Chat now with support
Chat with Support

Migration Manager for PSTs Enterprise Edition 7.2 - Administrator Guide

Module Editor

The Module Editor permits module specific configuration to be set down to a location level. Locations are specified by a drop box at the top of a tabbed interface. All modules enabled have configuration options exposed in each of the tabs. Configuration settings assigned here can be overridden using the Custom Settings option in the Module Settings sub-menu.

There are several settings which are seen over most or all of the modules within Migration Manager for PSTs. The following table provides a description of these configuration options:

Location

Drop-down at the top permitting selection of location for site specific module configuration defaults

Number of Threads

Number of instances of the module's functionality are configured to run concurrently

Update Interval

Time the module waits between queries to the core for more Work Items

Number of Work Items

The total number of requests for work a service will queue at a time

Storage locations

Specification of the storage area used by the module

Some modules also permit the ability to assign a cloud connection string for a storage location to support Azure nodes.

Some modules have configuration options that are specific to them. The following section discusses these options.

To ensure maximum efficiency of the Repair module, it is recommended that it be installed on the same machine as the Extraction module and the BITS upload location. When the Repair module is on a location local to the BITS upload location, there is special configuration required to enable the repair request to use the local path rather than a UNC path. Enabling this configuration has shown to produce a substantial performance gain for the repair module.

The extraction module is a powerful module that performs several tasks during the extraction process. This functionality requires many additional configuration options that are specific to it. The following table provides a description of these options:

Generic Filter

Enables filter criteria to be provided that applies to all items in the PST file

Notes Filter

Enables filter criteria to be provided that applies to email based message classes

Appointment Filter

Enables filter criteria to be provided that applies to appointment based message classes

Filter Deleted Items

Option to filters items in the Deleted Items folder

Enable Replace

Permits the ability to convert message classes of an item during extraction

Keep Items only in IPM Root

Enables ability to remove items in an area of the PST which is inaccessible in target systems

Source Type

Original message class desired for conversion

Destination Type

Message class intended for the value specified in 'Source Type' to be converted into

Enable Content Scanning

Enables the ability to identify most common sender and recipient in extracted PST files for better owner recognition

Encoding for ANSI files

Selects regional ANSI encoding

Skip Password Protected

Option to skip extraction for password protected files

The Extraction module is also able to filter data from PST files when that content is not desired or known to be unsupported in a target system. Filtering items will remove items based on how they match the specified criteria and these items will not be migrated to the target system. Filters will be applied to the scope of the area they are placed. For example, filters placed in the “Appointment Filter” filed will only apply to message classes associated with Appointments.

Filtered content is written to the specified “Filter Location”. The following is a list and description of properties PST files can be filtered by:

MessageClass

Property of a message which identifies the type of message it is

Created

The creation date of a message

Subject

The subject of a message

ReceivedBy

The name, email address, or distinguished name of the user who received the message

Sender

The name, email address, or distinguished name of the sender of a message

ModificationDate

The last modified date of a message

Size

The size of a message

Filters are case sensitive when applied. Its syntax can be built using the properties above and standard C# string methods. These methods are appended to a property and applied against the value of that property. If you wanted to find a property containing the value of “xyz” you would append .Contains(“xyz”) to the name of the property.

For more information on C# string methods and the options available for filtering, please refer to the MSDN site on the topic.

Filtering Examples

The following example on how to filter messages types by message class can be used if Enterprise Vault shortcuts are desired to be excluded from a migration:

item.MessageClass.ToLower().StartsWith(“ipm.note.enterprisevault”)

The following example shows how to exclude all items older than a year from being migrated:

item.Created < DateTime.UtcNow.AddMonths(-13)

This final example shows a filter designed to remove items larger than 25 MB from being migrated:

item.Size>26214400

This tab contains configuration settings for the duplication function. By default, Dedup examines, and dedupes, mails items within a PST and mail items between multiple PSTs. The settings unique to this tab are described as follows:

Hash Storage Location

The drive path of where the calculated hash values are stored

Limit to other Files only

Allow deduplication only between files.

This tab contains configuration settings for the ingestion into Microsoft targets such as Office 365 and Exchange servers. Migration Manager for PSTs uses the Advanced Ingestion Protocol (AIP) as a primary ingestion method into Microsoft targets. The settings in this tab control the behavior of this module and permit the ability to tune these settings to get the best performance possible. The settings unique to this tab are described as follows:

User Sync

Permits o365 user synchronization in multi-tenant environments

Subfolder name

The location created or used in the target mailbox where all content migrated is placed into

Unique Subfolder Names

Enables files with the same display name to have unique folders created for each PST file ingested

Ingest by Age filter

Sets a date filter for ingestion

Autodiscover Override

The URL that should be resolved by a proper functioning Autodiscover system

Exchange version

Enables specification of the version of Exchange the EWS API is expecting to communicate with, as required in early API versions

Disable Certificate Validation

Permits use of unsigned and untrusted SSL certificates when communicating over HTTPS to the target system

Disable Past Reminders

Removes reminders for meetings and calendar items that occurred in the past

Tracking Information

Applies hidden metadata about the migration to items written in the target system

Folder Types

List folder types for tasks, calendar, and contacts

Update Retention

Enables the ability to set a retention policy tag in the target system at the Top Folder level or on all items

Retention Policy Tag

The policy in the target system that is expected to be applied to migrated content.

