Zum Inhalt springen

How to Use Active Directory for Email Signatures

Präsentiert von Exclaimer

It’s one thing to create an amazing email signature design. It’s another to ensure that every user’s contact details populate their signature correctly. No matter how many users you have in your organization, you’ll want to manage all email signatures from a central directory that includes every single person’s personal information.

For organizations using Microsoft Exchange Server or Office 365 (now Microsoft 365), personalization in email signatures can be achieved by adding placeholders integrated with contact information from Active Directory (AD). This is where all of their users‘ details will be stored. For organizations using G Suite (now Google Workspace), Google Directory would be used for contact information instead.

Using Active Directory for email signatures effectively

Active Directory in email signatures

Using Active Directory for email signatures means each template will be automatically populated with accurate contact information. Examples include a user’s full name, job title, phone number, and email address. Using Active Directory in email signatures has the benefit of adding contact details at the server level. An organization would then use transport rules to implement signatures for all users.

Now, both Microsoft Exchange and Office 365 let you do this without any external help required. Changes might take time, and email signature management is complex, but it can be done with patience. However, Exchange and Office 365 don’t support all Active Directory for email signature user attributes, known as AD Attributes. This means using Active Directory for email signatures can be slightly limiting.

What AD Attributes can I use in Exchange and Office 365 signatures?

Below is a list, in alphabetical order, of the AD attributes you can use in Exchange and Microsoft 365 (formerly Office 365) email signatures. The left column shows the LDAP attribute name in Active Directory, and the right column shows the corresponding Active Directory Domain Services display name for when you are deploying a signature via a VBS script.

Note: Every AD Attribute you use needs to include two percentage symbols on either side of it, e.g.: %%DisplayName%%

Microsoft 365 Display Name Lightweight Directory Access Protocol (LDAP) Name
Zip/Postal Codepostalcode

Using additional Active Directory data in email signatures

More AD Attributes can be used in Microsoft Exchange and Office 365 signatures. However, you will not be able to add them if you implement email signatures manually.

Microsoft 365 Display Name Lightweight Directory Access Protocol (LDAP) Name
{CustomAttribute 1-15}extentionAttributes

There are 15 {CustomAttributes} available to use when it comes to Active Directory in email signatures. You must replace CustomAttribute/ extensionAttribute1 with the appropriate number between 1 and 15.

How to effectively use Active Directory in email signatures

If you use a dedicated email signature management tool like Exclaimer, you’ll be able to use Active Directory in email signatures much more effectively. Every email signature remains personalized and tailored for each user.

  • Synchronize user contact details for all members or, if required, select members.
  • Enable additional Azure AD Attributes (up to 100 AD fields).
  • Upload user attributes or overwrite the existing data that is read from the Azure Active Directory.
  • Upload user photos so that they can be added to your email signatures.

Exclaimer also allows an organization to let users edit specific contact information in their email signatures. This is all without having to make change requests to IT:

  • Personal titles
  • Job titles
  • Surname/family changes
  • Personal phone numbers
  • Working hours
  • Next holiday period

The IT team always maintains control over all user information. They determine which details are editable and which are not, ensuring that all email signatures remain accurate and compliant. This is also good for companies that might not have the most up-to-date data in Active Directory for email signatures.

The data is also stored independently of your Active Directory. This means signatures can use information you might not necessarily want to be housed in Active Directory for email signatures. You can then switch back to default AD data when necessary.

Bereit, zu beginnen?

Übernehmen Sie noch heute die Kontrolle über Ihre E-Mail-Signaturen, indem Sie ein kostenloses Probeabonnement starten oder eine Demonstration buchen.

Starten Sie noch heute eine kostenlose 14-tägige Testversion (keine Kreditkarteninformationen erforderlich!) oder buchen Sie eine Demo mit einem unserer Produktspezialisten, um mehr zu erfahren.

Leer meer met onze reeks hulpmiddelen

The Untapped Potential of Corporate Emails 1 Exclaimer

The Untapped Potential of Corporate Emails

Denken Sie, dass E-Mail-Signaturen nur eine Möglichkeit sind, Kontaktdaten anzuzeigen? Denken Sie anders! Entdecken Sie in unserem White Paper das volle Potenzial Ihrer E-Mail-Signaturen.

Lesen Sie mehr >
Moving from hybrid working from remote working

Die Anforderungen, die die neue, hybride Arbeitswelt für die E-Mail-Signaturverwaltung von Unternehmen bringt

Die Umstellung auf hybrides Arbeiten stellt Unternehmen vor eine Reihe von Herausforderungen. Finden Sie heraus, wie Sie sicherstellen können, dass die Verwaltung von E-Mail-Signaturen nicht zu diesen Herausforderungen gehört.

Lesen Sie mehr >
Die top 10 probleme bei e-mail-signaturen für unternehmen 4 Exclaimer

Die top 10 probleme bei e-mail-signaturen für unternehmen

Finden Sie heraus, wie Sie IT-Teams von den Kopfschmerzen der E-Mail-Signaturverwaltung befreien können – für immer!

Lesen Sie mehr >

Noch heute kostenlos testen Ihre neue E-Mail-Signatur
ist nur ein paar Klicks entfernt