HP Email Archiving software for Microsoft Exchange PST Import Tools Components and Deployment Best Practices Whitepaper

9
For example:
C:\PSTimport
UserA@pstimport.com
UserB@pstimport.com
UserC@pstimport.com
Unknown
By organizing the file structure in this way, it is possible to automate the creation of the configuration
files, thus simplifying the overall process.
PST File Ownership, Password Protection, and Permissions
Depending on the requirement for PST Imports by specific customers, it may be required that the
emails contained in PST files are
only
targeted at specific repositories. In this case, the File
Ownership property is required, but may
not
be correct depending on the source of the file.
Determining the primary owner of the file requires a manual intervention, since the PST Import Tools
are not designed to determine who the primary user of a PST file is.
Secondly, the PST Import Tools offer no ability to import password-protected PST files. If passwords
are known, it is possible to remove the password protection by connecting to the PST file from the
Outlook client and removing the password. Password-protected PST files cannot be imported until the
password is first removed. PST passwords may be reset using commercially available software;
however, password removal actions are the responsibility of the customer.
Lastly, read and write permissions to the PST Files are required by the HPAEServiceAccount account
including removal of any “Read-Only” attributes assigned at the file system level.
PST Audit Repository
PST Import Tools can send logging information to
any
IAP repository. In some cases, this may be a
previously created Audit repository, or in fact, the target repository for the PST import. However, it is
recommended that, where possible, you create a dedicated PST Import Logging user and repository
from the IAP PCC Account Management webpage. This allows all PST logs to be searched in a single
location and makes the task of identifying potential issues easier overall.
It is important to understand the logging process for PST Import Tools. The process creates log entries
that are stored on a per-PST file basis, not for the overall PST Import Process. Therefore, a log is
created for each PST file imported. Furthermore, the log file for a PST file may appear to be split in the
logging repository since, if the PST Import process is interrupted, all of the logging “to-date” is sent to
the logging repository.
Note that all log entries sent to the IAP are wrapped in a MIME message, so when searching the log
repository, make sure the document type is set to ‘email’.
Automated Creation of Configuration Files
Earlier in this document, we discussed the “Overall Configuration File Creation Process”. As a follow
on from this, we will now look at the options for automating the creation of the configuration files.
The simplest method to automate the creation is to use a dedicated file structure to organize the PST
files (as already discussed). Using a script (either VB Script or Perl), the structure and folder name
information can be taken and used to create a set of XML “import description files”. The format should
be as follows: