Categories Networking

How To Delete System Blocked Files

You will get the following error messages when you try to delete a file/folder which is being blocked by the System or Application Processes running in the Task manager:

  • Access Is Denied
  • Sharing Violation Error
  • File/Folder is being used by applications. Please close the application and then try again.

Solution:

You need to kill the handle. To kill the handle, use Process Explorer from Sysinternals (at URL: http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx)

How to delete the handle:

  • Run Process Explorer
  • Go to Find menu > Enter File/Folder name and then click on Search. You will see a list of processes blocking the file/folder.
  • Right click on the process and then click on Close Handle > Click Ok for confirmation.

Now you can successfully delete the file.

Nirmal Sharma

Nirmal Sharma is a MCSEx3, MCITP and was awarded the Microsoft MVP award in Directory Services and Windows Networking. He specializes in Microsoft Azure, Office 365, Directory Services, Failover Clusters, Hyper-V, PowerShell Scripting and System Center products. Nirmal has been involved with Microsoft Technologies since 1994. In his spare time, he likes to help others and share some of his knowledge by writing tips and articles on various sites.

Share
Published by
Nirmal Sharma

Recent Posts

How to repair PST files and import data back to Outlook or Office 365

If your business relies on Outlook, you can’t risk losing mailbox data because of PST files corruption. Here’s how to…

20 hours ago

Container security rises to meet the challenges of container vulnerabilities

As container technology becomes ubiquitous, container security has become crucial. Here’s a look at some recent innovations in this growing…

1 day ago

Best of CES 2020: Products, innovations, and services

From flying Ubers to rolling robots, CES 2020 had it all — and then some. Here’s a look at some…

2 days ago

Hardening your technology infrastructure in preparation for a DDoS attack

By establishing these 11 appropriate controls beforehand, your organization will be better positioned to withstand and survive a DDoS attack.

2 days ago

Microsoft App-V as an application virtualization solution: Pros & cons

If your shop is considering using App-V as an application virtualization solution, read this article first and weigh the pros…

2 days ago

Ransomware threats: Cybercriminals take their wares to the next level

As companies and individuals harden their defenses against ransomware, hackers are creating new and more virulent ransomware threats.

3 days ago