Skip to main content

Edit Mailbox Policies

When you need to assign or modify policies for a mailbox, you can configure mailbox policy settings. This controls which role assignment, retention, sharing, and other organizational policies apply to the mailbox.

When to Use This Workflow

Use this workflow when you need to apply specific policies for security, compliance, or functionality requirements, or when changing policy assignments due to organizational changes or updated requirements.

Before You Start

Make sure you have:

  • Appropriate access to manage policy assignments for the specific mailbox you want to modify.
  • Understanding of which policies should be applied based on the mailbox's purpose and requirements.
  • Knowledge of your organization's policy standards and compliance requirements.
  • Decisions about management access, retention, and other policy-controlled features.

Get Started

  1. Navigate to the Resource Admin portal
  2. Select Mailboxes from the resource type menu
  3. Click the Workflows tab
  4. Find and click Manage Mailbox Wizard Manage Mailbox Wizard
  5. Search for the mailbox you want to modify, then check the box next to it and click Next Select Mailbox
  6. Select Edit Mailbox Policies from the available actions Edit Mailbox Policies Action
  7. Click Next to proceed to the policy configuration

Configure Mailbox Policies

The interface displays policy assignment options in a simple Policies section with dropdown fields for various Exchange policies.

Edit Mailbox Policies Form

  1. Configure mailbox policies:
    • Role Assignment Policy: Select the policy that defines what management tasks can be performed on this mailbox.
    • Address Book Policy: Choose the policy for segmented address book access if your organization uses address book segregation.
    • Retention Policy: Select the policy that controls message retention and deletion (shows "Default MRM Policy" in the example).
    • Sharing Policy: Choose the policy that controls calendar and contact sharing permissions (shows "Default Sharing Policy" in the example).
    • Data Encryption Policy: Select the policy for data encryption requirements and settings.
  2. Click Next to proceed with your changes.

Complete the Workflow

  1. Review the Operation Execution Summary to confirm your changes were applied successfully: Operation Execution Summary The summary shows the specific policy assignments that were updated.
  2. Click Submit to continue.
  3. Choose your next action: Finish Workflow Options
    • Do you want to manage the same Mailbox? - Select this to perform additional actions on the same mailbox.
    • Do you want to manage different Mailbox(es)? - Select this to work with other mailboxes.
    • Do you want to finish the workflow? - Select this to complete the process and exit the wizard.
  4. Click Submit to proceed with your selected option.

Verify Your Changes

After completing the workflow:

  1. Check policy application by reviewing mailbox properties in management tools.
  2. Verify retention behavior if retention policies were modified.
  3. Confirm sharing restrictions are working as expected.
  4. Test policy inheritance to ensure settings are applied correctly.

What Happens Next

  • Policy changes take effect immediately for most settings, though some may require reconnection to the mailbox.
  • Retention policies begin processing messages according to the new policy schedule.
  • Sharing policies control external calendar and contact sharing capabilities.
  • Role assignment changes affect what management tasks can be performed on the mailbox.

If You Run Into Problems

Policy changes not taking effect: Some policy settings may require a brief delay. Wait 5-10 minutes and check mailbox properties again.

Retention policies not processing messages: Verify that the Managed Folder Assistant is running and that retention tags are properly configured in the assigned policy.

Sharing restrictions not working: Check that the sharing policy is properly configured and that external sharing is enabled at the organizational level.

Policy assignment conflicts: Review all assigned policies to ensure they don't contain conflicting settings that could cause unexpected behavior.