Outlook

Email

52 sections
416 source tickets

Last synthesized: 2026-02-13 01:12 | Model: gpt-5-mini
Table of Contents

1. Missing From / Send‑As options for shared or alternate mailboxes

14 tickets

2. Automatic Replies causing unexpected forwarding and out‑of‑office message updates

12 tickets

3. Missing Outlook app or no access due to licensing / account state (including mobile access)

47 tickets

4. Mailbox permissions, client cache/add-ins, missing folders and quarantined mail

134 tickets

5. New Outlook: change conversation grouping and reading pane arrangement

2 tickets

6. mailto: links opening the wrong app because Windows protocol association pointed to Chrome

4 tickets

7. Free/busy or calendar shows another user as busy due to incorrect timezone or working hours

6 tickets

8. Legacy/external mailbox inaccessible due to lost password

39 tickets

9. Request and provisioning of a new corporate mailbox

13 tickets

10. Temporary auto-forwarding requests blocked by forwarding consent policy

3 tickets

11. Subscribe an external iCal/ICS calendar into Outlook Desktop

2 tickets

12. High memory 'Restart recommended' message in New Outlook (Windows)

6 tickets

13. Missing Auto‑Complete / nickname cache entry reappeared after sending to the address

1 tickets

14. Make an Outlook calendar viewable or editable by colleagues (calendar sharing permissions)

5 tickets

15. Aggregate mailbox response‑time reporting (linking incoming and outgoing messages)

2 tickets

16. Outlook365 on Windows attaching files as OneDrive links instead of direct attachments

2 tickets

17. Cannot open .dat email attachments (format, not mailbox permissions)

2 tickets

18. Undelivered/bounced messages due to outdated external addresses in upstream systems

24 tickets

19. Edit received message to remove attachments in New Outlook

5 tickets

20. Administrator-set automatic replies for a departed employee mailbox

8 tickets

21. Outlook sign-in failures caused by federated SSO/Okta credential issues

26 tickets

22. Exchange Online / Outlook recipient and send‑rate limits (per‑message, daily, rate)

6 tickets

23. Renaming a resource mailbox address while preserving existing calendar bookings

1 tickets

24. Personal Microsoft account sign-in blocked in New Outlook on managed Windows 11 devices

2 tickets

25. Mailbox forwarding to an external Salesforce case address not active

4 tickets

26. Company Portal Self‑Service Tool restored Teams/Outlook sign‑in (Error 1001)

1 tickets

27. Malformed HTML/MIME in templates causing inline images to be cut off or not render

1 tickets

28. Outlook repeatedly showing signature-related pop-up due to embedded logo image

1 tickets

29. Third‑party service (Calendly) cannot deliver directly to Microsoft 365 Groups / Teams group mailboxes

7 tickets

30. Course-feed/Group meeting creation delayed by Delivery Management policy validating a very large Dynamic Distribution List

3 tickets

31. Directory / Outlook profile job‑title field limited to single line and character cap

1 tickets

32. Request and enablement of certificate‑based (S/MIME/PKI) encrypted email in Outlook on Windows 11

8 tickets

33. Mobile mailbox setup: no incoming/outgoing hostnames available

1 tickets

34. Apple ID conflict after organization claimed corporate email domain (temporary.appleaccount prompts)

1 tickets

35. Unexpected Outlook group invitations originating from internal IT changes

1 tickets

36. Outlook language/locale switching to English then self‑resolving

1 tickets

37. Attempted message recall after accidental send to external recipient

1 tickets

38. New Outlook taskbar envelope (notification badge) not reliably showing

2 tickets

39. Python smtplib authentication failing with Exchange Online because basic SMTP auth was blocked / OAuth2 required

2 tickets

40. Block or mute a harassing user in Outlook and Microsoft Teams

1 tickets

41. Outlook automatic translation uses default formality and cannot be forced to 'du' or informal tone

1 tickets

42. Unexpected high volume of SharePoint/Document‑library notification emails

2 tickets

43. Transfer ownership of an Outlook / Microsoft 365 Group when the owner has left

1 tickets

44. Power Automate 'Send an email with options' blocking parallel sends because runs waited for responses

1 tickets

45. Internal-looking sender addresses flagged as external when recipient mailbox is on a different accepted domain

1 tickets

46. New Outlook (Monarch) preview stopped showing meeting pop-up reminders and notification UI failed

1 tickets

47. Mailbox size increase requests and mailbox quota limits

1 tickets

48. Unable to create automatic forwarding rule in Outlook 365 (client rules)

1 tickets

49. Centralized email signature management and vendor security/data‑protection concerns

1 tickets

50. Legacy (old) Outlook signatures disappeared but appear in New Outlook

1 tickets

51. User confusion finding email, Teams and course portal after Office.com sign‑in

2 tickets

52. Planner email notifications not delivered to assigned users

1 tickets

1. Missing From / Send‑As options for shared or alternate mailboxes
95% confidence
Problem Pattern

Compose windows either lacked a visible From line or the From dropdown showed an incorrect or stale sender, preventing selection of a shared mailbox, alias, or alternate address. Some New Outlook builds showed the From control only per message and did not retain it between messages. In other cases users could not use a mailbox/alias because their account lacked send‑as permissions. Affected clients included New Outlook and desktop/classic Outlook with Exchange Online/Office 365 shared mailboxes and mailbox aliases.

Solution

Multiple distinct root causes were identified and resolved. Where the composer’s From control had been hidden by UI changes, restoring the compose/From setting in New Outlook or enabling Options → Show From in desktop/classic Outlook restored the sender dropdown and send‑as selection. Where a New Outlook build failed to retain the From control between messages, switching back to classic/older Outlook and enabling a persistent Show From control produced a lasting sender selector. Where the From dropdown contained a stale or obsolete entry (for example an old domain/alias after a mailbox change), removing the outdated cached entry from the From dropdown and selecting or adding the correct alias via the Other email address lookup allowed messages to be sent as the correct address and removed infrequent‑sender warnings. Where Outlook users could not set or use a specific mailbox address because of mailbox permissions, granting send‑as permission on the mailbox to the user restored the ability to select and send from that address. These resolutions applied to Exchange Online/Office 365 alias and shared‑mailbox scenarios in New Outlook and desktop/classic Outlook; Salesforce campaign‑send permissions were handled separately outside of Outlook.

2. Automatic Replies causing unexpected forwarding and out‑of‑office message updates
91% confidence
Problem Pattern

Senders and recipients observed missing, misdelivered, duplicated, or incorrect automatic-reply messages and unexpected Inbox behavior when Automatic Replies, client/server rules, delegation, or forwarded routing were involved. Symptoms included mail forwarded out of the mailbox (sometimes generating NDRs), duplicate or incorrect auto-reply text, automatic-reply state persisting after a deleted or ended calendar absence, Inbox appearing empty because rules moved messages, and unexpected recipient header labels in forwarded mail (for example 'Bis' shown instead of 'An'). Affected systems included Outlook desktop (classic and new), Outlook on the web, Exchange Online/Microsoft 365, shared mailboxes, and integrated third‑party endpoints.

Solution

Investigations identified multiple distinct causes for missing mail and unexpected automatic replies when Automatic Replies or routing were active. Client‑side Rules & Notifications in Outlook had forwarded or redirected messages (including rules configured to forward without keeping a copy); disabling or removing those rules restored mail to the mailbox. Some Outlook desktop Automatic Replies entries had an associated Automatic Replies rule that forwarded incoming mail; deleting the Automatic Replies rule stopped unintended forwarding. Separate Inbox rules were moving all incoming mail into user folders and producing an apparently empty Inbox; disabling or deleting those rules and moving mail back restored delivery. Mailbox‑level forwarding configured in Exchange/Microsoft 365 delivered mail outside the mailbox and produced non‑delivery reports when external destinations rejected forwarded messages; disabling or changing mailbox forwarding restored delivery to the mailbox. Duplicate Automatic Replies rules in desktop clients produced multiple auto‑replies; removing duplicate Automatic Replies rules and editing/saving the Automatic Replies text corrected incorrect contact information returned to senders. Where emails were routed to third‑party systems, investigations found the external system itself generated automated responses: incoming mail delivered to a Salesforce queue (Email‑to‑Case) produced a noreply‑style auto‑reply with unrelated content and an incorrect addressee even though the mailbox had no Automatic Replies configured; reconfiguring the external queue or autoresponder stopped those unexpected replies. Message traces, connector and routing inspection, and mailbox logs were used to confirm forwarding paths and to attribute whether an auto‑reply originated from the mailbox or an external service. Some cases involved user interface/display concerns rather than delivery failures: forwarded messages that showed localized recipient labels (for example 'Bis' instead of 'An') were attributed to delegation, delayed‑delivery or forwarding display effects and required no system change after confirmation. A few reports described Automatic Replies state persisting after a calendar absence entry was deleted or after the scheduled end time; those incidents were not resolved in‑ticket because support lacked mailbox‑level permissions and were escalated to the appropriate service portal or administrative team. Overall, affected cases were resolved by removing or correcting offending client or server rules, deleting Automatic Replies rules, correcting mailbox forwarding or reconfiguring external queues/autoresponders so automated responses matched the expected sender and content, and by restoring moved messages to the Inbox.

3. Missing Outlook app or no access due to licensing / account state (including mobile access)
79% confidence
Problem Pattern

Users could sign in with their Microsoft identity but Outlook (desktop, web/OWA, or mobile) or specific Outlook features were missing, inaccessible, denied, or would not open. Reported symptoms included app icons greyed out or disabled features (for example Loop or scheduling polls), startup failures or crashes (including macOS launch crashes referencing missing libraries such as @rpath/OPF.framework/Resources/OPF_Common.dylib), explicit 'access denied'/'not licensed'/'account is not active' messages, mailbox invisibility after profile/sign-in changes, iOS native Mail account-add failures returning “This Microsoft account does not exist,” and web sign-in flows blocked by pop-up blockers or non-interactive embedded consent pages. Incidents commonly followed license or mailbox provisioning failures, identity/SSO transitions, device/OS updates, MDM/enrollment connectivity problems, or multiple Outlook profiles.

Solution

Access and functionality were restored after correcting the underlying account, license, mailbox, identity, client UI, browser, enrollment, or device state. Observed repairs and outcomes included:

• License and mailbox provisioning fixes: accounts were reassigned or corrected to Microsoft 365/Office SKUs in Entra/Azure AD so they received Exchange/Outlook access; legacy or web-only SKUs were replaced where desktop or native-client access was required. Expired licenses that prevented Outlook from opening were renewed or reactivated and mailboxes were activated or reprovisioned after external↔internal or HR-driven transitions, restoring desktop/mobile licensing, send/receive capability, and feature availability.

• Identity/SSO and enrollment reconciliation: fixes to Okta→Entra identity-sync, group-membership, and blocked Okta Verify flows restored SSO tiles and app-launcher visibility and resumed previously failing sign-in and app-launch flows. MDM/Company Portal connectivity issues were repaired so managed devices completed enrollment and obtained app licenses.

• Client repair, reinstall, and client-version outcomes: damaged or incomplete Outlook installations were repaired or reinstalled from trusted sources (App Store, portal.office.com, company/self-service portals). Full Office reinstallations resolved cases where Outlook would not start. On macOS, removing a corrupted '.Microsoft Outlook.app.installBackup' entry and reinstalling or updating Outlook returned functionality once license/enrollment state was healthy.

• macOS launch/crash observations: some macOS Outlook launches failed with dyld crash reports referencing missing OPF framework libraries (for example: "Library not loaded: @rpath/OPF.framework/Resources/OPF_Common.dylib" ; EXC_CRASH/SIGABRT). These cases were observed to recover after reinstalling or repairing the Outlook/Office client or after backend/account state was corrected.

• Native iOS Mail observation: attempts to add an Outlook/Exchange account via iPhone Settings sometimes failed with the message “This Microsoft account does not exist.” These cases resolved when the account identity/activation/licensing or provisioning state was corrected or when alternate access paths (Outlook mobile or webmail) were used while the account state was remediated.

• Company Portal / self-service outcomes: where available a Company Portal 'Outlook Repair' or similar self-service action returned damaged/greyed installs to working order; when portal/enrollment endpoints were unreachable, reinstall via alternative trusted sources or temporary webmail sign-in provided access.

• Browser and embedded webflow observations: signing in via office.com/OWA or Okta sometimes restored mail access. Browser-state issues (pop-up blockers, unsupported user-agent checks, or embedded webviews lacking interactive consent controls) blocked app-registration or link flows and caused non-interactive consent pages to appear in Teams/embedded windows.

• Profile and sign-in restores: restoring the original active Outlook profile or sign-in returned mailbox visibility where profile changes had made the expected mailbox inactive.

• Add-in and feature restoration: correcting mailbox/license/add-in state returned disabled add-ins and scheduling features. Examples included restoring FindTime/Termin‑umfrage and enabling Microsoft Loop where the Loop button appeared grayed out after client or policy states were corrected.

• Client UI, propagation, and device remediation: expanding collapsed navigation or reconciling app-launcher tiles restored hidden Outlook/Groups entries. Short propagation delays (~10–30 minutes) commonly followed backend fixes. On managed mobile devices and desktop clients, reinstalling Outlook/Teams and completing enrollment/sign-in restored access; severe OS corruption or unactivated/unsupported legacy Office states sometimes required deeper device repair or OS upgrade.

After these corrections Outlook appeared in the Microsoft 365/Office apps list where applicable, accounts configured into Outlook/Teams/web/mobile regained visibility and access, Outlook features such as scheduling polls and Loop editing were restored, and related SSO and application errors ceased.

4. Mailbox permissions, client cache/add-ins, missing folders and quarantined mail
95% confidence
Problem Pattern

Microsoft 365 Outlook (new and classic desktop clients and Outlook on the web) exhibited mailbox, calendar and UI synchronization failures: messages, newly-created folders or group messages sometimes failed to appear in client views (occasionally only visible in OWA/search) or briefly appeared then vanished from both desktop and web with no trace. Office 365 group history and membership did not always sync for newly added members; categories/tags, replied indicators and folder ordering displayed incorrectly or duplicated; calendar items duplicated or conflicted. Clients experienced crashes, compose/reply hangs, persistent sign‑in prompts, and extreme slowness or startup failures correlated with very large or corrupted OST/PST caches; some missing items were later found in Junk/Quarantine or archived PSTs, and Windows 11 OneDrive/Explorer Save As integration occasionally failed with security/path‑length errors.

Solution

A broad set of Outlook desktop and web failures were resolved by addressing mailbox permissions and auto‑mount behavior, rebuilding or refreshing client identities and caches, isolating or removing add‑ins, switching client modes, and performing server‑side recoveries where required. Key consolidated remediations and observations included:

• Mailbox permissions and auto‑mounts: Correcting full‑access/send‑as permissions, forcing mailbox re‑synchronization or recreating profiles cleared auto‑mounted, phantom and conflicting mailbox mounts; server‑side permission fixes and membership propagation restored shared/group mailbox visibility.

• Client profiles, identities and add‑ins: Corrupted identities and persistent sign‑in prompts were cleared by creating new profiles and re‑authenticating; COM and web add‑in authentication or registration failures (including Teams, Salesforce and Adobe PDFMaker interactions) were isolated by disabling or re‑adding add‑ins, which restored scheduling, meeting integration and submission UI where they had blocked functionality.

• Local cache size/corruption and OST/PST handling: Severe slowness and startup failures correlated with very large or corrupted OST/PST files. Teams rebuilt, shrank or compacted caches, reduced Cached Exchange Mode retention, moved data to server‑side archives, or reprovisioned devices when OST corruption or device OS damage prevented recovery.

• Compose/reply, calendar and transient UI failures: Intermittent compose/reply closures, blocked calendar edits and UI regressions were often cleared by client restarts, profile/cache rebuilds or switching to OWA; persistent corruption required Office repair/reinstall or Microsoft‑side service remediation and, in unrecoverable cases, device reprovisioning or replacement.

• Outbox, duplicate sends and sent‑items caching: Duplicate outbound deliveries and delayed sends were traced to server‑side sent‑items caching and Outbox retries caused by oversized attachments or profile/OST conflicts. Remediations included server cache handling and client profile/attachment remediation; some incidents resolved spontaneously after resync.

• Message routing, quarantine and rules: Missing inbox items were recovered from Junk/Quarantine and by adjusting inbox rules, Safe Senders lists or Defender/Exchange false positive releases and signature corrections where indicated.

• Archive impacts, folder visibility and autocomplete: Missing messages stored in local archive PSTs were restored by locating and re‑attaching archive files or exporting/importing items. Empty subfolders, folder ordering jumps and stale autocomplete/Offline Address Book entries were resolved by forced resynchronization, profile recreations, or switching to the online GAL.

• Browser and OWA issues: Corrupted browser cache or cookies caused OWA failures; clearing browser data or switching browsers restored access in multiple incidents.

• Hardware and workstation failures: Defective devices or OS corruption (including damaged OST files) caused unrecoverable client failures; replacement hardware or reprovisioning resolved those incidents.

• OneDrive/SharePoint / Explorer save‑as failures: Cases were observed where saving Outlook items to OneDrive/SharePoint via File Explorer or Save As failed on Windows 11 with Windows security warnings on attachments and path‑length related failures; some instances allowed a temporary keep/accept but later produced errors. The ticket corpus did not contain a confirmed permanent remediation for these OneDrive/Explorer integration failures.

• Unresolved transient disappearances: Some incidents were documented where messages briefly displayed in the inbox and then vanished from both desktop Outlook and OWA with no record in search, Deleted Items or server quarantine; these events were observed but the corpus contained no definitive recovery or root‑cause for them.

Collectively, these remediations restored folder and message visibility, repaired launch and synchronization failures (including incidents requiring Microsoft‑side service recovery), removed add‑in impacts on UI and mail submission, refreshed stale address book/autocomplete state, resolved rendering anomalies and Outbox/delivery issues (including duplicate sends caused by server caching), and eliminated extreme client slowness caused by oversized caches or defective hardware.

Source Tickets (134)
5. New Outlook: change conversation grouping and reading pane arrangement
90% confidence
Problem Pattern

Users of New Outlook (Microsoft 365) reported that their inbox showed messages grouped into conversations/threads rather than as individual messages. In some cases conversation grouping persisted even after the user disabled it in Mail/Layout. Sorting appeared to apply to conversation groups rather than individual messages, and attachments were reported as missing or shown attached to other messages in the same conversation. No error messages were displayed; the issue was a user-facing organization/visibility problem in Mail view and reading pane arrangement.

