BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Convert a User Mailbox to a Shared Mailbox in Microsoft 365

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

After converting your regular mailbox to a shared mailbox in Microsoft 365, you retain all your existing calendars and email. The only difference is that it will be visible to several people. You can convert your shared mailbox back to private in the future. It promotes teamwork and convenience.

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

Some of the most important things to know when converting from user mailbox to shared mailbox include:

  • The user mailbox you wish to convert must have a license -assigned to it before you can convert it to a shared mailbox. If it does not, you may not find the option to convert it. If you removed the license, add it back first. You can remove it back later.
  • Do not delete your old user’s account as you will need it to anchor your shared mailbox
  • With a shared mailbox, you can enjoy up to 500GB of data without a license. If you want more data, you must have a license assigned.

You can convert regular mailbox to shared mailbox by following these steps:

  1. Find the Admin option after logging in to your Microsoft 365 account
  2. Find the option ‘Active Users’ under the Admin option
  3. Choose the user you wish to convert and click on the option ‘Mail Settings’
  4. Click ‘Convert to shared mailbox.’
  5. Click ‘Convert’ to finish the process

Using the Exchange Admin Center

  1. Find the option ‘Exchange Admin Center
  2. Click on the option ‘Recipients’ and then ‘Mailboxes.’
  3. Find the user mailbox and select ‘Convert’ under ‘Convert to shared mailbox.’
  4. If the mailbox is less than 50GB, remove the license from the user. Stop paying for it, but do not delete your user’s account. If you are converting it for a previous employee, check to ensure that they have no other way of logging in.

Converting the Mailbox of Deleted User

If you wish to convert the mailbox of a deleted user, follow these steps to complete the process:

  1. Restore the deleted account
  2. Ensure that it has an assigned Microsoft 365 license
  3. Reset the password and wait for the mailbox to be created again
  4. Convert it to a shared mailbox and remove the license from the user mailbox
  5. Start adding members

Converting a Shared Mailbox to a Regular Mailbox

You can convert your shared mailbox back to a regular mailbox by following these steps:

  1. Login to your account as admin and find the Microsoft 365 Admin Center
  2. Click ‘Exchange’
  3. Find the options ‘Recipients’ and then ‘Shared’
  4. Click on the shared mailbox
  5. Click ‘Convert’
  6. Click ‘Convert to regular mailbox.’
  7. You will receive a warning message asking for confirmation.
  8. Click ‘Yes’

You must assign a license for the mailbox after conversion. You must also reset the password. The conversion can take a lot of time. When it is done, you will receive a completion message. Click ‘Close.’

After signing into Microsoft 365 again, you will find all the data from your shared mailbox.

In conclusion, Microsoft 365 is great for both regular and shared mailboxes. They all have unique features and benefits. A shared mailbox is an inbox type that allows you and other members of your team to send and receive emails from a similar address. It is a great option for companies that wish to promote teamwork. Since all members can respond to emails in the address, sharing work is easy.

If you wish to switch from user to shared mailbox, you can complete the process in a few simple steps. During the migration process, your data remains secure and integrated.

More Like This

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

Original release date: October 27, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of …

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky Read More »

Read More

Getting Started With Microsoft Teams?

Getting Started With Microsoft Teams? What drives workplace performance? A few years ago, a Stanford study published in the Journal of Experimental Social Psychology suggested that workplace performance was driven by collaboration. In fact, just the thought of collaboration was enough to improve performance. One interesting statistic: 64% of employees working collaboratively had higher success rates than …

Getting Started With Microsoft Teams? Read More »

Read More

AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems

Original release date: October 22, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the U.S. electoral process. …

AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems Read More »

Read More

AA20-296A: Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets

Original release date: October 22, 2020 Summary This joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor tactics and techniques This joint cybersecurity advisory—written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA)—provides …

AA20-296A: Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets Read More »

Read More

MFA Bug Opens Door For Hackers To Attack Microsoft 365

New and heightened digital threats develop every day, and having standard security software may not be enough to protect your personal data and business from exploitation from malware attacks. Businesses across industries are vulnerable to new attacks, as many security software lags behind. Hackers find ways to work around the most common security platforms to …

MFA Bug Opens Door For Hackers To Attack Microsoft 365 Read More »

Read More

What Is The Dark Web?

What Is The Dark Web? Are your company’s data and network secure? Solidly secure? Or, are you worried you may have been hacked, putting sensitive data at risk? You may be wondering about the latter if you’re looking up information on the dark web and how it may impact your business. Because, indeed, if you …

What Is The Dark Web? Read More »

Read More