The essential guide to Exchange Server backup and recovery
A comprehensive collection of articles, videos and more, hand-picked by our editors
I'm considering performing a point-in-time restoration of an Exchange mailbox database. Since this action rolls...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
the database back to an earlier point in time, I'm curious as to what happens to the .ost files on my users' workstations. Can you please advise?
If you're curious about what will happen to the .ost files, all you really need is a copy of Outlook, Outlook Web App (OWA), some junk mail you can delete and the following steps.
To start, open Outlook and let the latest mail synchronize from the Exchange server to Outlook's .ost file. When the synchronization completes, unplug the network cable from the computer. Next, use another computer and log on to the same mailbox from OWA and delete a message or two. After doing so, log out of OWA.
You can also make a backup copy of the messages directly from Outlook if you like.
At this point, you've created an inconsistency. The recently deleted messages have been removed from Exchange, but they still exist in Outlook's .ost file.
When you plug the network cable back into the computer and open Outlook, the changes to the mailbox database will be replicated to the .ost file. This includes deleting messages that presently exist in the .ost file, but no longer exist within the mailbox database. This occurs because Outlook considers the contents of the Exchange Server mailbox to be authoritative.
The Exchange server's contents will always take precedence over anything stored in an Outlook .ost file when synchronization occurs.
About the author:
Brien Posey is an eight-time Microsoft MVP with two decades of IT experience. Before becoming a freelance technical writer, Brien worked as a CIO at a national chain of hospitals and health care facilities. He has also served as a network administrator for some of the nation's largest insurance companies and for the Department of Defense at Fort Knox.
Related Q&A from Brien Posey
Cloud-based backups can be secured via a variety of methods. Backup software and erasure coding may be just what is needed to improve your ...continue reading
Explore details regarding the growth of DR monitoring software from a focus on configuration validation to today's automated and more comprehensive ...continue reading
Through disk-based backup, continuous data protection enables backups to take place more often. Discover how to repair the technology's cost and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.