Solved

Drive Management - Drive at Risk

Posted on 2004-09-23
1
883 Views
Last Modified: 2013-12-03
My customer has an Adaptec Raid controller 2110s. He has 4 SCSI disks connected to it. In XP if I go into disk management it shows on of the disks as Healthy (At Risk). I have been searching for more information on this possible error. Does anyone know what this means? Should I replace this drive? If I right click on it I get the option to reconnect to it but have not taken that step until I can get a good backup.

Also connected to the raid are two other SCSI hard drives that are supposed to be mirroring the main drives. These drives show up in the raid boot setup page but do not show up in windows. Is this a sign they may not be working or does windows just not see mirror drives? I am thinking they should show up but I am not sure about that.
0
Comment
Question by:Chris_McMahon
1 Comment
 
LVL 12

Accepted Solution

by:
alandc earned 250 total points
ID: 12308293
The Healthy (At Risk) status occurs when a dynamic volume is experiencing I/O errors caused by bad sectors on the physical disk. The disk remaps the bad sectors by using sectors reserved exclusively for remapping. If the errors are transient, you can use the Reactivate Disk command in Disk Management to return the volume to the Healthy status. If the At Risk status persists, your disk might be failing. Back up the data and replace the disk as soon as possible.

For more information:
http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/Default.asp?url=/resources/documentation/Windows/XP/all/reskit/en-us/prkd_tro_jqjy.asp

If the SCSI drives are being mirrored by a RAID controller they will not show up in windows.  Windows Server has mirroring functionality built in that doesn't require the use of a RAID controller. You can't setup OS based mirroring with anything but Server verisons of Windows.

http://support.microsoft.com/default.aspx?scid=kb;EN-US;314343
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

We have adopted the strategy to use Computers in Student Labs as the bulletin boards. The same target can be achieved by using a Login Notice feature in Group policy but it’s not as attractive as graphical wallpapers with message which grabs the att…
Step by step guide to Clean and Sort your windows registry! Introduction: Always remember: A Clean registry = Better performance = Save your invaluable time In this article we're going to clear our registry manually! Yes, manually! The e…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now