Browse Definitions :
Definition

PST file

A PST file is a personal folder file in Microsoft Outlook. In Outlook, the storage limit for a single user's .PST file is 2 GB. PST stands for personal storage.

Ask your questions about Exchange at ITKnowledgeExchange.com

Getting started with PST files
To explore how PST files are used in the enterprise, here are some additional resources:
Microsoft Outlook .PST file FAQs Troubleshoot Outlook .PST file issues with this collection of FAQs, from importing and exporting data to file repair and recovery.
Why are .PST files a security threat to Exchange Server mailboxes? The use of .PST files can threaten mailbox security in an Exchange Server organization. Learn why these files are so problematic and how to disable them.
Create a group policy to prevent .PST file storage in Exchange 2007 Use the Group Policy Object Editor in Active Directory to prevent users from storing new data in .PST files on Exchange 2007 and Microsoft Outlook 2007.
Migrating .PST files to an Exchange Server information store The first step to migrate .PST files to an Exchange Server information store is to get Microsoft Outlook users to save .PST data to their Outlook mailboxes.
Lock down Microsoft Outlook 2007 to prevent .PST file access The final step to eliminating the use of .PST files for mailbox data storage in Exchange Server 2007 is locking down Microsoft Outlook 2007.
Migrating older .PST files to Microsoft Outlook 2003 Find out how to take advantage of Microsoft Outlook 2003's 20 GB .PST file size limit.
Control Microsoft Outlook .PST file size and usage via the registry Learn how to control and prevent Microsoft Outlook .PST problems by implementing registry keys that manage ANSI- and Unicode-based .PST file size and usage.
This was last updated in December 2008
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close