Can i delete ISALOG and ISALOG.BAK if I am not running ISA?

Posted on 2010-01-12
Medium Priority
Last Modified: 2012-05-08
I have a Windows Server 2003 computer that has been in use for several years, so it looks like it has been used for many different purposes throughout it's life, including apparently ISA server. If this server is now used only as a DC/DNS/DHCP can I delete these ISALOG and ISALOG.BAK files safely? They take up almost 1 GB of space combined and I'd love to have the free space.
Question by:LlewellynIT
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 51

Accepted Solution

Keith Alabaster earned 2000 total points
ID: 26298534
If the server is no longer an ISA Server then yes, you can. When the product is removed you are asked if you also want to remove the logs. If you say no, they are left in place.

Keith - ISA Forefront MVP

Author Closing Comment

ID: 31676396
LVL 51

Expert Comment

by:Keith Alabaster
ID: 26298566
Welcome mate.

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Common practice undertaken by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall pol…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

741 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question