Windows
 

Windows 8 : Working with file systems (part 5) - Working with quotas, Working with quotas for user accounts

10/10/2014 9:23:35 PM

Working with quotas

Working with disk quotas can provide a way to ensure that certain volumes allow each person using the computer to use only a predetermined amount of space. Consider the following example.

Fabio and Maria work for Tailspin Toys as summer interns within the marketing department. Fabio works on Mondays, Wednesdays, and Saturday mornings, whereas Maria works Tuesdays, Thursdays, and Friday afternoons, and they share the same workstation to conserve resources.

The computer Fabio and Maria use has an additional disk in it to contain their files. The disk has a maximum storage size of 1 TB and is backed up to the network every night at 10 P.M. To divide the resource evenly and ensure that one of the interns does not consume too much space, assigning quotas can allocate a certain amount of space to each intern.

You can assign quotas to entire volumes only. Each user receives an amount of storage space equal to the quota limit assigned. To configure quotas, complete the following steps:

  1. Access the desktop and open File Explorer.

  2. Press and hold or right-click the drive or volume on which you plan to configure quotas, and then select Properties.

  3. On the Quota tab, tap or click Show Quota Settings and tap or click Yes at the UAC prompt. The Quota Settings dialog box is shown in Figure 6.

    The Quota Settings dialog box, in which settings are defined

    Figure 6. The Quota Settings dialog box, in which settings are defined

  4. Select the Enable Quota Management check box to turn on quotas for the volume.

  5. If you want to deny space to user accounts that exceed the quota, select the Deny Disk Space To Users Exceeding Quota Limit check box.

  6. Choose one of the following options to limit storage space for new users on a volume:

    • Do Not Limit Disk Usage

    • Limit Disk Space To XX, where XX is the number of units by which to limit disk space

    When you enter a limit for a quota, you also need to choose a unit of storage for the quota. Available units are:

    • Kilobytes (KB)

    • Megabytes (MB)

    • Gigabytes (GB)

    • Terabytes (TB)

    • Petabytes (PB)

    • Exabytes (EB)

  7. Choose the warning level that Windows should use for the quota.

  8. Select the unit of storage for the warning.

  9. If you want to use an event log for tracking quota limits, select the Log Event When

    A User Exceeds Their Quota Limit check box.

  10. If you want to use an event log for tracking warning levels, select the Log Event When

    A User Exceeds Their Warning Level check box.

  11. Tap or click OK to save the settings for quotas for this volume.

Now that a volume has been configured to use quotas, you can enable quotas for user accounts on the computer. To do so, from the Quotas tab of the Properties dialog box for a volume, tap or click the Enable Quotas button. The results are shown in Figure 7.

A list of the user accounts that have quotas configured

Figure 7. A list of the user accounts that have quotas configured

Working with quotas for user accounts

In the Quota Entries For Volume dialog box, you can:

  • Add quotas to a user account.

  • Modify the quota warning and hard limits for a selected user.

  • Delete quota entries.

  • Import quota entries from a file.

  • Export quota entries to a file.

  • Search for quota entries by user account.

When modifying quota settings for a user account, if no quota settings are configured for the volume you have selected, you cannot set the quota limit, but you can configure the warning limit.

Using quotas can help you efficiently manage storage available to a group of people. Working with quotas helps keep individuals from consuming all the available storage space by allocating only a certain portion of the space to each person.

 
Others
 
- Windows 8 : Working with file systems (part 4) - Understanding Encrypting File System, BitLocker
- Windows 8 : Working with file systems (part 3) - Auditing access to securable objects by using SACLs
- Windows 8 : Working with file systems (part 2) - Inheritance and cumulative effectiveness
- Windows 8 : Working with file systems (part 1) - Security within the file system
- Windows 8 : Managing disks and storage (part 5) - Using Microsoft Drive Optimizer to organize data - The DiskPart utility
- Windows 8 : Managing disks and storage (part 4) - Using Microsoft Drive Optimizer to organize data - Check Disk (chkdsk)
- Windows 8 : Managing disks and storage (part 3) - Using Microsoft Drive Optimizer to organize data
- Windows 8 : Managing disks and storage (part 2) - Disk Defragmenter and Disk Cleanup
- Windows 8 : Managing disks and storage (part 1) - Using disk management
- Windows 8 : Sharing printers - Configuring shared printers, Configuring printing permissions
- Windows 8 : Sharing files and folders (part 6) - Understanding NTFS permissions - Identifying permissions, Taking ownership of a resource
- Windows 8 : Sharing files and folders (part 5) - Understanding NTFS permissions - Creating advanced security settings
- Windows 8 : Sharing files and folders (part 4) - Understanding NTFS permissions - Modifying file or folder permissions
- Windows 8 : Sharing files and folders (part 3) - Sharing a folder
- Windows 8 : Sharing files and folders (part 2) - Enabling folder sharing using the Windows 8 interface, Enabling folder sharing using the traditional interface
- Windows 8 : Sharing files and folders (part 1) - Configuring the Network and Sharing Center
- Windows 8 : Configuring virtual machine networking and storage (part 3) - Assigning a virtual switch to a virtual machine , Assigning storage to a virtual machine
- Windows 8 : Configuring virtual machine networking and storage (part 2) - Hyper-V virtual switch
- Windows 8 : Configuring virtual machine networking and storage (part 1) - Introducing storage and networking for Hyper-V
- Windows 8 : Customizing the Lock Screen - Customizing the Lock Screen Background,Controlling the Apps Displayed on the Lock Screen, Disabling the Lock Screen
 
 
Most View
 
- Upgrading to Sharepoint 2013 : Upgrading Content - Creating the Web Application, Testing the Content Database
- Exchange Server 2013 administration overview : Getting started with Exchange 2013 and Exchange Online
- Configuring SQL Server 2012 : Setting the Options (part 2) - Configuring the Database
- Exchange Server 2013 administration overview : Exchange Server 2013 and your hardware
- Windows 7 : Hardware and Software Compatibility (part 5) - Windows Virtual PC and XP Mode - Understanding Windows Virtual PC
- Windows 8 : Creating a Windows Network - Choosing a Network and Cabling System (part 1)
- SQL Server 2012 : Configuration Options (part 5) - Security-Configuration Properties
- Migrating to Exchange 2013 : Legacy Exchange Migrations, Common Migration Problems
- Sharepoint 2013 : Building an Application with Access Services (part 3) - Creating the Basic Application
- Microsoft Visio 2010 : Adding Structure to Your Diagrams - Annotating Shapes with Callouts
 
 
Top 10
 
- Microsoft OneNore 2010 : Distributing Your Notes - Transferring a Notebook to Another Computer
- Microsoft OneNore 2010 : Distributing Your Notes - Saving Pages, Sections, and Notebooks in Alternative File Formats
- Microsoft OneNore 2010 : Distributing Your Notes - Emailing a Page
- Microsoft OneNore 2010 : Distributing Your Notes - Printing a Section
- Microsoft Exchange Server 2010 Requirements : Additional Requirements
- Microsoft Exchange Server 2010 Requirements : Software Requirements (part 2) - Windows Server Roles and Features
- Microsoft Exchange Server 2010 Requirements : Software Requirements (part 1) - Additional Software
- Microsoft Exchange Server 2010 Requirements : Getting the Right Server Hardware (part 3) - Disk Requirements
- Microsoft Exchange Server 2010 Requirements : Getting the Right Server Hardware (part 2) - Memory Recommendations, Network Requirements
- Microsoft Exchange Server 2010 Requirements : Getting the Right Server Hardware (part 1) - The Typical User , CPU Recommendations