Solution

Support changed the New Outlook layout settings via Settings (gear) > Mail > Layout to switch between showing emails grouped by conversation or showing each message separately and to adjust the reading pane arrangement (Newest on top, Newest on bottom). When users reported that sorting seemed to order conversation groups (not individual messages) or that attachments were not visible on the expected message, support set the mailbox to Show each message separately so individual messages and their attachments were visible. The summary reflected behavior specific to New Outlook in Microsoft 365: conversation view treated threads as a single sortable unit and could change where attachments appeared in the message list or reading pane.

Source Tickets (2)
6. mailto: links opening the wrong app because Windows protocol association pointed to Chrome
95% confidence
Problem Pattern

Compose or file‑open actions launched the wrong application or an internal UI instead of delivering email. Observed symptoms included mailto: links opening a web browser rather than the user's mail client, .msg files (for example when opened from Oasis) launching New Outlook instead of classic Outlook due to the Windows .msg file association, myCampus compose actions opening Care's internal messaging UI (messages remained internal and did not generate SMTP deliveries), and Bulk‑Mail producing recipient lists that included outdated addresses from prior course instances. Affected systems included Windows and macOS clients, web browsers, myCampus/Care, and mail clients (Outlook, Apple Mail).

Solution

Support resolved OS-level association issues by resetting the Windows mailto: protocol handler to the correct mail client (for example, mailto back to Outlook) and by restoring the .msg file association to the expected Outlook application after an upgrade/revert to New Outlook. Investigations showed that some third‑party apps (for example, Oasis) used Process.Start to open .msg files and therefore launched whatever application Windows had registered for the .msg extension. Separately, myCampus compose actions were found to sometimes invoke Care’s internal messaging UI rather than emit mailto: links; messages sent via that internal interface remained internal to Care and did not produce external SMTP deliveries (confirmed by mail server logs). The Bulk‑Mail mailto script was found to occasionally build recipient lists that included stale addresses from prior course instances; support regenerated recipient lists from current enrolment data and adjusted the recipient‑generation logic so prior‑instance addresses were excluded.

7. Free/busy or calendar shows another user as busy due to incorrect timezone or working hours
90% confidence
Problem Pattern

Calendars and scheduling tools showed incorrect times or availability: attendee calendars and Microsoft Teams marked users as busy when they were free, and Microsoft Bookings sometimes failed to surface existing Outlook appointments, causing double bookings. Problems appeared across Outlook Web (OWA), the New Outlook app, Outlook desktop, Teams and Bookings and could persist despite correct OS timezone settings. Users occasionally reported being unable to locate date/time or timezone controls in the Outlook web UI.

Solution

Two common root causes accounted for the incorrect free/busy and booking-availability behavior. One cause was the mailbox having an incorrect mailbox time zone and/or working hours; correcting the mailbox time zone and working hours via Outlook on the web restored accurate free/busy availability (changes required a short propagation window). Support sometimes had to open Outlook through office.com/apps to access the web UI date/time/timezone controls when those controls were not immediately visible. A second cause was breakage of calendar sync after workstation, account or Outlook desktop profile changes: investigations targeted Bookings-to-mailbox calendar sync, the user’s Outlook desktop profile and Exchange free/busy service, and issues were resolved by rebuilding or repairing the Outlook desktop profile and re-establishing Bookings’ connection to the mailbox which restored calendar sync and availability.

8. Legacy/external mailbox inaccessible due to lost password
93% confidence
Problem Pattern

Users were unable to sign in to IU Mail/Office365 (desktop Outlook, Outlook mobile, and OWA) and reported errors such as “Unable to sign in”, “password incorrect”, persistent authentication prompts, or being redirected to the university login page asking for a password. Affected mailboxes included legacy, external, student (iu‑study.org), and service accounts. Common triggers included locked, expired, deactivated, or mistyped credentials; expired or missing password‑reset links; absence of configured self‑service 2FA; deactivated external addresses left in Outlook profiles producing repeated prompts; Okta account or session issues; and account linkage or migration from legacy/previous employer domains (for example, iubh) that caused username mismatches or redirection confusion.

Solution

Support verified the exact mailbox identity (correcting typos, non‑obvious service/svc addresses, and username mismatches caused by legacy employer domains) and checked account status, expiration, and licensing. When the self‑service reset flow failed or reset messages went to an inaccessible IU mailbox, support sent reset links or temporary passwords to the user’s alternate/private or Okta recovery email; when no 2FA was configured support issued manual password resets and resent expired links as needed. Okta MFA or an Okta account reset was completed where required and restored access. For external/deactivated addresses that produced repeated Outlook sign‑in prompts support reactivated the external account, performed a password reset and sign‑in so the Outlook profile could be changed, then temporarily switched the profile’s default account and removed or reconfigured the external entry. Mobile client sign‑in failures were resolved after credential recovery using these same procedures; when tenant or license limits prevented client access support noted webmail access (for example, https://mail.iu.org/). When mail flow between IU and legacy/external/service mailboxes was disrupted, support forwarded or redirected incoming messages to the user’s internal account to resume communications and restore dependent systems (for example, the Safe Portal); support also documented that external forwarding to non‑IU addresses was blocked. Restoring or extending an external/service account’s termination date required submitting the “Extend external Service Account / Verlängere externen Service Account” form via the IT Service Portal (Jira Service Management). Mailboxes owned by other teams (for example, student accounts on iu‑study.org) were referred to the responsible team (Study‑Support, techsupport@iu.org). External users were noted to be able to access the IT Service Portal via Okta to open tickets if needed.

9. Request and provisioning of a new corporate mailbox
95% confidence
Problem Pattern

Requests to provision or enable corporate mailboxes or addresses in Microsoft 365/Exchange Online, including granting send-as/access and forwarding. Reported symptoms included mailboxes or addresses not appearing or discoverable in Outlook or Teams, old addresses persisting after account renames, inability to connect or authenticate with New Outlook while Outlook Classic worked, inability to send from an address as a separate Outlook account, conflicts with Microsoft 365/Teams unified groups hidden from Exchange clients, incorrect display name or primary email shown to recipients, and missing mailbox access or ticketing (OTRS) queue permissions during role changes.

Solution

Support confirmed the requested mailbox owner/responsible person and completed mailbox creation and access assignments. Newly created standalone mailboxes became available to designated users after directory propagation (observed from minutes up to a few days). When mailboxes or addresses did not appear in Outlook or Teams, short directory synchronization/propagation delays usually resolved visibility. One failure to find an address was traced to a Microsoft 365/Teams unified group with the same name that was hidden from Exchange clients (hiddenFromExchangeClientsEnabled); the group was mail‑enabled/unhidden and send‑as/access assignments were applied after inspecting and adjusting group properties with PowerShell so Outlook/Teams integration completed. Where an address needed to be used as a separate sending account (for example for Word mail‑merge), support converted a shared mailbox to a user mailbox and granted access to required users; existing forwarding and integrations (including Salesforce) were preserved or confirmed. When mailbox display names or the displayed/primary email were incorrect (for example a private address showing), administrators updated the mailbox/user account display name or primary SMTP address; changes required directory propagation and appeared across services after propagation. Account renames sometimes left the old address visible in Teams and other programs and could break New Outlook connectivity while Outlook Classic still worked; these symptoms resolved after directory/AD synchronization and, in one case, removal of an obsolete Wireless-CPG AD group membership which restored CPG-Corp Wi‑Fi authentication after ~5 minutes of AD sync. For role or team changes, support also granted mailbox access and any required OTRS ticket-queue permissions so the user could access queues tied to the mailbox.

10. Temporary auto-forwarding requests blocked by forwarding consent policy
80% confidence
Problem Pattern

Users requested automatic forwarding of mail from other organisational mailboxes (including former-employee or separate institutional accounts) to their primary mailbox to receive subscription or verification emails or to avoid signing into multiple accounts. Attempts to enable auto-forwarding were blocked or unavailable and no usable forwarding option was presented. The issue affected Outlook/Office365 mailboxes and was commonly triggered when the mailbox owner’s consent or a destination address was not supplied, or when forwarding was not supported for the account.

Solution

Support identified that the organisation's forwarding consent policy prevented automatic forwarding to another address unless written consent from the mailbox owner and a specific destination address were provided; cases were held pending until those details were supplied. In situations where forwarding could not be enabled (policy block or unsupported account types), support instead configured the user’s mail client to access both mailboxes from a single Outlook profile by adding the secondary account into Outlook; the configuration steps were provided and implemented so the user could view both inboxes without relying on forwarding.

11. Subscribe an external iCal/ICS calendar into Outlook Desktop
90% confidence
Problem Pattern

Users had an iCal/ICS feed (for example, lecture schedules) but could not find where to import or subscribe to it in Outlook (desktop, web, or mobile). Some users specifically asked how to automatically integrate external lecture schedules into their calendar and how to have those entries mark time as busy or block full days. No error messages appeared — the reported symptom was an inability to locate an import/subscribe workflow or a method to auto‑block time from an external feed.

Solution

The issue was resolved for the recorded case by subscribing to the iCal/ICS URL from Outlook Desktop: the calendar was added using Outlook Desktop's Calendar view via Add Calendar → From Internet, pasting the ICS/iCal URL and confirming; the calendar then appeared in the user's Outlook calendar list. The ticket corpus did not contain documented resolution steps for subscribing from Outlook on the web or mobile, nor for automatically converting imported schedule items into busy/full-day blocks; a related request about automatic blocking and BookWithMe integration was closed with no technical details recorded.

Source Tickets (2)
12. High memory 'Restart recommended' message in New Outlook (Windows)
81% confidence
Problem Pattern

New Outlook on Windows repeatedly displayed high‑memory alerts (e.g. "We’ve detected that your session is using an unusually high amount of memory. Click here to restart Outlook.") or explicit 'not enough memory' / 'no available memory' notifications, preventing access to mail and calendar. Affected clients showed very high RAM usage, frequent freezes or unresponsiveness (sometimes not terminable via Task Manager), and the behaviour persisted after closing and restarting Outlook and after system reboots; mailbox quotas were often reported as having ample free space.

Solution

Affected users were reverted from the New Outlook build to the legacy/classic Outlook client by disabling the Newest Outlook toggle; returning to classic Outlook removed the recurring 'Restart recommended' memory warning and restored usable performance. Where switching clients was not possible, the Outlook Web App (https://outlook.office.com/) was used as a temporary alternative. In at least one incident, creating a new Outlook profile resolved a persistent 'no available memory' error when closing/restarting Outlook and rebooting did not help; mailbox quotas in that case showed ample free space, indicating the issue was not storage-related. Several reports described New Outlook becoming unresponsive and, in some cases, not terminable via Task Manager requiring a full system restart. The behaviour was identified as a known defect in the then-current New Outlook build and a Microsoft fix was awaited; support occasionally retried the New Outlook toggle to confirm when the build was corrected.

13. Missing Auto‑Complete / nickname cache entry reappeared after sending to the address
95% confidence
Problem Pattern

A colleague's email address stopped appearing in Outlook's Auto‑Complete dropdown when typing their name (likely removed by clicking the 'X'); the contact still existed in the address book and attempts to delete/re-add the contact or clear the Auto‑Complete list did not restore the suggestion.

Solution

The missing Auto‑Complete entry was restored after sending an email to the address (for example replying to an older message from that contact). The address re‑appeared in the Auto‑Complete list within about 24 hours after an outbound message to that recipient.

Source Tickets (1)
14. Make an Outlook calendar viewable or editable by colleagues (calendar sharing permissions)
90% confidence
Problem Pattern

Users reported calendar entries (including Microsoft Bookings appointments) that were not visible to colleagues or in Bookings, or calendars that behaved as personal/owner-only with no matching Microsoft 365 Group/Team. Symptoms included missing appointments in Bookings, missing items in colleagues' Outlook calendars, inability to add delegates or share the calendar, undeletable recurring events with persistent reminders after the creator left, and delegates not receiving meeting accept/decline notifications due to mailbox-owner Outlook settings or UI differences.

Solution

Access and visibility problems were resolved across three recurring scenarios. For calendars owned by a Microsoft 365 Group/Team or configured as shared resources, support updated the calendar's sharing permissions, granted specific people (or Everyone) view or edit rights, and created/sent sharing links or invitations when the Outlook client supported that flow. For personal/owner-only calendars and orphaned events (including undeletable recurring series created by departed staff), IT could not directly grant access; these incidents were resolved when the calendar owner or team owner added the requester as a delegate or removed the orphaned series, or when the calendar was converted to a shared Group resource and sharing rights were then applied and invitations sent. For missing Bookings appointments and related visibility issues, support verified user permissions and Azure AD group membership and added missing users to the appropriate groups; unexplained tenant-level synchronization or visibility problems were escalated to Microsoft (PSR opened) and resolved after Microsoft investigated and remediated tenant-side issues. Separately, cases where delegates did not receive meeting acceptance/decline notifications were traced to mailbox-owner Outlook settings or differing client UI that prevented enabling the option to deliver meeting-related messages to delegates; support documented and advised owner-side changes (including adding the delegate and enabling the relevant meeting-message copy settings) and recorded these attempted steps when changes had to be made by the mailbox owner, with no resolution confirmed in one ticket when owner-side action remained outstanding. Each incident concluded with either updated sharing/delegate permissions and sent invitations/sharing links, the owner adding the requester with appropriate rights (or removing orphaned items), the user being added to the correct Azure AD group, or Microsoft remediation after PSR escalation.

15. Aggregate mailbox response‑time reporting (linking incoming and outgoing messages)
70% confidence
Problem Pattern

Teams needed Outlook/365 visibility into email activity both at conversation and mailbox levels: (1) aggregate response‑time metrics showing whether incoming messages were answered or forwarded within defined time windows and trends, requiring reliably linking related incoming and outgoing messages even when subjects changed; (2) per‑address activity/status checks and last inbound/outbound timestamps for mailbox cleanup or auditing. ConversationId that links related messages was not visible in the standard Outlook UI, complicating reliable joins.

Solution

Aggregate response‑time reporting was produced by exporting mailbox message metadata that included Exchange/Graph conversationId values and message timestamps, then joining incoming and outbound items on conversationId to compute response‑time windows and trends. Message metadata extracts were performed via Microsoft Graph API (or PowerShell calling Graph), with exports automated by Power Automate or scripted jobs and stored as datasets in OneDrive/SharePoint; Power BI consumed the joined dataset to produce aggregate metrics and time‑series reports. For mailbox‑level activity and cleanup requests, the address list was extracted and mailbox statuses were checked in the Outlook/Exchange admin interfaces; mailbox audit sources (MessageTrace, unified audit logs or the Graph audit endpoints) were queried to obtain the last inbound and last outbound message timestamps. Those mailbox‑level results were exported to Excel for reconciliation alongside the dataset reports. This approach removed reliance on subject lines for conversation aggregation and provided per‑mailbox last‑activity data for administrative cleanup.

Source Tickets (2)
16. Outlook365 on Windows attaching files as OneDrive links instead of direct attachments
95% confidence
Problem Pattern

Senders composing mail in Outlook for Windows added local files and observed Outlook converted them into OneDrive share links instead of including traditional file attachments; recipients received links they could not open. Choosing the Outlook 'Upload to OneDrive' option (or other actions that uploaded the file) sometimes produced an intermittent German-language popup reading “Bitte hier klicken, um die Sicherheit zu garantieren” that redirected to https://outlook.office.com/owa/stepupauth.aspx and opened a blank page. The behavior reproduced only in the Outlook desktop client on Windows (Windows 10/11) and was not seen in Outlook Web (OWA) or on macOS.

Solution

The issue was reproduced as an interaction between Outlook for Windows and OneDrive rather than an account compromise or phishing link. When senders uploaded files via the Outlook 'Upload to OneDrive' flow, Outlook created OneDrive share links and an intermittent German-language step-up auth popup redirected to outlook.office.com/owa/stepupauth.aspx and opened a blank page; this behavior was limited to the Outlook desktop client on Windows. Sending the same files as traditional attachments avoided the problem: attaching the file by dragging it into the right side of the Outlook compose window caused Outlook to include the file as a standard attachment (for example, a normal PDF attachment) instead of generating a OneDrive share link. The popup/redirect behavior was classified as an Outlook for Windows desktop client bug and was not observed in OWA or on macOS.

Source Tickets (2)
17. Cannot open .dat email attachments (format, not mailbox permissions)
95% confidence
Problem Pattern

Recipients reported they could not open an email attachment with a .dat extension and suspected mailbox permissions or Outlook errors. The message contained a data export (labelled e.g. 'Pearson Eligibility Errors') where the attachment did not open in standard applications and produced no specific Outlook error code.

Solution

Support identified the attachment as a .dat data export rather than a general document and concluded it was a file‑format issue rather than a mailbox permission problem. The .dat content was converted into a text‑based format that the user could open and review, and the converted file was provided to the requester.

Source Tickets (2)
18. Undelivered/bounced messages due to outdated external addresses in upstream systems
95% confidence
Problem Pattern

Automated or individual emails to IU recipients were undelivered, bounced, silently dropped, or severely delayed because recipient addresses or forwarding records in upstream/profile systems were outdated or incorrect, or because of SRS/forwarding, sender identity or mailflow restrictions, mailbox licensing, anti‑spam/quarantine filtering, sender reputation/blocklists, or platform outages. Reported symptoms included NDRs and SMTP errors (for example “550 5.4.1 Access Denied”), Blocked‑Bounce reports with SRS‑encoded addresses, messages shown as delivered in IU logs but not appearing to recipients, bulk sends stuck in Drafts, scan‑to‑email deliveries delayed or lost, and persistent deprecated addresses in Outlook autocomplete. Affected systems included IU Outlook/Exchange and integrations such as CARE, EPOS, Oppy/VuV, Salesforce/Marketing Cloud/Qualtrics (AWS SES), campus scanner services, and MyCampus.

