Microsoft로 로그인
로그인하거나 계정을 만듭니다.
안녕하세요.
다른 계정을 선택합니다.
계정이 여러 개 있음
로그인할 계정을 선택합니다.

Problem

While importing .pst files from external devices in Outlook 2010, "You may not use the file. There is not enough permission to use pst files" error message appears. You may not use the file. There is not enough permission to use pst files.

Cause

When importing .pst files from an external device in Windows 7 after exporting .pst files from Windows XP to the external device, such problem occurs. The cause of this issue could be that the user accounts for Windows XP and Windows 7 were incompatible or the account control had been improperly set.


Solution



alternate text

If you use both methods, the security risk may increase. Also, the computer and network may be easily attacked by malicious users and malwares such as viruses. Before applying this change, you might want to evaluate risks relating to the implementation of this step. If you decided to implement this step, take additional measures to keep the system secure.



method 1: Set the permission as "Everyone" on .pst files for import

  1. Right click the .pst file you are about to import and click [Property]. (In this article, backup.pst was used for .pst file as an example.)

    alternate text

  2. In the backup.pst property screen, click [Security], and then [Edit].

    alternate text

  3. In the backup.pst permission screen, click [Add].

    alternate text

  4. In the Select user, computer, service account or group screen, enter Everyone and then click [Confirm].

    alternate text

  5. In both the backup.pst permission and backup.pst property screen, click [Confirm].

    alternate text

  6. Import the .pst file back to see if the issue has been resolved.




method 2: Set the user account control as "Do not notify"

Please follow the next steps in order.

  1. Click [Start] and [Control Panel] in that order.

    alternate text

  2. Under the Control Panel, click [User Account and Family Safety].

    alternate text

  3. In the User Account and Family Safety screen, click [User Account].

    alternate text

  4. In the User Account screen, click [Change User Account Control Setting].

    alternate text

  5. In the User Account Control Setting screen, Set the user account control to [Do not notify] which is the lowest level and click [Confirm].

    alternate text

    alternate text

    When the User Account Control message shows up, enter the administrator password or click [Yes].


  6. Restart the computer and Import back the .pst file to see if the issue has been resolved.


    alternate text

    If the problem has been solved, you must restore the User Account Control Setting back to its original step to stop the malicious programs from changing the computer.



Additional Information

The table below outlines how the settings for each step and the settings affect the security.

Setting

Description

Influence on Security

Always notify

  • Before changing the computer or the Windows within the program which require an administrator permission, a notification message appears.

  • Once you get the notification, the desktop becomes blurred and you can no longer perform other tasks within the computer unless you accept or decline the request displayed in UAC dialog box. When the desktop is in blurred state, no programs can be launched and we call this a "secured desktop".

  • It is the safest setting.

  • If you received the notification, please read the contents in each dialog box before allowing changes on the computer.

Notify only when attempting to change the computer within the program

  • Before changing the computer within the program which requires an administrator permission, a notification message appears.

  • When attempting to change the Windows setting which requires an administrator permission, the notification does not appear.

  • When programs besides Windows try to change the Windows setting, you will see the notification.

  • It is generally safe to allow the change on Windows settings without getting the notification. However, commands or data may be delivered to certain programs provided with Windows, which can be abused by malwares within the computer to install files or change settings. So you should be careful when allowing the programs to be executed on the computer.

Only notify when attempting to change the computer (do not blur the desktop)

  • Before changing the computer within the program which requires an administrator permission, a notification message appears.

  • When attempting to change the Windows setting which requires an administrator permission, the notification does not appear.

  • When programs besides Windows try to change the Windows setting, you will see the notification.

  • This setting is identical to "Notify only when attempting to change the computer within the program" but the notification is not displayed on secured desktop.

  • If you use this setting, other programs may negatively affect the visualization of the dialog box since the UAC dialog box does not exist on the secured desktop. If a malware is already running on the computer, this setting can be a bit risky.

Do not notify

  • A notification is not displayed before a change is made on the computer. When logged in as administrator, the program can make unauthorized changes on the computer.

  • If you are logged in as a standard user, all tasks that require an administrator permission are automatically ignored.

  • When selecting this setting, you must restart the computer and finish disabling the UAC. Once the UAC is unselected, the user who is logged in as administrator always has the admin permission.

  • This is the least safe setting. If the UAC is set not to display the notification, the computer can be exposed to security risk.

  • If the UAC is set not to display the notification, you should be careful when running programs because the executed program is able to access the computer with the permission identical to that of the user to read from or change the protected system area, personal user data, saved files and other saved items from the computer. These programs can also communicate and exchange information with all targets associated with the computer including the Internet.




References



Send Feedbacks

alternate text


As a valued customer, your feedback is very important to us. Please use Send Feedbacks below and provide us with your valuable ideas.

도움이 더 필요하세요?

더 많은 옵션을 원하세요?

구독 혜택을 살펴보고, 교육 과정을 찾아보고, 디바이스를 보호하는 방법 등을 알아봅니다.

커뮤니티를 통해 질문하고 답변하고, 피드백을 제공하고, 풍부한 지식을 갖춘 전문가의 의견을 들을 수 있습니다.

이 정보가 유용한가요?

언어 품질에 얼마나 만족하시나요?
사용 경험에 어떠한 영향을 주었나요?
제출을 누르면 피드백이 Microsoft 제품과 서비스를 개선하는 데 사용됩니다. IT 관리자는 이 데이터를 수집할 수 있습니다. 개인정보처리방침

의견 주셔서 감사합니다!

×