Exchange Server

How can I mount the Exchange 2000/2003 database when the E00.log is missing and I receive events 9518 and 455?

You may receive the following error message when you try to mount a mailbox or public store:

An internal processing error has occurred. Try restarting the Exchange System Manager or the Microsoft Exchange Information Store service, or both. ID no: c1041724

In the Application event log, you may also receive following events.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Event Type: Error
Event Source: ESE98
Event Category: Logging/Recovery
Event ID: 455
Date: 3/18/2001
Time: 5:14:22 PM
User: N/A
Computer: SERVER1
Description: Information Store (2376) Error -1811 (0xfffff8ed) occurred while opening log file D:\exchsrvr\MDBDATA\E000xxx.log.

Event Type: Error
Event Source: MSExchangeIS
Event Category: General
Event ID: 9518
Date: 3/18/2001
Time: 5:14:22 PM
User: N/A
Computer: SERVER1

There might be a few reasons for these errors:

  • You might be running an Anti-Virus program on the Exchange server and that program might not be properly configured. Read article KB245822 for more info on how to properly configure your Anti-Virus software on a computer running Exchange server.
  • If the Anti-Virus Quarantine option is enabled on the Exchange server and the anti-virus is not configured according to article KB245822.
  • If your Anti-Virus software is configured to scan x:\Program Files\exchsrvr\MDBDATA it might think that the “E00.log “ contains a virus, or that the file itself is the virus, therefore it will automatically quarantine the E00.log and cause the Exchange services to crash.

In order to solve these errors you might want to consider the following options:


  1. Stop all exchange services.
  2. Configure your Anti-Virus program according to article KB245822.
  3. Save your current log files that are usually located on x:\Program Files\exchsrvr\MDBDATA\Exxxxxxx.Log to a temporary folder.
  4. Delete all *.log files in the  x:\Program Files\exchsrvr\MDBDATA.
  5. Check that the folder “(x:\Program Files\exchsrvr\MDBDATA)” only contains the following files:




If not, move all extra files to a temporary folder.

  1. Start all Exchange Services and mount the Information Store service.

If the above procedure did not work, you might have a problem in the Exchange Database and you will need to try to resolve it by following option number two.

If the above procedure did not work, you might have a problem in the Exchange Database and you will need to refer to article KB313184.


You Cannot Mount the Database, and Receive Events 9518 and 455 – 294367

How to recover the information store on Exchange 2000 in a single site – 313184

Recommendations for troubleshooting an Exchange computer with antivirus software installed – 245822

How to Recover a Deleted Mailbox in Exchange 2000 – 274343

Related Topics:

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: