Skip to main content

HOWTO Backup Mailbox from Exchange Server 2007 SP1

Microsoft Outlook 2010This is another HOWTO procedure to backup a mailbox from Exchange Server 2007 SP1.
    Microsoft Exchange Server 2010 Best Practices (Best Practices (Microsoft))
  1. Open the Exchange Management Console (EMC)
  2. Go to Recipient Configuration, click the Mailbox
  3. In Mailbox, select the mailbox you want to manage (example: Jane Queen), then click Manage Full Access Permission.
  4. In Manage Full Access Permission, click Add, select a username (example: Bob King) you want to manage this mailbox. In Exchange Server 2007, by default only the exchange administrator and "SELF" have access to manage the mailbox. So you need to add the server administrator or a specific user (Bob King). After selecting a user, click Manage to continue. In Summary, you should see 1 Item,1Succeeded, 0 Failed. Click Finish. We just finished giving permission to a user where he/she can manage the mailbox.
  5. Now login to your workstation using Bob King (admin) username. I have Bob King profile in MS Outlook, so I need to add Jane Queen (mailbox) profile. In Control Panel, click the Mail icon, click Add, type Jane Queen for the profile name, click OK. In Email Account, click Next, select Microsoft Exchange Server click Next. In Exchange Server settings, type your Exchange Server name (example: kingexchange01) and User name (we are using Jane Queen), click check name to see if mailbox exist in the Exchange Server. If recognized, the username will returned with underline. Click Next and Finish. This complete adding Jane Queen mailbox profile.
  6. Start Microsoft Outlook, select Jane Queen mailbox profile. You now accessing Jane Queen mailbox through Bob King workstation. 
  7. Create a PST file for your backup. In Outlook, click Tools, Options, Mail Setup tab, click Add. In New Outlook Data File, select Office Outlook Personal Folder file (.pst), click OK. Click Save in if you want to select where to save the file, type Filename, click OK, Close, then OK to go back to Microsoft Outlook. Check the PST file you just created, it should be on the left column.
  8. Now let's copy the Inbox messages to the PST file. Select Inbox folder, right-click to select Copy Inbox, scroll to select the PST file to copy, click OK. This will begin to copy messages from server to the PST file. It will take a while to complete depending the size of your inbox/messages. 
  9. If you want to copy another folders from your Mailbox to the PST file, for example Sent Item. Just follow the previous step, select the folder, copy to PST file, and so on.
  10. Finish.
Resources:

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp