358 Lotus blogs updated hourly. Who will post next? Home | Downloads | Events | Pods | Blogs | Search | myPL | About 
 
Latest 7 Posts
[INFOGRAPHIC] Case Studies: Discovery Attender for Exchange
Thu, Dec 11th 2014 92
How machine learning is changing information governance
Mon, Dec 8th 2014 108
Troubleshooting: Become the best technical support contact ever
Tue, Dec 2nd 2014 176
Reminder: Archive Attender 3.5 support ending soon
Fri, Nov 7th 2014 139
[Off-the-topic] Black Friday statistics and predictions: Should we start calling Thanksgiving ‘Black Thursday?’
Fri, Nov 7th 2014 310
Using Classification in your Information Governance Strategy
Fri, Nov 7th 2014 157
Data leakage within your environment
Fri, Nov 7th 2014 186
Top 10
[Off-the-topic] Black Friday statistics and predictions: Should we start calling Thanksgiving ‘Black Thursday?’
Fri, Nov 7th 2014 310
Risk assessment: It is worth the work!
Mon, Jan 6th 2014 235
The Sherpa Approach: Why a Data “Garage Sale” is Essential to Your Migration
Tue, Jul 23rd 2013 206
10 things to know about Electronic Records Management
Wed, Oct 22nd 2014 193
Data leakage within your environment
Fri, Nov 7th 2014 186
Discovery Attender Features: Automatic Labels
Thu, Oct 16th 2014 183
Troubleshooting: Become the best technical support contact ever
Tue, Dec 2nd 2014 176
We’ll see you in booth #932 at ARMA 2014!
Thu, Oct 23rd 2014 170
Demystifying Defensible Deletion
Thu, Nov 6th 2014 170
Potential eDiscovery implications of upcoming changes to the Federal Rules of Civil Procedure (FRCP)
Fri, Nov 7th 2014 162


Importing PST Files into Exchange Mailboxes
Harvey Coblin    

Sherpa Software regularly distributes a series of short “how-to” videos that outline how to perform specific tasks using our Attender Utilities for Exchange products. We recently gave a facelift to one of the most popular of these instructional pieces, PST Migration with Mail Attender for Exchange.

Central access to Outlook Personal Folders (PST files) for legal discovery, email regulatory compliance and implementation of corporate policy is an increasingly critical issue for many organizations. The decentralized nature of PST files, combined with their proliferation throughout the enterprise on desktops, file servers and laptop machines, makes the task of finding, accessing and managing these information stores a headache for IT administrators – not to mention complicating e-Discovery efforts for legal staff looking to reduce potential exposure or vulnerability.

This brief video demonstrates how to use Sherpa’s Mail Attender for Exchange to locate PST files distributed throughout your environment, assign ownership to them, and then reintegrate them back into the appropriate users’ Exchange mailboxes. It also demonstrates a new feature in Mail Attender 4.7 that allows you to deduplicate (or single instance) messages as part of the process. If you missed it the first time around or would like a refresher course, the video can be found here:

Sherpa Software offers a suite of solutions designed to cost effectively take control of and manage email and other electronically stored information, including widely dispersed and potentially jeopardizing PSTs.

 

Video text follows:

One major advantage of Mail Attender is its ability to locate and manage any PST files distributed throughout an organization.  It doesn’t matter if the PSTs are server-based or located on users’ local workstations: Mail Attender can find them and automate the process of importing the messages into their respective owners’ Exchange Mailboxes or Archives.  This is all easily accomplished with little intervention on the part of the Exchange Administrator.  And new to Mail Attender 4.7 is an option to remove duplicate messages within the PST’s.
Once Mail Attender has scanned for PST files, there are 3 primary tasks associated with importing them to Exchange Mailboxes.
The first step is determining the PST file ownership. Next is assigning a destination mailbox. And finally, comes the actual importation of the PST file into Exchange. We’ll go over each of these tasks in order.
After Mail Attender searches for and detects PST files located on your file shares or on local workstations, the first thing we need to do is to assign ownership to those PST files. If your organization has hundreds or even thousands of PST files, assigning ownership one at a time is simply not practical. Fortunately, Mail Attender employs a sophisticated algorithm to determine the most likely owner address.
To Scan for Ownership, simply highlight each PST file you would like to scan from within the Mail Attender Console. Then, right-click on one of the selected PSTs files and choose Scan for Ownership in the popup menu.
As the scan of each file is finished, the LastOwnerScan column will display the date the scan completed. The owner name will appear in the Owner column. If Mail Attender isn’t able to find a definitive owner, it maintains a list of top potential owners based on user names found on the messages. You can then use these hits to assign ownership.

