Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Exchange Server

Using OWA 2003 for Storing Files

Can I enable users to store / upload files in their mailboxes through Outlook Web Access (OWA) in Exchange 2003?

This cool tip was first published by Sami Khoury on the Microsoft Exchange Team Blog.

Yes, although when users learn this trick they will soon start to upload ALL their crap to their mailboxes, and you will probably need to either implement mailbox quotas, or, if already using them, forcibly prevent users from crossing their quota limit.

In Windows 2000/2003 support has been added to a term called “web folders”, where you can browse the files and folders on a website in exactly the same way you browse your local disk. The underlying transport for web folders is called DAV, and Exchange 2000/2003 also supports and hooks itself to this interface.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

By connecting a client computer running Windows XP for example to a Windows Server 2003 computer running Exchange Server 2003, a user can send out HTTP requests to the server and if all is set up right, receive a window in which he or she can graphically browse their mailbox and folders.

In order to do so you must first configure your server to accept HTTP connections. This is done by default, as Exchange Server 2003 is installed on top of IIS and uses the WWW service for the OWA interface. Just make sure you can access OWA from your client machine, and preferably configure it to use SSL (read Configure SSL on OWA).

Next, assuming you use the following URL to access the OWA interface:

​http://server_name/exchange

(or https is using SSL, substitute server_name with the FQDN of your Exchange server)

Log onto OWA with your username and password.

Next click CTRL+O (oh, not zero) to open a new path:

Make sure you select “Open as Web Folder”. Click Ok.

You will see a list of folders looking like regular Explorer folders, however if you look closely you’ll see that most of these folders are the same ones found in your mailbox.

You can easily browse any folder (beware of making any changes related to permissions!), and you can also create new folders. Right-click an empty spot and choose New > Folder.

After the folder was created (in this case – “Stuff”), you can easily copy contents and files from your computer and then paste them inside this folder:

Nice, huh?

Related articles

You may find these related articles of interest to you:

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Live on Tuesday, September 28th, at 9:30 AM ET!

GET-IT: EndPoint Management 1-Day Virtual Conference

The management of endpoints is complicated and the risks associated with having unsecured devices roaming outside the firewall are quickly becoming a targeted vector for malicious users. In this Petri one-day virtual conference, we will be diving deep into how you can improve the way you manage your endpoints and learn from industry experts and MVPs about best practices, available tools to streamline your operations, and what's coming soon with Windows 11.

RSVP Now!

Sponsored By

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: