Best way to import old .ost files into an new install of exchange

Posted on 2006-06-06
Last Modified: 2011-10-03

I have five workstations that are still logged into the a win2k3 server that has crashed
We are re-building from scratch ( lucky for us,  critical data was stored elsewhere )

the workstations are still logged in, and outlook opens and users see their mailstore
( the .ost exhcange files are local on each machine) ( was running exchange in cache mode )

Once I rebuild the server, what's the best/easiest way to import their old mail
into the new exchange/03 server setup?
( I plan on still keeping local profiles, i.e. - individuals mailstore file local on each machine )
-  I will be re-naming the domain and having workstations join the new domain, unless somebody tells me that it would work to rebuild the server, using the same domain and server name
( from what I know of microsoft, that sounds like I would be asking for trouble )
Question by:geek3
    LVL 51

    Accepted Solution

    Your plan is sound.

    Your OST files (if kept local) can be remapped to the new Outlook configuration and either left that way or copied into the real mailbox folders out of the Personal Folder.

    No, you do not want to rebuild the server using the same domain name or servername unless you put all the workstations into WORKGROUP and rejoining them.  You're best to rename things to make sure there is no confusion to the workstations about where they should be connecting.

    Author Comment

    Thanks Netman66

    - so yoursaying i can just move the user's current .ost file over to the new(local) location in their new profile?
    LVL 51

    Expert Comment

    You should be able to, yes.

    After that, you'll need to configure their Outlook to use it.

    Author Comment

    I'll post more if I have any issues -

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    by Batuhan Cetin In this article I will be guiding through the process of removing a failed DC metadata from Active Directory (hereafter, AD) using the ntdsutil tool in a Windows Server 2003 environment. These steps are not necessary in a Win…
    I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now