Solved

Exchange Server log file growth and Outbox items ?

Posted on 2013-11-12
3
347 Views
Last Modified: 2013-12-04
Hi Folks,

Does the item in the Outbox can cause email transaction log in the server growth ?

I have executed the script below:

get-mailbox -ResultSize Unlimited | Get-MailboxFolderStatistics -folderscope Outbox | Sort-Object Foldersize -Descending | select-object identity,name,foldertype,itemsinfolder,@{Name="FolderSize MB";expression={$_.folderSize.toMB()}} | Export-Csv C:\Temp\Outbox.csv

Open in new window


I have identified some users with more than 1000 emails in the outbox and also bigger than 100 MB.

ShouldI worry about this or not needed ?

Thanks,
0
Comment
  • 2
3 Comments
 
LVL 8

Accepted Solution

by:
vSolutionsIT earned 500 total points
ID: 39643555
Every transaction done in the mailbox results in a transaction written in the log files.
you will have to find out why those emails are in outbox ?

Do they really need to send emails of that much big size?
0
 
LVL 7

Author Comment

by:Senior IT System Engineer
ID: 39643616
well it is not aboutthe size, because I have set the item limit to be 20 MB, only the number of email (itemcount) that is so large.

I'm not sure why would those emails stuck in the Outbox ?
0
 
LVL 7

Author Comment

by:Senior IT System Engineer
ID: 39646803
I can seethat some users who connected to the Windows Server 2003 Terminal Server service, their Outlook 2007 SP3 Outbox got plenty of email stuck in there ?
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
This video demonstrates how to sync Microsoft Exchange Public Folders with smartphones using CodeTwo Exchange Sync and Exchange ActiveSync. To learn more about CodeTwo Exchange Sync and download the free trial, go to: http://www.codetwo.com/excha…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question