Veritas 8.6 - Access Denied to Top of Information Store

Posted on 2005-05-13
Last Modified: 2010-04-03
I keep getting the following error message in our Veritas 8.6 Backup logs:

Unable to open the item Lisa Van Westing [lisa.fitzgerald]?Top of Information Store?Sent Items?RE: Property Request - skipped.
Access denied to file ?Lisa Van Westing [lisa.fitzgerald]?Top of Information Store?Sent Items?RE: Property Request.
^ ^ ^ ^ ^

This same error occurrs for several other users as well. We're running Exchange 2000 on a Windows 2000 Server box. Does anyone know how to fix this error? If anyone needs more info on our setup, let me know.
Question by:mckeough
    LVL 1

    Accepted Solution

    We have been getting the same type of errors for quite awhile now.  Even going in manually and deleting these emails do not help.  What you need to do is go into the job setup.  Go into the Microsoft Exchange mailboxe selections.  Go to the Lisa Fitzgerald mailbox, go to Top of the Information Store section.  You should see a sent items folder.  Just click on that folder.  You should be able to scroll through and see that Property Request email.  Just unselect it.

    This will keep it from being backed up and will allow the backup job to complete.  Let me know if you are still having trouble.

    Author Comment

    Well, I found something interesting. If you DO actually try to delete the item in their mailbox, you get a "Unable to open item. Access Denied" message. This is from the Outlook client, so it appears my problem is not Veritas. The user can't open the item, delete it - can't do anything with it. It is just stuck there. Any ideas?
    LVL 1

    Expert Comment

    We could never figure out if it was stuck there or what not.  We just gave up and unchecked it.  

    Expert Comment

    drag the mail to the deleted folder then emty

    Author Comment

    We actually have some of those troublesome emails in the "Deleted Items" folder, and it does not empty with those emails sitting in there.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Join & Write a Comment

    Suggested Solutions

    A bootable USB key can be very handy now-a-days. My favorite USB key consists of our Windows 7 image, network card drivers (to connect up to a Ghost server), the latest BIOS updates for all of our PCs and CopyWipe (to erase a retired PC) Creating…
    In this article, I provide some information on storage disks which go into calculations that will help you figure out how much Input/output Operations Per Second (IOPS) your disk subsystem can deliver. To effectively size & tune up applications l…
    This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
    This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now