies
TECH154813.pdf (225 kBytes)



Article URL http://www.symantec.com/docs/TECH154813


Terms of use for this information are found in Legal Notices