Solved

Exchange, Defragmentation

Posted on 2007-11-13
2
220 Views
Last Modified: 2010-03-06
We are running exchange 2000 for our emails. Our exchange binaries, queues, and transaction logs are placed in C:\exchsrvr directory. The exchange information stores, both private and public, are stored in drive E.
Can we defragment our C drive using the conventional file system defragmentation ?
0
Comment
Question by:mather71
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 1

Accepted Solution

by:
CraigLeslie earned 500 total points
ID: 20278009
Yes .... No problems
But it does work better it you can shutdown as many services as possible to allow the defrag access to all files. This is close as many open files as possible.
0
 
LVL 22

Expert Comment

by:ATIG
ID: 20279293
I would suggest you get additional disk and move your logs off the C drive...... for a number of reasons
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's recap what we learned from yesterday's Skyport Systems webinar.
Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question