{"id":1146,"date":"2009-01-07T13:54:08","date_gmt":"2009-01-07T12:54:08","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/"},"modified":"2009-01-07T13:54:08","modified_gmt":"2009-01-07T12:54:08","slug":"exchange-2007-resource-room-mailboxes","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/","title":{"rendered":"Exchange 2007 : Resource Room Mailboxes"},"content":{"rendered":"<p>Scenario : You have an AD account domain, that holds user accounts used to log on to the network\/Outlook, and you have a dedicated Exchange 2007 resource forest, that holds the Exchange infrastructure, (linked) mailboxes, etc.&#160; Accounts in the account domain are synced from the account domain to disabled accounts in the Exchange forest (e.g. using IIFP). You can find more information on how to do this in this <a href=\"\/index.php\/2008\/08\/17\/exchange-2007-multi-account-domain-to-single-resource-forest-replication-with-iifp-and-custom-rules-extension\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a><\/p>\n<p>I will refer to the account domain as ACC (or acc.local) and to the Exchange forest as EXCH (or exch.local)<\/p>\n<p>Some basic tasks I want to look at today are<\/p>\n<ul>\n<li>creating resource mailboxes<\/li>\n<li>granting access to the resource mailbox<\/li>\n<li>seting up delegates, autoprocessing of requests, etc<\/li>\n<li>managing properties of the resource mailbox<\/li>\n<\/ul>\n<p>&#160;<\/p>\n<h3>Creating Room Mailboxes <\/h3>\n<p>First of all, we\u2019ll have to create the Resource Mailbox objects in the Exchange forest, because there is no such thing as a linked Resource Mailbox<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/01\/image.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-right: 0px; border-top: 0px; display: inline; border-left: 0px; border-bottom: 0px\" height=\"188\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/01\/image-thumb.png\" width=\"275\" border=\"0\" \/><\/a> <\/p>\n<p>This means that you may want to create a placeholder (OU) to host the resource mailbox AD objects. When the placeholder is created, this is how you can create the room mailbox, given the facts that<\/p>\n<ul>\n<li>the room will be called&#160; ROOM-Meetingroom1-City1<\/li>\n<li>the OU where the room needs to be stored at is ou=Resource Mailboxes,ou=Company,ou=exch,ou=local<\/li>\n<\/ul>\n<p>Using powershell, this is how you can create the mailbox :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">new-Mailbox \n   -alias &quot;room-meetingroom1-city1&quot; \n   -database &quot;Mailbox Database&quot; \n   -name &quot;room-meetingroom1-city1&quot; \n   -resourcetype room \n   \u2013userPrincipalName room-meetingroom1-city1@exch.local \n   \u2013OU &quot;Resource Mailboxes\/Company&quot;<\/pre>\n<\/div>\n<p>This will create a disabled account in the Exchange forest.<\/p>\n<p>&#160;<\/p>\n<h3>Grant access to the resource mailbox<\/h3>\n<p>Access to all mailboxes is based on actual useraccounts, not on entries in the Global Address List. So if you want to grant permissions to users, you cannot use the EMC running in the Exchange forest, because it can only display entries from it\u2019s own domain (the Exchange Forest) and not from the actual account domains that hold the accounts used to access the mailboxes.&#160; Of course, the EMC would work if the user accounts and Exchange objects are in the same domain\/forest, but since we have an account domain and an exchange forest, it won\u2019t work.<\/p>\n<p>We have to use powershell for this so we can specify the domain\\useraccount the access is granted to.<\/p>\n<p>Suppose you want to allow acc\\john.doe&#160; and&#160; acc\\jane.doe to have full access to the room resource mailbox, you\u2019ll need to enter the following powershell commands :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">Add-MailboxPermission \n   -id &quot;room-meetingroom1-city1&quot; \n   -AccessRights FullAccess \n   -User &quot;acc\\john.doe&quot;\n\nAdd-MailboxPermission \n   -id &quot;room-meetingroom1-city1&quot; \n   -AccessRights FullAccess \n   -User &quot;acc\\jane.doe&quot;<\/pre>\n<\/div>\n<p>If you want to allow \u201cSend on behalf\u201d permissions to the same two users, you need to use the following command :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">Set-Mailbox \n   -id &quot;room-meetingroom1-city1&quot; \n   -GrantSendOnBehalfTo &quot;John Doe&quot;,&quot;Jane Doe&quot;<\/pre>\n<\/div>\n<div>In this case, you need to use the Exchange name, not the account domain user account name<\/div>\n<div>&#160;<\/div>\n<div>If you want to set \u201cSend-As\u201d permissions to these 2 users, run :<\/div>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">Add-ADPermission \n   -id &quot;room-meetingroom1-city1&quot; \n   -ExtendedRights Send-As \n   -User &quot;acc\\john.doe&quot;\n\nAdd-ADPermission \n   -id &quot;room-meetingroom1-city1&quot; \n   -ExtendedRights Send-As \n   -User &quot;acc\\jane.doe&quot;<\/pre>\n<\/div>\n<div>The Send-As permissions are again AD permissions, so you need to use the corresponding domain\\account names again.