Solved

Database path

Posted on 2002-07-17
6
203 Views
Last Modified: 2010-03-05
I have two domains zxc.com and cxz.com, both are in the same forest zxc plc. I installed Exchange 2000 in the first domain (zxc.com). I then installed a second Exchange server 2000 for the cxz.com domain. The both site want to use their own domain addresses i.e user@zxc.com or user@cxz.com .

The problem is that on the second server for the cxz.com domain the database path is M:\zxc.com\mailboxs.

Why is this and can it be changed?
0
Comment
Question by:stuartward
  • 2
  • 2
  • 2
6 Comments
 
LVL 10

Expert Comment

by:kevala
ID: 7160742
Where do you see that as the path?
0
 

Author Comment

by:stuartward
ID: 7161482
Via the Windows Explorer
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 7162489
M: is a virtual drive created by Exchange 2000.  Clients do not access Exchange via the drive mapping.  Why do you need to change it?
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:stuartward
ID: 7162504
The company has changed hands and the domain master (e.g. schema) is going to be moved to their new domain.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 7162540
Why does that drive a change in the virtual path?  It doesn't matter what the path is, Exchange will still work.
0
 
LVL 10

Accepted Solution

by:
kevala earned 50 total points
ID: 7162612
The M drive is a virtual representation of your mailbox and public folder stores. As geoffryn mentioned, this will not affect Exchange, and you should not try to change ANYTHING dealing with this drive. You should not back this drive up, you should not scan this drive, you should not change anything on this drive. Changing so much as one setting on this drive can mess up your whole installation.

To demonstrate this, you can set the information store to disable, restart the server, and you will not even see the M drive appear until you start the information store and mount your databases.....
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Check out this infographic on what you need to make a good email signature that will work perfectly for your organization.
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create a Distribution Group in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >>…
In this video we show how to create a mailbox database in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Servers >> Data…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now