Hi Eric, TScale has a new feature, Application Shaping that can help. Application Shaping cannot help you kill those processes, but it can help you eliminate the bad effects of those processes upon your servers. What you would do is define a rule in the Application Shaping feature that says that when iexplore.exe uses more than X% of CPU for N seconds, that TScale should reduce its Priority relative to other tasks on the server. What this will do is give only the resources to that orphaned instance of IE that would have otherwise gone to the idle process. So, it makes the Shaped application totally benign in terms of its impact upon the usability and performance of your server. You can download an evaluation copy of TScale from our site (www.rtosoft.com). After you download the evaluation software you will need to send an email to sales@xxxxxxxxxx to request an evaluation key (the key will allow the evaluation copy of TScale to work as a full production product for 30 days). It will take you about 2 minutes to install TScale on your server and another 5 minutes to set up the shaping rule for IE. Let me know if I can be of any further assistance. Cheers, Bernd Harzog CEO RTO Software, Inc. bernd.harzog@xxxxxxxxxxx 678-455-5506 x701 www.rtosoft.com -----Original Message----- From: Foote, Eric [mailto:EFoote@xxxxxxx] Sent: Tuesday, November 04, 2003 10:30 AM To: thin@xxxxxxxxxxxxx Subject: [THIN] Orphaned processes Anyone having issues with orphaned proccesses? We have Win2K SP4, MF XPe FR3 and we are seeing processes left behind after users logoff, like an iexplore.exe running under a users context taking up 50% of the boxes CPU (dual proc system). We cannot kill (kill -f, process explorer, at /interactive) all fail with access denied - our only solution is to reboot the box. Any suggestions would be apprecitiated. Thanks, Eric ******************************************************** This Weeks Sponsor Pearl Software Internet Monitoring, Filtering, and Control Solutions Enabling User & Group Level Oversight & Access Policies Fully Functional in a Thick or Thin Client Environment http://www.pearlsw.com ********************************************************** Useful Thin Client Computing Links are available at: http://thethin.net/links.cfm New! Online Thin Computing Magazine Site http://www.OnDemandAccess.com For Archives, to Unsubscribe, Subscribe or set Digest or Vacation mode use the below link: http://thethin.net/citrixlist.cfm ******************************************************** This Weeks Sponsor Pearl Software Internet Monitoring, Filtering, and Control Solutions Enabling User & Group Level Oversight & Access Policies Fully Functional in a Thick or Thin Client Environment http://www.pearlsw.com ********************************************************** Useful Thin Client Computing Links are available at: http://thethin.net/links.cfm New! Online Thin Computing Magazine Site http://www.OnDemandAccess.com For Archives, to Unsubscribe, Subscribe or set Digest or Vacation mode use the below link: http://thethin.net/citrixlist.cfm