Solved

File server resource manager - problem with feature "Least Recently Accessed Files"

Posted on 2009-03-31
13
1,183 Views
Last Modified: 2013-12-02
Dear experts,
I am using a 2003 R2 file server with activated scan for "Least Recently Accessed Files". Due to the nature of NTFS, the attribute "last access" gets updated by a lot of actions, including indexing of that file. Of course, to really make this scan valuable, I would only like to see, when a user has last accessed files and nothing else.

Is there any possibility to make this file server feature usable and still have indexing/synchronizing activated on that data volume?
0
Comment
Question by:McKnife
  • 7
  • 5
13 Comments
 
LVL 18

Accepted Solution

by:
BigSchmuh earned 500 total points
ID: 24061951
You can totally disable the "Last access" feature using a registry key (see below)
   http://www.howtogeek.com/geekers/DisableLastAccessUpdate.zip

But you can't select which applications are allowed to update this timestamp :-(

By the way, did you disable the 8.3 filename creation using a registry key in the hive
 HKLM\System\CurrentControlSet\Control\FileSystem\
Setting NtfsDisable8dot3NameCreation to 1 will disable 8.3 filename from the next reboot
0
 
LVL 53

Author Comment

by:McKnife
ID: 24062566
Thanks for the comment, but disabling it won't get me any further. What would I gain if I disable 8.3?
0
 
LVL 18

Expert Comment

by:BigSchmuh
ID: 24062606
Disabling 8.3 improves NTFS perf

This is very noticeable if you have folders with tons of files...and costless.
0
 
LVL 53

Author Comment

by:McKnife
ID: 24066752
I am not looking for performance improvements here.
0
 
LVL 18

Expert Comment

by:BigSchmuh
ID: 24075210
As stated before, you can't select which applications are allowed to update this "Last Access" timestamp :-(

You can start the file "Audit" feature and analyse the log. That is the expected results of a file audit feature.
0
 
LVL 18

Expert Comment

by:BigSchmuh
ID: 24090238
Facts:
-McKnife asked for a non existing feature (Having some apps not updating the NTFS file's "LastAccess" timestamp)
-I replied "You can totally disable the feature and use the "Audit" NTFS capability to render the expected results" (He wants to know when users accessed a file...which is exactly what auditing the file access does)

I think :
-the question was a good and serious question
-its answer should be useful in a EE KB
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 
LVL 53

Author Comment

by:McKnife
ID: 24090413
Hi!
Auditing is no way to make that very file server resource manager feature usable as the quota management does not care for auditing results. So in my opinion, this is an answer to a different question.
0
 
LVL 18

Expert Comment

by:BigSchmuh
ID: 24091100
Every audit log is in the very standard "Event log" format...
You can try an automated Audit reader which does this job for you.
0
 
LVL 53

Author Comment

by:McKnife
ID: 24094079
Dear BigSchmuh, what should I do this for? This is not helpful to get the quota subfeature going, which is what I'm asking for - I am not looking for the information "when was this file last accessed" itself. Please accept my decision to close this question.
0
 
LVL 18

Expert Comment

by:BigSchmuh
ID: 24094471
Your initial question was about updating the LastAccess timestamp...

Please read...
  http://www.experts-exchange.com/help.jsp?hi=405
0
 
LVL 53

Author Closing Comment

by:McKnife
ID: 31564718
As I already knew http://www.experts-exchange.com/help.jsp?hi=405 and should respect it, please accept my apologies.
0
 
LVL 18

Expert Comment

by:BigSchmuh
ID: 24098252
Thanks !

Hope I can offer a better help next time
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction People like FTP.  It's a solid, stable, robust protocol for quickly transferring files between two hosts using TCP/IP.  In most cases it's much faster than SMB or CIFS, and certainly much easier to set up between organizations.  This…
Learn about cloud computing and its benefits for small business owners.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now