Ask the Expert

Issues on Windows server with Exchange 2003

I use Windows 2003 Enterprise with Exchange 2003. Why does RCPSERV.EXE (process) sometimes kill my CPU? Is my CPU supposed to run high--sometimes up to 80%? Is the store.exe (process) supposed to use an average of 778,944K of memory?

    Requires Free Membership to View

RCPSERV.EXE is not a native Windows or Exchange process. I believe it is part of Network Associates GroupShield product. It is not normal for that process to consume all of the available CPU, although this is not the first time I've heard of anti-virus software consuming excessive CPU resources. I recommend conferring with Network Associates about this issue. They may even have an update or patch that can resolve this problem for you.

It is normal for the STORE.EXE process to consume lots of memory. The Exchange Information Store has an internal feature that enables Exchange to safely monopolize available memory resources. This feature, the Dynamic Buffer Allocation algorithm, is responsible for returning memory to the operating system if other programs require it. If other programs don't need any memory, Exchange uses it all. This is a good thing because, after all, that is why the memory is there. That said, there are good reasons why you may need to tune Exchange 2003. Have a look at http://support.microsoft.com/default.aspx?scid=kb;en-us;815372 for details on how to optimize memory for Exchange 2003.

This was first published in March 2004

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: