Solved

SCRIPT FOR BACKING UP

Posted on 2008-10-18
3
200 Views
Last Modified: 2013-12-01
Need help to: write a script that copies, and renames them to username_date_outlookarchive.pst and then copies them to a shared folder on the server so backup exec can grab them; configure to run  a script to delete the archives after backupexec is complete.
0
Comment
Question by:gabepcsolutions
  • 2
3 Comments
 
LVL 21

Accepted Solution

by:
AmazingTech earned 500 total points
ID: 22753130
Who's going to run the script to copy the archives? Each user or an administrator?

On a user logoff script or user logon script you can run this batch file.
COPY "%UserProfile%\Application Data\Microsoft\Outlook\Outlook.pst" "\\Server\Share\Backup\%UserName%_%Date:/=.%_OutlookArchive.pst"

Open in new window

0
 

Author Comment

by:gabepcsolutions
ID: 22753175
Thanks.
0
 
LVL 21

Expert Comment

by:AmazingTech
ID: 22753186
VBS.

The deleting part you'll have to get a script to run after backupexec.

DOS batch:
Del /q "\\server\share\backup\*.pst
ServerFolder="\\Server\Share\Backup"
 

Set objFSO = CreateObject("Scripting.FileSystemObject")

Set WshShell = WScript.CreateObject("WScript.Shell")
 

File=WshShell.SpecialFolders("AppData") & "\Microsoft\Outlook\Outlook.Dat"

BackupFile=ServerFolder & "\" & WshShell.ExpandEnvironmentStrings("%UserName%") & "_" & Replace(Date,"/", ".") & "_OutlookArchive.PST"
 

wscript.echo "Source: " & File

wscript.echo "Target: " & BackupFile 
 

objFSO.CopyFile File, BackupFile

 

Set objFSO = Nothing

Set WshShell = Nothing

Open in new window

0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Use this article to create a batch file to backup a Microsoft SQL Server database to a Windows folder.  The folder can be on the local hard drive or on a network share.  This batch file will query the SQL server to get the current date & time and wi…
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now