secure copy 5 5 user guide
TRANSCRIPT
-
8/3/2019 Secure Copy 5 5 User Guide
1/76
Secure CopyVERSION5
User Guide
-
8/3/2019 Secure Copy 5 5 User Guide
2/76
SECURE COPY5.5USER GUIDE II
UPDATED 18JANUARY 2011
Copyright2011byScriptLogicCorporationAllrightsreserved.
ThispublicationisprotectedbycopyrightandallrightsarereservedbyScriptLogic
Corporation.Itmaynot,inwholeorpart,becopied,photocopied,reproduced,translated,
orreducedtoanyelectronicmediumormachinereadableformwithoutpriorconsent,in
writing,fromScriptLogicCorporation.ThispublicationsupportsSecureCopy5.x.Itispossiblethatitmaycontaintechnicalortypographicalerrors.ScriptLogicCorporation
providesthispublicationasis,withoutwarrantyofanykind,eitherexpressedorimplied.
ScriptLogicCorporation
6000BrokenSoundParkwayNW
BocaRaton,Florida334872742
1.561.886.2400
www.scriptlogic.com
TrademarkAcknowledgements:
SecureCopyisaregisteredtrademarkofScriptLogicCorporationintheUnitedStates
and/orothercountries.Thenamesofothercompaniesandproductsmentionedhereinmay
bethetrademarksoftheirrespectiveowners.
http://www.scriptlogic.com/http://www.scriptlogic.com/ -
8/3/2019 Secure Copy 5 5 User Guide
3/76
SECURE COPY5.5USER GUIDE III
UPDATED 18JANUARY 2011
DOCUMENTATIONCONVENTIONS
Typeface Conventions
BoldIndicates a button, menu selection, tab, dialog box title, text to type,selections from drop-down lists, or prompts on a dialog box.
CONTACTINGSCRIPTLOGIC
ScriptLogicmaybecontactedaboutanyquestions,problems.orconcernsyoumayhave.
ScriptLogicCorporation
6000BrokenSoundParkwayNW
BocaRaton,Florida334872742
561.886.2400 SalesandGeneralInquiries
561.886.2450 TechnicalSupport
561.886.2499 Fax
www.scriptlogic.com
SCRIPTLOGIC ON THE WEBScriptLogiccanbefoundonthewebatwww.scriptlogic.com.Ourwebsiteoffers
customersavarietyofinformation:
Downloadproductupdates,patchesand/orevaluationproducts.
Locateproductinformationandtechnicaldetails.
FindoutaboutProductPricing.
SearchtheKnowledgeBaseforTechnicalNotescontaininganextensivecollectionoftechnicalarticles,troubleshootingtipsandwhitepapers.
SearchFrequently
Asked
Questions,
for
the
answers
to
the
most
common
non
technicalissues.
ParticipateinDiscussionForumstodiscussproblemsorideaswithotherusersandScriptLogicrepresentatives.
http://www.scriptlogic.com/http://www.scriptlogic.com/http://www.scriptlogic.com/http://www.scriptlogic.com/ -
8/3/2019 Secure Copy 5 5 User Guide
4/76
SECURE COPY5.5USER GUIDE IV
UPDATED 18JANUARY 2011
ContentsWHAT IS SECURE COPY?.......................................................................................................................................1
USING SECURE COPY.............................................................................................................................................2
STARTING
SECURE
COPY
....................................................................................................................................2EXAMINING THE MAIN WINDOW.........................................................................................................................2
File Menu .......................................................................................................................................................3
Tools Menu.....................................................................................................................................................3
Help Menu......................................................................................................................................................3
Tool Bar..........................................................................................................................................................4
Navigation Pane.. ...........................................................................................................................................4
SETTING GLOBAL OPTIONS .................................................................................................................................6
Setting Copy Preferences................................................................................................................................6
Setting SMTP Settings ....................................................................................................................................8
Setting Help Desk Authority Settings..............................................................................................................9
SETTING PREFERENCES .....................................................................................................................................10
Setting Start Page Preferences.....................................................................................................................10
Setting Proxy Settings...................................................................................................................................11
Setting Logging Repository Default..............................................................................................................12
CREATING A NEW JOB.......................................................................................................................................13
USING THE JOB SUMMARY VIEW.......................................................................................................................14
USING THE JOB DETAILS VIEW..........................................................................................................................16
Setting the Copy Location.............................................................................................................................16
Setting General Options I.............................................................................................................................18
Setting General Options II............................................................................................................................21
Setting Advanced Options I ..........................................................................................................................22
Setting Advanced Options II.........................................................................................................................24
Migrating File Shares...................................................................................................................................27
Migrating Local Groups & Users ................................................................................................................29
Filtering Files...............................................................................................................................................32
RUNNING A JOB.................................................................................................................................................35
VIEWING JOB STATISTICS..................................................................................................................................36VIEWING JOB LOGS ...........................................................................................................................................36
SCHEDULING JOBS.............................................................................................................................................38
Managing Scheduled Jobs............................................................................................................................41
USING SECURECOPYCMD.EXE ..........................................................................................................................41
MANAGING LICENSES .......................................................................................................................................42
Viewing License Status .................................................................................................................................42
Applying a New License File........................................................................................................................43
APPLYING SECURE COPY OPTIONS ....................................................................................................................51
MAXIMIZING COPY PERFORMANCE...................................................................................................................51
SYNCHRONIZING TARGET CONTENTS WITH SOURCE.........................................................................................52
Single Source Path To Single Target Path ...................................................................................................53
Multiple Source Paths To Single Target Path ..............................................................................................57
USING MAP FILES .............................................................................................................................................62Copying Groups and Users ..........................................................................................................................62
Copying Files and Folders ...........................................................................................................................64
COPYING FOLDER STRUCTURES WITHOUT FILES ..............................................................................................66
CREATING LOG FILES........................................................................................................................................67
CREATING HELP DESK AUTHORITY TICKETS ....................................................................................................68
TROUBLESHOOTING ............................................................................................................................................69
REMOVING SECURE COPY 5 ..............................................................................................................................69
INDEX ...................................................................................................................................................................70
-
8/3/2019 Secure Copy 5 5 User Guide
5/76
SECURE COPY5.5USER GUIDE 1
UPDATED 18JANUARY 2011
WhatisSecureCopy?
SecureCopyisacomprehensivesolutionfordataduplication,localgroupanduser
migration,sharemigration,andNTFSpermissionsconfiguration.SecureCopypermits
seamlessmigration,allowinganadministratortocopyfilesanddirectoriesonNTFS
partitionswhilekeepingthesecurityintact,creatingshares,andmigratinglocalgroups.
Allofthisfunctionalityisavailableinaneasytouseinterface,whichkeepsyouupdated
oncopyprogress,aswellasanyerrorsthatmayoccur.
SecureCopyalsoincludesfunctionalitysuchasdifferentialcopying,fullcommandline
support,andschedulingjobstorunafterhours.SecureCopysupportsWindows
2000/XP/2003/Vista/7,WindowsServer2008,andWindowsServer2008R2environments
andis
compatible
with
the
Microsoft
Cluster
Service.
-
8/3/2019 Secure Copy 5 5 User Guide
6/76
SECURE COPY5.5USER GUIDE 2
UPDATED 18JANUARY 2011
UsingSecureCopy
STARTINGSECURE COPY
ClickStart,pointtoProgramsScriptLogicCorporationSecureCopy5,andthenchoose SecureCopy5.Eachtimeyouruntheprogramyouaregreetedbythesplash
screen,whichdisplaystheinitializationoftheprogramandthecurrentversionnumber.
EXAMINING THE MAINWINDOW
WhenyoufirstopenSecureCopy,theJobSummaryViewpagedisplaysthesettingsfor
aDefault
job.
-
8/3/2019 Secure Copy 5 5 User Guide
7/76
SECURE COPY5.5USER GUIDE 3
UPDATED 18JANUARY 2011
File Menu
Note:ManyoftheFilemenuoptionsareavailableontheToolBarandshortcutmenus.
Menu Option Description
New
Restore settings on all tabs to the default to create and
name a new job.
Rename Rename the selected job.
Save Save all settings for the current job.
Save As Create a new job by editing a saved job.
Run Initiate the selected copy job.
Test Test the selected copy job. No files are copied.
Delete Remove a saved job from the list.
ScheduleOpen the Windows Scheduler to schedule the selected
job to run at a specified time.
Exit Close Secure Copy. You also can click .
Tools Menu
Menu Option Description
OptionsSet the number of threads, batch size, batch count, andproxy settings.
Preferences Set start page and proxy settings preferences.
Help Menu
Menu Option DescriptionHelp Open the online help for Secure Copy.
License View license status and apply a license file.
FeedbackGo to the ScriptLogic Product Feedback Page whereyou can request information and send productsuggestions.
Support Go to the ScriptLogic Support page.
AboutView information about the version of Secure Copyinstalled on your computer.
-
8/3/2019 Secure Copy 5 5 User Guide
8/76
SECURE COPY5.5USER GUIDE 4
UPDATED 18JANUARY 2011
Tool Bar
Note:ManyoftheToolBarbuttonsareavailableontheFilemenuandshortcutmenus.
Button Tool Tip Description
New JobRestore settings on all tabs to the default to create and name anew job.
Save Job Save all settings for the current job.
Save Job As Create a new job by editing a saved job.
Delete Job Remove a saved job from the list.
Run Job Initiate the selected copy job.
Test Job Test the selected copy job. No files are copied.
Schedule JobOpen the Windows Scheduler to schedule the selected job torun at a specified time.
Help Open the online help for Secure Copy.
Navigation Pane
Youcanhidebuttonstoincreasetheareafornavigationandrearrangethedisplayorder
ofthebuttons.
Button Description
Display the Jobs list and the Job Summary View page. SeeUsing the Job Summary View.
Display the Job Statistics View page. See Viewing JobStatistics.
Display the Job Logs View page. See Viewing Job Logs.
-
8/3/2019 Secure Copy 5 5 User Guide
9/76
SECURE COPY5.5USER GUIDE 5
UPDATED 18JANUARY 2011
Tohidebuttons,dragthesplitbardown.Youcanalsoclick ,andthenselectShowFewerButtons.
Toshowbuttons,dragthesplitbarup.Youcanalsoclick ,andthenselectShowMoreButtons.
Showing All Buttons Showing No Buttons
Torearrangethebuttondisplayorder,click ,andthenselectNavigationPaneOptions.TheNavigationPaneOptionsboxdisplaysthecurrentdisplayorder.
Tohideabutton,clearthecheckbox.
Tomoveaselectedbuttonupthelist,click .
Tomoveaselectedbuttondownthelist,click .
-
8/3/2019 Secure Copy 5 5 User Guide
10/76
SECURE COPY5.5USER GUIDE 6
UPDATED 18JANUARY 2011
SETTINGGLOBALOPTIONS
IntheOptionsbox,youdefinethedefaultsettingsforallnewlycreatedcopyjobs.Once
youcreateajob,youcanoverridethesesettings.
Setting Copy Preferences
FromtheToolsmenu,chooseOptions.TheCopyPreferencestabdisplays.
Note:Thesesettingsapplytoallnewlycreatedcopyjobs.Foreachindividualcopy
job,youcanoverridethesesettingsontheAdvancedOptionsItab.SeeSettingAdvancedOptionsI.
Thread Settings
Dependingonthenumberandsizeofthedatafilestobecopied,youcanmodifythe
settingsforthenumberofthreads,batchsize,andbatchcount.
Thread Count (2-10)
Selectthenumberofcopythreadsforanindividualcopyjob.Thenumberofthreads
isequivalenttothenumberofcopyjobsthatcanbeperformedsimultaneously.
Theminimumis2andthemaximumis20.
Whenmovingalargenumberofsmallfiles,youcanincreasethenumberof
threadstowardsthemaximumnumberof20threads.Withmorethreadsperjob,
largenumbersoffilescanbemovedintheshortestperiodoftime.
Whenmovinglargerfiles,usingfewerthreadsismoreeffectivebecausethe
threadsareabletofocusonmovingafewlargefiles,switchingcontrolbetween
fewthreadsinafluidprocessratherthanpassingcontroltomultiplethreads,
whichwouldslowdownthecopyprocess.
-
8/3/2019 Secure Copy 5 5 User Guide
11/76
SECURE COPY5.5USER GUIDE 7
UPDATED 18JANUARY 2011
Batch Count (25-100)
Selectthemaximumnumberoffilesinanindividualcopyjob.BatchCountisa
limiterbasedonthenumberoffilesathreadcanprocessatatime.Whenajobis
beingprocessed,asinglethreadcopieseitherthemaximumnumberoffilesinthe
batchcountorthemaximumbatchsize,whicheverisreachedfirst.Theminimum
numberoffilesis25andthemaximumis100.
Whenprocessingalargenumberofsmallfiles,itispreferabletosetthebatch
counttothehighestlevelforefficiency.
Whenprocessinglargefiles,thebatchcountcanbesetanywherebecausethe
batchsizelimitationwillbemetbeforethebatchcountlimitismet.
Important:Inmostcases,thedefaultvaluesareoptimal.Changingthesevalues
incorrectlycanleadtoperformancedegradation.
Batch Size (1-10 MB)
Selectthemaximumnumberofbytesinanindividualcopyjob.BatchSizeisalimiter
basedonthesizeofthefilesathreadcanprocessatatime.Whenajobisbeing
processed,asinglethreadcopieseitherthemaximumsizeoffilesorthemaximum
numberoffiles,whicheverisreachedfirst.Theminimumis1MBandthemaximum
is10MB.
Whenprocessingalargenumberofsmallfiles,itispreferabletosetthebatch
sizetothehighestlevelforefficiency.
Whenprocessinglargefiles,thebatchsizecanbesetanywherebecausethebatch
sizelimitationwillbemetpriortomeetingthelimitofthebatchcount.
Important:Inmostcases,thedefaultvaluesareoptimal.Changingthesevalues
incorrectlycanleadtoperformancedegradation.
Retry Settings
Retry Attempts
Choosethenumberoftimestoattemptaretryonlockedfiles.Theminimumnumber
ofattemptsis0andthemaximumis100.Thedefaultsettingis5retryattempts.
Minutes Between Retries
Choosethenumberofminutestowaitbetweeneachretryonlockedfiles.Thedefault
is30minutes.
-
8/3/2019 Secure Copy 5 5 User Guide
12/76
SECURE COPY5.5USER GUIDE 8
UPDATED 18JANUARY 2011
Setting SMTP Settings
FromtheToolsmenu,chooseOptions.TheOptionsboxopenstotheCopy
Preferencestab.OpentheSMTPSettingstab.
Note:Thesesettingsapplytoallnewlycreatedcopyjobs.Foranindividualcopyjob,
youcan
override
these
settings
on
the
Advanced
Options
II
tab.
Select
the
Send
EmailNotificationcheckbox,andthenclick .SeeSettingAdvancedOptionsII.
EntertheSMTPserverhostname,port,usernameandpassword,andavalidemailaddresstoappearintheFromfieldontheemail.
Youcansendatestemailbyclicking .
-
8/3/2019 Secure Copy 5 5 User Guide
13/76
SECURE COPY5.5USER GUIDE 9
UPDATED 18JANUARY 2011
Setting Help Desk Authority Settings
IfyouuseHelpDeskAuthoritytotrackserviceticketsfordatatransfersandmigrations,
youcancreateaHelpDeskAuthorityticketforthecopyjob.SeeCreatingHelpDeskAuthorityTickets.1. From
the
Tools
menu,
choose
Options.
The
Options
box
opens
to
the
Copy
Preferencestab.OpentheHelpDeskAuthoritySettingstab.
Note:Thesesettingsapplytoallnewlycreatedcopyjobs.Foranindividualcopyjob,
youcanoverridethesesettingsontheAdvancedOptionsIItab.SelecttheSend
EmailNotificationcheckbox,andthenclick .SeeSettingAdvancedOptionsII
2. IntheEmailAddressbox,typetheemailaddressthatisconfiguredinUserName
boxontheHDMailsMailServer(ReceiveEmail)areaoftheMailServertab.
3. IntheSubjectLineandEmailMessageboxes,typedefaulttextthatwillbeusedfor
allnewlycreatedjobs.
-
8/3/2019 Secure Copy 5 5 User Guide
14/76
SECURE COPY5.5USER GUIDE 10
UPDATED 18JANUARY 2011
SETTING PREFERENCES
Setting Start Page Preferences
Onthemainpages,youhavethechoicetomakethatpagetheonethatdisplayswhen
you
start
Secure
Copy.
Ifyouwanttochangetoanotherpageonstartup,youcanopenthatpageandselectthe
AlwaysusethisasstartpagecheckboxorselectapagefromPreferences.
FromtheToolsmenu,choosePreferences,andthenselectapagetoopenatstartup:
JobSummaryView,JobDetailsView,JobStatisticsView,orJobLogsView.
Close copy window automatically when no errors occur
Whenrunningajob,youcanchoosetoclosethecopywindowwhennoerrorsoccur.
Ifyouwanttokeepthewindowopenonceyouveselectedthecheckbox,clearthe
checkboxhere.
-
8/3/2019 Secure Copy 5 5 User Guide
15/76
SECURE COPY5.5USER GUIDE 11
UPDATED 18JANUARY 2011
Setting Proxy Settings
FromtheToolsmenu,choosePreferences,andthenopentheProxySettingstab.
Proxy Server
Use Proxy Server
Selectifyouareusingaproxyserver.
Proxy Server Address
Entertheaddressoftheproxyserver.
Proxy Server PortEntertheportnumber.Thedefaultis25.
User Name and Password
Proxy Server Requires User And Password
Selectiftheproxyserverrequiresausernameandpassword,andthenentertheuser
nameandpasswordinthecorrespondingboxes.
-
8/3/2019 Secure Copy 5 5 User Guide
16/76
SECURE COPY5.5USER GUIDE 12
UPDATED 18JANUARY 2011
Setting Logging Repository Default
OntheJobLogsViewpage,youcansetthedefaultfortheRepositorylocation.
SeeViewingJobLogs. FromtheToolsmenu,choosePreferences,opentheLoggingSettingstab,andthen
typeapath
in
the
Logging
Repositorybox.
-
8/3/2019 Secure Copy 5 5 User Guide
17/76
SECURE COPY5.5USER GUIDE 13
UPDATED 18JANUARY 2011
CREATING A NEWJOB
1. Click .Alternatively,chooseNewfromtheFilemenu,orrightclickintheJobslist,
andthenchooseNewJobfromtheshortcutmenu.TheCreateNewJobboxopens.
2. IntheEnterTheNewJobNamebox,typeanameforthecopyjob.Youcanuseany
combinationofalphanumericcharacterstocreateacompletedescription.
3. Click .ThecopyjobnamedisplaysintheJobslist.
Note:TheJobslistisnotadjustable,butyoucanusethescrollbartoseetheentire
jobnameorpointtoaselectedname.
Note:Tochangethejobname,selectthename,andthenchooseRenamefromthe
Filemenu.Alternatively,rightclickthejobname,andthenchooseRenamefromthe
shortcutmenu.
YoucanusetheJobSummaryViewortheJobDetailsviewtosettheoptionsforthe
copyprocess.SeeUsingtheJobSummaryVieworUsingtheJobDetailsView.
-
8/3/2019 Secure Copy 5 5 User Guide
18/76
SECURE COPY5.5USER GUIDE 14
UPDATED 18JANUARY 2011
USING THE JOBSUMMARYVIEW
OntheJobSummaryViewpage,youcansetbasiccopyjoboptionsquickly.Atthe
minimum,youneedtodefinethesourceandtargetpaths.TheSettingsareaprovidesa
fastwaytoselectoptionsforthecopyprocess.Tosetadditionaloptions,usetheJob
DetailsView.SeeUsingtheJobDetailsView.
Choosethepathtothesourceandtarget.
Note:Toselectadditionaloptions,clickSwitchtoJobDetailsView.SeeSettingtheCopyLocation.Settings
Copy changed files and do not synchronize the target folder contents with the source
Bydefault,onlychangedsourcefilesarecopiedtothetarget.Ifyouwanttocopyallthefiles,clickCopychangedfilestotoggletoCopyallfiles.
Bydefault,thecontentsofthetargetfolderisnotsynchronizedwiththesource.Ifyouwantorphanedfilesandfolderstobepurgedonthetarget,clickdonot
synchronizetotoggletosynchronize.
Note:Toselectadditionaloptions,clickSwitchtoJobDetailsView,andthenopen
GeneralOptionsI.SeeSettingGeneralOptionsI.
-
8/3/2019 Secure Copy 5 5 User Guide
19/76
SECURE COPY5.5USER GUIDE 15
UPDATED 18JANUARY 2011
Do not send an email notification when my job completes.
Bydefault,anemailnotificationisnotsentwhenthecopyjobcompletes.Ifyouwantto
sendanemail,clickDonotsendanemailnotification,andthenenteranemailaddress.
Note:Toselectadditionaloptions,clickSwitchtoJobDetailsView,andthenopen
AdvancedOptions
II.SeeSettingAdvancedOptionsII.
Ignore offline/stub files
Bydefault,stubfilesareskippedduringthecopyprocess.Tocopystubfiles,which
resultsintheoriginalfilebeingrecalledfromstorage,clickIgnoreoffline/stubfilesto
toggletoRecalloffline/stubfilesfromsourceandcopythemtothetarget.
Note:Toselectadditionaloptions,clickSwitchtoJobDetailsView,andthenopen
GeneralOptionsII.SeeSettingGeneralOptionsII.
Do not migrate file shares from the source to the targetBydefault,filesharesarenotmigratedtoadestinationserver.Tomigratefileshares
toatargetserver,clickDonotmigratefilesharestotoggletoMigratefileshares.
Note:Toselectadditionaloptions,clickSwitchtoJobDetailsView,andthenopen
FileShares.SeeMigratingFileShares.Do not migrate local groups and users from the source to the target
Bydefault,localgroupsandusersarenotmigrated.Ifyouwanttomigratelocal
groupsandusersfromthesourcetothetarget,clickDonotmigratelocalgroupsand
userstotoggletoMigratelocalgroupsandusers.
Note:Toselectadditionaloptions,clickSwitchto
Job
Details
View,andthenopen
LocalGroups&Users.SeeMigratingLocalGroups.Actions
Run this job now
Clicktoruntheselectedcopyjob.SeeRunningaJob.Test this job
Clicktotesttheselectedcopyjob.SeeRunningaJob.Schedule this job
Clicktoscheduletheselectedcopyjob.SeeSchedulingJobs.View job logs
ClicktoopentheSecureCopyLogspage.SeeViewingJobLogs.
-
8/3/2019 Secure Copy 5 5 User Guide
20/76
SECURE COPY5.5USER GUIDE 16
UPDATED 18JANUARY 2011
USING THE JOBDETAILSVIEW
TheJobDetailsViewoffersmoreoptionsforthecopyprocess.Youcansetbasicoptions
usingtheJobSummaryViewtoperformacopyjobquickly.SeeUsingtheJobSummaryView.Note:SecureCopymaintainsjobnamesandoptionsettingsintheSecureCopy.SSDfile,
whichislocatedintheSecureCopyinstallationdirectory.Ifnecessary,youcanmodifythisfileusingatexteditor,suchasNotepad.
Note:Aftermakingchanges,savethejobbyclicking .
Setting the Copy Location
Note:SecureCopywilltransferdatabetweenNTFS/FAT16/FAT32partitionsonly
(securitywillnotbemaintainedwhencopyingtoaFATpartition).CertainNAS
appliancemanufacturershavedevicesthatarecompatiblewithSecureCopy.
Button Description
Browse for the source and target paths.
Type the source and target paths.
Remove the selected paths.
-
8/3/2019 Secure Copy 5 5 User Guide
21/76
SECURE COPY5.5USER GUIDE 17
UPDATED 18JANUARY 2011
Create Initial Source Folder Under Target Folder
Bydefault,SecureCopycreatesafolderstructureonthetargetthatmimicsthefolder
structureinthesource.Toignorethesourcefolderstructure,clearthecheckbox.
Caution:IftheSynchronizeTargetwithSourcecheckboxisselectedontheGeneral
OptionsItab,andyoucopyfrommultiplesourcepaths,onlythosefilesinthelast
sourcefileinthelistaresynchronizedwiththetarget.Allotherfilesinthetargetaredeleted.SeeSettingGeneralOptionsI.TherearetwowaystoaddpathstotheSourcePathsandTargetPathsboxes:browsefor
apathortypeapathdirectly.
Browsing for a Path
1. OntheCopyLocationtab,click .TheBrowseforFolderlistboxopens.
2. Expandthelist,andthenselectthepathstocopy(source)andtocopyto(target).
3. ClickOK.
Typing a Path
1. OntheCopyLocationtab,click .TheAdd
Path
boxopens.
2. Typeapathforthefolder,andthenclickOK.
Note:Ifyoutypeapaththatdoesnotexist,youareaskedifyouwanttocreateit.
-
8/3/2019 Secure Copy 5 5 User Guide
22/76
SECURE COPY5.5USER GUIDE 18
UPDATED 18JANUARY 2011
Setting General Options I
Copy Only Changed Source Files to Target
Selecttocopyonlyfilesthatarechanged.Ifthesourceandtargethavefileswiththesame
name,SecureCopycomparesthefilesizeandtime/datestamp.Ifthefilesizeisdifferentorthe
targetfileisolderthanthesourcefile,SecureCopyoverwritesthetargetwiththesource.Thetargetisnotpurged;filesandfoldersthatareinthetarget,butnotinthesource,remaininthe
targetafterthecopyprocesscompletes.Ifthetargetpathisempty,allfilesandfoldersare
copiedfromthesourcetothetarget.
Ignore NTFS/FAT Time Differences Up to 2 Seconds
Selecttoskipfileswherethelastmodifieddateandtimediffersbylessthan2
seconds.ActiveonlywhenCopyOnlyChangedSourceFilestoTargetisselected.
Filetimegranularityis100nanosecondsonNTFSand2secondsonFAT,socopyingafile
fromNTFStoFATcausesfiletimestoberoundedtoavaluethattheFATfilesystemcan
manage.WhenboththesourceanddestinationvolumesareNTFS,thefiletimesare
comparedexactly.
When
either
the
source
or
destination
volume
is
not
an
NTFS
volume,
SecureCopyconsidersfiletimestobeidenticaliftheyarewithin2secondsofeachother.
Withoutthis2secondmargin,SecureCopymightclassifyunmodifiedfilesasolderor
newerfiles,whichwouldresultinunnecessarycopyingofunchangedfiles.
Sometimesyoumaywanttooverridethishandlingoffiletimes.Forexample,you
copyanNTFStreetoaFATvolume.SecureCopyroundsthefiletimes.Youthencopy
theFATtree(withitsroundedfiletimes)toalocalNTFSdrive.Later,whenyouwant
torecreatetheoriginaltreeexactly,youdonotwanttorefreshtheentiretree.
-
8/3/2019 Secure Copy 5 5 User Guide
23/76
SECURE COPY5.5USER GUIDE 19
UPDATED 18JANUARY 2011
Always Copy Permissions, Even On Skipped Files
Selecttocopythepermissionsofsourcefilesandfoldersfromthesourcetothe
target,evenifthefilesandfoldersareexactlythesame.Thisoptionishelpfulina
situationwherethepermissionswerechangedonthesource,butthefileswerenot
modified.Thecopyprocessskipsthefilesbecauseofthefilesizeandtime/date
stampareidentical.Ifthisoptionisselected,thepermissionsarecopiedevenifthe
fileisnot.
Copy All Files From Source To Target
Selecttocopyallfilesandfoldersfromthesourcetothetarget.Ifthesourceandtarget
havefilesandfolderswiththesamename,SecureCopyoverwritesthetargetwiththe
source.Thetargetisnotpurged;filesandfoldersthatareinthetarget,butnotinthe
source,remaininthetargetafterthecopyprocesscompletes.Ifthetargetpathisempty,
allfilesandfoldersarecopiedfromthesourcetothetarget.
Synchronize Target Contents with Source
Selecttoactivatetheoptionsforsynchronizingthetargetwiththesource.Forspecific
examplesonusingthisoption,seeSynchronizingTargetContentswithSource.Note:Whenpurgingfilesduringthesynchronizationprocess,thesourceandtargetmachinesandpathsasdefinedbythejobmustbecompared,andthenadjustedor
purgedaccordingly.Becausethepurgerequiresthecomparisonofthesourceandtarget
directoriesandfiles,theprocesscouldextendthedurationofthedatamigration.
Purge Orphaned Files/Folders on the Target
Selecttomakeallfilesandfoldersinthetargetidenticaltothoseinthesource.This
optionsdeletesfilesorfoldersinthetargetthatalsodonotexistinthesource.
Important:Onlyselectthisoptionwithasinglesourcepathandasingletarget.
Important:IftheCreateinitialsourcefolderundertargetfoldercheckboxonthe
CopyLocationtabisnotselected,thepurgedoesnotoccur.SeeSettingtheCopy
Location.
Purge Orphaned Files/Folders in SUBFOLDERS of the Target
Selecttomakeallsubfoldersinthetargetidenticaltosubfolderswiththesamename
inthesource.Thisoptiondeletesfilesandfoldersinthetargetsubfoldersthatalsodo
notexistinsubfolderswiththesamenameinthesource.
Important:Onlyselectthisoptionwithmultiplesourcepathsifyouarecertainthat
noneofthesourcepathshavesubfolderswithduplicatenames.
Override Security on Access Denied (You must be an administrator)
Selecttooverridesecuritywhenaccessisdenied.Allowsanadministratortoperforma
copywithoutchanginganyofthepermissionsorownershipfortheobjects.
Inatraditionalcopyprocess,ausermusthavepermissionsonafileorfoldertocopyit.If
theuserisdeniedaccess,theymustfirsttakeownershipoftheobject,andthensetthe
appropriatepermissionsbeforecopyingit.Imaginethenightmarescenarioofmigrating
10,000userhomeandprofiledirectoriesfromoneservertoanother.Thesedirectories
wouldtakeforevertorepermissionandcopy.
-
8/3/2019 Secure Copy 5 5 User Guide
24/76
SECURE COPY5.5USER GUIDE 20
UPDATED 18JANUARY 2011
Dont Copy Permissions (Copy data only)
Selecttocopydataonly.Copyingthepermissionsondataisnotalwaysnecessaryfor
everycopyjob.Ausermayjustwanttomigratedatafromonedrivetoanother,orfrom
oneservertoanother.
Generate Log File
Selectto
write
the
information
about
the
copy
job
progress
to
atext
file.
See
Creating
Log
Files.
Note:GenerationoflogfilesrequiresadditionalI/Oontheconsolemachineplusthe
retrievaloftheinformationonthesuccessandfailureoftheindividualfilesandfolder.
Click toselectalocationandspecifyanameforthelogfile.
Afterthelogfileisgenerated,click toviewthefilecontents.
Verbose Logging
Selecttocapturedetailinalogtextfile.AvailableonlyiftheGenerateLogFilecheckbox
isselected.SeeCreatingLogFiles.
-
8/3/2019 Secure Copy 5 5 User Guide
25/76
SECURE COPY5.5USER GUIDE 21
UPDATED 18JANUARY 2011
Setting General Options II
Map Folders and Files
Selecttospecifyatextfilethatmapssourcefolderstodestinationfoldersforcomplicated
jobswhereyoumightbecreatingnewfoldersandthenmappingoldfolderstothesenew
folders.SeeUsingMapFiles. Click toselectatextfileortypethepathintheMapFilePathbox.
Afterthetextfileisselected,click toviewthefilecontents.
Allow Copy of Encrypted Files as Unencrypted if Encryption fails
SelecttocreateanunencryptedfileonthetargetifSecureCopycannotencryptthe
copiedfile.Whencopyingafilethatisencryptedonthesource,SecureCopyattemptsto
encryptafileonthetargetusingEFS.IfSecureCopyisunabletoencryptthefileonthe
target,thecopywillfailunlessthisoptionisselected.
Copy Off-line Files/Stub Files
Selecttocopyfilesthatareonanofflinestoragedevice,resultingintheoriginalfilebeingrecalledfromofflinestorage.Ifthisoptionisnotselected,offline/stubfilesareskipped.
Synchronize Archive Bit on Source and Target
Selecttosetthearchivebitonthetargetfolderorfiletobethesameasthesource.
Clear Archive Bit on Source After Copying
Selecttoclearthearchivebitonthesourcefileafteritiscopied.Otherwisethearchivebit
willremainuntouched.
-
8/3/2019 Secure Copy 5 5 User Guide
26/76
SECURE COPY5.5USER GUIDE 22
UPDATED 18JANUARY 2011
Setting Advanced Options I
Reset Last Accessed Date on Source Files
CopyingfilesandpermissionscausestheLastAccessedDatetobesettothecurrent
date.SelectthisoptiontochangetheLastAccessedDatetothedatelastaccessedbefore
thecopy,whichisusefulifyouwanttolateraudityourfilestoseeiftheyneedtobearchivedordeleted.Selectingthisoptionalsopreventsthecopyprocessfrominterfering
withWindows2000/XP/2003/Vistafeatures,suchasRemoteStorage.
Synchronize Last Accessed Date and Created Date on Target with Source
Usewhenyouwantthecopyonthetargettobeidenticaltothecopyonthesource.This
specificallyincludestheLastAccessedDateandtheCreatedDate.Ifthisoptionisnot
checked,thisinformationcomesfromthesettingsthattheoperatingsystemsets
automatically.
Synchronize Last Accessed Date and Modified Date on Target Folder with Source
Whenafileiscopiedtoatargetfolder,theLastModifiedandLastAccesseddatesonthe
target
folder
are
updated
to
reflect
the
date
the
copy
occurred.
Select
this
option
to
reset
thedatesonthetargetfoldertomatchthedatesonthesourcefolder.
Verify File Copy
SelecttocompareaCRC32checksumofthefilebeingcopiedtothesourceandtarget.
Note:Verifyingthefilecopyisatime,I/O,andprocessorintensiveactivitybecauseit
comparesthechecksumsofthesourceandtargetfiles.Selectingthisoptioncould
considerablyextendthetimerequiredtocompletethedatamigration.
-
8/3/2019 Secure Copy 5 5 User Guide
27/76
SECURE COPY5.5USER GUIDE 23
UPDATED 18JANUARY 2011
Thread Count (2-20)
Selectthenumberofcopythreadsforanindividualcopyjob.Thenumberofthreadsis
equivalenttothenumberofcopyjobsthatcanbeperformedsimultaneously.
Theminimumis2andthemaximumis20.
Whenmovingalargenumberofsmallfiles,youcanincreasethenumberofthreads
towards
the
maximum
number
of
20
threads.
With
more
threads
per
job,
large
numbersoffilescanbemovedintheshortestperiodoftime.
Whenmovinglargerfiles,usingfewerthreadsismoreeffectivebecausethethreads
areabletofocusonmovingafewlargefiles,switchingcontrolbetweenfewthreads
inafluidprocessratherthanpassingcontroltomultiplethreads,whichwouldslow
downthecopyprocess.
Batch Count (25-100)
Selectthemaximumnumberoffilesinanindividualcopyjob.BatchCountisalimiter
basedonthenumberoffilesathreadcanprocessatatime.Whenajobisbeing
processed,asinglethreadcopieseitherthemaximumnumberoffilesinthebatchcount
orthemaximumbatchsize,whicheverisreachedfirst.Theminimumnumberoffilesis
25and
the
maximum
is
100.
Whenprocessingalargenumberofsmallfiles,itispreferabletosetthebatchcount
tothehighestlevelforefficiency.
Whenprocessinglargefiles,thebatchcountcanbesetanywherebecausethebatch
sizelimitationwillbemetbeforethebatchcountlimitismet.
Important:Inmostcases,thedefaultvaluesareoptimal.Changingthesevalues
incorrectlycanleadtoperformancedegradation.
Batch Size (1-10MB)
Selectthemaximumnumberofbytesinanindividualcopyjob.BatchSizeisalimiterbased
onthesizeofthefilesathreadcanprocessatatime.Whenajobisbeingprocessed,asingle
threadcopieseitherthemaximumsizeoffilesorthemaximumnumberoffiles,whicheverisreachedfirst.Theminimumis1MBandthemaximumis10MB.
Whenprocessingalargenumberofsmallfiles,itispreferabletosetthebatchsizeto
thehighestlevelforefficiency.
Whenprocessinglargefiles,thebatchsizecanbesetanywherebecausethebatch
sizelimitationwillbemetpriortomeetingthelimitofthebatchcount.
Important:Inmostcases,thedefaultvaluesareoptimal.Changingthesevalues
incorrectlycanleadtoperformancedegradation.
Retry on Locked File
Requests
a
retry
of
any
files
that
were
not
copied
during
the
initial
pass
through
the
directorystructure.
Retry Attempts
Choosethenumberoftimestoattemptaretryonlockedfiles.ActiveonlyifRetryon
lockedfileisselected.
Minutes Between Retries
Choosethenumberofminutestowaitbetweeneachretryonlockedfiles.Activeonlyif
Retryonlockedfileisselected.
-
8/3/2019 Secure Copy 5 5 User Guide
28/76
SECURE COPY5.5USER GUIDE 24
UPDATED 18JANUARY 2011
Setting Advanced Options II
Never Compress Target Files
Selecttodisregardanyfileorfoldercompressionthatmayexistonthesourceortarget.
Copiesallfilesandfoldersuncompressed.Thisoptionoffersthegreatestspeedforthe
copyprocess,andisrecommendedifthereisnotaspacerequirementonthetarget.
Always Compress Target Files
Selectonlyincaseswhenspaceisapremiumasitaddssubstantialoverheadandtimeto
thecopyjob.Thisoptionalsoaddstothefragmentationonthetargetvolume.Useonlyif
absolutelynecessary.
Compress Target Files Only if Source is Compressed
Selecttocompressthefilesandfoldersonthetargetiftheyarecompressedonthesource.
Thisoptionprovidesconsistencyamongthefilesystemsonthesourceandtarget,but
alsoaddstothetimerequiredtoperformtheprocess.Useonlyifnecessary.
Note:CompressionisnotperformedbySecureCopy;itisperformedbytheoperating
system.Thecompressionfunctionisperformedatthesametimeasthewritefunction,whichcouldextendthewritetimeofthefileandthusextendthedurationofdata
migration.
-
8/3/2019 Secure Copy 5 5 User Guide
29/76
SECURE COPY5.5USER GUIDE 25
UPDATED 18JANUARY 2011
SID History
Update ACLs Which Use SID History
SelecttoupdateACLswithnewSIDsfortheobjectsbeingmigratedandtoremovetheir
SIDhistory.Duringamigration,theSIDsoftheobjectsbeingmigratedarechecked
againsttheSIDHistoryspecifiedintheLDAPdomainpathbox.IftheSIDsoftheobjects
beingmigrated
are
on
the
list,
the
ACLs
are
updated
with
new
SIDs
for
the
migrated
objectsandtheirSIDhistoryiscleared.
Email Options
Send Email Notification:
Selecttosendanemailnotificationwheneitherajobhascompletedorhasnotcompleted
byaspecifieddateandtime.
When Job Completes
Selecttosendanemailtothespecifiedrecipientswhenthecopyjobcompletessuccessfully.
If Job Has Not Completed By
Selecttosendanemailtothespecifiedrecipientsonlyifthecopyjobhasnot
completedby
the
date
and
time
specified.
To
change
the
date
and
time,
click
an
item
inthebox,andthenusethearrowkeystochangethevalue.
If Job Is Not Completed Within HH:MM:SS
Selecttosendanemailtothespecifiedrecipientsonlyifthecopyjobhasnot
completedwithinthetimeperiodspecified.Tochangethetimeperiod,clickanitem
inthebox,andthenusethearrowkeystochangethevalue.
Toaddrecipients,click ,typetherecipientsname,andthenclick .
Toremoveaselectednamefromthelist,click .
-
8/3/2019 Secure Copy 5 5 User Guide
30/76
SECURE COPY5.5USER GUIDE 26
UPDATED 18JANUARY 2011
Tosetupemail,click .
EntertheSMTPserverhostname,port,usernameandpassword,andavalidemailaddresstoappearintheFromfieldontheemail.
IfyouuseHelpDeskAuthoritytotrackserviceticketsfordatatransfersandmigrations,youcancreateanHelpDeskAuthorityticketforthecopy
job.SelecttheCreateHelpDeskAuthorityTicketcheckbox.SeeCreatingHelpDeskAuthorityTickets.
Youcansendatestemailbyclicking .
-
8/3/2019 Secure Copy 5 5 User Guide
31/76
SECURE COPY5.5USER GUIDE 27
UPDATED 18JANUARY 2011
Migrating File Shares
SecureCopyallowsthemigrationoffilesharesfromoneservertoanotherserverorto
multipleservers.SecureCopyrecreatesthefilesharesofthesourceserveronthetarget
serverwithsharepermissionsintact,whichgreatlyreducesthetimeforfileshare
creationonthetargetserver.
Migrate File Shares to Destination Server
SecureCopyrecreatesonthetargetserver,thefilesharesthatareonthesourceserver.
Shareswhosefoldersarenotspecifiedinthesourcepathsarenotcopied.Inotherwords,
asSecureCopyrunsthecopyprocess,itcheckseachsourcepathanditssubfolderstosee
iftheyareshared.Ifso,andifthisoptionisspecified,SecureCopyrecreatestheshareon
thetargetcomputerandcreatestheappropriatesharepermissionsasdictatedbythoseof
thesource.
Thesuboptionsareusedifthesharenamealreadyexistsoriftheshareneedstobe
createdonaWindows2000/XP/2003/Vista/7,WindowsServer2008,orWindows2008R2
cluster.
If the share name already exists
Skip It (Ignore)
Ifasharealreadyexistsonthetarget,SecureCopydoesnotcreatetheshareonthetarget.
Overwrite (Remove old share, create new one)
Ifasharealreadyexistsonthetarget,SecureCopyunsharestheshareonthetarget,and
thenwritesoveritwiththesourceshare.
-
8/3/2019 Secure Copy 5 5 User Guide
32/76
SECURE COPY5.5USER GUIDE 28
UPDATED 18JANUARY 2011
Add the prefix
Add the suffix
Incaseswheretheremaybemultiplesharesofthesamenameandyouwanttorecreate
thesharesusingthenewfoldersfromthesource,butmanuallyrenamingtheshares
whenpromptedmaybeunfeasible,suchasinthecaseofascheduledjob,youcanhave
SecureCopyaddaprefixorasuffixtothenewsharename.Thisgivesauniformnaming
conventiontothenewsharesandpreventsunnecessaryuserintervention.
Cluster Group Name
ApplicableonlytoWindows2003.Ifyouarecopyingdatatoaclustergroup,typethenameoftheclustergroup.SecureCopymigratesthesharestothespecifiedclustergroup.
-
8/3/2019 Secure Copy 5 5 User Guide
33/76
SECURE COPY5.5USER GUIDE 29
UPDATED 18JANUARY 2011
Migrating Local Groups & Users
SecureCopyallowsanadministratortorecreatelocalgroupsandusersonatargetserver
ifthelocalgrouporuserhaspermissionsonthedatathatisbeingcopied.Whenthedata
iscopied,thesecurityshowsaSIDandanAccountUnknownbecausethelocalstorage
areamanagement(SAM)databaseonthetargetserverdoesnothaveanentryforthe
localgroup/useronthesourceserver.
Note:Whenmigratingalocalgroup,SecureCopysendsanRPCcalltothedomain
controllertovalidatethegroupsandthemembersofthegroup.Inastandardsingle
consolemigration,thegroupmigrationaddstotheoverheadandthusthetimeto
completethedatamigration.Itispossible,whenusingmultipleSecureCopyconsoles
thatareeachmigratingdataandthousandsoflocalgroups,eachwithhundredsof
members,thatSecureCopycanfloodadomaincontrollerwithRPCrequestsgenerating
RPCtimeouterrors.
Toavoidthesetypesofconflicts,youcanstagerthestartofthemigrationsorlimitthe
numberofthreadsbeingusedacrossallconsoles. Thesupportedmaximumtotalof
threadsis20however,asmanyas70havebeensuccessfullyusedwhenastaggeredstarttimeisutilized.SeeSettingAdvancedOptionsI.
Migrate Local Groups/Users to Destination Server
Selecttoenablefunctionalityavailableinthedialogbox.
Note:SecureCopyonlymigrateslocalgroupsanduserswhoalreadyhavepermissions
onthedatathatisbeingcopied.
-
8/3/2019 Secure Copy 5 5 User Guide
34/76
SECURE COPY5.5USER GUIDE 30
UPDATED 18JANUARY 2011
Migrate the following:
Copy Only Local Groups and Users Not Files
Selecttomigrateonlylocalgroupsandusers.Filesarenotmigrated.
Local Groups
Selecttomigratelocalgroupsfromthesourcetothetarget.
