ScriptLogic Secure Copy 4 User Guide

Size: px
Start display at page:

Download "ScriptLogic Secure Copy 4 User Guide"

Transcription

1 ScriptLogic Secure Copy 4 User Guide

2 SECURE COPY 4 II 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic Corporation. It may not, in whole or part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent, in writing, from ScriptLogic Corporation. This publication supports Secure Copy 4.x. It is possible that it may contain technical or typographical errors. ScriptLogic Corporation provides this publication as is, without warranty of any kind, either expressed or implied. ScriptLogic Corporation 6000 Broken Sound Parkway NW Boca Raton, Florida Trademark Acknowledgements: Secure Copy is a registered trademark of ScriptLogic Corporation in the United States and/or other countries. The names of other companies and products mentioned herein may be the trademarks of their respective owners. Printed in the United States of America (8/2005)

3 SECURE COPY 4 III DOCUMENTATION CONVENTIONS Typeface Conventions Bold Indicates a button, menu selection, tab, dialog box title, text to type, selections from drop-down lists, or prompts on a dialog box. CONTACTING SCRIPTLOGIC ScriptLogic may be contacted about any questions, problems or concerns you might have at: ScriptLogic Corporation 6000 Broken Sound Parkway NW Boca Raton, Florida Sales and General Inquiries Technical Support Fax SCRIPTLOGIC ON THE WEB ScriptLogic can be found on the web at Our web site offers customers a variety of information: Download product updates, patches and/or evaluation products. Locate product information and technical details. Find out about Product Pricing. Search the Knowledge Base for Technical Notes containing an extensive collection of technical articles, troubleshooting tips and white papers. Search Frequently Asked Questions, for the answers to the most common non-technical issues. Participate in Discussion Forums to discuss problems or ideas with other users and ScriptLogic representatives.

4 SECURE COPY 4 IV Contents WHAT IS SECURE COPY?...1 WHAT S NEW IN SECURE COPY 4?... 4 USING SECURE COPY... 7 STARTING SECURE COPY... 7 EXAMINING THE MAIN WINDOW... 7 Toolbar Buttons and Job Menu Options... 8 File Menu... 9 Window Menu... 9 Help Menu... 9 CREATING A NEW JOB Browsing for a Path Selecting Folders and Files Typing a Path Creating a New Folder Removing a Path SETTING OPTIONS FOR THE COPY PROCESS Setting General Copy Options Setting Advanced Options Compressing Files Migrating File Shares Migrating Local Groups Filtering Files TESTING A JOB RUNNING A JOB SAVING A JOB LOADING A SAVED JOB SCHEDULING JOBS Managing Scheduled Jobs USING SECUREJOBCOPY4.EXE REMOVING SECURE COPY APPLYING SECURE COPY OPTIONS MAXIMIZING COPY PERFORMANCE USING MAP FILES COPYING FOLDER STRUCTURES WITHOUT FILES CREATING LOG FILES...34 TROUBLESHOOTING FREQUENTLY ASKED QUESTIONS INDEX... 36

5 SECURE COPY 4 1 What is Secure Copy? Secure Copy is a comprehensive solution for data duplication, local group and user migration, share migration, and NTFS permissions configuration. Secure Copy permits seamless migration, allowing an administrator to copy files and directories on NTFS partitions while keeping the security intact, creating shares, and migrating local groups. All of this functionality is available in an easy to use interface, which keeps you updated on copy progress, as well as any errors that may occur. Secure Copy also includes functionality such as differential copying, full command line support, saving multiple jobs, and scheduling jobs to run after hours. Secure Copy supports Windows NT/2000/XP/2003 environments and is compatible with the Microsoft Cluster Service. RETAIN SECURITY WHILE YOU COPY If you use Windows NT Explorer, or the copy and xcopy commands to copy files, the file permissions are not copied with the file. Other utilities allow you to copy files and directories with security, but it does not create existing shares and migrate local groups like Secure Copy.

6 SECURE COPY 4 2 CREATE SHARES WHILE COPYING Now you have the option to migrate existing shares on the source server to the destination server, while using Secure Copy. As Secure Copy copies each folder, it first checks to see if that folder is shared. If so, Secure Copy will create the share on the destination server and copy the permissions to the share. This outstanding feature makes Secure Copy worth the investment. MIGRATE LOCAL GROUPS WHILE COPYING Secure Copy is the only tool available that migrates local groups while copying files. A local group is local to the machine it was created on. If a local group has permissions on a file in your source server, Secure Copy creates the local group on the destination server and modifies the permissions list on the destination file to reflect the newly created local group. If you were to use the scopy.exe program in the NT resource kit, every local group would appear as Account Unknown in the destination file's permissions list. If the local group name already exists on the destination server, you choose to be prompted for a new name or select a prefix or postfix naming convention.

7 SECURE COPY 4 3 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source paths, a target path, and copy options so that you can use the job in the future, either on-demand or scheduled. Secure Copy features a powerful scheduler that runs your jobs based on a variety of scheduling options, freeing you up to concentrate on other activities.

8 SECURE COPY 4 4 What s New in Secure Copy 4? ScriptLogic Corporation is pleased to announce the introduction of Secure Copy version 4.0. This release extends Secure Copy s market leadership as the fastest, easiest, most secure and most cost-effective product for the migration, consolidation and replication of files and file servers. The new functionality in version 4.0 enables IT administrators and consultants to complete migration, consolidation and replication projects faster and with less manual intervention than ever before. MULTI-THREADED COPYING Secure Copy 4 has been comprehensively overhauled under the hood with a new multithreaded copying engine to maximize performance and make full use of available network bandwidth. This is especially noticeable when copying large numbers of files that are less than, say, 250k in size. On the average file server containing a wide range of file sizes, performance increases of % over Secure Copy 3 are expected. The dramatic performance increases possible with Secure Copy 4 reduce the time taken for server migrations and consolidations, lowering the project cost and increasing the IT administrator or consultant s productivity. Multiple threads for the fastest copying performance available In Secure Copy 4, the process of copying files is broken down into individual smaller copy jobs that are defined by the following parameters: Thread count supplies the number of copy threads for an individual smaller copy job. The minimum is 2 and the maximum is 20. Batch count supplies the maximum number of files in an individual smaller copy job. The minimum number of files is 25 and the maximum is 100. Batch size supplies the maximum number of bytes in an individual smaller copy job. The minimum is 1 byte and the maximum is 10. By specifying different combinations of these values in Advanced Options, you can fine-tune the performance of Secure Copy to your individual machine and network configurations to optimize performance of the application and its impact on the available machine and network resources. For more information, see Maximizing Copy Performance in the Secure Copy User Manual.

