Chat now with support
Chat with Support

Rapid Recovery 6.2.1 - Mailbox Restore for Exchange User Guide

Understanding Mailbox Restore for Exchange Preparing to use Mailbox Restore for Exchange The Local Mount Utility and Mailbox Restore Using Mailbox Restore for Exchange Restoring Exchange data using Mailbox Restore Exchange database maintenance in Mailbox Restore About us Glossary

Running the Eseutil.exe command line utility

Eseutil.exe is a command line utility from Microsoft. It provides a second option for conducting integrity checks and repairs of Exchange .edb files, in addition to the Mailbox Restore Physical Integrity Check Wizard.

1.
On the Mailbox Restore home page, click the Database Maintenance drop-down menu, and then click Run Eseutil.exe.
The Run Eseutil.exe window opens.
3.
In the Run Eseutil.exe window, use the drop-down list or the browse button to select the Exchange Database File (.edb) Path described in the following table.

Table 14. Exchange database file paths

Path

Description

Exchange Database File (.edb) Path

The location of the Exchange database file with the extension .edb. By default, it is stored in the following location: C:\Users\administrator\AppData\Local\Mounts.

Log File Path

Automatically populated. It is the location of the log files associated with the database.

System Files Path

Automatically populated. It is the location of the system files associated with the database.

Option

Description

Repair a corrupted or damaged database

Repairs minor corruption found on an Exchange database.

Verify the checksum of a database

Calculates the checksum of a page and compares it with the checksum value stored in the header to ensure that there is no corruption.

5.
Click Start.

About us

We are more than just a name

We are on a quest to make your information technology work harder for you. That is why we build community-driven software solutions that help you spend less time on IT administration and more time on business innovation. We help you modernize your data center, get you to the cloud quicker and provide the expertise, security and accessibility you need to grow your data-driven business. Combined with Quest’s invitation to the global community to be a part of its innovation, and our firm commitment to ensuring customer satisfaction, we continue to deliver solutions that have a real impact on our customers today and leave a legacy we are proud of. We are challenging the status quo by transforming into a new software company. And as your partner, we work tirelessly to make sure your information technology is designed for you and by you. This is our mission, and we are in this together. Welcome to a new Quest. You are invited to Join the Innovation™.

Our brand, our vision. Together.

Our logo reflects our story: innovation, community and support. An important part of this story begins with the letter Q. It is a perfect circle, representing our commitment to technological precision and strength. The space in the Q itself symbolizes our need to add the missing piece — you — to the community, to the new Quest.

Contacting Quest

For sales or other inquiries, visit https://www.quest.com/contact.

Technical support resources

Technical support is available to Quest customers with a valid maintenance contract and customers who have trial versions. You can access the Quest Support Portal at https://support.quest.com.

The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. The Support Portal enables you to:

Glossary

The Rapid Recovery Agent is software installed on a physical or virtual machine that lets it be added to protection in the Rapid Recovery Core.

A checksum is a function that creates blocks of data that are used for the purpose of detecting accidental errors that are created during transmission or storage.

The Rapid Recovery Core is the central component of the Rapid Recovery architecture. The Core provides the essential services for backup, recovery, retention, replication, archiving, and management. In the context of replication, the Core is also called a source core. The source core is the originating core, while the target core is the destination (another Rapid Recovery Core on its own dedicated server, where protected machines or clusters are replicated).

Data store is the Microsoft term for an Exchange database. The data store is a storage file with the extension ‘.edb’ on the Exchange server that comprises the Outlook data. It contains the Exchange items that can be recovered by Mailbox Restore.

Differential Restore is a type of data recovery in Mailbox Restore that lets you recover only the differences between one or more offline and online Exchange databases.

The Storage Networking Industry Association (SNIA) defines data deduplication as the replacement of multiple copies of data—at variable levels of granularity—with references to a shared copy to save storage space or bandwidth. The Rapid Recovery Volume Manager performs global data deduplication within a logical volume. The granularity level of deduplication is 8 KB. The scope of deduplication in Rapid Recovery is limited to protected machines using the same repository and encryption key.

Rapid Recovery Live Recovery is an instant recovery technology for VMs and servers. It provides near-continuous access to data volumes in a virtual or physical server, letting you recover an entire volume with near-zero RTO and a RPO of minutes.

The Local Mount Utility (LMU) is a downloadable application that lets you mount a recovery point on a remote Rapid Recovery Core from any machine.

Log truncation is a function that removes log records from the transaction log. For a SQL Server machine, when you force truncation of the SQL Server logs, this process identifies free space on the SQL server. For an Exchange Server machine, when you force truncation of the Exchange Server logs, this action frees up space on the Exchange server.

Mailbox Restore for Exchange (Mailbox Restore) is a program that works with Rapid Recovery and Microsoft Exchange to recover Microsoft Outlook mail items, such as email messages, Calendar appointments, and Address Book contacts.

Microsoft Exchange (Exchange) is a server program that manages and stores Microsoft Outlook content, such as email messages, Calendar appointments, and Address Book contacts.

Exchange mountability is a corruption detection feature that alerts administrators of potential failures and ensures that all data on the Exchange servers is recovered successfully in the event of a failure.

An abbreviation for Personal Storage Table file, a PST file is an open-source format of storing email messages, Calendar appointments, and other Exchange items. The file uses the extension ‘.pst’.

The Profile Wizard in Mailbox Restore is a tool that lets you create, edit, and remove Outlook profiles directly from within Mailbox Restore. It is only available when the machine on which Mailbox Restore is installed also includes a compatible version of Microsoft Outlook.

A protected machine—sometimes called an "agent"— is a physical computer or virtual machine that is protected in the Rapid Recovery Core. Backup data is transmitted from the protected machine to the repository specified in the Core using a predefined protection interval. The base image transmits all data to a recovery point (including the operating system, applications, and settings). Each subsequent incremental snapshot commits only the changed blocks on the specified disk volumes of the protected machine. Software-based protected machines have the Rapid Recovery Agent software installed. Some virtual machines can also be protected agentlessly, with some limitations.

Rapid Recovery sets a new standard for unified data protection by combining backup, replication, and recovery in a single solution that is engineered to be the fastest and most reliable backup for protecting virtual machines (VM), as well as physical and cloud environments.

Recovery points are a collection of snapshots of various disk volumes. For example, C:, D:, and E:.

A remote Core represents an Rapid Recovery Core that is accessed by a non-Core machine using the Local Mount Utility or the Central Management Console.

The process of restoring one or more storage volumes on a machine from recovery points saved on the Rapid Recovery Core is known as performing a restore. This was formerly known as rollback.

A snapshot is a common industry term that defines the ability to capture and store the state of a disk volume at a given point, while applications are running. The snapshot is critical if system recovery is needed due to an outage or system failure. Rapid Recovery snapshots are application aware, which means that all open transactions and rolling transaction logs are completed and caches are flushed prior to creating the snapshot. Rapid Recovery uses Microsoft Volume Shadow Services (VSS) to facilitate application crash consistent snapshots.

True Scale is the scalable architecture of Rapid Recovery.

Rapid Recovery Universal Recovery technology provides unlimited machine restoration flexibility. It enables you to perform monolithic recovery to- and from- any physical or virtual platform of your choice as well as incremental recovery updates to virtual machines from any physical or virtual source. It also lets you perform application-level, item-level, and object-level recovery of individual files, folders, email, calendar items, databases, and applications.

Verified Recovery technology is used to perform automated recovery testing and verification of backups. It supports various file systems and servers.

Related Documents