354 Lotus blogs updated hourly. Who will post next? Home | Downloads | Events | Pods | Blogs | Search | myPL | About 
 
Latest 7 Posts
AIIMed for Greatness: My AIIM 2014 Conference Recap
Wed, Apr 9th 2014 79
How the heck was MEC (Microsoft Exchange Conference)?
Tue, Apr 8th 2014 164
White Paper: 7 Keys to a Successful IBM Connections Deployment
Thu, Apr 3rd 2014 124
White Paper: Implementing an Information Governance Program
Thu, Apr 3rd 2014 91
Policy-Driven Information Governance: The Ultimate Guide
Fri, Mar 28th 2014 92
Discovery Attender as an investigative tool
Tue, Mar 25th 2014 84
Make Your Office 365 Migration A Walk In The Clouds At MEC 2014
Thu, Mar 20th 2014 126
Top 10
IBM Connect 2014 Recap
Fri, Jan 31st 2014 530
The Sherpa Approach: Why a Data “Garage Sale” is Essential to Your Migration
Tue, Jul 23rd 2013 500
IBM Connect 2014: Attendee survey results (Free infographic)
Wed, Feb 12th 2014 448
Social Collaboration – What’s in your future?
Mon, Jan 6th 2014 435
Risk assessment: It is worth the work!
Mon, Jan 6th 2014 432
Attender Utilities for Notes: Installer Updates
Tue, Jan 7th 2014 416
The Evolution of Electronic Information Lifecycle
Mon, Jan 6th 2014 412
Planning for Information Governance
Mon, Jan 6th 2014 336
White paper: How to use IBM Connections for projects & more
Mon, Feb 17th 2014 335
Advance Features of Mail Attender
Mon, Jan 6th 2014 323


Importing PST Files into Exchange Mailboxes
Harvey Coblin    

Sherpa Software regularly distributes a series of short “how-to” videos that outline how to perform specific tasks using our Attender Utilities for Exchange products. We recently gave a facelift to one of the most popular of these instructional pieces, PST Migration with Mail Attender for Exchange.

Central access to Outlook Personal Folders (PST files) for legal discovery, email regulatory compliance and implementation of corporate policy is an increasingly critical issue for many organizations. The decentralized nature of PST files, combined with their proliferation throughout the enterprise on desktops, file servers and laptop machines, makes the task of finding, accessing and managing these information stores a headache for IT administrators – not to mention complicating e-Discovery efforts for legal staff looking to reduce potential exposure or vulnerability.

This brief video demonstrates how to use Sherpa’s Mail Attender for Exchange to locate PST files distributed throughout your environment, assign ownership to them, and then reintegrate them back into the appropriate users’ Exchange mailboxes. It also demonstrates a new feature in Mail Attender 4.7 that allows you to deduplicate (or single instance) messages as part of the process. If you missed it the first time around or would like a refresher course, the video can be found here:

Sherpa Software offers a suite of solutions designed to cost effectively take control of and manage email and other electronically stored information, including widely dispersed and potentially jeopardizing PSTs.

 

Video text follows:

One major advantage of Mail Attender is its ability to locate and manage any PST files distributed throughout an organization.  It doesn’t matter if the PSTs are server-based or located on users’ local workstations: Mail Attender can find them and automate the process of importing the messages into their respective owners’ Exchange Mailboxes or Archives.  This is all easily accomplished with little intervention on the part of the Exchange Administrator.  And new to Mail Attender 4.7 is an option to remove duplicate messages within the PST’s.
Once Mail Attender has scanned for PST files, there are 3 primary tasks associated with importing them to Exchange Mailboxes.
The first step is determining the PST file ownership. Next is assigning a destination mailbox. And finally, comes the actual importation of the PST file into Exchange. We’ll go over each of these tasks in order.
After Mail Attender searches for and detects PST files located on your file shares or on local workstations, the first thing we need to do is to assign ownership to those PST files. If your organization has hundreds or even thousands of PST files, assigning ownership one at a time is simply not practical. Fortunately, Mail Attender employs a sophisticated algorithm to determine the most likely owner address.
To Scan for Ownership, simply highlight each PST file you would like to scan from within the Mail Attender Console. Then, right-click on one of the selected PSTs files and choose Scan for Ownership in the popup menu.
As the scan of each file is finished, the LastOwnerScan column will display the date the scan completed. The owner name will appear in the Owner column. If Mail Attender isn’t able to find a definitive owner, it maintains a list of top potential owners based on user names found on the messages. You can then use these hits to assign ownership.