9 SECURE COPY 4 5 AUTOMATIC RETRY OF FAILED JOBS A common challenge when copying data is that some files and folders are locked by a process and cannot be accessed. IT administrators and consultants usually have to go through the logs at the end of a copy job and identify which files were not copied because a user or program was accessing them, and then manually reschedule a new job hoping to find a time when they are unlocked. With Secure Copy 4 this chore is reduced, as files that failed to copy can be automatically rescheduled for more attempts after the rest of the data has finished copying. For example, file server A is being copied to its redundant backup every night. Some workers are working late with an application that locks files on server A and makes them unavailable for copying. The administrator schedules the copy job to start at 8 PM, but early the next morning he has to manually check to see whether the workers had all released their file locks before the copy job tried to copy their files. If there were any that failed to copy, he has to manually copy those files before the workers need them again. Now, with Secure Copy 4, he simply enables Automatic File Retry and goes home knowing that Secure Copy will automatically retry failed file copies until the files are available, or he tells it to stop trying. This simple feature significantly eases the process of migrating and copying data on file servers, and further defines Secure Copy 4 as the perfect tool for data replication and file server migrations. New options to tune performance and manage retries

10 SECURE COPY 4 6 IMPROVED AND UPDATED USER INTERFACE Secure Copy 4 s User Interface has an updated look-and-feel with dockable toolbars for increased flexibility in arranging the workspace and maximum ease-of-use. In addition, the layout of the Secure Copy Options dialog box has been enhanced to simplify the user s experience, and new options have been added to control multi-threaded copying and automatic retries. Updated Interface

11 SECURE COPY 4 7 Using Secure Copy STARTING SECURE COPY Click Start, point to Programs > ScriptLogic Corporation > Secure Copy 4, and then choose Secure Copy Console. Each time you run the program you are greeted by the splash screen, which displays the initialization of the program and the current version number. EXAMINING THE MAIN WINDOW Secure Copy was designed to be straightforward and easy to use. All actions are accessible through one main window, which has two tabs. The Secure Copy tab is divided into three areas that represent the three steps involved in creating a copy job. In steps 1 and 2, you select the source and target paths. Secure Copy is compatible with local paths, mapped network drives, and the UNC pathname format. The paths you select display in the Source Paths and Target Paths list boxes. In step 3, you select various copy options that affect the copy job. The selected options display in a list next to.

12 SECURE COPY 4 8 The Saved Jobs tab displays copy jobs that you saved for use at a later time. You can load a saved job to run manually or you can schedule the job to run at a specified time. The Saved Jobs tab displays the status of the job. Toolbar Buttons and Job Menu Options The most common operations performed in the software can be accessed through the top toolbar. Depending on which tab is selected, the icons are available or grayed out. The same operations on the toolbar can be performed from the Job menu. Button Job Menu Shortcut Description New Job CTRL + N Clears the boxes on the Secure Copy tab so you can create a new job. Save Job CTRL + S Saves the job displayed on the Secure Copy tab. Save Job As Load Job Delete Job Run Now Test Job Schedule Job NA CTRL + L CTRL + D NA NA F3 Saves the job displayed on the Secure Copy tab; use to create a new job by editing a saved job. Places a saved job on the Saved Jobs tab into the Secure Copy tab. Removes a saved job from the list on the Saved Jobs tab. Initiates the job displayed on the Secure Copy tab or the selected job on the Saved Jobs tab. Tests the job displayed on the Secure Copy tab or the selected job on the Saved Jobs tab. Opens the Windows Scheduler so you can schedule the job displayed on the Secure Copy tab or the selected job on the Saved Jobs tab to run at a specified time.

13 SECURE COPY 4 9 File Menu Choose File > Exit to close Secure Copy. You also can click the Close button. Window Menu Choose Window > Secure Copy to open the Secure Copy tab. Choose Window > Saved Jobs to open the Saved Jobs tab. Choose Window > Show Toolbar to toggle the toolbar on or off. Choose Window > Toolbar Captions to toggle the lettering under the toolbar buttons on or off. Help Menu Choose Help > Contents or press F1 to open the online help for Secure Copy. Choose Help > About to see information about the version of Secure Copy installed on your computer, to apply a license file, or to visit the ScriptLogic web site.

14 SECURE COPY 4 10 CREATING A NEW JOB Important: When you click, all displayed entries are erased. You are not prompted to save the current job. If you want to save the current job before you create a new one, click, save the file, and then click. When you open Secure Copy, the Secure Copy tab is blank and ready for you to create a new job. If a job is already present, click to blank the Secure Copy tab. Create initial source folder under target folder Creates a folder structure on the target that is the same as the source folder structure. There are two ways to add paths to the Source Paths and Target Paths boxes: browse for a path or type a path directly. In addition, you can create a new folder on the target to receive the source. Note: By default, Secure Copy creates a folder structure on the target that mimics the folder structure in the target. To ignore the source folder structure, clear the Create initial source folder under target folder checkbox. Caution: If the Synchronize Target with Source check box is selected on the General Copy Options dialog box, and you copy from multiple source paths, only those files in the last source file in the list are synchronized with the target. All other files in the target are deleted.

15 SECURE COPY 4 11 Browsing for a Path 1. On the Secure Copy tab, click. The Select Folder list box appears. 2. Expand the hierarchical list, and then select the paths to copy (source) and to copy to (target). See Selecting Folders. The Select Folder list box supports multi-state checkboxes, which allow you to specify exactly what folders you want copied. Checkbox Indication The folder and its subfolders are not selected. No files or folders will be included in the copy process. The folder and all subfolders are selected. All files and folders underneath this folder will be included in the copy process. The folder is selected, and some of the subfolders are selected. All the files in this folder and subfolders that are selected will be included in the copy process. The folder is not selected, but some of the subfolders are selected. Only the selected subfolders underneath this folder will be copied. Note: For the target, you also can create a new folder to receive the selected source folders. See Creating a New Folder. 3. Click OK.

16 SECURE COPY 4 12 Selecting Folders and Files Single left-click on parent folder Selects the parent folder, all subfolders, and all files within parent folder. Single right-click on parent folder Selects the parent folder and only files within parent folder. Single left-click followed by a right-click on parent folder Selects only folders within the parent folder.

17 SECURE COPY 4 13 Typing a Path To bypass the system browser, you can type a path directly. 1. Click. The Enter Path box opens. 2. Type a path for the folder, and then click OK. Creating a New Folder You may want to create a new folder on the target drive to receive the selected source folders. 1. In the Step 2: Select target folders area, click. The Select Folder list box appears. 2. In the Select Folder list box, select the folder under which to create the new folder, and then click New Folder. The Enter Folder Name dialog box opens. 3. Type a name for the folder, and then click OK. Removing a Path 1. In the Source Paths or Target Paths lists, select a path, and then click. A message appears asking for confirmation. 2. Click Yes to remove the path from the list. SETTING OPTIONS FOR THE COPY PROCESS The Step 3:Choose from available copy options area displays the currently selected options. Click Options. The Secure Copy Options dialog box opens to the General Copy Options area. Set the desired options, and then click OK.

18 SECURE COPY 4 14 Setting General Copy Options Copy only changed source files to target If the source and target have files with the same name, Secure Copy compares the file size and time/date stamp. If the file size is different or the target file is older than the source file, Secure Copy overwrites the target with the source. The target is not purged; files and folders that are in the target, but not in the source, remain in the target after the copy process completes. If the target path is empty, all files and folders are copied from the source to the target. Ignore NTFS/FAT time differences up to 2 seconds Select to skip files where the last-modified date and time differs by less than 2 seconds. File-time granularity is 100 nanoseconds on NTFS and 2 seconds on FAT, so copying a file from NTFS to FAT causes file times to be rounded to a value that the FAT file system can manage. When both the source and destination volumes are NTFS, the file times are compared exactly. When either the source or destination volume is not an NTFS volume, Secure Copy considers file times to be identical if they are within 2 seconds of each other. Without this 2-second margin, Secure Copy might classify unmodified files as older or newer files, which would result in unnecessary copying of unchanged files. Sometimes you may want to override this handling of file times. For example, you copy an NTFS tree to a FAT volume. Secure Copy rounds the file times. You then copy the FAT tree (with its rounded file times) to a local NTFS drive. Later, when you want to recreate the original tree exactly, you do not want to refresh the entire tree. Copy all files from source to target Copies all files and folders from the source to the target. If the source and target have files and folders with the same name, Secure Copy overwrites the target with the source. The target is not purged; files and folders that are in the target, but not in the source, remain in the target after the copy process completes. If the target path is empty, all files and folders are copied from the source to the target.

19 SECURE COPY 4 15 Synchronize Target with Source Select to activate the options for synchronizing the target with the source. Purge orphaned files/folders in target folder Select to make all files and folders in the target identical to those in the source. This options deletes files or folders in the target that also do not exist in the source. Important: Only select this option with a single source path and a single target. Purge orphaned files/folders in SUBFOLDERS of the target Select this option to make all subfolders in the target identical to subfolders with the same name in the source. This option deletes files and folders in the target subfolders that also do not exist in subfolders with the same name in the source. Important: Only select this option with multiple source paths if you are certain that none of the source paths have subfolders with duplicate names. Override security on Access Denied (you must be an administrator) Allows an administrator to perform a copy without changing any of the permissions or ownership for the objects. In a traditional copy process, a user must have permissions on a file or folder to copy it. If the user is denied access, they must first take ownership of the object, and then set the appropriate permissions before copying it. Imagine the nightmare scenario of migrating 10,000 user home and profile directories from one server to another. These directories would take forever to repermission and copy. Don t Copy Permissions (copy data only) Copying the permissions on data is not always necessary for every copy job. A user may just want to migrate data from one drive to another, or from one server to another. Generate Log File Writes the information about the copy job progress to a text file. Click to select a location and specify a name for the log file. After the log file is generated, click to view the file contents. Verbose Logging Provides more detail in the log text file. Available only if Generate Log File is selected.

20 SECURE COPY 4 16 Setting Advanced Options Reset Last Accessed Date on source files Copying files and permissions causes the Last Accessed Date to be set to the current date. Selecting this option causes Secure Copy to change the Last Accessed Date to the date it was last accessed before the copy, which is useful if you want to later audit your files to see if they need to be archived or deleted. Selecting this option also prevents the copy process from interfering with Windows 2000/XP/2003 features, such as Remote Storage. Synchronize Last Accessed Date and Created Date on target w/source Use when you want the copy on the target to be identical to the copy on the source. This specifically includes the Last Accessed Date and the Created Date. If this option is not checked, this information comes from the settings that the operating system sets automatically. Always copy perms, even on skipped files Copies the permissions of source files and folders from the source to the target, even if the files and folders are exactly the same. This option is helpful in a situation where the permissions were changed on the source, but the files were not modified. The copy process skips the files because of the file size and time/date stamp are identical. If this option is selected, the permissions are copied even if the file is not. Clear Archive Bit on source after copying After files and folders are copied, Secure Copy clears the archive bit on those files and folders. Verify file copy Creates a verify log text file. Set Password for migrated user accounts Applies a password to migrated user accounts. Available only if Migrate Local Groups/Users to Destination Server is selected on the Migrate Local Groups tab. Type the password in the New Password box. Thread count Select the number of copy threads for an individual smaller copy job. The minimum is 2 and the maximum is 20.

21 SECURE COPY 4 17 Batch count Select the maximum number of files in an individual smaller copy job. The minimum number of files is 25 and the maximum is 100. Batch size Select the maximum number of bytes in an individual smaller copy job. The minimum is 1 byte and the maximum is 10. Retry on locked file Requests a retry of any files that were not copied during the initial pass through the directory structure. Retry attempts Choose the number of times to attempt a retry on locked files. Active only if Retry on locked file is selected. Minutes between retries Choose the number of minutes to wait between each retry on locked files. Active only if Retry on locked file is selected.

22 SECURE COPY 4 18 Compressing Files Specify how Secure Copy handles file compression during the copy process. Never compress target files Disregards any file or folder compression that may exist on the source or target. Copies all files and folders uncompressed. This option offers the greatest speed for the copy process, and is recommended if there is not a space requirement on the target. Always compress target files Only use this option in cases when space is a premium as it adds substantial overhead and time to the copy job. This option also adds to the fragmentation on the target volume. Use only if absolutely necessary. Compress target files only if source is compressed Compresses the files and folders on the target if they are compressed on the source. This option provides consistency among the file systems on the source and target, but also adds to the time required to perform the process. Use only if necessary.

23 SECURE COPY 4 19 Migrating File Shares Secure Copy allows the migration of file shares from one server to another server or to multiple servers. Secure Copy recreates the file shares of the source server on the target server with share permissions intact, which greatly reduces the time for file share creation on the target server. Migrate File Shares to Destination Server Secure Copy recreates on the target server, the file shares that are on the source server. Shares whose folders are not specified in the source paths are not copied. In other words, as Secure Copy runs the copy process, it checks each source path and its subfolders to see if they are shared. If so, and if this option is specified, Secure Copy recreates the share on the target computer and creates the appropriate share permissions as dictated by those of the source. The sub options are used if the share name already exists or if the share needs to be created on a Windows NT/2000/2003 cluster. Skip it (ignore) If a share already exists on the target, Secure Copy does not create the share on the target. Overwrite (remove old share, create new one) If a share already exists on the target, Secure Copy unshares the share on the target, and then writes over it with the source share. Add the prefix Add the suffix In cases where there may be multiple shares of the same name and you want to recreate the shares using the new folders from the source, but manually renaming the shares when prompted may be unfeasible, such as in the case of a scheduled job, you can have Secure Copy add a prefix or a suffix to the new share name. This gives a uniform naming convention to the new shares and prevents unnecessary user intervention. Cluster Group Name If you are copying data to a cluster, type the name of the cluster. Secure Copy migrates the shares to the specified cluster.

24 SECURE COPY 4 20 Migrating Local Groups Secure Copy allows an administrator to recreate local groups and users on a target server if the local group or user has permissions on the data that is being copied. When the data is copied, the security shows a SID and an Account Unknown because the local storage area management (SAM) database on the target server does not have an entry for the local group/user on the source server. Migrate Local Groups/Users to Destination Server Enables functionality available in the dialog box. Note: Secure Copy only migrates local groups and users who already have permissions on the data that is being copied. Local Groups Migrates local groups from the source to the target. Local Users Migrates local users from the source to the target. Target Server Migrates the local groups/users from the source server to the target server. Active Directory Migrates the source local groups/users to a Windows 2000/2003 server-based domain. In the Destination OU box, type a path using standard LDAP format, or click to browse for an organizational unit (OU). NT Domain Migrates the source local groups/users to a Windows NT 4.0 domain. In the Destination Domain box, type the NetBIOS name of the domain, or click to browse for a domain.

25 SECURE COPY 4 21 Always perform the following action Always add a prefix or suffix to the migrated groups/users to avoid conflicts. This option is helpful to administrators who use local groups and users with the same names on many servers throughout the enterprise. Add the prefix Add the suffix Type the prefix or suffix in the box. Adding a prefix or suffix allows administrators to enforce a standard naming convention, or to differentiate the migrated groups and users from their already existing counterparts. Use the existing group/user If a local group/user name already exists on the target, Secure Copy applies those permissions to the migrated data. Add members of the source group to existing group Migrates the users of a group on the source server to the group with the same name on the target server. Synchronize target members with source members If a local group/user already exists on the target, the source local group/user overwrites the target. Add the prefix Add the suffix In cases where there may be multiple local groups/users of the same name and manually renaming the local groups/users when prompted may be unfeasible, such as in the case of a scheduled job, you can have Secure Copy add a prefix or a suffix to the new local group/user name. This gives a uniform naming convention to the new local groups/users and prevents unnecessary user intervention. Don t append users to Target server s BUILTIN group Does not append users to the BUILTIN group in the target server. File Path Renames specific local groups during a migration by applying the contents of a map text file, which contains the old and new names. See Using Map Files. To create a map file, create a text document in Notepad, add one line for each map, and then save the file. Click to select the location of the map file. To view the contents of the map file, click. Example ServerAGroup = ServerBGroup ServerALocalGroupB = ServerBLocalGroupB

26 SECURE COPY 4 22 Filtering Files Secure Copy offers users the ability to filter which files and folders are copied based on a few criteria. Apply the following filter to the files Includes or excludes files depending on their extensions. This option gives administrators control over what content gets migrated, which is especially useful for the elimination of files that may not be necessary or appropriate in a corporate environment, such as TMP, MP3, MOV, MPG, WMA or any hundreds of others. Conversely, it can allow for migrations based on file types. For example, if one server will hold data such as multimedia for a company, a system administrator can specify that only the files for that use will go to the new server. In this case they might copy only JPG, MPG, SWF, MOV, WAV, or any other file with an extension that may be of importance. Add an Extension 1. Click. The Enter extension box opens. Important: When typing the extension, do not include the period or the extension will not be included or excluded based on the criteria. Secure Copy does not support wildcard values, such as * or? 2. Type an extension without the period, and then click OK. Remove an Extension In the Extensions list, select a extension, and then click. Include files that match these extensions Includes those files with the extension(s) listed in the Extensions list. Active when Apply the following filter to the files is selected. Exclude files that match these extensions Excludes those files with the extension(s) listed in the Extensions list. Active when Apply the following filter to the files is selected.

27 SECURE COPY 4 23 Exclude all folders with the following names Excludes folders based on their names. During a migration this might be helpful for the elimination of folders that are not necessary and can be recreated later. Some examples are temp folders and Temporary Internet Files folders. Add a Folder 1. Click. The Enter Folder Name to Exclude box opens. Important: Secure Copy does not support wildcard values, such as * or?. 2. Type a folder name, and then click OK. Remove a Folder In the Folder Name list, select a folder name, and then click. Include files modified between dates Includes files that were modified between the selected start and end dates. From the Start Date and End Date lists, select start and end dates. Include files between these sizes Includes files whose size is between the specified minimum and maximum size. In the Min size and Max size boxes, type values in kilobytes (KB). Limit folder recursion depth Limits the depth of the subfolders beneath the source folder that is selected for copy. In the Folder depth box, type a value to represent the level of subfolders (1 = one level; 2 = two levels).

28 SECURE COPY 4 24 TESTING A JOB Before running a copy job, you might want to test it to see if any errors are generated. 1. Open the Secure Copy tab to test the displayed job, or select one or more jobs on the Saved Jobs tab. 2. From the Job menu, choose Test Job, or click. The testing mode window opens to display the progress of the test. To cancel a test while it is running, click Cancel. If any errors occur during the test, an explanation and path displays. To save the errors to a comma/quote delimited log file (.txt), click Save As, locate a destination, name the file, and then click OK. Note: To maximize the performance of Secure Copy, you can set various options on the Advanced Options window to increase the number of copy threads used. See Maximizing Copy Performance. 3. If Close this window automatically when no errors occur is selected, the window closes if the test is successful; otherwise, click Close.

29 SECURE COPY 4 25 RUNNING A JOB Before running a job, you might want to test the process to see if any errors are generated. No files are copied during the test. See Testing a Job. 1. Open the Secure Copy tab to run the displayed job, or select one or more jobs on the Saved Jobs tab. 2. From the Job menu, choose Run Now, or click. The Job window opens to display the progress of the job. To cancel a job while it is running, click Cancel. If any errors occur, an explanation and path displays. To save the errors to a comma/quote delimited log file (.txt), click Save As, locate a destination, name the file, and then click OK. If the job is successful, a message displays in the window header. Note: To maximize the performance of Secure Copy, you can set various options on the Advanced Options window to increase the number of copy threads used. See Maximizing Copy Performance. 3. If Close this window automatically when no errors occur is selected, the window will close if the test is successful; otherwise, click Close. If you ran saved jobs, the Last Run and Status columns update with the run time and job status.

30 SECURE COPY 4 26 SAVING A JOB Secure Copy includes the ability to save and load copy jobs, which is extremely valuable to administrators who use jobs frequently or create complex jobs that require occasional modification. Note: Secure Copy maintains the job name and configuration settings of all saved jobs in a file SecureCopy3.SSD in the installation directory of the program. You can modify this file using a text editor, such as Notepad, or by loading the job in Secure Copy, and then making changes. You also can use a saved job to create a new job, by saving it with a different name after you modify the job. See Loading a Saved Job. 1. From the Secure Copy tab, open the Job menu, and then choose Save Job or Save Job As, or click. The Enter Job Name box appears. 2. Type a name for the job, and then click OK. The saved job is accessible from the Saved Jobs tab. LOADING A SAVED JOB 1. Open the Saved Jobs tab, and then select a job. 2. From the Job menu, choose Load Job, or click. The Secure Copy tab opens displaying the source and target paths, and the selected copy options. 3. Make any modifications to the job, and then save the job with the same name or save the job as a different name.

31 SECURE COPY 4 27 SCHEDULING JOBS Secure Copy includes the ability to schedule copy jobs to occur when they are convenient to personnel, without interfering with business practices. The best time for data migration is during hours of non-operation or non-peak usage. Quite often this is not feasible for the average 9 to 5 administrator. Secure Copy uses the features of the Microsoft Task Scheduler service to handle all functions of job scheduling. 1. Open the Secure Copy tab to test the displayed job, or select one or more jobs on the Saved Jobs tab. 2. From the Job menu, select Schedule Job, or click. The Task tab displays the job in the Run box. 3. In the Comments box, type any comments about the task. 4. Your user account name displays in the Run as box. If you want another user account to run the task, change the entry. If you want to change the user who can run the task, click Set Password. The Set Account Information dialog box displays. You can change the user account here also. Type a password, and then click OK. Note: The Enabled checkbox is selected by default, which enables the task to run at the specified time. To disable the task from running, clear the Enabled checkbox. 5. Open the Schedule tab to create a new schedule or edit an existing schedule.

32 SECURE COPY To create a new schedule, click New. The default values display. If Show multiple schedules is selected, you can create more than one schedule for the task. 7. From the Schedule Task list, select how often you want the task to run: Daily, Weekly, Monthly, Once, At System Startup, At Logon, or When Idle. The Schedule Task area of the dialog box changes depending on which option you select. 8. From the Start time list, select the time for the task to start. 9. To set more options, click Advanced. The Advanced Schedule Options dialog box appears. 10. Set the desired options, and then click OK.

33 SECURE COPY Open the Settings tab. Here you can set more options for the selected task. 12. Click Apply at any time to apply your selections to the task. To apply the settings and close the dialog box, click OK. Note: If the job was not enabled, Secure Copy automatically enables the job so the scheduled task can run. To disable the job so the scheduled task does not run, right-click the job, and then choose Disable Job. To enable the job again, right-click the job, and then choose Enable Job. Managing Scheduled Jobs The Task Scheduler service is included with Microsoft Internet Explorer 5.0 and later with the Offline Browsing Pack installed. As such it is included in Windows 2000/XP/2003. It is an add-on to Windows NT 4.0. To view scheduled jobs in Windows NT 4.0, open My Computer. To view scheduled jobs in Windows 2000/XP/2003, click Start, point to Programs > Accessories > System Tools, and then choose Scheduled Tasks.

34 SECURE COPY 4 30 USING SECUREJOBCOPY4.EXE SecureJobCopy4.exe is the engine that Secure Copy uses for copy processes and it uses all of the features that are available in Secure Copy. SecureJobCopy4.exe runs from the command line, but offers only limited options to script, because it references the features of a saved job by using the name of that job. Note: You must use SecureJobCopy4.exe from a computer that has a fully licensed version of Secure Copy 4 installed. You cannot copy SecureJobCopy4.exe from machine to machine, as it works only as an evaluation version and is limited to copying a small amount of objects. REMOVING SECURE COPY 4 Proper removal of Security Explorer can be achieved in a few ways. You can use the Add/Remove Programs control panel applet for a full removal. 1. From the Windows Control Panel, double-click Add/Remove Programs. The Add/Remove Programs window opens. 2. From the list of currently installed programs, select Secure Copy Click Remove. A message box prompts you for confirmation. 4. To remove the application, click Yes. A status dialog box displays for the few seconds necessary to remove the application. After removal is complete, Secure Copy will have been removed from your system. Note that the installation directory that contained Secure Copy remains after the process is complete. This directory contains the license file for the product and any files created after the product was installed. These may be deleted manually if you wish to completely remove Secure Copy.

35 SECURE COPY 4 31 Applying Secure Copy Options There are several options that you can select to perform various tasks. This chapter includes information about ways to apply Secure Copy Options to maximize your use of Secure Copy. MAXIMIZING COPY PERFORMANCE There are three parameters on the Advanced Options tab that you can use to maximize copy performance: Thread count, Batch count, and Batch size. See Setting Advanced Options. By default, the maximum number of files in a batch is 25 and the maximum size of the batch is 1MB. The minimum number of threads is 2 by default. By increasing the thread count, you are adding more threads that copy batches of files. Each of the file threads deals with one batch of files at a time. In normal operation, these default settings should be adequate. However, if you have a large number of small files and many batches, you might start by creating at least 10 threads, and then monitoring network card utilization. The goal of adjusting these three parameters is to maximize your network bandwidth. Other factors that prevent Secure Copy from using all the network bandwidth include slow disk speeds, disk fragmentation, and other activity on the network and file server.

36 SECURE COPY 4 32 USING MAP FILES A map file is a text file that creates a mapping between source and target groups and users. Using a map file give you greater flexibility in the way that local groups/users are migrated, either from one computer to another, to an NT domain, or to Active Directory. Note: Map files cannot be used to create mappings for domain groups. Map files are most commonly used when local group/user accounts include the source computer's name. Example You need to migrate data from Server1 to Server2. Permission entries on the data include the local groups LocalGroup1_Server1 and LocalGroup2_Server1. If the data is copied using the Migrate Local Groups option, the data is copied to Server2, but the access control lists for the data would still reference LocalGroup1_Server1 and LocalGroup2_Server1. Using a map file provides a means of modifying the behavior of the local group migration so that once the job completes, the access control lists for the data would reference LocalGroup1_Server2 and LocalGroup2_Server2. 1. Using Notepad, create a map file by typing each name mapping on a new line. 2. In Secure Copy, click, and then click Migrate Local Groups. See Migrating Local Groups. 3. Select Migrate Local Groups/Users to Destination Server. 4. Under Map file, select File Path, and then click to locate the map file you created. Note: To view or edit the contents of the map file, click. 5. Select any other options on the Migrate Local Groups window, and then click OK. 6. On the Secure Copy tab, specify the source and destination paths. See Creating a New Job. 7. Run the job. See If Close this window automatically when no errors occur is selected, the window closes if the test is successful; otherwise, click Close. 8. Running a Job.

37 SECURE COPY 4 33 COPYING FOLDER STRUCTURES WITHOUT FILES At times it may be desirable to replicate a directory structure from one computer to another, but not include files that may reside within that structure. By using a combination of folder and file selection filters, it is possible to create a copy job that includes all the folders/directories of a specified source path, but does not include any files within that path. 1. On the Secure Copy tab, specify the source and destination paths. See Creating a New Job. Note: It may be desirable to uncheck Create initial source folder under target folder, especially when the source path is a drive root (i.e., \\server1\c$\). 2. Click, and then click Filter Files. 3. Select Exclude all folders with the following names. Leave the Folder Name list empty. 4. Select Apply the following filter to the files. 5. Click, type an extension that does not exist within the selected source structure, such as xyz, and then click OK. 6. Click OK to close the Secure Copy Options window. 7. Run the job. See If Close this window automatically when no errors occur is selected, the window closes if the test is successful; otherwise, click Close. 8. Running a Job.

38 SECURE COPY 4 34 CREATING LOG FILES Three types of log files can be created, which include varying levels and types of information: basic, verbose, and verify. Note: Unless the name of a log file is changed, it is overwritten by successive copy jobs. To prevent a log from being overwritten, append the name of the log file with either of the following case-sensitive variables, which provide a unique timestamp: %DATE% #DATE# The format of the timestamp is: yyyy_mm_dd_hh_mm_ss Basic Log File The basic log file is created on the General Copy Options window. See Setting General Copy Options. Contents Start Time (day, date, and time) Source Path Count End Time (day, date, and time) Summary Information: Number of folders and files processed Number of Copied Files and Total Bytes Transferred Number of Skipped Files and Total Bytes Skipped Verbose Log File Contents are the same as the basic log file, but each folder and file is listed in the order it was processed. See Setting General Copy Options. Verify File Copy Log File The verify log file is created on the Advanced Options window. See Setting Advanced Options. Contents Start Time (day, date, and time) For each file copied the following information is logged: CRC Source: <a 32-bit CRC value created when read> (sourcepath\filename) CRC Dest : <a 32-bit CRC value created when written> (destinationpath\filename) CRC Match?: [Yes No] End Time (day, date, and time) Summary Information: Number of folders and files processed Number of Copied Files and Total Bytes Transferred Number of Skipped Files and Total Bytes Skipped

39 SECURE COPY 4 35 Troubleshooting FREQUENTLY ASKED QUESTIONS I get errors when I try to run the Secure Copy 4 installation file on Windows NT 4.0. Why is this? The Secure Copy 4 setup file is distributed in a Windows Installer package due to the inherently robust nature of this package. Additionally this format provides for ease of distribution, publication, installation and uninstallation. The Windows Installer service is built into the Windows 2000/XP/2003 operating systems, but not into Windows NT 4.0. To install Secure Copy 4 correctly on Windows NT 4.0, you need to first install the Windows Installer service. I am licensed for multiple servers, but I get an error message when I try to apply my license file to another server. It states that the license file has already been applied and to please select a fresh file to unlock the product. Why? This behavior is by design. Please contact technical support for a resolution. When I copy the command line version of Secure Copy to another server it is limited as to how many objects it can copy. Why is this? The command line version needs to run from a machine where Secure Copy is installed as the command line version uses the same license file.

40 SECURE COPY 4 36 Index A Add button, 13 Advanced Options, 16 archive bit clearing, 16 B batch count, 17 batch size, 17 browse bypass, 13 path, 11 BUILTIN group, 21 buttons Add, 13 Del, 13 Options, 13 View, 15, 21 C canceling running job, 25 checkboxes, 11 clearing archive bit, 16 cluster group name, 19 compressing files, 18 copying folder structures, 33 only changed files, 14 permissions, 16 setting options, 13 creating folder structures, 10 log files, 34 map files, 32 new folders, 13 new jobs, 10 D Delete button, 13 E Enter Folder Name box, 13 Enter Path box, 13 entering path, 13 excluding files and folders, 23 exiting Secure Copy, 9 F file compression, 18 File menu, 9 file shares migrating, 19 files copy only changed, 14 filtering, 22 selecting, 12 filtering files, 22 folders copying structures, 33 creating new, 13 selecting, 12 G General Copy Options, 14 generating log file, 15 verbose log file, 15 H Help menu, 9 I including files, 23

41 SECURE COPY 4 37 J Job menu, 8 jobs creating new, 10 loading saved, 26 managing scheduled, 29 running, 25 saving, 26 scheduling, 27 testing, 24 L last accessed date, 16 loading saved job, 26 local groups migration, 20 log file, 15, 34 verbose, 15, 34 verify, 16, 34 M managing scheduled jobs, 29 map files, 21, 32 menus File, 9 Help, 9 Job, 8 Window, 9 migrate user accounts setting password, 16 migrating file shares, 19 local groups, 20 modify saved job, 26 multithreading, 16 O opening Secure Copy, 7 options advanced, 16 general copy, 14 Options button, 13 overriding security, 15 R recursion depth, 23 removing folder from list, 23 path from list, 13 Secure Copy, 30 running a job, 25 S Saved Jobs tab, 8, 26 saving copy job, 26 scheduling copy job, 27 Secure Copy exiting, 9 removing, 30 starting, 7 Secure Copy tab, 7 blanking, 10 SecureJobCopy4.exe, 30 security override, 15 Select Folder list, 11 selecting folders and files, 12 setting password migrated user accounts, 16 shares. See file shares. source synchronize with target, 16, 21 starting Secure Copy, 7 synchronize last accessed date, 16 synchronizing created date, 16 T tabs Saved Jobs, 8, 26 Secure Copy, 7 target synchronize with source, 16, 21 testing a job, 24 thread count, 16 toolbar, 8 captions, 9 toggle, 9 P path browsing for, 11 removing, 13 typing in, 13 permissions copy, 16

42 SECURE COPY 4 38 V verbose log file, 15, 34 verify log file, 16, 34 View button, 15, 21 W wildcards, 22 Window menu, 9 Windows Installer, 35

ScriptLogic Secure Copy 4 Getting Started Guide

ScriptLogic Secure Copy 4 Getting Started Guide ScriptLogic Secure Copy 4 Getting Started Guide SECURE COPY 4 II 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic

More information

Dell Secure Copy 7.1. User Guide

Dell Secure Copy 7.1. User Guide Dell Secure Copy 7.1 2015 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

Security Explorer 9.1. User Guide

Security Explorer 9.1. User Guide Security Explorer 9.1 User Guide Security Explorer 9.1 User Guide Explorer 8 Installation Guide ii 2013 by Quest Software All rights reserved. This guide contains proprietary information protected by copyright.

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide 1 Seagate Manager User Guide Revision 2 2009 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology,

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Function. Description

Function. Description Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.

More information

User Manual. Active Directory Change Tracker

User Manual. Active Directory Change Tracker User Manual Active Directory Change Tracker Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems

More information

Desktop Authority 8 Getting Started

Desktop Authority 8 Getting Started 8 Getting Started Copyright Copyright 1997-2009 ScriptLogic Corporation and its licensors. All Rights Reserved. Protected by U.S. Patents 6,871,221; 7,293,087; 7,353,262 and 7,469,278 with other patents

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Administrator s Guide

Administrator s Guide Administrator s Guide 1995 2011 Open Systems Holdings Corp. All rights reserved. No part of this manual may be reproduced by any means without the written permission of Open Systems, Inc. OPEN SYSTEMS

More information

Server Edition USER MANUAL. For Mac OS X

Server Edition USER MANUAL. For Mac OS X Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems Server Edition V8 Peregrine User Manual for Linux and Unix operating systems Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Red Hat is a registered trademark

More information

FileLoader for SharePoint

FileLoader for SharePoint Administrator s Guide FileLoader for SharePoint v. 2.0 Last Updated 6 September 2012 Contents Preface 3 FileLoader Users... 3 Getting Started with FileLoader 4 Configuring Connections to SharePoint 8

More information

SPList Export for SharePoint 2007 User Manual

SPList Export for SharePoint 2007 User Manual SPList Export for SharePoint 2007 User Manual Last Updated: January 2009 Copyright 2008-2009 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software

More information

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product

More information

Smart-X Software Solutions SecReport Enterprise User Guide

Smart-X Software Solutions SecReport Enterprise User Guide Smart-X Software Solutions SecReport Enterprise User Guide Table of Contents: WELCOME 4 FEATURES AND CAPABILITIES 5 CONTENTS AND REQUIREMENTS 7 CONTENTS 7 REQUIREMENTS 8 LICENSING AND INSTALLATION 10 EVALUATION

More information

Top Producer for Palm Handhelds

Top Producer for Palm Handhelds Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

SyncBreeze FILE SYNCHRONIZATION. User Manual. Version Dec Flexense Ltd.

SyncBreeze FILE SYNCHRONIZATION. User Manual. Version Dec Flexense Ltd. SyncBreeze FILE SYNCHRONIZATION User Manual Version 10.3 Dec 2017 www.syncbreeze.com info@flexense.com 1 1 SyncBreeze Overview...3 2 SyncBreeze Product Versions...5 3 Product Installation Procedure...6

More information

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software

More information

PrimoPDF User Guide, Version 5.0

PrimoPDF User Guide, Version 5.0 Table of Contents Getting Started... 3 Installing PrimoPDF... 3 Reference Links... 4 Uninstallation... 5 Creating PDF Documents... 5 PrimoPDF Document Settings... 6 PDF Creation Profiles... 6 Document

More information

Sys-Manage. User Manual. CopyRight2

Sys-Manage. User Manual. CopyRight2 Sys-Manage User Manual CopyRight2 Copyright 2012 by Sys-Manage. All rights reserved. This publication is protected by Copyright and written permission should be obtained from the publisher prior any prohibited

More information

EMC SourceOne for File Systems

EMC SourceOne for File Systems EMC SourceOne for File Systems Version 7.2 Administration Guide 302-000-958 REV 02 Copyright 2005-2015 EMC Corporation. All rights reserved. Published in the USA. Published December 9, 2015 EMC believes

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

Administration Guide - NetApp File Archiver

Administration Guide - NetApp File Archiver Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

Colligo Engage Outlook App 7.1. Offline Mode - User Guide

Colligo Engage Outlook App 7.1. Offline Mode - User Guide Colligo Engage Outlook App 7.1 Offline Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 3 Checking

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 36 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - DATA PROTECTION MANAGER DEPLOYMENT GETTING STARTED

More information

Tzunami Inc. Evaluation Guide

Tzunami Inc. Evaluation Guide Tzunami Inc. Evaluation Guide Using K-Wise Deployer for Rapid Content Migration into Microsoft SharePoint Products and Technologies Rapid migration solutions for Microsoft SharePoint Portal Server 2003

More information

InSync Service User Guide

InSync Service User Guide InSync Service User Guide Matrix Logic Corporation 1 Published by Matrix Logic Corporation Copyright 2011 by Matrix Logic Corporation All rights reserved. No part of the content of this manual may be reproduced

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT File Synchronization Version 9.1 Apr 2018 www.diskboss.com info@flexense.com 1 1 DiskBoss Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

DocAve for Salesforce 2.1

DocAve for Salesforce 2.1 DocAve for Salesforce 2.1 This document is intended for anyone wishing to familiarize themselves with the user interface and basic functionality of AvePoint s DocAve for Salesforce tool. System Requirements

More information

CA IT Client Manager. Packager and Installer for Windows Administration Guide. Release 12.8

CA IT Client Manager. Packager and Installer for Windows Administration Guide. Release 12.8 CA IT Client Manager Packager and Installer for Windows Administration Guide Release 12.8 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Windows 2000 / XP / Vista User Guide

Windows 2000 / XP / Vista User Guide Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

DupScout DUPLICATE FILES FINDER

DupScout DUPLICATE FILES FINDER DupScout DUPLICATE FILES FINDER User Manual Version 10.3 Dec 2017 www.dupscout.com info@flexense.com 1 1 Product Overview...3 2 DupScout Product Versions...7 3 Using Desktop Product Versions...8 3.1 Product

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

User Manual. Dockit Archiver

User Manual. Dockit Archiver User Manual Dockit Archiver Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems Private Ltd for

More information

Manual Nero BackItUp. Nero AG

Manual Nero BackItUp. Nero AG Manual Nero BackItUp Nero AG Copyright and Trademark Information The manual for Nero BackItUp and all its contents are protected by copyright and are the property of Nero AG. All rights reserved. This

More information

ADOBE DRIVE 4.2 USER GUIDE

ADOBE DRIVE 4.2 USER GUIDE ADOBE DRIVE 4.2 USER GUIDE 2 2013 Adobe Systems Incorporated. All rights reserved. Adobe Drive 4.2 User Guide Adobe, the Adobe logo, Creative Suite, Illustrator, InCopy, InDesign, and Photoshop are either

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

NovaBACKUP. User Manual. NovaStor / May 2014

NovaBACKUP. User Manual. NovaStor / May 2014 NovaBACKUP User Manual NovaStor / May 2014 2014 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

ScriptLogic Enterprise Security Reporter 3.0 Reporting Guide

ScriptLogic Enterprise Security Reporter 3.0 Reporting Guide I ScriptLogic Enterprise Security Reporter 3.0 Reporting Guide ENTERPRISE SECURITY REPORTER 3.0 I 2006 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all

More information

CTC Accounts Active Directory Synchronizer User Guide

CTC Accounts Active Directory Synchronizer User Guide i Contents Overview... 3 System Requirements... 4 Additional Notes... 5 Installation and Configuration... 6 Running the Synchronizer Interactively... 7 Automatic Updates... 7 Logging In... 8 Options...

More information

FBackup. FBackup User Manual. Take full control of your backup. Copyright 2017 Softland

FBackup. FBackup User Manual. Take full control of your backup. Copyright 2017 Softland FBackup Take full control of your backup FBackup User Manual FBackup User Manual for FBackup version 7 by Softland This documentation contains proprietary information of Softland. All rights reserved.

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Administrator Guide Software version 2.2 D14197.06 February 2011 Contents Contents... 2 Introduction... 4 Pre-Installation Information...

More information

NetVault : Backup Built-in Plugins

NetVault : Backup Built-in Plugins NetVault : Backup Built-in Plugins Version: 8.5Product Number: NVG-129-8.5.1-EN-02 version 8.5.1 User s Guide NVG-129-8.5.1-EN-02 04/26/10 Copyrights NetVault: Backup Built-in Plugins User s Guide Software

More information

NovaBACKUP. User Manual. NovaStor / April 2016

NovaBACKUP. User Manual. NovaStor / April 2016 NovaBACKUP User Manual NovaStor / April 2016 2016 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

EMC SourceOne TM Offline Access USER GUIDE. Version 6.8 P/N A01. EMC Corporation Corporate Headquarters: Hopkinton, MA

EMC SourceOne TM Offline Access USER GUIDE. Version 6.8 P/N A01. EMC Corporation Corporate Headquarters: Hopkinton, MA EMC SourceOne TM Offline Access Version 6.8 USER GUIDE P/N 300-013-695 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2005-2012 EMC Corporation.

More information

Kaseya 2. User Guide. for VSA 6.0

Kaseya 2. User Guide. for VSA 6.0 Kaseya 2 Patch Management User Guide for VSA 6.0 July 19, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

RenameMan User Guide. ExtraBit Software

RenameMan User Guide. ExtraBit Software RenameMan User Guide ExtraBit Software http://www.extrabit.com Version 3.1 August, 2005 Contents Introduction... 5 What does RenameMan do?... 5 Features... 5 Quick tour of RenameMan... 5 Getting started...

More information

EMC SourceOne for Microsoft SharePoint Version 6.7

EMC SourceOne for Microsoft SharePoint Version 6.7 EMC SourceOne for Microsoft SharePoint Version 6.7 Administration Guide P/N 300-012-746 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

HORTICOPIA Professional

HORTICOPIA Professional HORTICOPIA Professional Networking User Guide Horticopia, Inc. www.horticopia.com October 2017 Table of Contents I. Quick Start 2 II. System Requirements 3 III. Installing HORTICOPIA Professional 4 1.

More information

DesignPro Tools for Xerox Elixir Technologies Corporation. All rights reserved.

DesignPro Tools for Xerox Elixir Technologies Corporation. All rights reserved. Follow the Crop Marks DesignPro Tools for Xerox Getting Started Guide C 1998-2008 Elixir Technologies Corporation. All rights reserved. Elixir Technologies Corporation 721 East Main Street Ventura, CA

More information

InsightUnlimited Upgrades Best Practices. July 2014

InsightUnlimited Upgrades Best Practices. July 2014 InsightUnlimited Upgrades Best Practices July 2014 InsightUnlimited Version: 2012.2 and above Document Version: 1.1 Last Updated: July 29, 2014 Table of Contents Introduction... 4 Overview... 4 Audience...

More information

SDL Content Porter 2013 User Manual. Content Management Technologies Division of SDL

SDL Content Porter 2013 User Manual. Content Management Technologies Division of SDL SDL Content Porter 2013 User Manual Content Management Technologies Division of SDL Revision date: 28-03-2013 Copyright 1999-2013 SDL Tridion Development Lab B.V. All rights reserved. No part of this documentation

More information

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.3 Prepared for: FEMA Round Hill, VA 20142 Prepared by: Verizon Federal Incorporated P.O.

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

K2 ServerSave Installation and User Guide

K2 ServerSave Installation and User Guide K2 ServerSave Installation and User Guide Chapter 1: Introduction 1.1 What is K2 ServerSave? Welcome to the K2 ServerSave Server Edition User Guide. This guide briefly describes the K2 ServerSave Application

More information

Ascent 6.06 Release Script for Hummingbird DM Release Notes

Ascent 6.06 Release Script for Hummingbird DM Release Notes Ascent 6.06 Release Script for Hummingbird DM 5.0-5.1 Release Notes 10001305-000 Revision A September 27, 2004 Copyright Copyright 2004 Kofax Image Products, Inc. All Rights Reserved. Printed in USA. The

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Silk Performance Manager Installation and Setup Help

Silk Performance Manager Installation and Setup Help Silk Performance Manager 18.5 Installation and Setup Help Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright 2004-2017 Micro Focus. All rights reserved.