The second step in this process is to assign a transfer destination. Mail Attender supports a special rule type that facilitates the transfer of email messages from one email store to another, called a Message Transfer Rule.
The transfer destination is dynamically assigned based on Keywords. Using Keywords, you can assign different transfer destinations to all of your PST files with one assignment, instead of per PST file. Since we’re not listing an individual Exchange mailbox as a specific destination, we refer to this type of transfer as an “indeterminate mailbox destination.” This should begin to make more sense as we step through the process.

First, Select the PST file(s) that you want to assign a transfer destination to, right-click and select Properties from the popup menu.

In the Properties dialog, select the Transfers tab, and click Add Mailbox. This opens the Add a New Mailbox Transfer Destination window: Next, we’ll need to provide a name. Let’s just call this one “Indeterminate Mailbox.”
Next, click the Add Keyword button to populate the Mailbox Server field. From the keyword list select [USERAD_EX_OR_CAS_SERVER]. This will dynamically assign the mailbox’s server based on the ownership found during the Scan for Ownership.
Next, click the second Add Keyword button to populate the destination Distinguished Name. We’ll select [USERAD_EX_DN] from the listed keywords. This will dynamically assign a mailbox as the transfer destination based on its ownership. Click OK  and we now see the Properties dialog is now populated with the transfer destination values that we just added.

Now that we’ve used the server name and the user’s distinguished name to establish a linkage between the PST files and the Exchange Mailboxes, all that’s left to do is to create a rule within Mail Attender to perform the actual import.
From the Rules view in the navigation tree, create a new rule by clicking on the toolbar icon Create a new rule. When you do so, the Select Rule Type window will appear.  We then select the third option, “Message Transfer Rule.” This type of rule is used to send messages from one email store to another, using Mail Attender as an intermediary. Then click OK and the New Message Transfer Rule window opens.

After giving our new rule a title on the “General” tab, we move over to the “Email Stores” tab, We can click the “Add” button to select the PST files we would like to import to this list. After we’ve selected all relevant files we just click the Add button to add them in the bottom window.There are additional options on the other tabs that allow us to refine our transfer and add specific conditions, but we’re going to skip those and proceed over to the “Destination” tab, where we’ll enter the transfer destination. Back in Step 2, we created a transfer destination called “Indeterminate mailbox” to assign PST ownership based on the server and user name. We’ll enter “Indeterminate mailbox” here.

The “Check for duplicates…” option allows Mail Attender to de-duplicate (or single instance) the messages being imported from the source PST files. We can toggle the scope of the deduplication t apply to the entire mailbox or limit the deduplication to a particular folder and its sub-folders.

Next comes the schedule tab. It’s generally a good idea to run the import process during off-peak hours in order to avoid conflicts with users who may have their PST files open. However, if you want to kick the import off immediately, you certainly have that option as well.

Mail Attender also provides a host of reports and logs to help you centrally manage the entire migration process. Not only does it give you the ability to migrate your PSTs into Exchange, but also provides complete project management from beginning to end.

Sherpa Software support hours are Monday through Friday, 8:00 AM to 5:30 PM,Eastern Stand Time.



