What Is A Personal Storage Table (PST) File? - Fortinet

Skip to content Skip to navigation Skip to footer CyberGlossary › Email Security › What Is A PST File? What Is A PST File?

Definition, security issues, and frequently asked questions about PST files.

2025 Gartner® Magic Quadrant™ for Email Security FL Definition Security FAQs FL Definition Definition Security FAQs

PST File Meaning

A PST file is a personal storage table, which is a file format Microsoft programs use to store items like calendar events, contacts, and email messages. PST files are stored within popular Microsoft software like Microsoft Exchange Client, Windows Messaging, and Microsoft Outlook.

The PST file format is also commonly referred to as a personal folder, or when used as a cache in Outlook’s exchange mode, an offline storage table (OST) or offline folder. The format first appeared in the mid-1990s in the Microsoft Exchange email client, which later became Microsoft Outlook. It was used to help users access server mailboxes, and just like in the modern day, allow them to create local archives of the email folders they have on server-based email clients.

When a new email account is added to Outlook, Outlook creates a local copy of the information onto the user’s device. This enables users to access emails they have previously downloaded or synchronized, contacts and calendar information, and tasks even if they are not online. Some Microsoft accounts, such as Post Office Protocol (POP) accounts, store information in Outlook Data Files (.pst), while others, such as Outlook 365, Exchange, Internet Message Access Protocol (IMAP), and Outlook.com accounts, store information in Offline Outlook Data Files (.ost).

Archiving emails is now associated with terms and practices like electronic discovery (e-discovery), compliance, and regulation. But PST files were originally used to help admins limit the amount of storage available on their servers to improve performance and reduce backup times. This also enabled users to expand their email storage space by creating local archives.

Every email account created in Outlook gets its own database, which is the PST file that stores contacts, calendar items, emails, and reminder messages. This data can either be compressed or encrypted, and Outlook’s performance slows down as the PST file accumulates more data. 

PST files appear with a .pst extension in an Outlook data folder, while .ost files are used as a temporary offline storage option for Exchange servers and webmail hosts, such as Outlook.com. This helps users access emails even when they are not connected to the email server.

What Are The Advantages of PST files?

The main business advantage of using PST files is to reduce the amount of data residing on email servers. This reduces the amount of time that admins have to spend helping end-users who have reached the maximum capacity of their inbox. 

End-users benefit from gaining extra space to store their emails. They are also able to access the data stored in their email inbox when they are offline.

2025 Gartner® Magic Quadrant™ for Email Security

Fortinet Named a Challenger in the 2025 Gartner® Magic Quadrant™ for Email Security

Download Now

PSTs And Security Issues

PST files are an extremely common form of email storage, which are central to all Microsoft email software solutions. However, if they are managed incorrectly, they can become corrupted or create a major security issue.

Its widespread use makes email one of the most common threat vectors targeted by cyber criminals. The sophistication and volume of email-based attacks continues to increase, especially as people move to cloud-based email solutions such as Microsoft 365, Outlook.com, and Google’s Gmail and G Suite applications.

As with any Microsoft IT environment, organizations and users must understand the importance of managing PST files securely. This process is crucial to helping businesses prevent data loss and leakage, avoid any legal issues, and protect themselves from cyberattacks that target archived email data.

Part of the problem with PST files is that they were designed for use in a different era of computing, which has seen issues with stability and unexpected access errors. Having local access to email data may sound like a positive concept, but this can easily result in PST files becoming corrupted and users losing access to their email inboxes. Furthermore, the fact that PST files reside on users’ local devices runs the risk of them not being backed up. If that data is lost because of a hard drive crashing or some other computer or device issue, then it is likely unrecoverable. 

However, the tactics deployed to deal with PST files have gradually evolved in line with the sophistication of the devices they are stored on. Tools like PST file repair, migration, storage, and recovery ensure there are now simple solutions for issues that would have been more difficult to remedy. For example, Microsoft’s Inbox Repair tool is specifically designed to help users validate, repair, and correct problems with PST files, enabling them to recover and repair any lost files or personal folders.

PST File FAQs

What is the purpose of a PST file?

A PST file is used by Microsoft programs to store data and items such as email messages, calendar events, and contacts.

Can you open a PST file without Outlook?

Yes. Aside from Outlook, PST files are associated with several Microsoft software services, including Microsoft Exchange Client and Windows Messaging.

How do you create a PST file?

PST files are automatically created by Outlook. However, they can be created manually. From an Outlook inbox, select New Items, then More Items, and Outlook Data File. Create a file name and check the Add Optional Password box, then type in a password and verify it.

Where is a PST file located?

The location of a PST file depends on the version of Outlook that a user is running. Outlook 2007 and Outlook 2010 both store PST files in a user’s AppData folder. That is easily discoverable using the C:\users\username\AppData\Local\Microsoft\Outlook location. Microsoft moved the PST file location into the Documents folder in Outlook 2013 and retained it for Outlook 2016. It can be discovered using this location: C:\users\username\Documents\Outlook Files. 

The PST file location is easily discoverable within all versions of Outlook. In Outlook 2007, open Account Settings from the Tools menu. While in Outlook 2010, Outlook 2013, and Outlook 2016, users can reach the same location by opening the File menu, then the Account Settings dropdown menu, and clicking on Account Settings. From the Account Settings in all Outlook versions, open the Data Files tab, select the account to be investigated, then click on Open File Location. Outlook will then open a File Explorer window that contains the user’s PST and OST files.

Email Security Resources

  • Cybersecurity
  • Types of Cyber Attacks
  • IT vs OT Cybersecurity
  • AI Cybersecurity
  • Cyber Threat Intelligence
  • Cybersecurity Management
  • Network Security
  • Data Security
  • Email Security
  • Endpoint Security
  • Web Security
  • Enterprise Security
  • Cybersecurity Mesh

Quick Links

  • Fortinet Products
  • Fortinet Demos
  • Analyst Reports
  • FortiGuard Threat Intelligence
  • Contact Us

Related Topics

Trending Now

15 Cybersecurity Tools for Small and Medium Businesses

Small and medium businesses (SMBs) are just as vulnerable to attacks as larger organizations. Learn the best cybersecurity tools and practices for protecting your small or medium-sized business. Trending Now

What is Email Security?

Email security includes the techniques and technologies that protect email accounts and communications. Learn how to guard against malware and phishing attacks. Trending Now

What is Spam Filtering?

Learn what spam filters are and how they can help you.

More PST File Resources

Solution Guides

Securing Office 365 with FortiMail

Analyst Reports

New ProxyShell Post-exploitation Activity

Speak with an Expert

Please fill out the form and a knowledgeable representative will get in touch with you soon.

Not you? Click here. First Name * Last Name * Job Function * Job Function AnalystBusiness OperationsCloud ArchitectCloud Infrastructure ManagerCloud Partner ManagerCloud Security ManagerCloud Solutions SpecialistFinance/ProcurementIT ApplicationsIT ArchitectureIT DatacenterIT ManagementIT NetworkIT - OtherIT Partner/ResellerIT SecurityIT SystemJournalistMarketing/Sales/Business DevelopmentStudent/ResearcherIT ConsultingNon IT - OtherOT ICS/SCADA Job Level * Job Level C-LevelDirectorManagerEngineer/ArchitectAdmin/AnalystIndividual ContributorSelf-employedVPOther Company * Email Address * Phone * Country/Region * Country/Region United StatesUnited KingdomCanadaAustraliaBrazilChinaFranceGermanyIndiaItalyJapanNetherlandsRussian FederationSingaporeSouth KoreaSouth AfricaTaiwan-------AfghanistanAland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBritish Indian Ocean TerritoryBritish Virgin IslandsBruneiBulgariaBurkina FasoBurundiCambodiaCameroonCape VerdeCayman IslandsCentral African RepublicChadChileChristmas IslandCocos IslandsColombiaComorosCongoCongo, The Democratic Republic Of TheCook IslandsCosta RicaCote D'IvoireCroatiaCubaCuracaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland IslandsFaroe IslandsFijiFinlandFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard Island and McDonald IslandsHoly See (Vatican City State)HondurasHong KongHungaryIcelandIndonesiaIran, Islamic Republic ofIraqIrelandIsle of ManIsraelJamaicaJerseyJordanKazakhstanKenyaKiribatiKosovoKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacauMadagascarMalawiMalaysiaMaldivesMaliMaltaMartiniqueMarshall IslandsMauritaniaMauritiusMayotteMexicoMicronesiaMoldova, Republic ofMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlands AntillesNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorthern Mariana IslandsNorwayOmanPakistanPalauPalestine, State ofPanamaPapua New GuineaParaguayPeruPhilippinesPitcairn IslandsPolandPortugalPuerto RicoQatarRepublic of North MacedoniaReunionRomaniaRwandaSaint BarthelemySaint HelenaSaint Kitts and NevisSaint LuciaSaint MartinSaint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSint Maarten (Dutch part)SlovakiaSloveniaSolomon IslandsSomaliaSouth Georgia and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwitzerlandSyrian Arab RepublicSwedenTajikistanTanzania, United Republic ofThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUruguayUS Virgin IslandsUzbekistanVanuatuVenezuelaVietnamWallis and FutunaWestern SaharaYemenZambiaZimbabwe State/Province State/Province Item 1Item 2Item 3 Zip Code/Postal Code Any specific product, services or solution? (Optional) I consent to receive promotional communications (which may include phone, email, and social) from Fortinet. I understand I may proactively opt out of communications with Fortinet at anytime.

By clicking submit you agree to the Fortinet Terms and Conditions & Privacy Policy.

address1 Also of Interest:
  • Fortinet CVE Analysis
  • What Is FTP (File Transfer Protocol)?
  • What Is Email Encryption?
  • Horabot Unleashed: A Stealthy Phishing Threat

Tag » Where Is The Outlook Calendar File Stored