\n\n\n Possible Workarounds \n | \n\n Pros \n | \n\n Cons \n | \n
\n\n\n For delegate access problems, Assign the \"Write Personal Information\" right to all users or a subset of users in the domain that need the ability to assign delegate rights. \n | \n\n This helps alleviate some of the permissions issues that 913696 introduces \n | \n\n This requires that all users reside in the same Active Directory domain. You can still have multiple domains, but any user that needs the ability to assign delegate rights, those users accounts need to reside in the same domain. Exchange still needs to refer you to a GC with writable context to update the publicDelegates attribute. \n | \n
\n\n\n For DL update issues, Move the distribution groups to the same domain as the user accounts (See 238394 or this for information using MoveTree to move Distribution Groups.) This is the recommended approach to resolve these issues 100% \n | \n\n This allows DSProxy requests to refer you to correct GC to perform the update. Since the DL's and users are all in the same domain, we are able to update DL's and assign delegate permissions. \n | \n\n This requires a good understanding of your AD Site/Subnet topology since the Exchange RFR process now tries to direct you to a user domain GC instead of an Exchange GC based on their current subnet. \n \n \n \n \nCombining both users and DL's in the same domain may break any custom applications that were written exclusively for a particular domain and would have to be changed to accommodate the new location for these groups. \n \n \n \n \nThis only works in an environment where there is a single domain to house both the users and DL's. You can have multiple domains, but for this to work correctly, all users and DL's must reside in the same domain and Exchange has to be setup to refer you to the correct GC's as well. This referral mechanism is outside the scope of this document and is better explained in the following links \n \n· http://technet.microsoft.com/en-us/library/b7f8fbf4-732c-4a87-a9d5-3c4c375e5948.aspx \n \n· http://msexchangeteam.com/archive/2005/11/04/413669.aspx \n \n· http://msexchangeteam.com/archive/2006/03/17/422350.aspx \n \n \n \n | \n
\n\n\n Apply hotfix and registry entry of \"RFR Prefer In-Site GCs\" per 912584 to ensure that a GC in the same AD site as the Exchange Server will always be used. \n \n \n \n \n \n | \n\n Allows you to force clients to use GC's within the same AD site as the Exchange Server instead of using User Domain GC's that are not in the same AD site. \n | \n\n If User Domain GC's and Exchange GC's are in the same Active Directory site as the Exchange server, the point system does not change with this registry key being set which is unfortunate. The only way to make this registry key work is to move all User Domain GC's out of the Exchange Active Directory site so that the point system can work and then refer you to Exchange GC's instead of User Domain GC's \n \n \n \n \nThis will result in additional load on the GCs in the same Domain and AD Site as your Exchange servers, but this should be minimal. \n \n \n \n \nThis will result in issues with delegate permissions that the change to DSPROXY.DLL in SP2 was intended to address if the user accounts are in another domain outside of the Exchange domain. \n | \n
\n\n\n Use a 3rd party tool to provide the ability to update distribution lists via a web interface. See this page for a list of Active Directory partners that may include this functionality. \n \n \n \n | \n\n This allows a single web based interface in to all DL management functions \n | \n\n Microsoft currently does not provide a DL management solution at the current time. \n | \n
\n\n\n Change the details template per this. See Figure 1 below for a sample of what this might look like. \n | \n\n Less intrusive on the client as this change will only need to be changed in one place which is server side. \n | \n\n The details templates would need to be updated for each language. \n \n \n \n \nNo workaround still to manage Distribution Lists. Have to purchase 3rd party solution or you can create their own home grown application \n | \n
\n\n\n Per 319206, you can use a GPO to force OL clients to use a specific GC via the \"Closest GC\" and \"DS Server\" registry keys \n | \n\n Temporary fix to workaround issues in certain scenarios where some users may not have the need to perform either a DL Management or Delegate function. You unfortunately cannot have the best of both worlds in multi-domain environments. \n | \n\n The client-detected global catalog server may be out of date or semi-functional. If the global catalog server is having problems but still responds to Named Service Provider Interface (NSPI) requests, Outlook may not stop responding and return to the DSProxy for a new referral. \n \n \n \n \nIn multi-domain environments, the global catalog server that you select may not be in the same domain as Active Directory group objects. Therefore, users cannot update group membership because the local global catalog server has a read-only copy of the group. \n \n \n \n \nThis key cannot be used in the Exchange Resource Forest Scenario as the GC used by Outlook must be one in the Resource Forest where the mailboxes are located. \n \n \n \n \nExchange performs a series of suitability tests to make sure a GC is ready/suitable for use by Exchange and its clients; this registry key bypasses that option, which could lead to a bad experience for the client. \n \n \n \n \nIf the server goes down that is specified in the DS Server key, Outlook will need to be restarted to connect to another GC. If outlook detects during startup that the specified GC is down, we will go and request a referral to a GC from the Exchange server. \n | \n
\n\n\n Use RPC over HTTP (Outlook Anywhere) for users who manage Distribution Groups. Starting with Exchange 2003 SP1 and later, we no longer enable RFR for HTTP requests, so Exchange is doing all of the proxying to the domain controllers for user requests. This change helped with security issues where GC's were exposed over the internet. \n | \n\n If DL's reside in the same domain in which the Exchange servers live, then the ability to update DL membership might work. This all depends on what DC exchange used to perform the update. \n | \n\n This may work in certain situations, but is not the end all solution as you may get referred to an incorrect GC to perform the DL updates and the configuration of delegates. \n | \n
\n\n\n Use the \"No RFR Service\" registry key per 302914 to disable the RFR interface on the Exchange Server so that we no longer refer you to a GC, but instead, Exchange handles all of the NSPI Proxy requests. If a specific GC is required with this key set, they you can use the \"NSPI Target Server\" registry key to hard code Exchange to use a specific GC to proxy requests to. \n | \n\n This may help alleviate DL update issues if they reside in the same domain as the Exchange server, but can have adverse affects for the ability to update Delegates. \n | \n\n This adds a performance hit on the Exchange servers as the clients have to use the Exchange server for all Address List Lookups instead of offloading this to a GC. \n \n \n \n \nUsing this key will require you to recreate all Outlook user profiles as we cache the previously referred GC in the registry of that profile. \n \n \n \n \nHard Coding an NSPI Target Server will provide undesired results to the client and the Exchange server should that server go down or is unavailable. \n | \n
\n\n\n In a small environment, you can have your Exchange Administrator administer Distribution lists rather than Outlook Users. \n | \n\n Administrators or help desk personnel that have been delegated rights to update group membership can easily update DL membership for their users. \n | \n\n Adds additional overhead for the Exchange or Active Directory Administrator to update DL membership. \n | \n
\n\n\n For delegate scenarios, you can add the Send On Behalf of right on the user account in which you want to delegate permissions to. \n | \n\n This helps alleviate cross domain delegate issues, but you still need to grant specific permissions to the folders once that right is added. \n | \n\n This requires a user to open Active Directory Users and Computers and then grant this right provided they have access to update the user in Active Directory which adds additional overhead. If that user doesn't have permission, then this requires another person with at least account operator permissions to perform this update. \n \n \n \n \nGranting permissions in this way grants no permission by default and requires the user to go back in to Outlook and then grant the appropriate folder permissions for the delegated user. If the user that was granted delegate rights needs to grant someone else delegate access, they need to go through the same steps as above to get this added. \n | \n
\n\n