---------------------
http://www.sherpasoftware.com/blog/importing-pst-files-into-exchange/
Dec 12, 2012
30 hits



Recent Blog Posts
92


[INFOGRAPHIC] Case Studies: Discovery Attender for Exchange
Thu, Dec 11th 2014 4:12p   Mel Moraes
You might have read a few of our glowing case studies and testimonials of Discovery Attender, whether it be on a customer’s blog, on our Capterra review site or within the resources section of the Sherpa Software website. However, we wanted to do something different: For those of you interested in reading about how Discovery […] [read] Keywords: exchange exchange xml
108


How machine learning is changing information governance
Mon, Dec 8th 2014 5:12a   Sherpa Software
While machine learning sounds interesting, how does it differ from what is currently on the market? Why is this technology so important to the future success of compliance operations in your company? There is some debate over its definition, but one of machine learning’s pioneers put it like this: “Machine learning is a field of […] [read] Keywords: xml
176


Troubleshooting: Become the best technical support contact ever
Tue, Dec 2nd 2014 3:11p   Mark Slabinski
Imagine, for a moment, a common situation in any information governance (IG) program: It’s 1:00 p.m. on Thursday, and you’ve just received a request from your organization’s legal team with a page-and-a-half-full of search terms and parameters. They need this by Monday; so you jump right into it, ready to search through the marked email […] [read] Keywords: email xml
139


Reminder: Archive Attender 3.5 support ending soon
Fri, Nov 7th 2014 10:12a   Marta Farensbach
Customers currently using Archive Attender version 3.5 are highly encouraged to upgrade to the current version 4.2 of the product before the support end date of December 15, 2014. As previously announced, older Archive Attender versions up to, and including 3.5 SP3, will not be patched or updated, nor will technical support be provided after […] [read] Keywords: archive xml
310


[Off-the-topic] Black Friday statistics and predictions: Should we start calling Thanksgiving ‘Black Thursday?’
Fri, Nov 7th 2014 10:12a   Mel Moraes
If you’re anything like me, you’re going to wake up on November 27 of this year, turn the TV on to watch the Macy’s Thanksgiving Day Parade (amid grumbles from your significant other, saying that all he/she wants to watch today is football) and get started on the turkey. Thereafter, you’ll enjoy an incredible day […] [read] Keywords: xml
157


Using Classification in your Information Governance Strategy
Fri, Nov 7th 2014 10:12a   Rick Wilson
I recently returned from the ARMA 2014 show in San Diego. Aside from a chance to visit this beautiful city, it was a great opportunity to connect with our customers and industry professionals within the records management community, and also to learn about the information governance challenges that they are facing on a daily basis. […] [read] Keywords: community xml
186


Data leakage within your environment
Fri, Nov 7th 2014 9:12a   Jeff Tujetsch
Typically, when an eDiscovery request is being created, the first type of data that comes to mind is email; it is the most logical and popular place to search. Everyone uses email – and more on point, everyone keeps email. Typically, administrators have a good handle on where centralized emails reside. Obviously, live mail files […] [read] Keywords: email xml
162


Potential eDiscovery implications of upcoming changes to the Federal Rules of Civil Procedure (FRCP)
Fri, Nov 7th 2014 8:11a   Harvey Coblin
It’s no secret that the eDiscovery process is time-consuming and expensive – and not just in the obvious sense, such as the costs of having legal teams and forensics experts pour through data, looking for responsive content in electronically stored information (ESI). There’s also the “hidden” costs associated with having to maintain volumes upon volumes […] [read] Keywords: xml
170


Demystifying Defensible Deletion
Thu, Nov 6th 2014 12:12p   Marta Farensbach
Defensible deletion, also known as defensible disposition, is a key component in executing an effective information governance strategy.  When properly applied, a good defensible deletion policy helps to safeguard information assets, reduce corporate risk, free-up resources and streamline operational flow. However, industry reports mirror Sherpa’s own conclusions that companies either don’t have, or don’t follow well-established defensible deletion processes. […] [read] Keywords: xml
133


Digging Deeper into Proactive eDiscovery
Wed, Nov 5th 2014 10:11a   Stephanie DiPaolo
by Mark Slabinski Proactive eDiscovery, as its name implies, is preemptively establishing a framework to handle any litigation or regulatory searches or collections before it is needed in a real world situation.  It means that tools, resources, policy and procedure will be in place well before your company has to take legally-mandated steps for compliance […] [read] Keywords: xml




Created and Maintained by Yancy Lent - About - Blog Submission - Suggestions - Change Log - Blog Widget - Advertising - Mobile Edition