<\/div>\n<div>&#160;<\/div>\n<p>&#160;<\/p>\n<h3>Set up autoprocessing and delegates<\/h3>\n<p>John and Jane Doe will be our two meetingroom managers. We want people to be able to book the resource, but either John or Jane need to get a notification email and must approve (or reject) the request before the resource gets booked<\/p>\n<p>This is how this is done<\/p>\n<p>First, set the delegates. <\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">Set-MailboxCalendarSettings \n   -id &quot;room-meetingroom1-city1&quot;\n   -ResourceDelegates &quot;John Doe&quot;,&quot;Jane Doe&quot;<\/pre>\n<\/div>\n<p>As you can see, you must specify all delegates at once, because the field is a multi-value field. So if you need to change the delegates afterwards, you\u2019ll have to specify all of the delegates again.&#160;&#160; Furthermore, the users that are mentioned here are Exchange users, so you need to enter the Exchange display name, not the account domain user account.<\/p>\n<p>In order to complete the setup of the autoprocessing and the whole process of getting notified and making sure the workflow is set up, take the following steps :<\/p>\n<p>Logged on as acc\\john.doe or acc\\jane.doe, open OWA and open the mailbox of the meeting room. <\/p>\n<p>In the upper right corner, click \u201cOptions\u201d.&#160; In the left pane, open \u201cResource Settings\u201d<\/p>\n<p>Enable \u201cAutomatically process meeting requests\u201d if you want auto-processing<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/01\/image1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-right: 0px; border-top: 0px; display: inline; border-left: 0px; border-bottom: 0px\" height=\"419\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/01\/image-thumb1.png\" width=\"542\" border=\"0\" \/><\/a> <\/p>\n<p>Under Scheduling Permissions, set :<\/p>\n<p>Schedule automatically if resource is available : set to \u201cSelect Users and Groups\u201d, and don\u2019t enter anything in the field. (this will make sure all requests need to be approved)<\/p>\n<p>Submit a request for manual approval if the resource is available : set to \u201cEveryone\u201d <\/p>\n<p>Schedule automatically if available and manual if unavailable : set to \u201cSelect Users and Groups\u201d and don\u2019t enter anything.<\/p>\n<p>Make sure \u201cAlways forward to delegates\u201d is enabled.<\/p>\n<p>Save these changes.&#160; If you now try to book the meeting room, the two delegates should receive an email and they should be able to approve\/decline the meeting request.<\/p>\n<p>In addition to these settings, it may be a good idea to change the \u201cmaximum allowed minutes\u201d setting under \u201cResource Scheduling Options\u201d. If you want to allow people to book a meeting room for a meeting that lasts more than one day, you will need to increase the default value of 1440 minutes (1 day) to something else (e.g. 144000)<\/p>\n<p>&#160;<\/p>\n<h3>Managing other properties<\/h3>\n<p>After making the changes as explained above, the settings of a resource mailbox are :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\"><p>Get-MailboxCalendarSettings \u2013id \u201croom-meetingroom1-city1\u201d | FL<\/p><p>AutomateProcessing                  : AutoAccept\nAllowConflicts                      : False\nBookingWindowInDays                 : 180\nMaximumDurationInMinutes            : 144000\nAllowRecurringMeetings              : True\nEnforceSchedulingHorizon            : True\nScheduleOnlyDuringWorkHours         : False\nConflictPercentageAllowed           : 0\nMaximumConflictInstances            : 0\nForwardRequestsToDelegates          : True\nDeleteAttachments                   : True\nDeleteComments                      : True\nRemovePrivateProperty               : True\nDeleteSubject                       : True\nDisableReminders                    : True\nAddOrganizerToSubject               : True\nDeleteNonCalendarItems              : True\nTentativePendingApproval            : True\nEnableResponseDetails               : True\nOrganizerInfo                       : True\nResourceDelegates                   : {John Doe, Jane Doe}\nRequestOutOfPolicy                  :\nAllRequestOutOfPolicy               : True\nBookInPolicy                        :\nAllBookInPolicy                     : True\nRequestInPolicy                     :\nAllRequestInPolicy                  : True\nAddAdditionalResponse               : False\nAdditionalResponse                  : <span style=\"color: #0000ff\">&lt;<\/span><span style=\"color: #800000\">DIV<\/span><span style=\"color: #0000ff\">&gt;&lt;<\/span><span style=\"color: #800000\">FONT<\/span> <span style=\"color: #ff0000\">face<\/span>=<span style=\"color: #ff0000\">Tahoma<\/span> <span style=\"color: #ff0000\">size<\/span>=<span style=\"color: #ff0000\">2<\/span><span style=\"color: #0000ff\">&gt;&lt;\/<\/span><span style=\"color: #800000\">FONT<\/span><span style=\"color: #0000ff\">&gt;&lt;\/<\/span><span style=\"color: #800000\">DIV<\/span><span style=\"color: #0000ff\">&gt;<\/span>\nRemoveOldMeetingMessages            : True\nAddNewRequestsTentatively           : True\nProcessExternalMeetingMessages      : False\nDefaultReminderTime                 : 15\nRemoveForwardedMeetingNotifications : False\nIdentity                            : exch.local\/Company\/Resource Mailboxes\/room-meetingroom1-city1<\/p><\/pre>\n<\/div>\n<p>Most of these properties are more or less self-explanatory, but one of the most interesting option is \u201cSubject of meeting requests\u201d. By default, when people in your organization start using the meeting room, the delegates\/managers of the meeting room won\u2019t see the subject of the meeting. In certain cases, this may be a problem for them in order to be able to properly manage the resource.