Solution

Delivery and send failures were resolved by correcting recipient records and upstream integration state, repairing mailbox/server/licensing problems, removing forwarding or deactivated sender states, releasing or permitting quarantined/sender identities, and removing senders/IPs from external blocklists. Notable outcomes and actions included: • Upstream profile and contact records (for example CARE, EPOS, MyCampus and Oppy/MS Oppy on VuV) were updated to the current internal addresses, which restored password‑resets, GEP login and other automated deliveries. • Where support lacked direct permissions to change profile records (for example Oppy/VuV), the update was completed via the SalesTech Service Portal. • Forced integration refreshes (for example Oasis→MYlibf) restored portal password‑reset and confirmation messages. • An Outlook bulk send stuck in Drafts cleared after removal of an ex‑matriculated recipient record containing an external address, allowing the message to be resent. • A send failing with “550 5.4.1 Access Denied” was resolved after correcting mailbox/mail‑server state and re‑setting up the Outlook client. • A transient Microsoft 365 licensing outage produced rejections until licenses were restored. • Removal/reactivation of Salesforce automations and mailbox forwarding restored expected deliveries when forwarding or deactivated senders were implicated. • Marketing Cloud “Blocked Bounce” reports were reconciled with Exchange/anti‑spam and quarantine logs and external blocklist checks; releasing quarantined messages, permitting the sending domain/IP through Exchange allowances, and removal from blocklists restored delivery. • Migration of Qualtrics SMTP to AWS SES had blocked invitations when sending was restricted to @iu.org; delivery resumed after permitting the Qualtrics SMTP identity through Exchange transport allowances and aligning the sender identity. • SRS/forwarding encoded bounces were investigated by correlating forwarded/SRS‑encoded addresses with student/contact records and forwarding logs; where forwarding or SRS addresses were active they were corrected or removed, or specialist teams were engaged to remediate the upstream forwarding state. • A global scan‑to‑email incident that produced severe delays or losses was resolved after a backend/service‑side fix deployed on 2025‑08‑04. Investigations and reconciliations routinely used LetterWriter and emailprocess logs, postmaster bounces (including SRS‑encoded addresses), Exchange quarantine and anti‑spam logs, transport/mailflow/transport‑rule reviews, external blocklist checks, and checks of recipients’ Junk/Spam folders and Outlook client behavior. When recipient‑side configuration or downstream filtering caused delivery failure, support engaged recipient/domain contacts to confirm mailbox existence, MX/SMTP acceptance and anti‑spam settings.

19. Edit received message to remove attachments in New Outlook
95% confidence
Problem Pattern

New Outlook lacked several post-delivery mailbox management features present in classic Outlook: the reading pane did not allow editing a received message (Save offered only a .msg via 'Save As'), shared mailbox color-category management controls were greyed out, and New Outlook did not expose 'Recall This Message' for messages sent to external recipients. Message recall also failed when recipients had already read the message. Users reported accidental CCs or delivery to external/student mailboxes and requested removal or modification of delivered items.

Solution

Support used multiple approaches depending on the feature gap and delivery scope. For editing a received message in New Outlook, support opened the message in its own window and used the built‑in Edit Message action (Move → Actions → Edit Message); attachments were removed via the ribbon and the message was saved, which modified the existing mailbox item rather than producing a .msg file on disk. For mistaken sends where recall was required, support installed and ran the older/classic Outlook client and used its 'Recall This Message' feature against Exchange/Exchange Online; recall succeeded only under the standard Exchange constraints (for example, intra-organization scope and recipient unread status). When messages had been delivered to external or other-account mailboxes and recall was unavailable or had failed, support identified the item in the recipient mailbox and performed a hard delete of the item from that mailbox, then confirmed deletion completed. Separately, Microsoft confirmed that New Outlook did not provide the capability to manage color categories on shared mailboxes and that this capability could not be enabled by IT; where category management was required, support relied on classic/older Outlook (or a client that exposed the shared-category controls) to make the changes.

20. Administrator-set automatic replies for a departed employee mailbox
95% confidence
Problem Pattern

Automatic-reply/absence messages for Exchange/Outlook were missing, delayed, incorrect, or not visible in client UIs. Senders sometimes received no out‑of‑office notices for absent or departed users, or forwarding targets continued to receive stale automated replies originating from deactivated mailboxes (including ticketing-system messages). Outlook/OWA, Microsoft Teams, or Salesforce sometimes showed no absence status after administrator changes, and unattended mailboxes were reported where requesters sought either forwarding or out‑of‑office notifications.

Solution

Issues were resolved by administrators creating or updating Exchange/Outlook automatic-reply entries and by taking actions on mailbox forwarding and deactivated accounts. Administrators set internal and external reply text (including bilingual messages when requested), added alternate contact addresses when provided, and applied date-range/expiry values. For cases where deactivated mailboxes or forwarding produced stale ticketing-system replies, administrators cleared or replaced the original mailbox auto-responder and, where appropriate, disabled mailbox forwarding at the source; they also verified the deactivation state and the active/deactivated Automatic Replies status for the accounts. Support noted that absence/status visibility in client UIs (Outlook/OWA, Teams, Salesforce) could lag after Exchange changes. When mailbox owners were available, support guided them on enabling Automatic Replies in Outlook Web App or Outlook, and when delegation was involved support adjusted or advised on delegation settings so the correct absence message was applied.

21. Outlook sign-in failures caused by federated SSO/Okta credential issues
92% confidence
Problem Pattern

Microsoft 365/Outlook authentication failures across desktop, mobile and web clients presenting as repeated sign‑in prompts, authentication or redirect loops (web/mobile 'Detected repeated redirects'), explicit errors such as 'Unable to sign in', 'Couldn't find a match', 'You can't sign in here with a work or school account', desktop error code 135011, persistent IMAP password prompts on iPhone Mail, missing shared mailboxes, loss of Outlook search or SharePoint/OneDrive access, or client‑specific timeouts such as Outlook for Mac 'The sign‑in took too long'. Failures commonly followed Okta/Microsoft credential or MFA changes, account identifier updates or account transitions (for example surname/email changes or migration from an external address), simultaneous multiple Microsoft account sessions in a browser, client updates, or device/Intune enrollment and Outlook activation events.

Solution

Authentication problems were resolved when the user's Microsoft/Okta identity and the client account state were restored to a single, consistent supported state. Observed successful resolutions included: resetting the user's Okta or Microsoft 365 password, which restored mailbox access and stopped repeated Outlook/IMAP prompts; forcing MFA enrollment or registering missing factors (for example assigning Okta‑MFA group membership and configuring Okta Verify), which restored Outlook search and SharePoint/OneDrive access; re‑registering hardware security keys or biometric factors after YubiKey/Windows Hello/Touch ID failures; separating simultaneous Microsoft account sessions by using different browsers, browser profiles, or private windows to remove session conflicts that produced persistent refresh/loop states; removing and re‑adding problematic accounts in the desktop client or adding the primary account during a remote support session when the client rejected sign‑in with messages such as 'You can't sign in here with a work or school account. Use your personal account instead.'; switching from native iPhone Mail to Outlook for iOS (which used M365 SSO) to stop repeated IMAP prompts; simple device restarts for transient sign‑in loops; using Outlook Web or web Teams as temporary access while desktop sign‑in issues persisted; addressing browser‑specific Deskbird/Firefox interactions by using Edge/Chrome or the desktop client; and device remediation such as Intune re‑enrollment or a full device fresh start after Outlook installation or activation failures. Client logs frequently lacked detailed error information; desktop error code 135011 and web/mobile 'Detected repeated redirects' were observed in some failures. Some Outlook for Mac sign‑ins timed out with 'The sign‑in took too long' while Office.com web SSO still succeeded, and in those cases support sometimes left the record closed when web access met the user's needs. A number of incidents were recorded as restored with no documented remediation (for example after account transitions or backend propagation), indicating that account/identity propagation could resolve certain cases without local changes.

22. Exchange Online / Outlook recipient and send‑rate limits (per‑message, daily, rate)
95% confidence
Problem Pattern

Users attempted bulk sends from Outlook/Exchange Online or tried to create/send to large distribution lists and experienced delivery failures, outbound blocks, or hard member limits in Outlook. Symptoms included undeliverable bounces stating 'the sending email address was not recognized as a valid sender', outbound mail rejected as spam, Outlook preventing creation of large lists, or Word mail-merge messages embedding the logged-in user's private account/reference. Triggers included large or frequently changing recipient lists (hundreds to over a thousand recipients), tenant-level temporary reductions of per-message recipient caps, or standard Exchange Online sending limits. Affected systems were Outlook, Exchange Online/Exchange, Microsoft 365 groups, AD/Entra-synced groups, and mail-merge/Word.

Solution

Support documented Exchange Online platform sending defaults and described what resolved each incident. Platform-default limits were stated as 500 recipients per message, roughly 5,000 recipients per day, and an estimated send rate around 30 messages per minute; the 500-per-message cap was identified as a platform limit that generally could not be raised and prior attempts to increase it had triggered anti-spam throttling and delivery failures. For large or frequently changing audiences support implemented and validated alternatives: mail-enabled distribution groups (including dynamic groups maintained in Azure AD/Entra and synced from systems such as Salesforce or Okta); Microsoft 365 groups with mail functionality — either dynamic M365 groups when members were identifiable by AD attributes or manually-managed M365 groups populated with a bulk-add tool (an internal app was used successfully to add >100 members). Other successful mitigations included splitting large recipient lists across multiple messages and using dedicated mass-mailing/broadcast services (e.g., Mailchimp/CleverReach) when identity control and scale were required; Word mail-merge was noted to be unsuitable for some B2B mass mailings because it attached the private reference/account of the logged-in user. In security-triggered incidents where tenant administrators temporarily reduced outbound recipient limits (an example lowered the cap to 25 after a phishing event), support resolved delivery failures and bounce messages (including 'sending email address was not recognized as a valid sender') by reverting the tenant-level change and restoring normal outbound sending; in one case a client restart was advised after the tenant change was reverted and sending resumed.

