?
Solved

Log file and Transaction file size

Posted on 2011-03-24
3
Medium Priority
?
329 Views
Last Modified: 2012-05-11
What is the size of log files and transaction files. Also suppose I send an email to anyone will the transaction file change. Where are both the files situated?
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 2

Author Comment

by:kunalclk
ID: 35207194
Thing to add that the email that is sent contains a 5 mb excel file.
0
 
LVL 27

Accepted Solution

by:
Steve earned 1000 total points
ID: 35211001
transaction log files are a plain text record of everything flowing through the SMTP connector.
An email that is 5 mb will create just over 5mb worth of data in the transaction logs.

The log files are generally limited in size to around 5 mb so multiple log files are created as messages flow.
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 35393073
thnx
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
There are times when we need to generate a report on the inbox rules, where users have set up forwarding externally in their mailbox. In this article, I will be sharing a script I wrote to generate the report in CSV format.
This video demonstrates how to sync Microsoft Exchange Public Folders with smartphones using CodeTwo Exchange Sync and Exchange ActiveSync. To learn more about CodeTwo Exchange Sync and download the free trial, go to: http://www.codetwo.com/excha…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 4 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question