C2C Email Archiving – remote laptop access to archive

Here are some details on the capabilities of Offline Email Archiving for remote laptops. It is great to have your email archived on your server, but some users need access when they are not in the office or connected to the internet. C2C Archive One has this capability with an optional module. Hope it is helpful. Please let us know and we can demo these features for you.

Larry M Phelps
Solbrekk Inc,
Minneapolis, Minnesota
cell 612-382-4069

Preparing for Offline Synchronizing
ArchiveOne Enterprise (Policy) can be configured so that a laptop (or any other type of PC) that
is sometimes online and sometimes offline to the network that the ArchiveOne Service is on can
maintain a copy of the archive of a mailbox, which can be used when they are offline.
This has the following requirements and features:
o The laptop must be running an OST copy of the server based mailbox.
o On a regular basis, the laptop must be connected to the network that the ArchiveOne Service
is on, in such a way that they have the same access permissions as a standard PC that is
permanently connected – it is not sufficient just to have a dial-up connection, unless that
gives the laptop fully authenticated access. Specifically, they need to be able to see server
shares on the network.
o It requires Outlook 2000 or later on the laptop, and the Laptop Client component installed.
o When offline, laptop users will be able to view messages by viewing the message links in
their mailbox (which will then view from the local copy of the archive) but they will not be
able to search the archive.
o When online, laptop users will behave like any other user, including searching the archive.
o Archiving is only performed on the server. The laptop contains a copy of the server based
archive of the mailbox, but it is never updated on the laptop. If the laptop is lost or stolen, a
new laptop can be configured and can easily be brought up to date with the latest copy of the
archive, with no loss of data (except for any mail that was not archived and not on the server
copy of the mailbox).
o Whereas most mailbox archive data can be stored either on a hard drive or a storage
manager, archive data for mailboxes that are being synchronized must be located on hard
drive. This means it is the administrator’s responsibility to ensure they are suitably backed
o If multiple users share the laptop or one user accesses multiple mailboxes, the Laptop Client
will keep local copies of the archives of all appropriate mailboxes up to date whenever it is
The architecture is as follows:
o The administrator enables a mailbox for offline synchronization.
o They then archive the mailbox.
o During regular intervals (which can be scheduled), the ArchiveOne Service updates an offline
repository that contains items just for this mailbox. This offline repository is temporary and
is not required for backup.
o The ArchiveOne Service shares this offline repository as a network accessible share (viewable
only to users who are allowed to search into the mailbox) if it is not already in a shared
o When the user logs into Outlook on the laptop, the Laptop Client software checks to see if the
user’s mailbox has an offline repository on the server.
o If so, it copies the offline repository data onto the laptop.
o It intercepts attempts to view message links in the mailbox, and if the laptop is currently
offline, it uses the local copy of the archive.

Watchguard Firewall Review

Security Magazine reviews the Watchguard XTM 505 firewall. If you are looking for a firewall, Watchguard is one that I would recommend.
Solbrekk is one of the largest valued added resellers for Watchguard in Minneapolis Minnesota. We have been installing and servicing Watchguard firewalls for over seven years.

Here is complete article:
Watchguard Firewall Review Minneapolis Minnesota

Watchguard Product Matrix – Minneapolis Minnesota

Watchguard Education Promotion – Minneapolis Minnesota

Email Archiving – Which Method is Best?

Email archiving is fairly easy concept to understand, but how it is accomplished using the underlying technologies is not as easy to grasp. These technologies include; MAPI, Exchange Web Services, Transaction Log Parsing, and Single Instance Storage. Most product demonstrations typically spend time explaining the benefits of their products as they should. But, an understanding of the underlying technologies can help you make a more informed decision.

Some have said that Microsoft plans to move away from MAPI. I don’t believe Microsoft is moving away from MAPI any time soon. Currently, there are an estimated 500 million Microsoft Outlook users. Outlook uses MAPI to connect to Exchange. Even using Outlook remotely (RPC over HTTP), you are still using the MAPI protocol via plain RPC or RPC embedded within an HTTP data stream.

For this reason I recommend a email archive product that uses MAPI technology.

Other products use Transaction Log parsing. Although, this works, it is not using Microsoft’s best practices approach. Essentially developers are reverse engineering the Exchange undocumented Transaction Logs to extracting data for archival. Using this method can result in a major problems for this type of archive product if for some reason you need to restore Exchange data from a backup.

For this reason I recommend that you do not select an email archiving product that parses the Exchange Transaction Logs.

Many people are worried about email archiving adding extra overhead to your Exchange server. Both archiving methods, using MAPI or Parsing Transaction Logs , do add a certain additional load to a server. But we have not seen this cause problems. In most cases, most organizations have too much data in their Exchange server and using a good email archiving product eliminates this unnecessary data and actually makes the Exchange server perform better.