23. Renaming a resource mailbox address while preserving existing calendar bookings
95% confidence
Problem Pattern

A resource mailbox (pool vehicle) needed its booking email address changed to a new SMTP address effective on a specific future date while keeping all existing calendar bookings intact. The request required the mailbox address to change without losing or altering current appointments.

Solution

The resource mailbox SMTP address was renamed on the requested date from BRH2-EF-IU712@iu.org to BRH2-EF-IU311@iu.org. Existing bookings remained intact after the rename and the mailbox/address change was visible in Outlook; the user verified the result.

Source Tickets (1)
24. Personal Microsoft account sign-in blocked in New Outlook on managed Windows 11 devices
60% confidence
Problem Pattern

On Windows 11 devices where Outlook (New Outlook) and the device were managed by the user's institutional Microsoft account, attempts to add a secondary/personal Microsoft account failed. The attempt produced a group‑policy block message such as "Sign‑in with Microsoft account not possible. This program was blocked by a group policy" with error 0x800704ec. Third‑party calendars imported via iCal succeeded, but direct personal Microsoft account sign‑in was blocked.

Solution

IT determined the sign‑in failure was caused by the device and New Outlook instance being managed by the user's institutional Microsoft account and by an applied group policy that blocked Microsoft account sign‑ins (manifesting as the error "This program was blocked by a group policy" and code 0x800704ec). As a result, adding a secondary/personal Microsoft (@live) account to New Outlook on the managed device was not possible; no in‑ticket remediation was applied. Importing third‑party calendars via iCal (for example GMX) had succeeded despite the policy, and users reported UI differences when attempting the operation in New Outlook versus legacy Outlook.

Source Tickets (2)
25. Mailbox forwarding to an external Salesforce case address not active
90% confidence
Problem Pattern

Mailbox-level automatic forwarding configured in Outlook for organizational/shared iu.org mailboxes failed to deliver incoming mail to external Salesforce case addresses (case.salesforce.com). Incoming messages continued to route to legacy Freshdesk SMTP targets or did not appear at the Salesforce case address. Sales‑force verification emails for affected mailboxes were left pending, expired, or were delivered to a previous/renamed mailbox address and therefore were not completed. Affected systems included Outlook shared/organizational mailboxes and Salesforce case ingestion.

Solution

Forwarding for affected organizational/shared mailboxes had been applied at the mailbox level in Outlook, replacing legacy Freshdesk SMTP targets with the designated Salesforce case (case.salesforce.com) addresses. Typographical errors in target addresses were corrected and mailbox email IDs were updated where mailboxes had been renamed so verification messages would be delivered to the current address. Mailbox owners completed the Salesforce verification emails (two per mailbox: address add and address mapping) when available; where verification links had expired, support completed the mailbox verification in the backend. Mailbox-level settings were saved and allowed to propagate; after propagation incoming messages were delivered to the Salesforce case addresses.

26. Company Portal Self‑Service Tool restored Teams/Outlook sign‑in (Error 1001)
90% confidence
Problem Pattern

User could not sign into Microsoft Teams, Outlook or their account; the sign‑in flow failed and applications were inaccessible, with an on‑screen "Fehler 1001" (Error 1001) reported. The issue recurred after a prior incident and affected managed devices using the Company Portal.

Solution

Access was restored after the Company Portal Self Service Tool (IU-DE-AAD-ASS-INTUNE-IT-EPM_Self-ServiceTools) was installed from the Company Portal. Installing that app via the Company Portal resolved the Error 1001 sign‑in failure and returned Teams, Outlook and account access to normal.

Source Tickets (1)
27. Malformed HTML/MIME in templates causing inline images to be cut off or not render
80% confidence
Problem Pattern

Sent messages that included screenshots or inline images rendered with the image cut off, missing or an abruptly truncated <img src> tag in the HTML part. Symptoms appeared in raw message source (broken HTML img tag, missing external resource reference) and manifested as missing inline images in Outlook and other clients. Problem occurred for emails generated from templating systems (e.g., Salesforce Opportunity templates) whose MIME parts were malformed.

Solution

Investigated raw MIME of the offending templates and found the HTML part and embedded image handling were malformed (truncated tags and incorrect multipart structure). The template generator was corrected so messages used a proper multipart/related / multipart/alternative structure and image references were delivered as valid Content-ID (cid) parts or well-formed external URLs instead of broken inline Base64 in the HTML part. After regenerating the templates and sending test messages, Outlook and other clients rendered the images normally.

Source Tickets (1)
28. Outlook repeatedly showing signature-related pop-up due to embedded logo image
90% confidence
Problem Pattern

Outlook on a new device repeatedly displayed a pop-up dialog when composing or replying at the moment the automatic signature (which included an embedded IU logo image) was inserted. The symptom did not occur on the old device and appeared tied to the signature asset insertion step during compose.

Solution

Technician rebuilt the problematic signature in the Outlook client. The user opened Outlook's Signatures editor, made a trivial edit and switched signatures to trigger the save prompt; confirming saved changes forced Outlook to regenerate the local signature data and cleared the repeated pop-up. The issue was attributed to the embedded logo asset in the signature and was resolved after re-saving the signature.

Source Tickets (1)
29. Third‑party service (Calendly) cannot deliver directly to Microsoft 365 Groups / Teams group mailboxes
90% confidence
Problem Pattern

Third‑party scheduling and CRM services (for example Calendly, HubSpot, Salesforce) intermittently failed to interact reliably with Microsoft 365 mailboxes and calendars. Symptoms included service‑generated scheduling or notification emails addressed to Microsoft 365 Groups or Teams group mailboxes not appearing in the group inbox; senders being blocked by Teams/Microsoft 365 Group send restrictions; Outlook add‑ins or integrations reporting Exchange connection errors (for example “Something happened when we tried to connect to the Exchange server” with no further details); and calendar integrations failing to connect or reauthenticate when tenant Azure AD enterprise apps were not approved or during Microsoft authentication outages. In at least one case a Salesforce integration routed an Office mailbox into a Salesforce queue so incoming replies did not appear in users’ Outlook inboxes.

Solution

Observed failures were resolved by aligning integration authentication and mailbox delivery models with Microsoft 365 group and calendar behaviors and, where necessary, informing customers of SaaS routing limitations. Resolution patterns included: 1) Delivery and sender‑permission issues: when third‑party services required a standard mailbox to authenticate or were blocked by Teams/Microsoft 365 Group send restrictions, a dedicated user/service mailbox was provisioned for the integration to authenticate and send/receive; messages were forwarded or shared from that mailbox into the Microsoft 365 Group mailbox when group delivery was required, and administrators granted specific sending addresses permission to send to the target group to restore delivery. 2) Integration and authentication failures: for integrations that relied on Azure AD enterprise applications, tenant administrators approved/whitelisted the enterprise app and granted affected users permission to add the Outlook add‑in; specialists then completed the mailbox‑to‑app connection and configured scheduling so booked events generated Teams meeting invites. Separately, a widespread Calendly–Outlook outage was traced to a Microsoft authentication service disruption; after Microsoft restored authentication and affected accounts re‑authenticated, users were able to reconnect their Outlook calendars and calendar availability returned. 3) CRM queue ingestion limitations: investigation confirmed at least one Salesforce configuration routed an Office mailbox into a Salesforce Queue so incoming replies did not surface in users’ Outlook inboxes; because the SaaS routing behavior could not be changed, the customer was informed of this limitation. 4) Exchange connectivity failures: in one case the Salesforce App for Outlook reported an Exchange connection error (“Something happened when we tried to connect to the Exchange server” with the details link blank); restoring Exchange connectivity cleared the error and allowed Salesforce logging from Outlook to succeed.

30. Course-feed/Group meeting creation delayed by Delivery Management policy validating a very large Dynamic Distribution List
70% confidence
Problem Pattern

Newly created channel/Teams meetings, Course Feed group calendar events and planner notifications were not visible in organizers' Outlook and Teams calendars for extended periods (typically tens of minutes up to ~1–2 hours). The delay was reproducible for some Course Feed groups but not all and was seen in Outlook Web and Teams. Incidents correlated with either Delivery Management policy membership validation against very large Dynamic Distribution Lists or with automatic Teams creation via the PA Flow (often after a Teams client/rollout change).

Solution

Root cause analysis identified two distinct patterns found in the ticket set. In the first, Microsoft confirmed Delivery Management policy membership validation against a very large Dynamic Distribution List (IUG-IU-Students-All, ~184k members) caused long group resolver (CATRESLPR) lookups and delivery delays of ~20+ minutes; remediation changed the delivery/validation configuration so the group resolver no longer performed expensive lookups against that large DDL (for example by removing or excluding the DDL from the policy or using a differently scoped group), after which meetings and calendar items returned to normal timing. In other incidents, tickets reported longer visibility delays (around 1–2 hours) that began after a Teams version rollout and were reproducible only for some Course Feed teams; Microsoft support indicated automatic Teams creation via the PA Flow as a likely correlate in those cases. Those PA Flow–related incidents showed no error codes in the tenant logs and did not record the same DDL-related remediation, so the PA Flow/team-creation path was identified as a separate avenue for investigation when DDL lookup latency was not present.

Source Tickets (3)
31. Directory / Outlook profile job‑title field limited to single line and character cap
90% confidence
Problem Pattern

A user attempted to display two job roles in their Outlook profile / Global Address List entry but the profile job‑title field only allowed a single line and enforced a character limit. The issue affected directory/profile management (GAL/Exchange/AD) and Outlook display; no error messages were reported, only the inability to enter or show both titles in full.

Solution

Support reviewed the directory and GAL attribute constraints and confirmed the job‑title attribute only accepted a single line and was character‑capped. The user was informed of the limitation and advised that only one full title (or a shortened/combined title within the character limit) could be stored and displayed in the Outlook/GAL profile. The user accepted the restriction and no further changes were made.

Source Tickets (1)
32. Request and enablement of certificate‑based (S/MIME/PKI) encrypted email in Outlook on Windows 11
95% confidence
Problem Pattern

Outlook on Windows (Windows 10/11) users were unable to send certificate‑based (S/MIME/PKI) encrypted email. Symptoms included the S/MIME/encrypted‑mail option being missing or unavailable, encrypted messages failing to send to specific external organisations (notably Arbeitsagentur / BA Munich) despite receiving encrypted mail from them, or inability to encrypt to contacts because recipient certificates or Outlook address‑book entries were absent. Affected components included user and recipient S/MIME certificates, Outlook profiles, certificate stores, and Outlook address books (openkeys).

Solution

Issues were resolved by ensuring end‑to‑end presence and registration of the required S/MIME certificates and address‑book entries. Where users lacked a personal S/MIME certificate, Cloud Operations issued the certificate, an enrollment appointment installed the certificate on the Windows 10/11 device and bound it to the user’s Outlook profile, and S/MIME/encrypted‑mail sending was then verified; users were briefed on certificate usage. Where sending to an external organisation failed, the recipient organisation’s current S/MIME certificates were obtained and imported/registered into affected users’ certificate stores or accounts; after importing or updating those recipient certificates, encrypted messages to that organisation succeeded. In at least one case the inability to encrypt was caused by a missing Outlook address book required for the recipient (the openkeys address book); deploying the openkeys address book to Outlook and importing the recipient (Arbeitsagentur) certificate into it restored encrypted‑mail capability. All changes were recorded and verified following the organisation’s S/MIME/Outlook guidance.

33. Mobile mailbox setup: no incoming/outgoing hostnames available
90% confidence
Problem Pattern

User could not finish email setup on a smartphone because they did not have the incoming/outgoing mail server hostnames and could not manually configure a mobile mail client. The device and mail client were not providing any specific error codes; the account was a corporate IU email address.

Solution

The user installed the Microsoft Outlook mobile app and signed in with their IU credentials; Outlook automatically provisioned the account without requiring manual incoming/outgoing hostnames. The ticket was closed after the user confirmed the account was added and no further questions were raised.

Source Tickets (1)
34. Apple ID conflict after organization claimed corporate email domain (temporary.appleaccount prompts)
95% confidence
Problem Pattern

An iPhone repeatedly prompted for the password of an Apple ID tied to a corporate @iu.org address that the organization had claimed, preventing the device from retrieving mail and calendar. The phone showed prompts referencing temporary.appleaccount.com and reported the original Apple ID no longer existed.

Solution

Support explained that the corporate takeover of the @iu.org address prevented it from being used as an Apple ID and that the address could not be released back to the user. The user was instructed to create or use a different Apple ID (for example a personal @icloud.com or another non‑IU address) so the device could sign into Apple services and restore mail/calendar access.

Source Tickets (1)
35. Unexpected Outlook group invitations originating from internal IT changes
90% confidence
Problem Pattern

Team members received ambiguous or unexpected Outlook group invitation emails whose group name and origin they could not identify. Emails appeared suspicious to users because the invitations were unsolicited and lacked clear context.

Solution

IT investigated and confirmed the invitations were generated by internal IT changes rather than a security incident. Users were informed that the messages were benign and that no action was required; the ticket was closed after communicating the origin and reassuring affected staff.

Source Tickets (1)
36. Outlook language/locale switching to English then self‑resolving
80% confidence
Problem Pattern

Outlook repeatedly displayed UI, email content labels, and date/time formats in English despite the account and profile showing the correct (German) language. The language reverted to English each time Outlook was reopened or refreshed and affected both classic and New Outlook views.

Solution

The issue resolved itself without administrative intervention and Outlook returned to the expected German locale. Prior user attempts to change language options, synchronize Microsoft 365 settings, and clear browser data had not prevented the transient language switch; no further action was required after the self‑resolution.

Source Tickets (1)
37. Attempted message recall after accidental send to external recipient
60% confidence
Problem Pattern

A user urgently attempted to recall an email sent to an unintended external recipient (a student) that had been sent about a week earlier. There were no explicit error messages; the user was concerned the recall would not succeed because the message was likely already read.

Solution

It was noted that a recall attempt was unlikely to succeed in this scenario because the message had been sent externally and had sufficient time to be delivered and potentially read. The ticket recorded that recall success was doubtful given those conditions and advised accordingly; no successful remote removal of the message was achieved.

Source Tickets (1)
38. New Outlook taskbar envelope (notification badge) not reliably showing
50% confidence
Problem Pattern

New Outlook for Windows exhibited inconsistent taskbar mail-badge and unread-count behaviour: the badge sometimes failed to appear for new mail, did not clear when messages were marked read, or displayed unread counts when no unread messages existed. The badge occasionally only refreshed after launching Outlook or briefly appeared then disappeared while unread messages remained. Affected components included the New Outlook app and the Windows taskbar; some incidents involved the taskbar referencing an 'Outlook (classic)' instance rather than the New Outlook.

Solution

Investigations documented intermittent and inconsistent taskbar mail-badge/unread-count behaviour in New Outlook for Windows. In several cases the issue was traced to the taskbar shortcut referencing the wrong Outlook instance; replacing the taskbar entry with the active New Outlook application corrected the unread-email indicator for those users. Other reports showed the badge would temporarily refresh after launching Outlook but did not produce a consistent fix; those occurrences were recorded for further investigation. The same ticket also included a separate PowerPoint/ThinkCell error that was identified as a known Microsoft issue and not caused by ThinkCell.

Source Tickets (2)
39. Python smtplib authentication failing with Exchange Online because basic SMTP auth was blocked / OAuth2 required
40% confidence
Problem Pattern

SMTP clients and automation nodes (Python smtplib scripts, n8n Send Email node, and similar) failed to authenticate or send mail to Exchange Online/Microsoft 365. Symptoms included authentication failures such as 'credentials are incorrect' or '535 5.7.3 Authentication unsuccessful' after STARTTLS, and server responses like '451 5.7.3 STARTTLS is required to send mail'; users also reported inability to use app‑specific passwords when MFA was enabled. Failures commonly appeared when tenants or mailbox policies disallowed basic SMTP AUTH or required modern OAuth2/TLS-based authentication.

Solution

The failures were traced to Exchange Online/tenant policies rejecting legacy/basic SMTP authentication or enforcing TLS/OAuth2 requirements. In reported cases the incidents were resolved when administrators provided a supported, centrally managed authentication path: they registered an Azure AD application, granted Mail.Send application permissions with admin consent, and the sending code was changed to use OAuth2 (client‑credentials via MSAL to obtain an access token and then send mail through Microsoft Graph or SMTP XOAUTH2). As alternatives that were accepted in affected environments, administrators enabled SMTP AUTH for the mailbox or created an Exchange Online SMTP relay/connector dedicated to application/service traffic so the automation could submit mail without using a personal mailbox. For environments where the automation could not be updated to use OAuth2 (for example the n8n Send Email node in a self‑hosted instance), teams also used an internal SMTP relay/service (AWS SES or similar) as a permitted outbound SMTP path. Reported diagnostic symptoms included 'credentials are incorrect' after STARTTLS, '451 5.7.3 STARTTLS is required', and authentication failures where MFA and app‑password policies prevented legacy client logins.

Source Tickets (2)
40. Block or mute a harassing user in Outlook and Microsoft Teams
90% confidence
Problem Pattern

A user received persistent harassment from a student via Microsoft Teams direct messages and email despite removal from a Course Feed. The reporter could not find a clear 'block' option in Teams and asked for assistance to stop further messages and email contact.

Solution

Support used Outlook's Block-sender feature on an email from the student and then muted the user's chat in Microsoft Teams. Blocking the sender in Outlook also prevented the sender in Teams in this case, and muting the chat via the Teams chat options silenced subsequent messages and calls. After those actions the reporter and colleagues stopped receiving further harassment.

Source Tickets (1)
41. Outlook automatic translation uses default formality and cannot be forced to 'du' or informal tone
90% confidence
Problem Pattern

Outlook's built‑in message translation produced high‑quality German but used formal address ("Sie/Ihnen") instead of the company's desired informal "du" form. Users asked what prerequisites exist, whether all employees can use the feature, and whether admins can enforce a less formal translation style. Systems involved: Outlook desktop/web translation feature and Microsoft 365.