This tab contains configuration settings for the ingestion into Enterprise Vault targets. Migration Manager for PSTs uses the Enterprise Vault API as an ingestion method into Enterprise Vault targets. The settings in this tab control the behaviour of this module and permit the ability to tune these settings for the desired results. The settings Unique to this tab are described as follows:

Retention Category

The ID or name of the Retention Category content is to be stored under

Subfolder name

The location created or used in the target mailbox where all content migrated is placed into

Unique Subfolder Names

Enables files with the same display name to have unique folders created for each PST file ingested

Ingest by Age filter

Sets a date filter for ingestion

Tracking Information

Applies hidden metadata about the migration to items written in the target system

Create shortcuts

Enables the ability to create Enterprise Vault shortcuts in Exchange targets for content migrated.

Shortcut filter

Option to filter shortcuts that are created. Create shortcuts must be enabled.

This tab contains configuration settings for the identification and restoration of Enterprise Vault shortcuts identified within PST files. The settings in this tab control the behavior of this module and permit the ability to tune these settings for the desired result. There is only one unique value in this tab. The Item Ingest Parallelism is used to determine the number of items requested for rehydration per pass per thread of a running module.

This tab contains configuration settings for the cleanup module. The settings in this tab control the behavior of this module and permit the ability to tune these settings for the desired result.

Move Location

Select local or cloud storage

Local Location

Sets the local storage path for cleanup data

File Statues to Delete

Sets the status codes of files to be deleted during cleanup. The default value is status 2400 (Deleting)

This tab contains configuration settings for the Leftover module. The Leftover module copies non-ingested data to a file share or OneDrive. The settings in this tab control the behaviour of this module and permit the ability to tune these settings for the desired result.

Destination

Select Share (e.g., c:\, e:…, or UNC path) or OneDrive

Subfolder Name

Creates a subfolder in the destination

Flat Structure

If checked, all leftover data is saved in the destination with no folder structure.

Unzip

If checked, individual leftover mail items will be stored. In unchecked, zipped items will be stored.

Scheduled Tasks

Scheduled tasks sub-menu permits review and management of regular activities required in a migration. The interface shows all tasks available to the system and the time they are last run. You can execute the tasks now or you can change the configuration of a given task to run at specified times. Tasks can also be scheduled to execute on a regular interval and run continually.

Scheduled Reports

The Scheduled Reports sub-menu permits management of schedule report configurations. Scheduled reports are run periodically and are made available through the web portal to users who subscribe to the report. The reports are created by running defined SQL scripts and are saved as CSV files. Subscribed reports are emailed to the subscriber as ZIP files.

The options on the home ribbon for the Scheduled Reports sub-menu are as follows:

Refresh

Refreshes data in the displayed grid

Add

Creates a new report definition

Delete

Deletes an existing report definition

Edit

Edits an existing report definition

The options available in the report configuration are:

Name

The name of the report

Description

Description of the report

Mail template

The name of the email template used for emailing subscribed reports

SQL query

SQL script to generate the report

Schedule

Schedule for executing the query

Day of month

Select day of month for monthly reports

Report enabled

Option to enable/disable the report

Computers

The Computers sub-menu provides a grid of data showing all machines seen in the environment. The data returned also includes all computers where content was discovered. Computers can be assigned to specific locations, be designated as “Central Servers” so the Central Upload Agent uploads the content on it and can be flagged to have the content of the files identified on that machine scanned for sender and recipient information. Should it be appropriate, comments can be added, displayed, or managed for computers identified within the environment.

The options on the home ribbon for the Computers sub-menu are as follows:

Refresh

 

Refreshes data in the displayed grid

Set

Central Servers

Sets servers to act as a central upload server

Unset

Central Servers

Unsets servers acting as a central upload server

Set

Content Scanner

Sets servers to act as a content scanner

Unset

Content Scanner

Unsets servers acting as a content scanner

Add

Comments

Add comments for a selected computer

Show

Comments

Shows comments for a selected computer

Close All Comments

Comments

Close all the comments for a selected computer

Set Location

Location

Assigns a computer to specific location

Import Owners

Computer

Imports CSV file of computer owner information to be used in ownership calculations

Admin File Scan

Computer

Forces a file scan on a computer using the agent service to find files that the logged in user doesn’t have rights to

Related Documents