Solved

Does smartphone access effect Exchange online maintainance / defrag ?

Posted on 2011-03-04
7
364 Views
Last Modified: 2012-08-14
Does smartphone access effect Exchange online maintainance / defrag ?
These devices are continualy accessing mailboxes, downloading mail, etc
0
Comment
Question by:atomicnetworks
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 74

Expert Comment

by:Glen Knight
ID: 35034536
No, there is no reason why it should.  The online maintenance runs whilst the database is "live" so there may be a slight performance issue for the devices during this time but it's not likely to be noticed.
0
 

Author Comment

by:atomicnetworks
ID: 35034588
But it is recommended this is run during low or even no utilisation periods.  
0
 
LVL 74

Expert Comment

by:Glen Knight
ID: 35034614
The maintenance window is between 1am and 5am by default so this is a low utilisation period.  This is when the online defrag runs.
0
Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

 

Author Comment

by:atomicnetworks
ID: 35034753
so the long and short is smartphone access should not effect an online defrag right even though mailboxes are being accessed.

One last thing. what happens if you run the maintainance window during normal office hours ?
0
 
LVL 74

Accepted Solution

by:
Glen Knight earned 500 total points
ID: 35034759
Correct.

Running it during office hours will simply cause a performance issue for the end users, there is no technical reason not to do it and indeed I do this ona regular basis to expedite tasks I am working on.
0
 

Author Comment

by:atomicnetworks
ID: 35034760
thanks fella
0
 
LVL 74

Expert Comment

by:Glen Knight
ID: 35034762
anytime ;)
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Unified and professional email signatures help maintain a consistent company brand image to the outside world. This article shows how to create an email signature in Exchange Server 2010 using a transport rule and how to overcome native limitations …
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…
The video tutorial explains the basics of the Exchange server Database Availability groups. The components of this video include: 1. Automatic Failover 2. Failover Clustering 3. Active Manager

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question