Local Users
Selecttomigratelocalusersfromthesourcetothetarget.
Set Password for migrated user accounts
Selecttoenterapasswordforthemigrateduseraccounts.Typethenewpasswordinthe
NewPasswordbox.
Select local group
Target Server
Selecttomigratelocalgroups/usersfromthesourceservertothetargetserver.
Active Directory
SelecttomigratelocalgroupsfromthesourceservertoanActiveDirectory
OrganizationalUnit(OU).TypeapathusingstandardLDAPformatintheDestination
OUbox,orclick tobrowseforanOU.
Always perform the following action
Selecttoalwaysaddaprefixorsuffixtothemigratedgroups/userstoavoidconflicts.
Thisoptionishelpfultoadministratorswhouselocalgroupsanduserswiththesame
namesonmanyserversthroughouttheenterprise.
Add the prefix
Add the suffix
Typetheprefixorsuffixinthebox.Addingaprefixorsuffixallowsadministrators
toenforceastandardnamingconvention,ortodifferentiatethemigratedgroupsand
usersfromtheiralreadyexistingcounterparts.
If the local group/user name already exists
Use the existing group/user
Ifalocalgroup/usernamealreadyexistsonthetarget,SecureCopyappliesthose
permissionstothemigrateddata.
Add members of the source group to existing group
Migratestheusersofagrouponthesourceservertothegroupwiththesamenameon
thetargetserver.
Synchronize target members with source members
Ifalocalgroup/useralreadyexistsonthetarget,thesourcelocalgroup/useroverwrites
thetarget.
-
8/3/2019 Secure Copy 5 5 User Guide
35/76
SECURE COPY5.5USER GUIDE 31
UPDATED 18JANUARY 2011
Add the prefix
Add the suffix
Incaseswheretheremaybemultiplelocalgroups/usersofthesamenameandmanually
renamingthelocalgroups/userswhenpromptedmaybeunfeasible,suchasinthecase
ofascheduledjob,youcanhaveSecureCopyaddaprefixorasuffixtothenewlocal
group/username.Thisgivesauniformnamingconventiontothenewlocalgroups/users
andpreventsunnecessaryuserintervention.
Select how BUILTIN groups are to be treated
Dont append users to Target servers BUILTIN group
SelecttonotappenduserstotheBUILTINgroupinthetargetserver.
Map File
Specify Map File
Selecttorenamespecificlocalgroupsduringamigrationbyapplyingthecontentsofa
maptextfile,whichcontainstheoldandnewnames.SeeUsingMapFiles. Tocreateamapfile,createatextdocumentinNotepad,addonelineforeachmap,
andthensavethefile.
ExampleServerAGroup = ServerBGroup
ServerALocalGroupB = ServerBLocalGroupB
Toselectthelocationofthemapfile,click .
Toviewthecontentsofthemapfile,click .
-
8/3/2019 Secure Copy 5 5 User Guide
36/76
SECURE COPY5.5USER GUIDE 32
UPDATED 18JANUARY 2011
Filtering Files
Applyingfiltersgivesadministratorscontroloverwhatcontentgetsmigrated,whichis
especiallyusefulfortheeliminationoffilesthatmaynotbenecessaryorappropriateina
corporateenvironment,suchasTMP,MP3,MOV,MPG,WMAoranyhundredsof
others.Conversely,applyingfilterscanallowformigrationsbasedonfiletypes.For
example,ifoneserverwillholddatasuchasmultimediaforacompany,asystemadministratorcanspecifythatonlythefilesforthatusewillgotothenewserver.Inthis
casetheymightcopyonlyJPG,MPG,SWF,MOV,WAV,oranyotherfilewithan
extensionthatmaybeofimportance.
Filter Files
Apply Filter to the Files
Selecttoapplythelistedfilterstofiles.Youcanfilterfilesbyfilenameorextension.
-
8/3/2019 Secure Copy 5 5 User Guide
37/76
SECURE COPY5.5USER GUIDE 33
UPDATED 18JANUARY 2011
Onlyfilesstartingwiththetextstring
Accounting,areincludedinthecopyjob.
Allfileswiththeextensions.tmp,.mp3,
and.wmvareexcludedfromthecopyjob.
Add a Filter
1. Click .TheAddFilterNameboxopens.
2. Typeafilter.Youcanfilterfileextensionsorfilenames.Enterfiltersoneatatime.
Tofilteranextension,youmustincludeanasteriskandadotseparator(for
example,*.txt).
Tofilterfilenamesbeginningwithaspecificstringoftext,usethefilterSTRING*
(forexample,TEST*returnsfilessuchasTEST_FILE.doc).
Tofilterfilenamesendingwithaspecificstringoftext,usethefilter*STRING(for
example,*TESTreturnsfilessuchasBOB_FILE_TEST.doc.
Tofilterfilenamescontainingaspecificstringoftext,usethefilter*STRING*(for
example,*TEST*returnsfilessuchasBOB_TEST_FILE.doc.
3. Click .
Include Files That Match These Filters
Includesthosefilesthatmatchthefilter(s)listedintheFilterslist.Activewhenthe
Applyfiltertothefilescheckboxisselected.
Exclude Files That Match These Filters
Excludesthosefileswiththefilters(s)listedintheFilterslist.ActivewhentheApply
filtertothefilescheckboxisselected.
Remove a Filter
IntheFilterslist,selectafilter,andthenclick .
Exclude the Following Folders
Excludesfoldersbasedontheirnames.Theasteriskwildcardissupported(New*would
filterafoldernamedNewFolder).Duringamigrationthismightbehelpfulforthe
eliminationoffoldersthatarenotnecessaryandcanberecreatedlater.Someexamples
aretempfoldersandTemporaryInternetFilesfolders.
Add a Folder
1. Click .TheAddFolder
Nameboxopens.
2. Typeafoldername,andthenclickOK.
-
8/3/2019 Secure Copy 5 5 User Guide
38/76
SECURE COPY5.5USER GUIDE 34
UPDATED 18JANUARY 2011
Remove a Folder
IntheFolderNamelist,selectafoldername,andthenclick .
Filter Files By Specified Date
Include Files Created Between Dates
Includesfilesthatwerecreatedbetweentheselectedstartandenddates.Fromthe
StartDate
andEnd
Datelists,selectstartandenddates.
Include Files Modified Between Dates
Includesfilesthatweremodifiedbetweentheselectedstartandenddates.Fromthe
StartDateandEndDatelists,selectstartandenddates.
Include Files Between These Sizes
Includesfileswhosesizeisbetweenthespecifiedminimumandmaximumsize.Inthe
MinsizeandMaxsizeboxes,typevaluesinkilobytes(KB).
Limit Folder Recursion Depth
Limitsthedepthofthesubfoldersbeneaththesourcefolderthatisselectedforcopy.In
theFolderdepthbox,typeavaluetorepresentthelevelofsubfolders(1=onelevel;2=
twolevels).
-
8/3/2019 Secure Copy 5 5 User Guide
39/76
SECURE COPY5.5USER GUIDE 35
UPDATED 18JANUARY 2011
RUNNING A JOB
Note:Beforerunningajob,click totestthejobtoseeifanyerrorsaregenerated.
Alternatively,clickTestthisjobontheJobSummaryViewpage,chooseTestfromthe
Filemenu,orrightclickajobintheJobslist,andthenchooseTestfromtheshortcut
menu.Nofilesarecopiedduringthetest.
1. SelectoneormorejobsfromtheJobsarea,andthenclick .Alternatively,
clickRunthisjobnowontheJobSummaryViewpage,chooseRunfromtheFile
menu,orrightclickajobintheJobslist,andthenchooseRunfromtheshortcut
menu.
Note:Ifyoumadeanychangestothecopyoptions,youarepromptedtosavethefile
beforecontinuing.
Thewindowopenstodisplaytheprogressofthejob.
Tocancelajobwhileitisrunning,click .
Ifanyerrorsoccurduringthejob,anexplanationandpathdisplays.Tosavetheerrorstoacomma/quotedelimitedlogfile(.txt),click ,locatea
destination,namethefile,andthenclick .
Important:Ifthecopyjobstopsforwhateverreason,youcanrestartthejobwithout
recopyingthefilesalreadycopied.SelecttheCopyOnlyChangedSourceFilesto
TargetcheckboxontheGeneralOptionsItab,andthenstartthejobagain.
SeeSettingGeneralOptionsI.Ifthejobissuccessful,amessagedisplaysinthewindowheader.
Note:TomaximizetheperformanceofSecureCopy,youcansetvariousoptionson
theAdvancedOptionsItabtoincreasethenumberofcopythreadsused.See
MaximizingCopyPerformance.
-
8/3/2019 Secure Copy 5 5 User Guide
40/76
SECURE COPY5.5USER GUIDE 36
UPDATED 18JANUARY 2011
2. IftheClosethiswindowautomaticallywhennoerrorsoccurcheckboxisselected,
thewindowclosesifthejobissuccessful;otherwise,click .
Note:Onceyouselectthisoption,usethePreferencesoptionontheToolsmenuto
resetthischeckbox.SeeSettingStartPagePreferences.Note:Ifpowerislostduringacopyjob,SecureCopydoesnotrememberthelastfile
itcopied.Youneedtorestartthejoboncepowerisrestored.Ifthejobisscheduledto
runeachnight,thejobwillrunatthenextscheduledtime.
VIEWINGJOBSTATISTICS
OntheJobStatisticsViewpage,youcanviewthedateandtimethatajobwaslastrun.
Toviewstatistics,click .
VIEWINGJOBLOGS
Foreachjobrun,SecureCopyautomaticallycreatesalogfile(*.scl),whichisstoredinthe
ScriptLogicCorporation\SecureCopy\Logsfolder.Thefilenamecontainsthedateand
timethatthejobwasrun.
Note:You
also
can
generate
other
optional
log
files
(.txt).
See
Creating
Log
Files.
1. Toviewlogs,click .Alternatively,clickViewjoblogson
theJobSummaryViewpage.
TheRepositoryboxdisplaysthedefaultlocationforlogfiles.Youcanchangethe
locationontheLoggingSettingstabinToolsPreferences.SeeSettingLoggingRepositoryDefault.
-
8/3/2019 Secure Copy 5 5 User Guide
41/76
-
8/3/2019 Secure Copy 5 5 User Guide
42/76
SECURE COPY5.5USER GUIDE 38
UPDATED 18JANUARY 2011
SCHEDULINGJOBS
SecureCopyincludestheabilitytoschedulecopyjobstooccurwhentheyareconvenient
topersonnel,withoutinterferingwithbusinesspractices.Thebesttimefordata
migrationisduringhoursofnonoperationornonpeakusage.Quiteoftenthisisnot
feasiblefortheaverage9to5administrator.SecureCopyusesthefeaturesofthe
MicrosoftTaskSchedulerservicetohandleallfunctionsofjobscheduling.
1. SelectajobintheJobslist,andthenclick .Alternatively,chooseSchedule
fromtheFilemenu,orclickSchedulethisjobontheJobSummaryViewpage.The
TasktabdisplaysthejobintheRunbox.
2. IntheCommentsbox,typeanycommentsaboutthetask.
3. YouruseraccountnamedisplaysintheRunasbox.Ifyouwantanotheruser
accounttorunthetask,changetheentry.
Ifyouwanttochangetheuserwhocanrunthetask,click .TheSet
AccountInformationdialogboxdisplays.Youcanchangetheuseraccounthere
also.Typeapassword,andthenclick .
Note:TheEnabledcheckboxisselectedbydefault,whichenablesthetasktorunatthespecifiedtime.Todisablethetaskfromrunning,cleartheEnabledcheckbox.
4. OpentheScheduletabtocreateanewscheduleoreditanexistingschedule.
-
8/3/2019 Secure Copy 5 5 User Guide
43/76
SECURE COPY5.5USER GUIDE 39
UPDATED 18JANUARY 2011
5. Tocreateanewschedule,click .IftheShowmultipleschedulescheckbox
isselected,youcancreatemorethanonescheduleforthetask.
6. FromtheScheduleTasklist,selecthowoftenyouwantthetasktorun:Daily,
Weekly,Monthly,Once,AtSystemStartup,AtLogon,orWhenIdle.TheSchedule
Taskareachangesdependingonwhichoptionyouselect.
7. FromtheStarttimelist,selectthetimeforthetasktostart.
8. Toset
more
options,
click
.The
Advanced
Schedule
Options
box
appears.
9. Setthedesiredoptions,andthenclick .
-
8/3/2019 Secure Copy 5 5 User Guide
44/76
SECURE COPY5.5USER GUIDE 40
UPDATED 18JANUARY 2011
10. OpentheSettingstab.Hereyoucansetmoreoptionsfortheselectedtask.
11. Click atanytimetoapplyyourselectionstothetask.Toapplythesettings
andclosethedialogbox,click .
Note:Ifthejobwasnotenabled,SecureCopyautomaticallyenablesthejobsothe
scheduledtaskcanrun.Todisablethejobsothescheduledtaskdoesnotrun,right
clickthejob,andthenchooseDisableJob.Toenablethejobagain,rightclickthejob,
andthenchooseEnableJob.
-
8/3/2019 Secure Copy 5 5 User Guide
45/76
SECURE COPY5.5USER GUIDE 41
UPDATED 18JANUARY 2011
Managing Scheduled Jobs
TheTaskSchedulerserviceisincludedwithMicrosoftInternetExplorer5.0andlater
withtheOfflineBrowsingPackinstalled.AssuchitisincludedinWindows
2000/XP/2003/Vista/7.
To
view
scheduled
jobs,
click
Start,
point
to
Programs
Accessories
System
Tools,andthenchooseScheduledTasks.
USINGSECURECOPYCMD.EXE
SecureCopyCmd.exeistheenginethatSecureCopyusesforcopyprocessesandituses
allofthefeaturesthatareavailableinSecureCopy.SecureCopyCmd.exerunsfromthe
commandline,butoffersonlylimitedoptionstoscript,becauseitreferencesthefeatures
ofasavedjobbyusingthenameofthatjob.
Note:YoumustuseSecureCopyCmd.exefromacomputerthathasafullylicensed
versionofSecureCopy5installed.YoucannotcopySecureCopyCmd.exefrommachine
tomachine,asitworksonlyasanevaluationversionandislimitedtocopyingasmall
amountofobjects.
Usage
SecureCopyCmd.exe /Job=""
SecureCopyCmd.exe /Name=""
Optional Parameters
/Test Test the job
/Quiet Runs job without user interface
/Source Define a new source path
/Target Define a new target path
Important:Ifyouadd/sourceor/targettothecommand,itoverridesthesource(s)
andtarget(s)specifiedinthecopyjobidentifiedbythejobidorname.
Examples
securecopycmd.exe /Job="{2f99c223-1625-45dc-ba6a-8573139f77fd}"
securecopycmd.exe /Name="Default" /Test
-
8/3/2019 Secure Copy 5 5 User Guide
46/76
SECURE COPY5.5USER GUIDE 42
UPDATED 18JANUARY 2011
MANAGINGLICENSES
FromtheHelpmenu,chooseLicense.TheLicenseRegistrationInformationbox
opens.Ifyouhaveregistered,thecurrentlicensekeydisplays.
Viewing License Status
To
view
the
status,
click
.If
FULL
Licensing
Managementwas
selectedduringproductregistration,alllicensedserversarelisted.IfLIMITED
LicensingManagementwasselected,onlythelicenseforthisserverislisted.
Tochangethelicense,click .SeeApplyingaNewLicenseFile. Torefreshthelicensestatus,click .
ToviewtheEndUserLicenseAgreement(EULA),click .
-
8/3/2019 Secure Copy 5 5 User Guide
47/76
SECURE COPY5.5USER GUIDE 43
UPDATED 18JANUARY 2011
Applying a New License File
1. FromtheHelpmenu,chooseLicense.TheLicenseRegistrationInformationboxopens.
2. Click .TheProductRegistrationWizardopens.
3. InthePleaseenteryourSecureCopylicensekeybox,typethelicensekey.
Note:AtanytimeduringtheProductRegistrationProcess,youcanclick to
viewtheEndUserLicenseAgreement.
Note:Ifyouareupgradingfromapreviousversion,yourexistinglicenseisnotinthe
necessaryformat.Youmustfirstupgradeyouroldlicense.
a. Ifyouareupgradingandhaveanolderlicensefile,click .TheUpgradeOldLicenseboxopens.
b. TypethelicensenumberintheLicenseNumberbox,orclick tolocate
thelicensenumber.
c. Typeyourcompanyandcontactnamesintheappropriateboxes,andthenclick
.
-
8/3/2019 Secure Copy 5 5 User Guide
48/76
SECURE COPY5.5USER GUIDE 44
UPDATED 18JANUARY 2011
4. Click .
5. SelectwhethertouseFULLorLIMITEDLicensingManagement.
FULL Licensing Management
Selecttosendfulllicensinginformation,suchasthecomputer,domain,and
administratornames,inanencryptedmannertoScriptLogic.ScriptLogicCustomer
Supportwillhaveaccesstodetailedinformationaboutyourlicenses,andyour
LicenseDashboardwillshowlicenseusageinformationforallyourinstallations.
LIMITED Licensing Management (Not recommended)
Selecttosendnonidentifiabledata,muchlikeapasswordhash,inanencrypted
mannertoScriptLogic.ScriptLogicCustomerSupportwillhaveverylimited
informationabout
your
licenses,
and
your
License
Dashboard
will
show
only
license
usageforthecomputeronwhichyouareinstallingthisinstanceofSecureCopy.
Note:FormoreinformationaboutScriptLogicOnlineLicensingVerification(SOLV),
clickMoreInformation.
6. Click .
-
8/3/2019 Secure Copy 5 5 User Guide
49/76
SECURE COPY5.5USER GUIDE 45
UPDATED 18JANUARY 2011
7. Selectwhethertoregisteronlineoroffline.
Online (Internet connection required)
Selecttocontinuewiththeregistrationprocess.ThecomputermusthaveanInternet
connection.
Offline
Selecttoregisteroffline.Onlyselectthisoptionifthecomputeryouareregistering
doesnothaveanInternetconnection.SeeRegisteringOffline.Registering Online
1. SelectOnline,andthenclick .
-
8/3/2019 Secure Copy 5 5 User Guide
50/76
SECURE COPY5.5USER GUIDE 46
UPDATED 18JANUARY 2011
Note:TouseaProxyServer,click .TheProxyServerSettingsboxopens.
SelecttheUseaProxyServercheckbox,enterthenecessaryinformation,andthen
click .
2. Click .Iftheonlineregistrationissuccessful,aRegistrationrequest
completemessagedisplays.
3. Click .Amessageboxdescribeslicensinginformation.
-
8/3/2019 Secure Copy 5 5 User Guide
51/76
SECURE COPY5.5USER GUIDE 47
UPDATED 18JANUARY 2011
Registering Offline
IfthecomputeronwhichyouareinstallingSecureCopydoesnothaveaccesstotheInternet,
youcanregisteroffline.Exportaproductregistrationfile(.phl),copythatfiletoacomputer
thathasInternetaccess,uploadthefiletotheScriptLogicwebsite,downloadaproduct
licensefile,andthencopythatproductlicensefiletotheoriginalcomputer.
1. SelectOffline,andthenclick .Youfirstexportaregistrationfile.
2. IntheActionarea,selectExportregistrationfile.
3. TypeapathintheFileLocationbox,orclick tolocateapath.
4. Click .Thelocationoftheproductregistrationfiledisplays.
Note:Leavethiswindowopenwhileyouprocesstheproductregistrationfile.
-
8/3/2019 Secure Copy 5 5 User Guide
52/76
SECURE COPY5.5USER GUIDE 48
UPDATED 18JANUARY 2011
Note:Ifyouwanttopostponetheregistrationprocess,click .Functionality
mightbelimiteduntilyouimporttheproductlicensefile.Whenyouarereadyto
completetheregistrationprocess,openSecureCopy,opentheHelpmenu,andthen
chooseLicense.
5. CopytheproductregistrationfiletoacomputerthathasanInternetconnection.
6. OnthecomputerthathasanInternetconnection,openthefollowingURL:
http://www.scriptlogic.com/phlcp/OfflineRegistrationPage.aspx
7. Typethepathtotheproductregistrationfile,orclick tolocatethefile.
8. Click .TheFileDownloadboxopens.
9. Click tosavetheLicenseFile.phlfile.
10. CopytheLicenseFile.phlfiletothecomputerthatyouareregistering.
11. Click .TheImportProductLicenseFilewindowopens.
http://www.scriptlogic.com/phlcp/OfflineRegistrationPage.aspxhttp://www.scriptlogic.com/phlcp/OfflineRegistrationPage.aspx -
8/3/2019 Secure Copy 5 5 User Guide
53/76
SECURE COPY5.5USER GUIDE 49
UPDATED 18JANUARY 2011
12. Typethepathtotheproductlicensefile(.phl),orclick tolocatethefile.
13. Click .Iftheofflineregistrationissuccessful,aRegistrationrequest
completemessagedisplays.
-
8/3/2019 Secure Copy 5 5 User Guide
54/76
SECURE COPY5.5USER GUIDE 50
UPDATED 18JANUARY 2011
14. Click .Amessageboxdescribeslicensinginformation.
-
8/3/2019 Secure Copy 5 5 User Guide
55/76
SECURE COPY5.5USER GUIDE 51
UPDATED 18JANUARY 2011
ApplyingSecureCopyOptions
Thereareseveraloptionsthatyoucanselecttoperformvarioustasks.Thischapter
includesinformationaboutwaystoapplySecureCopyOptionstomaximizeyouruseof
SecureCopy.
MAXIMIZINGCOPY PERFORMANCE
TherearethreeparametersontheAdvancedOptionsItabthatyoucanusetomaximize
copyperformance:Threadcount,Batchcount,andBatchsize.SeeSettingAdvancedOptionsI.
Bydefault,themaximumnumberoffilesinabatchis25andthemaximumsizeofthe
batchis1MB.Theminimumnumberofthreadsis2bydefault.Byincreasingthethread
count,you
are
adding
more
threads
that
copy
batches
of
files.
Each
of
the
file
threads
dealswithonebatchoffilesatatime.
Innormaloperation,thesedefaultsettingsshouldbeadequate.However,ifyouhavea
largenumberofsmallfilesandmanybatches,youmightstartbycreatingatleast10
threads,andthenmonitoringnetworkcardutilization.
Thegoalofadjustingthesethreeparametersistomaximizeyournetworkbandwidth.
OtherfactorsthatpreventSecureCopyfromusingallthenetworkbandwidthinclude
slowdiskspeeds,diskfragmentation,andotheractivityonthenetworkandfileserver.
-
8/3/2019 Secure Copy 5 5 User Guide
56/76
SECURE COPY5.5USER GUIDE 52
UPDATED 18JANUARY 2011
SYNCHRONIZINGTARGETCONTENTS WITH SOURCE
Whensynchronizingthecontentsofthetargetfolderwiththesourcefolder,youcan
selecttwodifferentmethodsofpurgingorphanedfiles/foldersinthetarget.Thesetwo
optionsontheGeneralOptionsItabworkinconjunctionwiththeCreateinitialsource
folderundertargetfoldercheckboxontheCopyLocationtab.Theexamplesincluded
inthissectionillustratehowthesethreeoptionsworktogether.
-
8/3/2019 Secure Copy 5 5 User Guide
57/76
SECURE COPY5.5USER GUIDE 53
UPDATED 18JANUARY 2011
Single Source Path To Single Target Path
Example 1
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders on the target
Source Path Target Path Target Result
C:\SOURCE \\SRV11\C$\TARGET\ \\SRV1\C$\TARGET\SOURCE\
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisselected,the
sourcefolderstructureisduplicatedunderthetargetfolder.Whenthecopyprocessis
complete:
Filesandfoldersinthetargetfolder(\\SRV1\C$\TARGET\SOURCE\)thatdonotalsoexistinthesourcefolder(C:\SOURCE\)arepurgedfromthetargetfolder.
Inthisexample,subfolder
A4
doesnotexistinthesourcefolderandthereforeis
deletedfromthetargetfolderwhenthecopyprocesscompletes.
-
8/3/2019 Secure Copy 5 5 User Guide
58/76
SECURE COPY5.5USER GUIDE 54
UPDATED 18JANUARY 2011
Example 2
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders in SUBFOLDERS of the target
Source Path Target Path Target Result
C:\SOURCE\ \\SRV1\C$\TARGET\ \\SRV1\C$\TARGET\SOURCE\
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisselected,the
sourcefolderstructureisduplicatedunderthetargetfolder.Whenthecopyprocessis
complete:
Filesandfoldersthatdonotexistinthesourcefolder(C:\SOURCE\)arenotpurgedfromthetargetfolder(\\SRV1\C$\TARGET\SOURCE\).
Filesandfoldersthatdonotexistinthefirstsubfoldersofthesourcefolder(C:\SOURCE\subfolderA4\)anddownarepurgedfromthecorrespondingtarget
folder(\\SRV1\C$\TARGET\SOURCE\sub
folder
A4\).
Inthisexample,thefoldersinsubfolderA4donotexistinthesourcefolderand
thereforearedeletedfromthetargetfolderwhenthecopyprocesscompletes.
-
8/3/2019 Secure Copy 5 5 User Guide
59/76
SECURE COPY5.5USER GUIDE 55
UPDATED 18JANUARY 2011
Example 3
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders on the target
Source Path Target Path Target Result
C:\SOURCE\ \\SRV1\C$\ \\SRV1\C$\
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisnotselected,the
sourcefolderstructureisnotduplicatedunderthetargetpath.Whenthecopyprocessis
complete:
Allfilesandfoldersinsidethesourcefolder(C:\SOURCE\)arecopiedtothetargetfolder(\\SVR1\C$\).
Forsafety,orphanedfilesandfoldersinthisscenarioarenotpurgedbecausethesystemdrivewouldbepurgedofallotherdata.
-
8/3/2019 Secure Copy 5 5 User Guide
60/76
SECURE COPY5.5USER GUIDE 56
UPDATED 18JANUARY 2011
Example 4
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders in SUBFOLDERS of the target
Source Path Target Path Target Result
C:\SOURCE\ \\SRV1\C$\TARGET \\SRV1\C$\TARGET
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisnotselected,the
sourceparentfolderisnotduplicatedunderthetargetpath,butthesourcesubfoldersare
duplicated.Whenthecopyprocessiscomplete:
Allfilesandfoldersinsidethesourcefolder(C:\SOURCE\)arecopiedtothetargetfolder(\\SRV1\C$\TARGET\).
Filesandfoldersthatexistintherootofthesourcefolder(C:\SOURCE\)arenotpurgedfromthetargetfolder(\\SRV1\C$\TARGET\).
Filesandfoldersthatdonotexistinthefirstsubfoldersofthesourcefolder(C:\SOURCE\subfolderA4\)anddownarepurgedfromthecorrespondingtarget
folder(\\SVR1\C$\TARGET\subfolderA4).
-
8/3/2019 Secure Copy 5 5 User Guide
61/76
SECURE COPY5.5USER GUIDE 57
UPDATED 18JANUARY 2011
Multiple Source Paths To Single Target Path
Important:Whencopyingmultiplesourcepathstoasingletargetpath,anyfileorfolder
withthesamenamelocatedontherootofthesourcepathsisoverwrittenbythefileor
folderofthesamenameinthelastsourcepath.
Scenario 1: Folders with the same nameTherearetwofoldersnamedsubfolderB1;oneisunderthesourcepathfolder
(C:\folderA\)andtheotherisunderthesourcepathfolder(C:\folderB\).Thesubfolder
B1folderfromthelastsourcepath(C:\folderB\subfolderB1\)overwritesthesubfolder
B1folderfromthefirstsourcepathfolder(C:\folderA\subfolderB1\).Thetargetfolder
thencontainsonlyonesubfolderB1folder,whichcontainsthefilesandfoldersfromthe
lastsourcepathfolder(C:\folderB\subfolderB1\).
Scenario 2: Files with the same name
Therearetwofilesnamedtestfile.txt;oneisunderthefirstsourcepathfolder
(C:\folderA\)and
the
other
is
under
the
second
source
path
folder
(C:\folderB\).
Thetestfile.txtfilefromthelastsourcepath(C:\folderB\testfile.txt)overwritesthe
testfile.txtfilefromthefirstsourcepathfolder(C:\folderA\testfile.txt).Thetargetfolder
thencontainsonlyonetestfile.txtfile(\\server1\C$\testfile.txt),whichisthetestfile.txt
filefromthelastsourcepath(C:\folderB\testfile.txt).
-
8/3/2019 Secure Copy 5 5 User Guide
62/76
SECURE COPY5.5USER GUIDE 58
UPDATED 18JANUARY 2011
Example 1
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders on the target
Source Paths Target Paths Target ResultC:\folderA\
C:\folderB\
\\server1\C$\ \\server1\C$\folderA\
\\server1\C$\folderB\
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisselected,the
sourcefolderstructureisduplicatedunderthetargetpathduringthecopyprocess.
Whenthecopyprocessiscomplete:
Allfilesandfoldersinsidethesourcefolders(C:\folderA\andC:\folderB)arecopiedtothetargetfolder(\\SVR1\C$\).
Filesandfoldersthatdonotexistinthesourcefolders(C:\folderA\)and(C:\folderB\)arepurgedfromthetargetfolders(\\server1\C$\folderA\)and(\\server1\C$\folderB\).
Important:Whencopyingmultiplesourcepathstoasingletargetpath,anyfileorfolder
withthesamenamelocatedontherootofthesourcepathsisoverwrittenbythefileor
folderofthesamenameinthelastsourcepath.SeeScenario1:FolderswiththesamenameandScenario2:Fileswiththesamename.
-
8/3/2019 Secure Copy 5 5 User Guide
63/76
SECURE COPY5.5USER GUIDE 59
UPDATED 18JANUARY 2011
Example 2
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders in SUBFOLDERS of the target
Source Paths Target Paths Target ResultC:\folderA\
C:\folderB\
\\server1\C$\ \\server1\C$\folderA\
\\server1\C$\folderB\
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisselected,the
sourcefolderstructureisduplicatedunderthetargetpathduringthecopyprocess.
Whenthecopyprocessiscomplete:
Allfilesandfoldersinsidethesourcefolders(C:\folderA\andC:\folderB)arecopiedtotheirrespectivetargetfolders(\\server1\C$\folderA\)and(\\server1\C$\folderB\).
Filesandfoldersthatdonotexistintherootofthesourcefolders(C:\folderA\)and(C:\folderB\)arenotpurgedfromtheirrespectivetargetfolders(\\server1\C$\folderA\)
and(\\server1\C$\folderB\).
Filesandfoldersthatdonotexistinthesubfoldersofthesourcefolders(C:\folderA\subfolderA1\)and(C:\folderB\subfolderB1\)anddownarepurged
fromtheirrespectivetargetfolders(\\server1\C$\folderA\folderAsub1\)and
(\\server1\C$\folderB\subfolderB1\).
-
8/3/2019 Secure Copy 5 5 User Guide
64/76
SECURE COPY5.5USER GUIDE 60
UPDATED 18JANUARY 2011
Example 3
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders on the target
Source Paths Target Paths Target Result
C:\folderA\
C:\folderB\
\\server1\C$\ \\server1\C$\
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisnotselected,the
sourceparentfolderisnotduplicatedunderthetargetpathduringthecopyprocess,but
thesourcesubfoldersareduplicated.Whenthecopyprocessiscomplete:
Allfilesandfoldersinsidethesourcefolders(C:\folderA\andC:\folderB)arecopiedtothetargetfolder(\\SVR1\C$\).
Forsafety,filesandfoldersthatdonotexistintherootofthesourcefolders
(C:\folderA\)
and
(C:\folderB\)
are
not
purged
from
the
target
folder
(\\SVR1\C$\),
becausethesystemdrivewouldbepurgedofallotherdata.
Important:Whencopyingmultiplesourcepathstoasingletargetpath,anyfileorfolder
withthesamenamelocatedontherootofthesourcepathsisoverwrittenbythefileor
folderofthesamenameinthelastsourcepath.SeeScenario1:FolderswiththesamenameandScenario2:Fileswiththesamename.
-
8/3/2019 Secure Copy 5 5 User Guide
65/76
SECURE COPY5.5USER GUIDE 61
UPDATED 18JANUARY 2011
Example 4
Create initial source folder under target folder
Synchronize Target Contents with Source
Purge orphaned files/folders in SUBFOLDERS of the target
Source Paths Target Paths Target Result
C:\folderA\
C:\folderB\
\\server1\C$\ \\server1\C$\
BecausetheCreateinitialsourcefolderundertargetfoldercheckboxisnotselected,the
sourceparentfolderisnotduplicatedunderthetargetpathduringthecopyprocess,but
thesourcesubfoldersareduplicated.Whenthecopyprocessiscomplete:
Filesandfoldersfromallsourcepathsarecopiedtothetargetfolder(\\server1\C$\).
Filesandfoldersthatdonotexistinthefirstsubfoldersofthesourcefolders(C:\folderA\subfolderA1\)and(C:\folderB\subfolderB1\)anddownarepurged
fromtheirrespectivetargetfolders.
Forsafety,filesandfoldersthatdonotexistintherootofthesourcefolders(C:\folderA\)and(C:\folderB\)arenotpurgedfromtherootofthetargetfolder(\\server1\C$\).
Important:Whencopyingmultiplesourcepathstoasingletargetpath,anyfileorfolder
withthesamenamelocatedontherootofthesourcepathsisoverwrittenbythefileor
folderofthesamenameinthelastsourcepath.SeeScenario1:Folderswiththesamenameand
Scenario2:Fileswiththesamename.
-
8/3/2019 Secure Copy 5 5 User Guide
66/76
SECURE COPY5.5USER GUIDE 62
UPDATED 18JANUARY 2011
USINGMAPFILES
Amapfileisatextfilethatcreatesamappingbetweensourceandtargetgroupsandusers,
orsourceandtargetfilesandfolders.Usingamapfilegiveyougreaterflexibilityinthe
waythatlocalgroups/usersaremigratedorfilesandfoldersarecopied,eitherfromone
computertoanotherortoActiveDirectory.
Note:Mapfilescannotbeusedtocreatemappingsfordomaingroups.
Copying Groups and Users
Mapfilesaremostcommonlyusedwhenlocalgroup/useraccountsincludethesource
computersname.
Example
YouneedtomigratedatafromServer1toServer2.Permissionentriesonthedatainclude
thelocalgroupsLocalGroup1_Server1andLocalGroup2_Server1.
IfthedataiscopiedusingtheMigrateLocal
Groupsoption,thedataiscopiedto
Server2,buttheaccesscontrollistsforthedatawouldstillreference
LocalGroup1_Server1andLocalGroup2_Server1.
Usingamapfileprovidesameansofmodifyingthebehaviorofthelocalgroup
migrationsothatoncethejobcompletes,theaccesscontrollistsforthedatawould
referenceLocalGroup1_Server2andLocalGroup2_Server2.
1. UsingNotepad,createamapfilebytypingeachnamemappingonanewline.
2. InSecureCopy,opentheLocalGroups&Userstab,andthenselecttheMigrate
LocalGroups/UserstoDestinationServercheckbox.
-
8/3/2019 Secure Copy 5 5 User Guide
67/76
-
8/3/2019 Secure Copy 5 5 User Guide
68/76
SECURE COPY5.5USER GUIDE 64
UPDATED 18JANUARY 2011
Copying Files and Folders
1. UsingNotepad,createamapfilebytypingeachnamemappingonanewline.
Formatting Map Files
Sourceandtargetdirectorymustbeondifferentcomputers,copyingfromonelocationtoanotheronthesamecomputer(evenifthesourceandtargetareon
differentvolumes)preventsthefoldersfrombeingmapped.
Thefullpathforthesourceandtargetfoldersmustbeenteredintothemapfile.
Example:C:\source\=\\ad3\e$\scytest\target\
Forfolders,thesourceandtargetpathinthemapfilemusthaveatrailingbackslash(notnecessaryforfiles).
Example:C:\source\=\\ad3\e$\scytest\target\
Thetargetdirectorydoesnotneedtobecreatedaheadoftime.
Example:IfthemapfileisconfiguredasC:\source\=\\ad3\e$\scy
test\target\,andthereisnofoldernamedtargeton\\ad3\e$\scy test\
priortorunningthecopyjob,SecureCopywillcreatethetargetfolderandcopy
thecontentsofthesourcefolderintothisfolder
Examples
Torenameafile:
C:\test\testfile.txt=\\targetserver\test\newtestfile.txt
Todivertafile:
C:\test\textfile.txt=\\targetserver\newDir\textfile.txt
Torenameafolder:
C:\test\=\\targetserver\C$\newfolder\
-
8/3/2019 Secure Copy 5 5 User Guide
69/76
-
8/3/2019 Secure Copy 5 5 User Guide
70/76
SECURE COPY5.5USER GUIDE 66
UPDATED 18JANUARY 2011
COPYINGFOLDER STRUCTURESWITHOUT FILES
Attimesitmaybedesirabletoreplicateadirectorystructurefromonecomputerto
another,butnotincludefilesthatmayresidewithinthatstructure.
Byusingacombinationoffolderandfileselectionfilters,itispossibletocreateacopy
jobthat
includes
all
the
folders/directories
of
aspecified
source
path,
but
does
not
includeanyfileswithinthatpath.
1. OntheCopyLocationtab,specifythesourceanddestinationpaths.SeeSettingtheCopyLocation.Note:ItmaybedesirabletocleartheCreateinitialsourcefolderundertargetfolder
checkboxontheCopyLocationtab,especiallywhenthesourcepathisadriveroot
(i.e.,\\server1\c$\).
2. OpentheFilterFilestab,andthenselecttheExcludethefollowingfolderscheck
box.LeavetheFolderNameslistempty.
3.
Select
the
Apply
filter
to
the
files
check
box.
4. Click ,typeanextensionthatdoesnotexistwithintheselectedsourcestructure,
suchasxyz,andthenclick .TheFiltersboxdisplaystheextension.
5. Saveandthenrunthejob.SeeRunningaJob.
-
8/3/2019 Secure Copy 5 5 User Guide
71/76
SECURE COPY5.5USER GUIDE 67
UPDATED 18JANUARY 2011
CREATINGLOGFILES
Inadditiontotheautomaticallycreatedlogfile(*.scl),youcanchoosetocreatethree
othertypesoflogfiles(*.txt),whichincludevaryinglevelsandtypesofinformation:
basic,verbose,andverify.
Note:Unlessthenameofalogfileischanged,thelogfileisoverwrittenbysuccessivecopyjobs.Topreventalogfilefrombeingoverwritten,appendthenameofthelogfile
witheitherofthesecasesensitivevariables,whichprovideauniquetimestamp
(yyyy_mm_dd_hh_mm_ss):
%DATE%
#DATE#
Basic Log File
SelecttheGenerateLogFilecheckboxontheGeneralOptionsItab.SeeSettingGeneralOptionsI.Contents
Start Time (day, date, and time)
Source Path Count
End Time (day, date, and time)
Summary Information:
Number of folders and files processed
Number of Copied Files and Total Bytes Transferred
Number of Skipped Files and Total Bytes Skipped
Verbose Log File
SelecttheVerboseLogFilecheckboxontheGeneralOptionsItab.Contentsofthe
verboselogfilearethesameasthebasiclogfile,buteachfolderandfileislistedinthe
orderitwasprocessed.SeeSettingGeneralOptionsI.Verify Log File
SelecttheVerifyfilecopycheckboxontheAdvancedOptionsItab.SeeSettingAdvancedOptionsI.Contents
Start Time (day, date, and time)
For each file copied the following information is logged:
CRC Source: (sourcepath\filename)
CRC Dest :
(destinationpath\filename)
CRC Match?: [Yes | No]
End Time (day, date, and time)
Summary Information:
Number of folders and files processed
Number of Copied Files and Total Bytes Transferred
Number of Skipped Files and Total Bytes Skipped
-
8/3/2019 Secure Copy 5 5 User Guide
72/76
SECURE COPY5.5USER GUIDE 68
UPDATED 18JANUARY 2011
CREATINGHELP DESK AUTHORITYTICKETS
HelpDeskAuthorityiswebbasedsoftwareusedbyITServiceProviderstomanage
businessinformationfromacommondatabase.HelpDeskAuthoritycapturesemail
alerts,generatesaserviceticket,andthenroutesittotheappropriateresource.InSecure
Copy,youcancreateaHelpDeskAuthorityticketforacopyjob.
Note:TocreateaHelpDeskAuthorityticketforacopyjob,youneedHDMailinstalled
andconfiguredinparallelwithyourHelpDeskAuthorityinstallation.
1. OpentheAdvancedOptionsIItab,andthenselecttheSendEmailNotification
checkbox.SeeSettingAdvancedOptionsII.2. Click .TheEmailSettingsboxdisplaysthedefaultsettingsfromthe
HelpDeskAuthoritySettingstab.SeeSettingHelpDeskAuthoritySettings.3. SelecttheCreateHelpDeskAuthorityTicketcheckbox.
4. Ifnecessary,changethedefaulttextintheEmailAddress,SubjectLine,andEmail
Message
boxes.
-
8/3/2019 Secure Copy 5 5 User Guide
73/76
SECURE COPY5.5USER GUIDE 69
UPDATED 18JANUARY 2011
Troubleshooting
ScriptLogicCorporationhasalibraryofarticlesinitsKnowledgeBase,whichmay
provideananswertoaproblemyouareexperiencing.Beforecallingtechnicalsupport,
checktoseeifyourproblemisdocumentedhere.YoumightalsobrowsetheDiscussion
Forumstoseeifanyoneelseisexperiencingthesameissue.
http://www.scriptlogic.com/support/products/securecopy/
REMOVINGSECURECOPY 5
Proper
removal
of
Secure
Copy
can
be
achieved
in
a
few
ways.
You
can
use
the
Add/RemoveProgramscontrolpanelappletforafullremoval.
1. FromtheWindowsControlPanel,doubleclickAdd/RemovePrograms.
TheAdd/RemoveProgramswindowopens.
2. Fromthelistofcurrentlyinstalledprograms,selectSecureCopy5.
3. ClickRemove.Amessageboxpromptsyouforconfirmation.
4. Toremovetheapplication,clickYes.Astatusdialogboxdisplaysforthefew
secondsnecessarytoremovetheapplication.
Afterremovaliscomplete,SecureCopywillhavebeenremovedfromyoursystem.
NotethattheinstallationdirectorythatcontainedSecureCopyremainsafterthe
processiscomplete.Thisdirectorycontainsthelicensefilefortheproductandany
filescreatedaftertheproductwasinstalled.Thesemaybedeletedmanuallyifyou
wishtocompletelyremoveSecureCopy.
http://www.scriptlogic.com/support/products/securecopy/http://www.scriptlogic.com/support/products/securecopy/ -
8/3/2019 Secure Copy 5 5 User Guide
74/76
SECURE COPY5.5USER GUIDE 70
UPDATED 18JANUARY 2011
Index
.
.phl,46
.scl,36
.ssd,15
.txt,36
A
ACLs
updating,
24
archivebit
clearing,20
synchronizing,20
B
batchcount,7,22
batchsize,7
BUILTINgroup,30
buttons
hiding,5
C
clearing
archivebit,20
SIDhistory,24
clustergroupname,27
compressoptions
alwayscompress,23
conditional,23
Nevercompress,23
copyjob
creating,12
running,34
sendingemailnotifications,24
testing,34
viewinglogfiles,36
viewingstatistics,35
copying
allfiles,18
dataonly,19
encryptedfiles,20
folderstructures,65
onlychangedfiles,17
permissions,18
settingpreferences,6
settingretrysonlockedfiles,22
skippingfiles,17
skippingofflinefiles,20
createddate
synchronizing,21
creating
folderstructures,16
logfiles,66
mapfiles,
61
newjob,12
E
email
sendingatest,8,25
sendingnotifications,24
settingup,25
encryptedfiles
copying,20
EndUserLicenseAgreement,42
EULA,42
excludingfilesandfolders,32
exitSecureCopy,3
F
Filemenu,3
fileshares
migrating,26
files
filtering,31
filtering
files,31
folders
copyingstructures,65
G
generating
logfile,19
-
8/3/2019 Secure Copy 5 5 User Guide
75/76
SECURE COPY5.5USER GUIDE 71
UPDATED 18JANUARY 2011
H
HelpDeskAuthority,9,25
Helpmenu,3
hiding
buttons,5
I
ignoring
recentlymodifiedfiles,17
J
job
creatingnew,12
rename,3
running,34
testing,34
viewinglogfiles,36viewingstatistics,35
jobdetailsview,15
jobsummaryview,13
jobs
managingscheduled,40
scheduling,37
L
lastaccesseddate
resetting,21
synchronizing,21
synchronizing,21
license
applyingnew,42
viewing,41
lockedfiles
retrycopy,22
logfile,19,66
ve