Feeds

Help! My Exchange server just rebooted

When recovery is the only option

Securing Web Applications Made Simple and Scalable

I’ve seen a spate of issues from companies running their own MS Exchange servers. A few patterns emerged. In all cases, servers running Exchange (usually as part of Small Business Server) either lost power or rebooted unexpectedly.

This will not always cause problems. But if Exchange is busy writing things to the data store, it can result in corruption of your Exchange database and lost data.

Naturally, the first question to ask is: is there a backup? I would hope so, but it’s not always the case. Even if you do have a backup system in place, bad things can happen.

In one case, I got a customer 95 per cent of the way through a restore, only to discover that the second to last cartridge in the set was unreadable. In another, the backups in question were too old. As it turns out, 24 hour-old backups were not fresh enough to restore that particular day’s hundreds of business-critical emails.

Yesterday saw one unfortunate soul’s company on the receiving end of a truck-versus-pole induced massive power spike. The UPS took the bullet for the email server; however the backup server was protected only by an ancient power bar. The surge took the backup server’s power supply, motherboard and all drives with it.

Worse, six out of eight externally-powered USB-attached hard drives were convinced to let out the magic smoke as well. (Incidentally, both WDs survived. All the Seagates bought it.)

Outlook OST restore

So what options are available? One approach – typically only used if all else fails - is called an OST restore. It relies on the concept that each user of the Exchange server runs Outlook in cached mode.

In a lot of environments – typically the kind where backups don’t exist – users ignore best practices regarding security. This means their computers are often left logged on 24/7. Outlook then has a complete copy of their mailbox cached locally.

To restore in this case, you create a new database and assign the existing users new mailbox space in the new database. A quick internet search will present you with a choice of tools to convert OST files into PST files. This one by Nucleus Technologies is a good example. Once converted, you can mount the PST file into the user’s Outlook and copy all the information back into the new mailbox.

This approach has some basic flaws. If you have more than a handful of users, it is stupendously time consuming. And it won’t get you back your public folders; it can only recover a user’s mailbox data and “favourite” public folders that happened to be cached locally.

Also, Outlook may be out-of-date compared to the Exchange server for users who don’t leave their computer logged on all day. In such cases a recovery may miss crucial information.

Better options exist in the form of tools that directly manipulate the exchange database. Consider eseutil. Eseutil ships with Exchange.

There are dozens of quality walkthroughs on the net for recovering an Exchange database from almost any conceivable situation.

Eseutil screenshot

Though eseutil can take a while to execute on badly damaged data stores, in the case of the above truck meets pole accident, this sequence of commands quite literally saved a business:

eseutil.exe /r E00 /l "C:\Program Files\Exchsrvr\MDBDATA" eseutil.exe /p "C:\Program Files\Exchsrvr\MDBDATA\priv1.edb" eseutil.exe /d "C:\Program Files\Exchsrvr\MDBDATA\priv1.edb" eseutil.exe /p "C:\Program Files\Exchsrvr\MDBDATA\pub1.edb" eseutil.exe /d "C:\Program Files\Exchsrvr\MDBDATA\pub1.edb" eseutil.exe /r E00 /l "C:\Program Files\Exchsrvr\MDBDATA" eseutil.exe /r E00 /l "C:\Program Files\Exchsrvr\MDBDATA" /i

Eseutil does not rely on the cached copies of the mailboxes being up to date. Instead, it works to restore the original Exchange data store.

This allows recovery of public folders as well as the mailboxes of users working with cacheless clients such as Outlook Web Access. Best of all, you don’t have to fiddle about creating a new data store and moving around user mailboxes.

If you are ever caught with your pants down without a backup, keep eseutil in mind. It could save you a lot of time, effort and money. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.