Specification Sheet

1
Overview
The problem of data fragmentation is inextricably linked with any file system. When you change or
delete files on a disk, gaps are created which are later reused for other data. Since these files are
usually not the same size, they are spread over several of these gaps. Over time, a mass of files is
created on the hard disk that significantly slows down the time needed for accessing them.
But speed is not the only problem: highly fragmented files can also cause system errors (see Microsoft
knowledge base article # 967 351
1
) that ultimately result in data inconsistencies and crashes. Another
aspect involves the forensics in saving data when the file structure has been damaged. Whenever
files are fragmented, data recovery is at best more difficult, at worst impossible.
Centralized management
An important aspect in the management of a defragmentation solution across a network is the
extent and ease with which it can be controlled. The O&O Enterprise Management Console
2
is
an ideal tool for centrally controlling O&O Defrag’s installation, configuration, and reporting of all
processes. The administrator can even decide whether individual users should be given the ability to
run or influence O&O Defrag on their own.
O&O Defrag features a scheduling option that allows a user to define the exact dates and time
periods when defragmentation should be executed. This is especially important if other processes
such as data backups or consolidations are also scheduled. Overlapping these processes could result
in an unnecessary double burden for the machines and lead to longer run times.
Another aspect of the integrated O&O Defrag scheduling is its ability to start and stop certain system
processes or applications before and after their execution. This makes it possible, for example, to
stop server processes before defragmentation in order to allow sharing for exclusively blocked files.
After defragmentation, they can automatically be started again.
Along with these options, O&O Defrag can be fully and transparently integrated into existing
network infrastructures and software management systems. A detailed scripting interface offers
extensive configuration options for influencing the defragmentation process whenever the need
arises.
Security and control
Data security plays a major role during defragmentation. Access to data and, by extension, to the
defragmentation software, must be adjusted accordingly because the program’s functionality
requires it to access all of the computer’s data.