Finally, after a long wait, Enterprise Vault has caught up with some of the third party products which deal with PST migration. At least, it has in some ways. I'm talking about password removal from PST files. This is now an option on the site settings:
With this setting enabled (it's not by default) any PST files which Enterprise Vault attempts to migrate which are password protected will have the password stripped first of all.
And in the world of DTRACE when you hit a password protected file you'll see something like this:
168797 10:24:39.352 [7424] (MigratorServer) <604> EV:M {CMigrator::OpenPSTStore}|Trying to generate password patch to open PST file.
168798 10:24:39.352 [7424] (MigratorServer) <604> EV:M {CPstUtil::ComputePstPasswordPatch:#108} Entry.
168799 10:24:39.352 [7424] (MigratorServer) <604> EV:M {CPstUtil::OpenPstFile:#66} Entry.
168800 10:24:39.354 [7424] (MigratorServer) <604> EV:M {CPstUtil::OpenPstFile:#86} Exit - 0.
168801 10:24:39.354 [7424] (MigratorServer) <604> EV:M {CPstUtil::GetPstFileType:#179} Entry.
168802 10:24:39.354 [7424] (MigratorServer) <604> EV:M {CPstUtil::GetPstFileType:#198} PST file type is UNICODE.
168803 10:24:39.354 [7424] (MigratorServer) <604> EV:M {CPstUtil::GetPstFileType:#202} Exit - 0.
168804 10:24:39.354 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::ComputePasswordPatch:#311} Entry.
168805 10:24:39.354 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::ReadHeader:#245} Entry.
168806 10:24:39.354 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::ReadHeader:#288} Exit.
168807 10:24:39.372 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::FetchPasswordCRC:#434} Entry.
168808 10:24:39.372 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::SearchBlock:#358} Entry.
168809 10:24:39.373 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::SearchBlock:#414} Exit.
168810 10:24:39.373 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::ReadBlock:#752} Entry.
168811 10:24:39.374 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::ReadBlock:#786} Exit.
168812 10:24:39.374 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::FetchPasswordCRC:#483} Found PidTagPstPassword in message store block.|
168813 10:24:39.374 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::FetchPasswordCRC:#499} PST file IS password protected. Getting it's CRC.|
168814 10:24:39.374 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::FetchPasswordCRC:#533} Exit.
168815 10:24:39.374 [7424] (MigratorServer) <604> EV:M {CPstUtil::CPstReader<class CPstUtil::CUnicodePst>::ComputePasswordPatch:#336} Exit.
168816 10:24:39.374 [7424] (MigratorServer) <604> EV:M {CPstUtil::ComputePstPasswordPatch:#161} Exit.- 0.
168817 10:24:39.374 [7424] (MigratorServer) <604> EV:M {CMigrator::OpenPSTStore}|Successfully generated password patch to open PST file '\\?\UNC\ROB-PC\C$\Users\vty\Documents\pwdprotected.pst'. Trying to open pst file using password patch.
168818 10:24:39.374 [7424] (MigratorServer) <604> EV:L CPSTHelper::OpenPstStore:[\\?\UNC\ROB-PC\C$\Users\vty\Documents\pwdprotected.pst]