Solution

Support confirmed the translation capability in Outlook was a client/user‑side built‑in feature (separate from Microsoft 365 Copilot) and was available to all users. There was no configuration exposed to end users or tenant admins to control translation style, tone, formality (e.g., 'du' vs 'Sie'), or gendering; the translator produced the standard formal German by default. The outcome communicated to the requestor was that there was no admin or client setting to force an informal translation style, so any change required providing manually‑localized text or using a separate translation workflow outside the built‑in Outlook translator.

Source Tickets (1)
42. Unexpected high volume of SharePoint/Document‑library notification emails
80% confidence
Problem Pattern

A mailbox received an unusually high and repeated stream of automated notification emails (ranging from recurring hourly messages to bursts of hundreds per hour) originating from automation systems such as SharePoint document‑library alerts/Power Automate flows or external services (for example Jira Service Management/LCC). Messages contained routine notification text and no SMTP/delivery error codes, affected only the recipient mailbox, and client‑side actions (moving to Spam) did not stop the source from continuing to send.

Solution

Investigation traced notification floods to automation/alert sources rather than mail delivery faults. In cases originating from SharePoint document libraries or Power Automate flows, the spike was resolved after the library alerts or flows were removed, narrowed in scope, or had their frequency reduced, and the affected mailbox was unsubscribed from the alert stream; message volume returned to normal after the alerts/flows were disabled or adjusted. In cases where emails were generated by an external system (for example the LCC/Jira Service Management service in one ticket), support routed the issue to the owning application team because the sending system needed configuration changes or to be stopped at source; no SMTP/delivery error codes were present. Client‑side measures such as moving messages to Spam were observed to be only a local/temporary mitigation and did not stop the originating automation from continuing to issue notifications.

Source Tickets (2)
43. Transfer ownership of an Outlook / Microsoft 365 Group when the owner has left
90% confidence
Problem Pattern

An Outlook (Microsoft 365) group remained managed by a single owner who was no longer with the organisation, preventing current staff from updating group membership or settings. Users requested a new owner so the group could be maintained; no explicit error messages were reported. Affected systems were Outlook groups / Microsoft 365 Groups (Exchange Online).

Solution

The group's ownership was reassigned by adding the requested user (Jennifer Teudt) as a group owner. After Jennifer was added as an owner, she could manage membership and update the group's settings, resolving the access/management issue.

Source Tickets (1)
44. Power Automate 'Send an email with options' blocking parallel sends because runs waited for responses
90% confidence
Problem Pattern

A scheduled Power Automate flow using the 'Send an email with options' action sent inconsistently: several recipients did not receive the email while the flow owner could receive test messages. The symptom suggested some runs were blocked or serialized (the flow appeared to wait for the first emailed response), and affected systems included Power Automate flows, the 'Send an email with options' action, and Exchange/Outlook delivery tracing.

Solution

The flow was changed to allow concurrent runs by enabling Concurrency Control (parallelism) on the run/apply-to-each scope so multiple instances could send 'Email with options' messages in parallel instead of waiting for an earlier run's response. After enabling the concurrency control, the flow sent messages to all intended recipients reliably.

Source Tickets (1)
45. Internal-looking sender addresses flagged as external when recipient mailbox is on a different accepted domain
90% confidence
Problem Pattern

Recipients reported receiving messages from unfamiliar internal-looking addresses (e.g., studium-*@info.iu.org) and Outlook showed a 'from outside the organization' indicator; users suspected spam or mis-sent institutional mail. The issue involved mail addressed from one organizational domain to mailboxes in a different accepted domain, causing visual warnings in Outlook.

Solution

Investigation verified that the reported sender domain (info.iu.org) was owned by the organization and that the specific sender addresses were legitimate addresses under that domain. The explanation provided was that Outlook flagged the messages as 'from outside the organization' because the recipient mailboxes belonged to a different organizational domain (iu-study.org), so the visual external indicator appeared despite the sender being an internal, valid address.

Source Tickets (1)
46. New Outlook (Monarch) preview stopped showing meeting pop-up reminders and notification UI failed
60% confidence
Problem Pattern

New Outlook (Monarch) preview stopped displaying pop-up meeting notifications/reminders. When opening Settings → General → Notifications the notifications toggle would not change and the settings pane sometimes rendered as a black window; no error code was shown. The symptom affected meeting pop-up reminders (olk.exe present) and occurred in the preview/Monarch build.

Solution

Support could not reproduce a working state. In‑ticket troubleshooting included forcing an update of New Outlook, clearing the app local state (ClearLocalState), and a full reinstall of the client; none of these actions restored pop-up meeting reminders or fixed the Settings → Notifications toggle or the black rendering. The problem persisted in the Monarch preview and remained unresolved in the ticket, consistent with a product/preview bug requiring Microsoft engineering attention.

Source Tickets (1)
47. Mailbox size increase requests and mailbox quota limits
92% confidence
Problem Pattern

User requested an increase to their Exchange/Outlook mailbox storage quota because they reached or were concerned about mailbox size limits. The ticket contained no error codes and did not specify retention or archiving requirements. Users expected a backend quota increase rather than client‑side storage adjustments.

Solution

The request was not implemented (ticket closed as "Won't Do"). Support documented a client‑side mitigation: reducing Outlook Cached Exchange Mode retention (shortening "download mail for the last X months") to lower local mailbox storage. No server‑side quota change or provisioning was performed.

Source Tickets (1)
48. Unable to create automatic forwarding rule in Outlook 365 (client rules)
95% confidence
Problem Pattern

User could not configure automatic email forwarding in Outlook 365 using rules; multiple attempts to create a forwarding rule failed without explicit error messages. The issue affected rule creation in the Outlook client/web and the user queried whether extra permissions were required.

Solution

Support joined the user via Microsoft Teams and used a remote control session (TeamViewer) to create and save an Outlook forwarding rule on the user's account. Test messages were sent and forwarding was verified as working. No elevated permissions were required in this case; the problem was resolved by creating the rule interactively during the support session.

Source Tickets (1)
49. Centralized email signature management and vendor security/data‑protection concerns
87% confidence
Problem Pattern

Organization requested centralized management of email signatures across thousands of accounts for consistent branding. The request raised security and data protection concerns about third‑party signature services that route mail externally, uncertainty about operational ownership, and requirements for integration with Azure AD group membership tooling.

Solution

The request was recorded as a procurement/architecture item rather than an immediate technical change. Stakeholders documented functional needs (support for ~4,600 accounts and group‑based membership), security concerns about vendor routing (CodeTwo/Exclaimer), and legal requirements (DPA/AVV review). Preference for a client‑side (Outlook) mode to avoid external mail routing was noted and vendor options were identified for formal evaluation and procurement, with DPA and operational ownership to be resolved before rollout.

Source Tickets (1)
50. Legacy (old) Outlook signatures disappeared but appear in New Outlook
40% confidence
Problem Pattern

Users reported that email signatures stopped appearing in the legacy (old) Outlook client after a company rebrand. The same signatures were visible when switching to New Outlook. Restarts did not restore signatures and there were no error messages or codes; affected system was legacy Outlook while New Outlook showed signatures normally.

Solution

Support confirmed the signatures were present and rendered in New Outlook while the legacy Outlook client did not show them. Troubleshooting steps included restarting the client and the workstation and an investigative review of signature state in the client; support advised re-creating or re-adding signatures in legacy Outlook and checking the local signature storage (user profile AppData\Roaming\Microsoft\Signatures) as part of remediation. There was no single confirmed root cause or final fix recorded in the ticket.

Source Tickets (1)
51. User confusion finding email, Teams and course portal after Office.com sign‑in
75% confidence
Problem Pattern

After signing in at Office.com with IU credentials, users reported they could not find incoming email or access Outlook, Teams, or the IU teaching‑platform pages (My courses, assignments, student/teaching groups). Some users saw an on‑screen prompt referencing a different mailbox for password‑reset instructions. Other users reported inability to access mail for hours or days with no error messages.

Solution

Support had the user sign in at Office.com with their IU credentials and opened Outlook and Teams from the Office app launcher in the browser to confirm where mail and apps appeared. Agents verified mailbox access and the presence of password‑reset or delivery messages by showing the message inside Outlook on the web. For teaching‑platform issues, agents demonstrated the IU teaching‑platform landing area where 'My courses', assignments and the student/teaching group or level are displayed so the user could consistently access those pages after signing in. When users reported inability to access email without visible error messages, support examined login records/logs, confirmed successful authentication and mailbox access, and then communicated that confirmation to the user before closing the ticket.

Source Tickets (2)
52. Planner email notifications not delivered to assigned users
60% confidence
Problem Pattern

A user did not receive Microsoft Planner email notifications when tasks were updated or commented on; affected systems included Microsoft Planner and Outlook/Exchange. The team believed tagging/mentioning users in a comment should trigger Outlook emails, but those notifications were missing for a specific account. The user reported no incoming Planner emails despite being expected to receive assignment/comment alerts.

Solution

No confirmed fix was recorded in the ticket. Support recommended verifying the user's Planner notification settings to ensure Planner email notifications were enabled and confirming the user was actually assigned to the task. The ticket thread reiterated that mentioning/tagging someone inside a Planner comment does not reliably generate an email notification by design, and assignment-based notifications were the intended trigger discussed.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X