Solved

Deleting System Volume Folder for defrag

Posted on 2006-11-22
9
765 Views
Last Modified: 2010-05-18
I'm trying to defrag a clients sbs2003 server. I cannot achieve better then 17% fragmentation because of fragmentation in the system volume folder. Can the contents of this folder be deleted safely.
0
Comment
Question by:microaideinc
  • 2
  • 2
  • 2
9 Comments
 
LVL 26

Expert Comment

by:MidnightOne
ID: 17998506
microaideinc:

In a word, NO!

SYSVOL in integral to the functioning of Active Directory.

You might try Raxco's defrag tool PerfectDisk, which does allow for an offline defrag of usually-locked files.

HTH

MidnightOne
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17999644
in two words, hell no! Sysvol isnt just integral, its the foundation of AD
0
 
LVL 15

Accepted Solution

by:
harleyjd earned 500 total points
ID: 18000906
I think he means the "System Volume Information" folder, and while it's not AD specific, you still cannot delete it.

What you can do, though, is turn off SHADOW COPIES, so that should clear out a fair whack of it.

0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 18000911
**grin** i dont feel like a turkey i swear **grin** i saw SYSVOL and flipped ha!
0
 
LVL 15

Expert Comment

by:harleyjd
ID: 18000912
Sorry - shoulda followed up. Shadow Copies setup is found on the "Shadow Copies" tab on the disk volume properties. You could also just limit the space it can use.

0
 
LVL 26

Expert Comment

by:MidnightOne
ID: 19088910
Recommend harleydj for the points, as his answer is correct.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now