Back

6 Steps to Delegate Office 365 Mailbox Access Permissions

When managing an Office 365 or hybrid Exchange environment youll likely need to delegate Office 365 mailbox access to additional users at some point...

2 min read
Published on Apr 11, 2017
6 Steps to Delegate Office 365 Mailbox Access Permissions

When managing an Office 365 or hybrid Exchange environment, you’ll likely need to delegate Office 365 mailbox access to additional users at some point.

In certain situations, you could simply create an Office 365 shared mailbox to grant multiple users mailbox access. Many companies take this approach when setting up generic email addresses for the business or specific departments.

But other scenarios are not so straightforward. For instance, if an executive hires an assistant to manage his or her mailbox, the newcomer should not have full access to the Office 365 or hybrid Exchange account. Instead, you’ll want to configure access permissions to give that person limited access and functionality.

A number of other business scenarios will require you to delegate Office 365 mailbox access permissions. So what’s the easiest (and safest) way to set up these permissions?

Enable Office 365 Mailbox Sharing

The process of sharing a mailbox is known as delegating access permissions in Exchange. Whether you’re working in Office 365 or a hybrid Exchange environment, use these steps to delegate Office 365 mailbox permissions:

  1. Sign in to Office 365 Admin Center.

  2. Select Users > Active Users.

  3. Select the user that requires delegate access.

  4. Expand “Mail Settings.” mail settings office 365

  5. Find “Mailbox Permissions” and select Edit. mailbox permissions office 365

  6. Add or modify users as required. Once complete, select Save. edit Office 365 mailbox access permissions

Equipping users with shared mailbox access is one way to extend the ability to read and manage emails, send-as and send-on-behalf.

The steps above are primarily geared towards tier 2 system administrators using the GUI to make changes to your account. You can script all the steps in PowerShell to make bulk changes. 

Looking for more help automating or managing your Office 365 infrastructure?

Check out the resources below or reach out today to learn more about our Exchange consulting: Creating an Office 365 Mailbox in a Hybrid Configuration Deleting & Disabling Mailboxes in Exchange Hybrid 2013 & 2016

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

Implementing Cybersecurity Policies for CMMC Compliance and Managing CUI

CMMC compliance requires well-documented cybersecurity policies. Learn how to implement security controls, create an SSP and POA&M, and manage Controlled Unclassified Information (CUI).

Apr 25, 2025
7 min read
CMMC compliance for DoD contractors

CMMC Compliance Requirements for DoD Contractors and Subcontractors in the Defense Industry

CMMC compliance is mandatory for DoD contractors and subcontractors. Learn about certification levels, requirements, and the consequences of failing to meet compliance.

Apr 24, 2025
6 min read
How to prepare for a CMMC compliance audit

CMMC Compliance Audit Preparation: A Complete Checklist for Small Businesses

Preparing for a CMMC compliance audit is critical for DoD contractors. Use this checklist to perform a gap analysis, assess CMMC readiness, and prepare for a Level 2 assessment.

Apr 23, 2025
8 min read
FAR CUI vs CMMC Understanding

FAR CUI vs CMMC Understanding the Differences and Overlaps

FAR CUI and CMMC both focus on protecting sensitive federal data, but they have key differences. Learn how they work together and whether FAR CUI compliance aligns with CMMC.

Apr 15, 2025
10 min read
What Is a POAM?

What Is a POAM?

Learn how a Plan of Action and Milestones (POAM) helps meet NIST 800-171 & DFARS compliance. Understand its role in FedRAMP, security categorization, and risk mitigation.

Apr 8, 2025
8 min read
Best Cybersecurity Practices for Achieving CMMC Compliance

Best Cybersecurity Practices for Achieving CMMC Compliance

Achieving CMMC cybersecurity compliance requires strong security controls. Learn best practices for securing your IT environment, protecting CUI, and implementing MFA.

Apr 7, 2025
6 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation