additional mailboxes registry setting

Posted on 2011-10-05
Last Modified: 2012-05-12
The process to add/open an additional mailbox, i am using the following:
Click Tools/Email Accounts
View or change existing...<Next>
Highlight your account, and click Change
Click More Settings
From the Advanced tab, click Add under mailboxes to open additional mailboxes with your profile...

however, where does this get stored?  Is it stored in the Registry, in the current user directory and if so where is the location?

i have found articles saying you need to look at the sid of the machine and then drill down to this location -

HKEY_USERS\MACHINE SID ID - \Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook

 but this location does not exist in the current user keys! Surely the user sid is just a replica of the current user directory in many ways?

thanks in advance....
Question by:speechlys
    LVL 4

    Accepted Solution


    The profiles are stored in HKEY_CURRENT_USER\\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\ as you say above, but under this key the subkey names will match the names of the profiles as defined in the Control Panel Mail applet. So it won't necessarily be called 'Outlook'.

    Check in the control panel Mail applet for the name of the profile and then check in the registry location for that name. The profile settings should be in there. It is not really stored in any useable form and although the additional mailboxes are in there, I'm not sure whether you'll be able to automate the addition of these mailboxes by this method.

    Author Comment

    ok thanks, do you know of any other way or method to do this?
    LVL 4

    Expert Comment

    This is sometimes done at install time - you can customize the installation of Outlook using tools available in the Office Resource Kit (I think you can download this from the MS website). Alternatively (as you've probably already deployed office) you might want to look at creating a customized PRF file:

    Author Closing Comment


    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Join & Write a Comment

    Suggested Solutions

    In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
    Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now