Solved

Identifying stale data

Posted on 2011-09-05
9
359 Views
Last Modified: 2012-05-12
Our management asked us to identify “stale data” on our servers – most of which running either server 2003, server 2008 and some still win2k. By stale they refer to data that is no longer necessary for business purposes/and/or is no longer being accessed (with stats to back this up).

My initial reaction to this was number 1 would probably be ex employees home drives still resident that weren’t manually deleted as part of the leaver process. I have also identified many people disabled in AD who should have been deleted – and subsequently their mailbox stays in exchange servers (but again per person its only 40mb each).

I am really after a full comprehensive list of what kinds of data / types of files/devices could still be out there taking up valuable space – and best ways to identify this problem. As windows admins any input welcome.
0
Comment
Question by:pma111
  • 5
  • 3
9 Comments
 
LVL 8

Assisted Solution

by:pwust
pwust earned 150 total points
ID: 36484405
Provided that the files are located on NTFS file systems, you will be able to take advantage of the file attribute "last file access time". Tools like Microsoft's Robocopy can move files that have not been accessed since (e.g.) 90 days are moved to a different location, or even deleted.
0
 
LVL 3

Author Comment

by:pma111
ID: 36484430
Can it identify them for you in some form of report as well?

I was more after typical stale data that people perhaps forget about, above and beyond ex employee home drives and exchange mailboxes

There must be tons
0
 
LVL 57

Accepted Solution

by:
Mike Kline earned 350 total points
ID: 36484615
Are you running 2003 or 2003 R2,  in 2003 R2 file server resource manager does provide you with reports that can help

http://technet.microsoft.com/en-us/library/cc755603(WS.10).aspx

There are also third party tools you can search for.

In terms of AD you can use tools like old computer by Joe Richards and adtidy.  Those are both free tools but are not targeted at files but AD objects.

Thanks

Mike
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 3

Author Comment

by:pma111
ID: 36484620
Hi mike - in your opinion What risk do old comps really pose on corporate storage?
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 36484666
low  risk in terms of storage, that is more for AD maintenance.
0
 
LVL 3

Author Comment

by:pma111
ID: 36494716
mike is there is similar tool to resource manager in 2008 - sorry not an admin myself
0
 
LVL 3

Author Comment

by:pma111
ID: 36494721
I assume you were talking about "storage reports"? Can you provide an example?
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 36496068
Yes, not sure if I'll be able to take screenshots from mylab today though, there is good info on the Microsoft site   http://technet.microsoft.com/en-us/library/cc731206(WS.10).aspx

http://computingtech.blogspot.com/2011/03/windows-server-2008-generating-storage.html

Thanks

Mike
0
 
LVL 3

Author Comment

by:pma111
ID: 36496110
If you get chance for screenshots that would help no end
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
The business world is becoming increasingly integrated with tech. It’s not just for a select few anymore — but what about if you have a small business? It may be easier than you think to integrate technology into your small business, and it’s likely…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question