Trying to find and remove shared calendar permissions.

Daniel Treccagnoli 0 Reputation points
2024-04-24T18:01:16.4366667+00:00

Hello all

Some users in my organization are able to access full details on users' calendars, not everyone but also people they really shouldn't have full rights on. I have checked their permissions in Exchange settings in PowerShell, as well as on the individual calendars in the local Outlook for the affected users. This appears to be affecting primarily users that were made before my time in this organization. We have a Hybrid Azure AD environment so we sync from On-Prem AD. Not sure where else to look to see why these calendars are visible. Is it something inherited from the On-Prem DC?

Outlook
Outlook
A family of Microsoft email and calendar products.
3,076 questions
Microsoft Exchange Hybrid Management
Microsoft Exchange Hybrid Management
Microsoft Exchange: Microsoft messaging and collaboration software.Hybrid Management: Organizing, handling, directing or controlling hybrid deployments.
1,906 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Vasil Michev 96,436 Reputation points MVP
    2024-04-25T07:39:45.72+00:00

    If there are no individual (or group) entries on the affected Calendars, the most likely reason is that the Default permission entry has been modified. It should be set to AvailabilityOnly, or None if you want to prevent access altogether.

    0 comments No comments

  2. Bruce Jing-MSFT 1,075 Reputation points Microsoft Vendor
    2024-04-25T10:58:15.9266667+00:00

    Hi,

    Based on my experience, you could refer to the followings:

    1. You can also use ' Get-MailboxFolderPermission -Identity user@domain.com:\calendar ' cmdlet in PowerShell to view the permissions of a specific use.
    2. Can you provide the results of your Outlook query? For example the image below: A screenshot of a computerDescription automatically generated
    3. It is recommended that the customer logs into the local AD server, finds the affected user and checks his properties for exceptions. The steps are shown below: A screenshot of a computerDescription automatically generated