Q137393: PC Gen: Useful Novell Utilities For Administrators
Article: Q137393
Product(s): Microsoft Mail For PC Networks
Version(s): 3.2,3.2a,3.5
Operating System(s):
Keyword(s):
Last Modified: 01-FEB-2002
-------------------------------------------------------------------------------
The information in this article applies to:
- Microsoft Mail for PC Networks, versions 3.2, 3.2a, 3.5
-------------------------------------------------------------------------------
SUMMARY
=======
When you maintain or troubleshoot a Microsoft Mail for PC Networks postoffice in
a Novell NetWare environment, many Novell utilities can be useful, such as the
following:
CHKVOL.EXE - Displays statistics on the current volume.
FLAG.EXE - Displays and allows modification to NetWare file
attributes.
MONITOR.NLM - Views open files and releases locked files (launched
from the server console only).
NDIR.EXE - Displays the size, date, time, and owner of each file in
a NetWare directory.
PURGE.EXE - Permanently deletes previously erased files in a
NetWare directory.
RIGHTS.EXE - Displays a user's access rights in the current
directory.
SALVAGE.EXE - Restores deleted files that are not yet purged.
SYSCON.EXE - For network administration (user accounts, server
error log, file server information, etc.).
USERLIST.EXE - Displays a list of all users currently logged onto the
server.
NOTE: For best results, make sure you are logged onto the Novell server as
SUPERVISOR or equivalent before you run any of the above utilities.
MORE INFORMATION
================
The following is detailed information about the utilities listed above:
CHKVOL.EXE
----------
Usage: CHKVOL
Chkvol will report the following information on the current volume:
- Total volume space
- Space in use by files
- Space in use by deleted files
- Space available from deleted files
- Space remaining on volume
- Space available to <currentuser>
Because mail executables do not consider "Space in use by deleted files" as
actual free space, a purge may be needed (see PURGE.EXE below). To determine the
actual amount of free space a mail executable sees, use the following formula:
(Space Remaining on Volume) minus (Space in Use by Deleted Files) equals
(Actual Free Space)
This utility is also useful in determining the actual space available to the user
that is currently logged on. This may or may not be less than the Space
Remaining on Volume figure. See the SYSCON section below about volume/disk
restrictions for more information.
FLAG.EXE
--------
Usage: FLAG [path [option | [+|-] attribute(s) ] [SUB]]
Example: FLAG M:\MAILDATA\*.* RW SUB
This will change all file attributes under MAILDATA and subdirectories to
Read/Write. For high-traffic postoffices, you can also add the (S)hareable
attribute to KEY files and GLB files (with the exception of CONTROL.GLB,
TID.GLB, FLAG.GLB, and MASTER.GLB).
MONITOR.NLM
-----------
Usage: (from the file server console only) LOAD MONITOR. This is a menu driven
utility useful for clearing locked files from stranded connections. It also
provides viewing of file open/lock activity, file server resource utilization
stats, connections, and disk information.
NOTE: In order to run this utility from a workstation, RSPX.NLM and REMOTE.NLM
must be loaded on the file server, and Remote Console (RCONSOLE.EXE) must be
launched at the workstation. RCONSOLE provides a direct console connection to
the server so that it is possible to run MONITOR from a desktop machine.
When a workstation running a mail executable crashes, MAILDATA files may be left
open. Use MONITOR to close the files safely, and clear the connection.
1. From the Available Options menu, choose Connection Information.
2. Select the logon ID whose machine has crashed, then press DELETE.
3. Answer Yes to the Clear Connection? prompt.
NDIR.EXE
--------
Usage: NDIR [path] [/option...]
Example: NDIR M:\MAILDATA\*.* /OW LE " " /SUB
Displays all ownerless files under MAILDATA and subdirectories along with the
file date/time stamp and size.
For additional information, please see the following article in the Microsoft
Knowledge Base:
Q100511 Assigning Owners to Files in NetWare 2.x and 3.x
PURGE.EXE
---------
Usage: PURGE [filename | wildcard] [/ALL | /A]
Example: PURGE M:\MAILDATA\*.* /ALL
Purges all deleted MAILDATA files from the volume. Because mail executables can
not interpret free space from the space used by deleted files, a periodic purge
may be necessary.
RIGHTS.EXE
----------
Usage: RIGHTS [path]
Example: RIGHTS M:\MAILDATA
Rights can contain any of the following: [SRWCEMFA]
All | Supervisor | Read | Write | Create | Erase
| Modify |File scan |Access Control
Displays the current logon ID's effective rights for the MAILDATA directory.
Usually these rights are inherited down into all sub-directories as well, unless
otherwise specified in Trustee Directory Assignments for that user. It is useful
for checking a mail client or a mail message transfer agent's (MTAs) user rights
to MAILDATA.
SALVAGE.EXE
-----------
Usage: SALVAGE
This is a menu driven utility.
SALVAGE is useful for quickly restoring a recently deleted file. To restore a
deleted MAILDATA file, do the following:
1. Run SALVAGE in the same volume where MAILDATA resides.
2. Change the current directory to the MAILDATA directory that contained the
deleted file.
3. Select to View\Recover Deleted files, then set the view criteria for *.*
4. Search for the filename you wish to restore; highlight it, and press ENTER.
NOTE: If you restore a previous version over an existing file, you will be
prompted to rename the file you are restoring.
SYSCON.EXE
----------
Usage: SYSCON
This is a menu driven utility.
SYSCON (short for SYStem CONfiguration) performs most of the system management
functions. Some of the pertinent options are:
File Server Information:
Allows the viewing of the NetWare versions, revision numbers and number of
licenses for any on-line Novell server on the network.
Supervisor Options:
Contains several functions, including view/edit system AUTOEXEC file (to see
which modules are being loaded on the server) and view the file server's
error log.
User Information: Contains all users accounts and associated information, such
as
- Account restrictions (when does the account and/or password expire?).
- Groups Belonged to (default = EVERYONE).
- Other Information (last login date/time, disk space in use).
- Security Equivalencies (either to a group or another user).
- Station Restrictions (limits the user to logging on from only the specified
MAC address or addresses).
- Time Restrictions (time interval specified for allowed logins).
- Trustee Directory Assignments (access privileges to specified directories).
- Volume/Disk Restrictions (limits the amount of disk space the user can
actually fill on a volume).
USERLIST.EXE
------------
Usage: USERLIST [fileserver/][name] [/Address | /Object] [Continuous]
Example: USERLIST MAILSRV/ /A
Displays all currently logged on users on the Novell file server MAILSRV, as well
as each node address and login time. You must be currently logged on or attached
to the server you wish to run USERLIST on. If you do not specify a server name,
USERLIST will default to the server you are currently logged on to and running
the USERLIST utility from.
Novell is a vendor independent of Microsoft; we make no warranty, implied or
otherwise, regarding this product's performance or reliability.
Additional query words: 3.20 3.20a 3.50
======================================================================
Keywords :
Technology : kbMailSearch kbZNotKeyword3 kbMailPCN320 kbMailPCN320a kbMailPCN350
Version : :3.2,3.2a,3.5
=============================================================================
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Copyright Microsoft Corporation 1986-2002.