Tom Rodman said:
Thanks Bjorn, I'm but I still need some convincing. I guess it
come down to how well the NTFS filesystem is designed and how much
you want to trust it.
My experience - from reading and answering in MS newsgroups - is that NTFS
corruption is very sparingly seen in server halls. When I have seen
corruption myself, it was traced to malfunctioning hardware. In that case,
I trusted my backup.
Our experience with Windows NT indicated that "dirty flag" was
not always set properly by the OS. We would reboot, no chkdsk
was run automatically, then immediately reboot again with chkdsk
set to run, and find that chkdsk identified and repaired
problems in the filesystem.
Minor maintenance tasks are done when you run chkdsk. Cached unused
security descriptors are cleaned out. Those are not triggering the dirty
bit, thankfully.
This is what KB 255008 says about this process:
"All NTFS volumes contain a security descriptor database. This database is
populated with security identifiers that represent unique permission
settings that are applied to files and folders. When files or folders have
unique NTFS permissions applied, NTFS stores a unique security descriptor
once on the volume, and it also stores a pointer to the security descriptor
on any file or folder that references it.
If files or folders no longer use that unique security descriptor, NTFS
does not remove the unique security descriptor from the database, but
instead, keeps it cached. Like any caching strategy, you want to keep the
cached information as long as possible because it may be used again."
I take it uSoft says "not to worry",
maybe so, but does this agree with everyones' experience? I would
be most comfortable with at least a once/month forced check.
Of course, whatever makes you feel comfortable, but once a week seems
excessive to me.
Best regards
Bjorn