&#160; You can make the subjects visible by \u2018not removing\u2019 the subjects.<\/p>\n<p>Turn off \u201cSubject of meeting requests\u201d in OWA<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/01\/image2.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-right: 0px; border-top: 0px; display: inline; border-left: 0px; border-bottom: 0px\" height=\"303\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/01\/image-thumb2.png\" width=\"480\" border=\"0\" \/><\/a><\/p>\n<p>or use powershell to disable the removal of the subject field :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">set-mailboxCalendarSettings \n   -id &quot;room-meetingroom1-city1&quot;\n   -DeleteSubject $false<\/pre>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Scenario : You have an AD account domain, that holds user accounts used to log on to the network\/Outlook, and you have a dedicated Exchange 2007 resource forest, that holds the Exchange infrastructure, (linked) mailboxes, etc.&#160; Accounts in the account domain are synced from the account domain to disabled accounts in the Exchange forest (e.g. &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Exchange 2007 : Resource Room Mailboxes\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[349],"tags":[1300,509],"class_list":["post-1146","post","type-post","status-publish","format-standard","hentry","category-exchange","tag-powershell","tag-exchange"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exchange 2007 : Resource Room Mailboxes - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exchange 2007 : Resource Room Mailboxes - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Scenario : You have an AD account domain, that holds user accounts used to log on to the network\/Outlook, and you have a dedicated Exchange 2007 resource forest, that holds the Exchange infrastructure, (linked) mailboxes, etc.&#160; Accounts in the account domain are synced from the account domain to disabled accounts in the Exchange forest (e.g. &hellip; Continue reading &quot;Exchange 2007 : Resource Room Mailboxes&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2009-01-07T12:54:08+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Exchange 2007 : Resource Room Mailboxes\",\"datePublished\":\"2009-01-07T12:54:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/\"},\"wordCount\":933,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"powershell\",\"MS Exchange\"],\"articleSection\":[\"MS Exchange\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/\",\"name\":\"Exchange 2007 : Resource Room Mailboxes - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2009-01-07T12:54:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/07\\\/exchange-2007-resource-room-mailboxes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exchange 2007 : Resource Room Mailboxes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exchange 2007 : Resource Room Mailboxes - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/","og_locale":"en_US","og_type":"article","og_title":"Exchange 2007 : Resource Room Mailboxes - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Scenario : You have an AD account domain, that holds user accounts used to log on to the network\/Outlook, and you have a dedicated Exchange 2007 resource forest, that holds the Exchange infrastructure, (linked) mailboxes, etc.&#160; Accounts in the account domain are synced from the account domain to disabled accounts in the Exchange forest (e.g. &hellip; Continue reading \"Exchange 2007 : Resource Room Mailboxes\"","og_url":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2009-01-07T12:54:08+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Exchange 2007 : Resource Room Mailboxes","datePublished":"2009-01-07T12:54:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/"},"wordCount":933,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["powershell","MS Exchange"],"articleSection":["MS Exchange"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/","url":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/","name":"Exchange 2007 : Resource Room Mailboxes - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2009-01-07T12:54:08+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/07\/exchange-2007-resource-room-mailboxes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Exchange 2007 : Resource Room Mailboxes"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":19645,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=1146"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1146\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=1146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=1146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=1146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}