Exchange Server

Restore the M Drive Mapping in Exchange 2003

How can I restore the IFS Mapping for Drive M in Exchange Server 2003?

MS KB 305145 has more info (Remove the M Drive Mapping in Exchange 2000).

To restore the drive M mapping, use the script that is provided here: ifsdrive_script.zip – 2kb)

After you download and extract the drive M removal script, you need to run the script from a command prompt on the Exchange Server 2003:

Sponsored Content

Passwords Haven’t Disappeared Yet

123456. Qwerty. Iloveyou. No, these are not exercises for people who are brand new to typing. Shockingly, they are among the most common passwords that end users choose in 2021. Research has found that the average business user must manually type out, or copy/paste, the credentials to 154 websites per month. We repeatedly got one question that surprised us: “Why would I ever trust a third party with control of my network?

Open a command prompt window, and then change to the folder that you saved the script to.

At the command prompt, type the following command to remove the drive M mapping:

Note: The script stops and starts the Exchange 2003 message transfer agent (MTA), Exchange 2003 Post Office Protocol version 3 (POP3), Exchange 2003 Internet Message Access Protocol, Version 4rev1 (IMAP4), Exchange 2003 information store, and World Wide Web Publishing services.

​ifsdrive drive_letter

Where drive_letter is (and should be) M:.

For example:

​ifsdrive m:

Links

Remove the IFS Mapping for Drive M in Exchange 2000 Server – 305145

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (1)

One response to “Restore the M Drive Mapping in Exchange 2003”

Leave a Reply

13 Email Threat Types to Know About Right Now

As email threats evolve and multiply, keeping track of them all—and staying protected against the many different types—becomes a complex challenge. Today, that requires more than just the traditional email gateway solution that used to be good enough.

In this eBook you will learn:

  • What are the most common and challenging email attacks for organizations?
  • How to defend against sophisticated email threats, such as spoofing, social engineering, and fraud
  • How to protect employees at the inbox level with the right technologies and security-awareness training
  • How to use a multilayered protection strategy to reduce susceptibility to email attacks and better defend your business and employees

Sponsored by: