Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

is it safe to run chkntfs command while system is running (not at startup) to check the system health?

Posted on 2009-07-15
1
Medium Priority
?
221 Views
Last Modified: 2012-05-07
Hi all,
Is it safe to run chkntfs command while system is running (not at startup) to check the system health? does it cause any problems or system hangs? i got the following error message (just once)on one of my critical systems, and i don't want to reboot the system as possible.

Event Type:      Error
Event Source:      Ntfs
Event Category:      (2)
Event ID:      55
Date:            7/15/2009
Time:            9:05:34 AM
User:            N/A
Computer:      XYZ
Description:
The file system structure on the disk is corrupt and unusable. Please run the chkdsk utility on the volume SYSTEM.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
Data:
0000: 0c 00 04 00 02 00 52 00   ......R.
0008: 02 00 00 00 37 00 04 c0   ....7..À
0010: 00 00 00 00 02 01 00 c0   .......À
0018: 00 00 00 00 00 00 00 00   ........
0020: 00 00 00 00 00 00 00 00   ........
0028: 17 0b 14 00               ....    
0
Comment
Question by:ksisletim
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 71

Accepted Solution

by:
Qlemo earned 750 total points
ID: 24858045
It is safe to do so. You can always perform a chkdsk without switches, which does only tests.

chkdsk /f or /r however (which perform repair actions) need to access the partition exclusively, and depending on the partition type (system, pagefile, data) this can't be done without rebooting.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Suggested Courses

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question