If you have questions or would like to look at email arching, please feel free to contact me.

Larry Phelps
Minneapolis Minnesota

C2C Email Archiving

We find that the reason many people have problems with their email server is that their user are using their email system as their filing cabinet. Seldom deleting emails, just in case they need them. This causes their server to fill up, affecting performance and sometimes causing the system to near is storage limits.  User are asked to delete their email or archive it.  PST files are created and are difficult to manage.  Can you relate to this?

    Here are some good reasons you should consider implementing a Email archival system:

  1. Server performance
  2. Server capacity
  3. Reduce IT workload
  4. Eliminate reliance on PST files 
  5. More efficient search and retrieval 
  6. Security 
  7. Compliance 
  8. Discovery 
  9. Disaster Recovery 
  10. End-user convenience 
  11. Manage retention policy 
  12. Employee productivity,a recent IDC study revealed that a company with 1,000 information workers can expect to lose more than $5 million in annual salary costs because of time spent on unproductive e-mail searches.  Reasons to Archive Email 

We have looked at many Email Archiving products and recommend C2C.  Here is some articles that I think you will find helpful.

C2C Key Benefits of Archive One Email Archiving

C2C ArchiveOne Express Email Archive for Small Business

Email Archiving Disk-based Repositories White Paper

C2C Microsoft Exchange Advanced Email Archiving

C2C Email Archiving Osterman Research on Content Retention

If you are interested in learning more about email archiving or would like to engage in a 30 day pilot project, please contact me.

Larry Phelps



Minneapolis Minnesota

Top Technology Breakthroughs

CRN News recently published an article stating what they thought were the greatest technology breakthroughts in the past 25 years. Well, for many of you 25 years would take you back to your blackmart app childhood, but for others of us we have watched the crazy growth of technology and how it has impacted our lives.

If you were asked to list some of the technologies that really changed your life, what would the be?

Here is that CRN listed as the top 25:
1. Software As A Service – rather than purchasing software capability you rent it, such as Webex.
2. Realtime Collaboration/Communications – AOL Instant Messaging and text messaging are examples of this.
3. IPOD – Apple Computer’s device that allows mobile storage of audio and images.
4. Google – the search engine that gave new meaning to information overload. Watch for other technologies they are developing!
5. Blackberry – the phone, PDA and web browser in one device.
6. Linux/Open Source – a growing software movement that has Microsoft’s attention.
7. The Web Browser – made the internet accessible to the average user.
8. The Virus – has spawned a whole industry.
9. The Y2K Scare – design oversight, hype and distrust all characterize this event.
10. The PDA – hand held organization!
11. Wireless Communications – cell phones, wireless PDA and WIFI have invaded nearly every business and household.
12. E-Mail – this change the method of communications for most people in their business and personal life.
13. The Mouse – change the way we interact with computer applications.
14. The Internet – has changed business probably more than any technology listed here.
15. Ethernet – this invention is the conduit that allows most of the data communication that is happening today.
16. The Network Operating System – allows standalone PC’s to share resources.
17. The Office Suite – today the standard of office tools.
18. The Graphical User Interface – Windows changes the ease of use of computers forever.
19. The Modem – became the standard for many years to remotely connect computer systems.
20. The Laptop Computer – gave birth to what we call today, mobile users.
21. The Relational Database – capability once only existed on mainframe computers became common place.
22. The Word Processor – the most widely used application to date.
23. The Spreadsheet – one of the most powerful application we use.
24. The IBM PC – this product legitimized the personal computer industry.
25. The x86 CPU – Intel produced a legacy of products that have lasted nearly 30 years.

For the complete article go to: CRN ARTICLE</a

Information Security: What you really should know.

You should attend this seminar if you:
o Have computer users
o Want to learn more about information security
o Are in a regulated industry and/or process credit cards
o Use vendors to store or process data
o Want to learn about technology risks that may impact your business
o Want to know what your options are for protecting intellectual property and other confidential data
Mark Ritchie Minnesota Secretary of State
Matthew J. Harmon, CISSP, CISA, GSEC Blanski Peter Kronlage & Zoch, P.A.
William Larsen Watchguard Technologies, Inc.
Darlene Tester, JD, CISSP Bluestem Brands

Event Information
Tuesday, June 29, 2010 Time:
Registration: 8:00 am to 8:30 am
Program: 8:30 am to 10:30 am
Q&A Session: 10:30 am to 11:00 am

Golden Valley Golf & Country Club
7001 Golden Valley Road
Golden Valley, MN 55427 Cost:
$25 per person – Prepaid
$35 per person – At the door
Continental breakfast and security reference
handbook included

Reserve a seat by June 23, 2010 for you or your guest(s) by contacting Cecille Rice at 763-404-4736 or events at solbrekk.com