More information

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52 Contents Getting Started.....................................................1 Installing the Software...........................................1 Using the Maxtor System Tray Icon................................6

More information

BounceBack 18. User Manual

BounceBack 18. User Manual BounceBack 18 User Manual 2016 CMS Products, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice. The information

More information

TIBCO Spotfire Automation Services 7.5. User s Manual

TIBCO Spotfire Automation Services 7.5. User s Manual TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

Adlib PDF FileNet Connector Guide PRODUCT VERSION: 5.1

Adlib PDF FileNet Connector Guide PRODUCT VERSION: 5.1 Adlib PDF FileNet Connector Guide PRODUCT VERSION: 5.1 REVISION DATE: January 2014 Copyright 2014 Adlib This manual, and the Adlib products to which it refers, is furnished under license and may be used

More information

MRO Management 6.0 Users Manual by Scanlon Associates

MRO Management 6.0 Users Manual by Scanlon Associates MRO Management 6.0 Users Manual by Scanlon Associates Version 6.0.70725 I 6.0.70725 Table of Contents Part I Main Screen 2 1 Work Area... 2 2 Browse Work... File 2 3 Toolbar... 2 4 Result Data Tab... 3

More information

Backup App v7. Quick Start Guide for Windows

Backup App v7. Quick Start Guide for Windows Backup App v7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restore Data; Combined Technical

More information

Novell ZENworks Handheld Management

Novell ZENworks Handheld Management Administration Guide AUTHORIZED DOCUMENTATION Novell ZENworks Handheld Management 7 SP1 IR4 January 24, 2011 www.novell.com Novell ZENworks 7 Handheld Management Administration Guide Legal Notices Novell,

More information

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved. Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored

More information

Getting Started. A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED

Getting Started. A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED Getting Started A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED Locum House, 84 Brown Street, Sheffield, S1 2BS, England Telephone: +44 (0)

More information

ACE Operation Manual

ACE Operation Manual ACE Operation Manual Elecsys Director ACE Operation Manual Product Information Full information about other Elecsys products is available on our website at www.elecsyscorp.com Useful Contact Information

More information

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue:

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue: Zen Internet Online Data Backup Zen Vault Express for Mac Issue: 2.0.08 Tel: 01706 90200 Fax: 01706 902005 E-mail: info@zen.co.uk Web: www.zen.co.uk Zen Internet 2015 Contents 1 Introduction... 3 1.1 System

More information

FileLoader for SharePoint

FileLoader for SharePoint End User's Guide FileLoader for SharePoint v. 2.0 Last Updated 6 September 2012 3 Contents Preface 4 FileLoader Users... 4 Getting Started with FileLoader 5 Configuring Connections to SharePoint 7 Disconnecting

More information

Personality Migration Reference

Personality Migration Reference www.novell.com/documentation Personality Migration Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use

More information

MIDIAX ONLINE BACKUP INSTALLATION

MIDIAX ONLINE BACKUP INSTALLATION MIDIAX ONLINE BACKUP INSTALLATION http://midiax.com/backup/onlinebackup.htm Online Backup & Recovery Manager is a tool for configuring automatic file and folder backups for storage in the cloud. After

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

Print Station. Point-and-Click Printing WHITE PAPER

Print Station. Point-and-Click Printing WHITE PAPER Print Station Point-and-Click Printing WHITE PAPER Contents Overview 3 Printing with Print Station 4 Easy-to-use Browser Interface 4 Familiar Folder Navigation 5 Search Functionality 6 Informative Display

More information

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 Administration GUIDE OnePass Agent for Exchange Mailbox Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 User Guide - One Pass Agent for Exchange Mailbox Table of Contents Overview Introduction

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 7 Permissions

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 7 Permissions Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 7 Permissions Objective: Network Lab # 7 Permissions Define permissions. Explain the characteristics

More information

Backup App V7. Quick Start Guide for Windows

Backup App V7. Quick Start Guide for Windows Backup App V7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restoring Data; Combined Technical

More information

TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy

TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy Reference: http://www.microsoft.com/technet/prodtechnol/office/sps2003/deploy/spst2003.mspx?pf=true

More information

Function Point WORKBENCH Release 7.0k INSTALLATION GUIDE TABLE OF CONTENTS

Function Point WORKBENCH Release 7.0k INSTALLATION GUIDE TABLE OF CONTENTS Function Point WORKBENCH Release 7.0k GUIDE TABLE OF CONTENTS FUNCTION POINT WORKBENCH RELEASE 7.0K GUIDE... 1 LICENCE TYPES... 3 Standalone Licence Machine Dependent (Single User)... 3 Network Licence

More information

User Manual. ARK for SharePoint-2007

User Manual. ARK for SharePoint-2007 User Manual ARK for SharePoint-2007 Table of Contents 1 About ARKSP (Admin Report Kit for SharePoint) 1 1.1 About ARKSP 1 1.2 Who can use ARKSP? 1 1.3 System Requirements 2 1.4 How to activate the software?

More information

User s s Manual. Transcend Elite Software

User s s Manual. Transcend Elite Software User s s Manual Transcend Elite Software (Version 1.0) Congratulations on purchasing one of Transcend s world-renowned storage products. Your Transcend storage device comes with Transcend Elite a very

More information

Perceptive Data Transfer

Perceptive Data Transfer Perceptive Data Transfer User Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: September 2016 2015 Lexmark International Technology, S.A. All rights reserved. Lexmark is a trademark of Lexmark

More information

FSRM (File Server Resource Management)

FSRM (File Server Resource Management) 2012 FSRM (File Server Resource Management) Prepared By: Dharak Adroja Project Guide: Prof. Heera Bamaniya Acknowledgement I take this opportunity to express my indebtedness to all those who directly helped

More information

SuperNova. Screen Reader. Version 14.0

SuperNova. Screen Reader. Version 14.0 SuperNova Screen Reader Version 14.0 Dolphin Computer Access Publication Date: 09 April 2014 Copyright 1998-2014 Dolphin Computer Access Ltd. Technology House Blackpole Estate West Worcester WR3 8TJ United

More information

Relativity Designer Installation Guide

Relativity Designer Installation Guide Liant Software Corporation Relativity Designer Installation Guide Version 5 Copyright 1994-2003 by Liant Software Corporation. All rights reserved. Printed in U.S.A. No part of this publication may be

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

EventVault Introduction and Usage Feature Guide Version 6.x

EventVault Introduction and Usage Feature Guide Version 6.x EventVault Introduction and Usage Feature Guide Version 6.x Publication Date: Jun 12, 2009 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com ABSTRACT The purpose of this document

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

Medivators Data Management Software Installation / User Manual

Medivators Data Management Software Installation / User Manual Medivators Data Management Software Installation / User Manual For DSD and SSD Endoscope Reprocessors Medivators is a registered trademark of Minntech Corporation. Windows and Windows Explorer, Excel,

More information

As a first-time user, when you log in you won t have any files in your directory yet.

As a first-time user, when you log in you won t have any files in your directory yet. Welcome to Xythos WFS. This program allows you to share files with others over the Internet. When you store a file within your WFS account, you can make it selectively available to be viewed, edited, deleted,

More information