Professional Documents
Culture Documents
Windows Tips
Windows Tips
Exchange databases consist of following several type of files, most important of which are the following:
.EDB
"Property data", contain a textual part of messages in MS Database Encapsulated Format (MDBEF).
.STM
.LOG
.CHK
The Checkpoint file. It stores a separator between flushed and un-flushed parts of transaction logs.
Each database such as a Mailbox Store or a Public Folder Store consist of two files: xxx.EDB and
xxx.STM, where "xxx" denotes some same name.
• A temporary store is located in the TEMP.EDB file (it holds intermediate transactions data),
• The most recent part of the transaction log is placed in the E$$.LOG file,
• The older parts of the transaction log are located in the E$$#####.LOG files,
• Two reserved fragments of the transaction log in RES1.LOG and RES2.LOG files,
http://support.microsoft.com/kb/103884
• You must have Edit, delete, and modify security permissions on the GPO and Read permissions on the
• You must have privileges to create GPOs in the domain and Read permissions on the file system location
'lowest' in the hierarchy (the physical) and proceeding to the 'highest' (the application). The layers are
• Application
• Presentation
• Session
• Transport
• Network
• Data Link
• Physical