The second step in this process is to assign a transfer destination. Mail Attender supports a special rule type that facilitates the transfer of email messages from one email store to another, called a Message Transfer Rule.
The transfer destination is dynamically assigned based on Keywords. Using Keywords, you can assign different transfer destinations to all of your PST files with one assignment, instead of per PST file. Since we’re not listing an individual Exchange mailbox as a specific destination, we refer to this type of transfer as an “indeterminate mailbox destination.” This should begin to make more sense as we step through the process.

First, Select the PST file(s) that you want to assign a transfer destination to, right-click and select Properties from the popup menu.

In the Properties dialog, select the Transfers tab, and click Add Mailbox. This opens the Add a New Mailbox Transfer Destination window: Next, we’ll need to provide a name. Let’s just call this one “Indeterminate Mailbox.”
Next, click the Add Keyword button to populate the Mailbox Server field. From the keyword list select [USERAD_EX_OR_CAS_SERVER]. This will dynamically assign the mailbox’s server based on the ownership found during the Scan for Ownership.
Next, click the second Add Keyword button to populate the destination Distinguished Name. We’ll select [USERAD_EX_DN] from the listed keywords. This will dynamically assign a mailbox as the transfer destination based on its ownership. Click OK  and we now see the Properties dialog is now populated with the transfer destination values that we just added.

Now that we’ve used the server name and the user’s distinguished name to establish a linkage between the PST files and the Exchange Mailboxes, all that’s left to do is to create a rule within Mail Attender to perform the actual import.
From the Rules view in the navigation tree, create a new rule by clicking on the toolbar icon Create a new rule. When you do so, the Select Rule Type window will appear.  We then select the third option, “Message Transfer Rule.” This type of rule is used to send messages from one email store to another, using Mail Attender as an intermediary. Then click OK and the New Message Transfer Rule window opens.

After giving our new rule a title on the “General” tab, we move over to the “Email Stores” tab, We can click the “Add” button to select the PST files we would like to import to this list. After we’ve selected all relevant files we just click the Add button to add them in the bottom window.There are additional options on the other tabs that allow us to refine our transfer and add specific conditions, but we’re going to skip those and proceed over to the “Destination” tab, where we’ll enter the transfer destination. Back in Step 2, we created a transfer destination called “Indeterminate mailbox” to assign PST ownership based on the server and user name. We’ll enter “Indeterminate mailbox” here.

The “Check for duplicates…” option allows Mail Attender to de-duplicate (or single instance) the messages being imported from the source PST files. We can toggle the scope of the deduplication t apply to the entire mailbox or limit the deduplication to a particular folder and its sub-folders.

Next comes the schedule tab. It’s generally a good idea to run the import process during off-peak hours in order to avoid conflicts with users who may have their PST files open. However, if you want to kick the import off immediately, you certainly have that option as well.

Mail Attender also provides a host of reports and logs to help you centrally manage the entire migration process. Not only does it give you the ability to migrate your PSTs into Exchange, but also provides complete project management from beginning to end.

Sherpa Software support hours are Monday through Friday, 8:00 AM to 5:30 PM,Eastern Stand Time.



---------------------
http://www.sherpasoftware.com/blog/importing-pst-files-into-exchange/
Dec 12, 2012
41 hits



Recent Blog Posts
79


AIIMed for Greatness: My AIIM 2014 Conference Recap
Wed, Apr 9th 2014 11:12a   Rick Wilson
I recently returned from AIIM 2014, the annual conference staged by the Association for Information and Image Management, and I have to say, it was a great experience! Right from the opening keynote by well-known industry pundit Guy Kawasaki, AIIM 2014 signaled that it would be a much different event for IT professionals than, for example, Microsoft’s annual TechEd show. Kawasaki’s topic was “Enchantment,” and he eloquently guided us through some basic rules for enchanting coworkers, cus [read] Keywords: microsoft networking xml
164


How the heck was MEC (Microsoft Exchange Conference)?
Tue, Apr 8th 2014 3:12p   Doug Yarabinetz
Another Microsoft Exchange Conference (MEC) has come and gone, leaving critics divided.  Like any event, both pros and cons could be highlighted. In my opinion, MEC not only picked a great city in Austin, Texas, but they scheduled perfect weather, planned and coordinated some pretty cool events, had an adequate number of staff on-hand to answer questions and even managed to give every attendee a Dell Venue tablet. OK – that last one is an easy way to persuade the audience to say nice thin [read] Keywords: archiving email exchange exchange microsoft office xml
124


White Paper: 7 Keys to a Successful IBM Connections Deployment
Thu, Apr 3rd 2014 2:15p   Denny Russell
Companies spend a lot of time evaluating different platforms when selecting their enterprise social software, but few take the time to worry about how to effectively put it into production. We’ll take a look at best practices for successfully rolling IBM Connections out to users within organizations. I’m not referring to the technical specifications required for setting up and installing the system, I’m referring to the end-user experience. Getting your users to implement and love the [read] Keywords: collaboration connections ibm enterprise social software xml
91


White Paper: Implementing an Information Governance Program
Thu, Apr 3rd 2014 12:11p   Rick Wilson
In today’s world of interconnected devices and ubiquitous connectivity, many of us are engaged as knowledge (or information) workers – routinely creating, processing or disseminating information as our primary job function. As a result, information has become an essential corporate asset. If you accept the assertion that information is an asset, then like any other corporate asset, information must be tracked, managed and disposed of at the end of its useful life. Instituting this type [read] Keywords: ibm xml
92


Policy-Driven Information Governance: The Ultimate Guide
Fri, Mar 28th 2014 10:11a   Stephanie Sheaffer
Is your organization ready to face the increasing demands to manage data and associated risks?  Your information assets are sensitive, confidential and call for a policy-driven solution to automate enterprise content management.  How will you deal with information identification, retention, protection, privacy, security and eDiscovery requirements? This document covers the following: What is information governance? Locating your data pain points. Researching options and organizations. Creatin [read] Keywords: enterprise security xml
84


Discovery Attender as an investigative tool
Tue, Mar 25th 2014 6:12a   Marta Farensbach
A common Discovery Attender question is whether or not it works as ”investigation software.”   While the most common deployment for this application is assisting electronic discovery (litigation) or answering FOIA requests, Sherpa Software has a number of customers who use Discovery Attender primarily for the purposes of internal investigations.  So, the answer to that question is, “yes.”   However, for novices in this field, there are some very important considerations to keep in m [read] Keywords: application email enterprise network security xml
126


Make Your Office 365 Migration A Walk In The Clouds At MEC 2014
Thu, Mar 20th 2014 9:12a   Mel Moraes
Keep it Sherpa Simple: KISS your data struggles goodbye Sherpa Software will be sharing industry experience and best practices as they demonstrate their Microsoft Exchange solutions at the upcoming Microsoft Exchange Convention (MEC) 2014 in Austin, Texas. The increasing popularity of Office 365 has created many challenges when it comes to data migration. Sherpa Software can help make your migration a walk in the clouds with attachment management, content filtering, public folder management a [read] Keywords: community email exchange exchange microsoft office xml




103


Understanding HIPAA
Wed, Mar 19th 2014 12:11p   Harvey Coblin
Here at Sherpa, we’re frequently contacted by organizations looking to learn more about complying with federal regulations, such as HIPAA or Sarbanes-Oxley. HIPAA, the Health Insurance Portability and Accountability Act, was enacted in 1996 to ensure the protection of patient privacy. Foremost, it also provides the right for patients to access their medical records, as well as preventing (in most circumstances) healthcare providers from sharing sensitive patient information without the patient [read] Keywords: email office security xml
149


What is eDiscovery and why should anyone care?
Tue, Mar 11th 2014 8:13a   Mark Slabinski
Trying to explain the purpose of eDiscovery can be a daunting task; just a few weeks ago I’d be hard-pressed to provide an adequate explanation. After working at Sherpa these past few months however, I have come to acknowledge just how important it is to an organization to have a firm grasp of eDiscovery solutions. Put yourself, for a second, in the shoes of a frazzled employee, suddenly in charge of finding a piece of information that could save your company in a massive litigation case; you [read] Keywords: exchange exchange microsoft xml
95


4 B2B marketing trends to love in 2014
Mon, Mar 10th 2014 11:15a   Mel Moraes
Times are a-changing, and it’s no longer a simple battle between companies (specifically, their marketing departments) to have the best showing at trade shows, the most magazine editorial features, the flashiest website and the highest number of followers on social media – it is much, much more than that. More and more B2B marketers are catching on by utilizing e-blasts and e-newsletters, taking advantage of marketing automation programs and creating effective SEO strategies, but there still [read] Keywords: google twitter xml




Created and Maintained by Yancy Lent - About - Blog Submission - Suggestions - Change Log - Blog Widget - Advertising - Mobile Edition