LAE Software

Global Partner

PST Identification

LAE Software’s PST Migrator is an automated PST file migration solution that easily enables migrating email contained in PST files to your Microsoft 365 email service.

Methods supported natively by Microsoft are cumbersome at best, requiring you first to upload your PST files to an Azure location — or send them (MSFT) a drive containing your PST files and have them moved to Azure for you.

If planning a migration to Microsoft 365 for your organization’s email, managing and migrating PST files can present a tremendous challenge. PST Migrator is the solution.

Already migrated to M365? TEAM-IIS provides post M365 migration PST identification and discovery audits at no cost.

Outlook PST files, while helpful for people who run into mailbox limits, pose various problems for individuals and organizations.

The top issues include:

Compliance issues related to discovery and data loss.

Backups are rarely performed on PST files.

They generate support calls related to corruption and configuration.

With migrations to Microsoft Office 365, the lower cost of storage has opened an opportunity to move the PST data back into the mailbox and solve the problems they created.

PST Migrator makes the PST data move to a Microsoft 365 mailbox easier by automatically moving the folders and items via a background non-disruptive process.

Once done, PST Migrator disconnects the Outlook PST files and ultimately deletes the empty file.


Automated Migration of PST Data

PST Migrator runs fully automated so no action is required by users. This increases the success rate of a complete PST migration and also saves time.

Uses Existing Infrastructure

The flexible deployment package can be pushed and managed by desktop management solutions already in-place. This includes GPOs, SCCM, Intune, LANDesk, etc.

Flexible Migrations – on prem / cloud

While built with Microsoft’s Exchange Online ‘large’ mailboxes in mind, PST Migrator can migrate the data to other mailbox locations, including on-premises Exchange Servers.

Connected and Disconnected PST Processing

Microsoft Outlook PSTs can be discovered and migrated by either looking at connected PSTs or disconnected PSTs sitting in the file system. With features like Ownership Verification, we can ensure the PSTs match to the person using Microsoft’s Outlook.

Resource and Bandwidth control

Since PST Migrator leverages the distributed power of your endpoints, the bottleneck sometimes is the network upload capacity. The resource control feature limits the rate at which data is moved which protects your networks.

Enhanced Corruption Mitigation

PST Migrator uses the Microsoft Outlook API and is error handled per item. Which means there isn’t a need to run ScanPST. ScanPST will truncate some good data with the bad where PST Migrator will grab more good data out of a corrupted PST and just leave behind the bad.

Quota Protection

Although Microsoft’s Office365 allows for very large mailboxes and archives, the quota protection feature makes sure the migration of the PST data does not push mailboxes over their limits.

Ownership Verification

Ownership verification ensures that PSTs being migrated are matched to the person using Outlook. Configurable for both connected and disconnected, this feature is most important when searching network shares for disconnected PSTs.

User Validation

For those looking for end user validation of the PSTs to migrate, we have user validation available/configurable for both the connected and disconnected PSTs.

Retention Policy Tagging

PST Migrator can apply a Microsoft Exchange policy, or tag, to the PST data it migrates. Policies/tags can be used to delete or move the data to the online archive.

Restricted Run Times

When enabled, PST Migrator will only process data during the allowed times of day.


• 2010 – 2019 or Office365
Operating System
• Windows Client 7, 8, 8.1 or 10 (32 or 64 bit)
• Windows Server 2008-2019 (Desktop Experience Required)
.Net Framework
• 3.5 – 4.8

How It Works


Give us a call or complete this from. A representative will contact you directly.

  • Let’s talk

    We’ll chat about your business, regulatory challenges, data privacy concerns, and information governance goals.

  • Requirement elicitation

    We’ll bridge the gap between the as-is and to-be.

  • Move forward

    We’ll put together a proposal, and once accepted, start!