The essential guide to Exchange Server backup and recovery
A comprehensive collection of articles, videos and more, hand-picked by our editors
I'm considering performing a point-in-time restoration of an Exchange mailbox database. Since this action rolls...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
the database back to an earlier point in time, I'm curious as to what happens to the .ost files on my users' workstations. Can you please advise?
If you're curious about what will happen to the .ost files, all you really need is a copy of Outlook, Outlook Web App (OWA), some junk mail you can delete and the following steps.
To start, open Outlook and let the latest mail synchronize from the Exchange server to Outlook's .ost file. When the synchronization completes, unplug the network cable from the computer. Next, use another computer and log on to the same mailbox from OWA and delete a message or two. After doing so, log out of OWA.
You can also make a backup copy of the messages directly from Outlook if you like.
At this point, you've created an inconsistency. The recently deleted messages have been removed from Exchange, but they still exist in Outlook's .ost file.
When you plug the network cable back into the computer and open Outlook, the changes to the mailbox database will be replicated to the .ost file. This includes deleting messages that presently exist in the .ost file, but no longer exist within the mailbox database. This occurs because Outlook considers the contents of the Exchange Server mailbox to be authoritative.
The Exchange server's contents will always take precedence over anything stored in an Outlook .ost file when synchronization occurs.
About the author:
Brien Posey is an eight-time Microsoft MVP with two decades of IT experience. Before becoming a freelance technical writer, Brien worked as a CIO at a national chain of hospitals and health care facilities. He has also served as a network administrator for some of the nation's largest insurance companies and for the Department of Defense at Fort Knox.
Related Q&A from Brien Posey
Licensing is a critical component of VDI. VMware offers two main licensing options with Horizon View; a per user model and a per concurrent ...continue reading
Licensing is a key component to virtual desktop infrastructure. Citrix XenDesktop provides businesses with the option of user or device specific ...continue reading
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.