secure copy user guide - axantech · secure copy™ 4 3 updated 25 august 2005 save jobs for future...

42
ScriptLogic ® Secure Copy 4 User Guide

Upload: others

Post on 06-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

ScriptLogic® Secure Copy™ 4

User Guide

Page 2: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 II

UPDATED 25 AUGUST 2005

© 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic Corporation. It may not, in whole or part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent, in writing, from ScriptLogic Corporation. This publication supports Secure Copy 4.x. It is possible that it may contain technical or typographical errors. ScriptLogic Corporation provides this publication “as is,” without warranty of any kind, either expressed or implied. ScriptLogic Corporation 6000 Broken Sound Parkway NW Boca Raton, Florida 33487-2742 1.561.886.2400 www.scriptlogic.com Trademark Acknowledgements: Secure Copy is a registered trademark of ScriptLogic Corporation in the United States and/or other countries. The names of other companies and products mentioned herein may be the trademarks of their respective owners. Printed in the United States of America (8/2005)

Page 3: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 III

UPDATED 25 AUGUST 2005

DOCUMENTATION CONVENTIONS

Typeface Conventions

Bold Indicates a button, menu selection, tab, dialog box title, text to type, selections from drop-down lists, or prompts on a dialog box.

CONTACTING SCRIPTLOGIC

ScriptLogic may be contacted about any questions, problems or concerns you might have at:

ScriptLogic Corporation 6000 Broken Sound Parkway NW Boca Raton, Florida 33487-2742

561.886.2400 Sales and General Inquiries 561.886.2450 Technical Support

561.886.2499 Fax

www.scriptlogic.com

SCRIPTLOGIC ON THE WEB

ScriptLogic can be found on the web at www.scriptlogic.com. Our web site offers customers a variety of information:

Download product updates, patches and/or evaluation products.

Locate product information and technical details.

Find out about Product Pricing.

Search the Knowledge Base for Technical Notes containing an extensive collection of technical articles, troubleshooting tips and white papers.

Search Frequently Asked Questions, for the answers to the most common non-technical issues.

Participate in Discussion Forums to discuss problems or ideas with other users and ScriptLogic representatives.

Page 4: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 IV

UPDATED 25 AUGUST 2005

Contents WHAT IS SECURE COPY?............................................................................................................................... 1 WHAT’S NEW IN SECURE COPY 4? ............................................................................................................... 4 USING SECURE COPY..................................................................................................................................... 7

STARTING SECURE COPY ............................................................................................................................ 7 EXAMINING THE MAIN WINDOW................................................................................................................. 7

Toolbar Buttons and Job Menu Options................................................................................................. 8 File Menu ............................................................................................................................................... 9 Window Menu......................................................................................................................................... 9 Help Menu .............................................................................................................................................. 9

CREATING A NEW JOB............................................................................................................................... 10 Browsing for a Path.............................................................................................................................. 11 Selecting Folders and Files .................................................................................................................. 12 Typing a Path ....................................................................................................................................... 13 Creating a New Folder ......................................................................................................................... 13 Removing a Path................................................................................................................................... 13

SETTING OPTIONS FOR THE COPY PROCESS............................................................................................... 13 Setting General Copy Options .............................................................................................................. 14 Setting Advanced Options..................................................................................................................... 16 Compressing Files ................................................................................................................................ 18 Migrating File Shares........................................................................................................................... 19 Migrating Local Groups....................................................................................................................... 20 Filtering Files....................................................................................................................................... 22

TESTING A JOB .......................................................................................................................................... 24 RUNNING A JOB......................................................................................................................................... 25 SAVING A JOB............................................................................................................................................ 26 LOADING A SAVED JOB ............................................................................................................................. 26 SCHEDULING JOBS..................................................................................................................................... 27

Managing Scheduled Jobs .................................................................................................................... 29 USING SECUREJOBCOPY4.EXE .................................................................................................................. 30 REMOVING SECURE COPY 4 ...................................................................................................................... 30

APPLYING SECURE COPY OPTIONS ............................................................................................................ 31 MAXIMIZING COPY PERFORMANCE........................................................................................................... 31 USING MAP FILES ..................................................................................................................................... 32 COPYING FOLDER STRUCTURES WITHOUT FILES ...................................................................................... 33 CREATING LOG FILES................................................................................................................................ 34

TROUBLESHOOTING .................................................................................................................................... 35 FREQUENTLY ASKED QUESTIONS.............................................................................................................. 35

INDEX ........................................................................................................................................................... 36

Page 5: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 1

UPDATED 25 AUGUST 2005

What is Secure Copy? Secure Copy is a comprehensive solution for data duplication, local group and user migration, share migration, and NTFS permissions configuration. Secure Copy permits seamless migration, allowing an administrator to copy files and directories on NTFS partitions while keeping the security intact, creating shares, and migrating local groups. All of this functionality is available in an easy to use interface, which keeps you updated on copy progress, as well as any errors that may occur. Secure Copy also includes functionality such as differential copying, full command line support, saving multiple jobs, and scheduling jobs to run after hours. Secure Copy supports Windows NT/2000/XP/2003 environments and is compatible with the Microsoft Cluster Service.

RETAIN SECURITY WHILE YOU COPY

If you use Windows NT Explorer, or the copy and xcopy commands to copy files, the file permissions are not copied with the file. Other utilities allow you to copy files and directories with security, but it does not create existing shares and migrate local groups like Secure Copy.

Page 6: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 2

UPDATED 25 AUGUST 2005

CREATE SHARES WHILE COPYING

Now you have the option to migrate existing shares on the source server to the destination server, while using Secure Copy. As Secure Copy copies each folder, it first checks to see if that folder is shared. If so, Secure Copy will create the share on the destination server and copy the permissions to the share. This outstanding feature makes Secure Copy worth the investment.

MIGRATE LOCAL GROUPS WHILE COPYING

Secure Copy is the only tool available that migrates local groups while copying files. A local group is local to the machine it was created on. If a local group has permissions on a file in your source server, Secure Copy creates the local group on the destination server and modifies the permissions list on the destination file to reflect the newly created local group. If you were to use the scopy.exe program in the NT resource kit, every local group would appear as Account Unknown in the destination file's permissions list. If the local group name already exists on the destination server, you choose to be prompted for a new name or select a prefix or postfix naming convention.

Page 7: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 3

UPDATED 25 AUGUST 2005

SAVE JOBS FOR FUTURE OR SCHEDULED USE

Secure Copy allows you to define a job, which is a set of source paths, a target path, and copy options so that you can use the job in the future, either on-demand or scheduled. Secure Copy features a powerful scheduler that runs your jobs based on a variety of scheduling options, freeing you up to concentrate on other activities.

Page 8: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 4

UPDATED 25 AUGUST 2005

What’s New in Secure Copy 4? ScriptLogic Corporation is pleased to announce the introduction of Secure Copy™ version 4.0. This release extends Secure Copy’s market leadership as the fastest, easiest, most secure and most cost-effective product for the migration, consolidation and replication of files and file servers.

The new functionality in version 4.0 enables IT administrators and consultants to complete migration, consolidation and replication projects faster and with less manual intervention than ever before.

MULTI-THREADED COPYING

Secure Copy 4 has been comprehensively overhauled under the hood with a new multi-threaded copying engine to maximize performance and make full use of available network bandwidth. This is especially noticeable when copying large numbers of files that are less than, say, 250k in size. On the average file server containing a wide range of file sizes, performance increases of 50-100% over Secure Copy 3 are expected.

The dramatic performance increases possible with Secure Copy 4 reduce the time taken for server migrations and consolidations, lowering the project cost and increasing the IT administrator or consultant’s productivity.

In Secure Copy 4, the process of copying files is broken down into individual smaller copy jobs that are defined by the following parameters:

Thread count supplies the number of copy threads for an individual smaller copy job. The minimum is 2 and the maximum is 20.

Batch count supplies the maximum number of files in an individual smaller copy job. The minimum number of files is 25 and the maximum is 100.

Batch size supplies the maximum number of bytes in an individual smaller copy job. The minimum is 1 byte and the maximum is 10.

By specifying different combinations of these values in Advanced Options, you can fine-tune the performance of Secure Copy to your individual machine and network configurations to optimize performance of the application and its impact on the available machine and network resources. For more information, see Maximizing Copy Performance in the Secure Copy User Manual.

Multiple threads for the fastest

copying performance

available

Page 9: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 5

UPDATED 25 AUGUST 2005

AUTOMATIC RETRY OF FAILED JOBS

A common challenge when copying data is that some files and folders are locked by a process and cannot be accessed. IT administrators and consultants usually have to go through the logs at the end of a copy job and identify which files were not copied because a user or program was accessing them, and then manually reschedule a new job hoping to find a time when they are unlocked. With Secure Copy 4 this chore is reduced, as files that failed to copy can be automatically rescheduled for more attempts after the rest of the data has finished copying.

For example, file server A is being copied to its redundant backup every night. Some workers are working late with an application that locks files on server A and makes them unavailable for copying. The administrator schedules the copy job to start at 8 PM, but early the next morning he has to manually check to see whether the workers had all released their file locks before the copy job tried to copy their files. If there were any that failed to copy, he has to manually copy those files before the workers need them again. Now, with Secure Copy 4, he simply enables Automatic File Retry and goes home knowing that Secure Copy will automatically retry failed file copies until the files are available, or he tells it to stop trying.

This simple feature significantly eases the process of migrating and copying data on file servers, and further defines Secure Copy 4 as the perfect tool for data replication and file server migrations.

New options to tune performance

and manage retries

Page 10: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 6

UPDATED 25 AUGUST 2005

IMPROVED AND UPDATED USER INTERFACE

Secure Copy 4’s User Interface has an updated look-and-feel with dockable toolbars for increased flexibility in arranging the workspace and maximum ease-of-use. In addition, the layout of the Secure Copy Options dialog box has been enhanced to simplify the user’s experience, and new options have been added to control multi-threaded copying and automatic retries.

Updated Interface

Page 11: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 7

UPDATED 25 AUGUST 2005

Using Secure Copy STARTING SECURE COPY

Click Start, point to Programs > ScriptLogic Corporation > Secure Copy 4, and then choose Secure Copy Console. Each time you run the program you are greeted by the splash screen, which displays the initialization of the program and the current version number.

EXAMINING THE MAIN WINDOW

Secure Copy was designed to be straightforward and easy to use. All actions are accessible through one main window, which has two tabs.

The Secure Copy tab is divided into three areas that represent the three steps involved in creating a copy job. In steps 1 and 2, you select the source and target paths. Secure Copy is compatible with local paths, mapped network drives, and the UNC pathname format. The paths you select display in the Source Paths and Target Paths list boxes. In step 3, you select various copy options that affect the copy job. The selected options display in a list next to .

Page 12: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 8

UPDATED 25 AUGUST 2005

The Saved Jobs tab displays copy jobs that you saved for use at a later time. You can load a saved job to run manually or you can schedule the job to run at a specified time. The Saved Jobs tab displays the status of the job.

Toolbar Buttons and Job Menu Options

The most common operations performed in the software can be accessed through the top toolbar. Depending on which tab is selected, the icons are available or grayed out. The same operations on the toolbar can be performed from the Job menu.

Button Job Menu Shortcut Description

New Job CTRL + N Clears the boxes on the Secure Copy tab so you can create a new job.

Save Job CTRL + S Saves the job displayed on the Secure Copy tab.

Save Job As NA Saves the job displayed on the Secure Copy tab; use to create a new job by editing a saved job.

Load Job CTRL + L Places a saved job on the Saved Jobs tab into the Secure Copy tab.

Delete Job CTRL + D Removes a saved job from the list on the Saved Jobs tab.

Run Now NA Initiates the job displayed on the Secure Copy tab or the selected job on the Saved Jobs tab.

Test Job NA Tests the job displayed on the Secure Copy tab or the selected job on the Saved Jobs tab.

Schedule Job F3

Opens the Windows Scheduler so you can schedule the job displayed on the Secure Copy tab or the selected job on the Saved Jobs tab to run at a specified time.

Page 13: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 9

UPDATED 25 AUGUST 2005

File Menu

Choose File > Exit to close Secure Copy. You also can click the Close button .

Window Menu

Choose Window > Secure Copy to open the Secure Copy tab.

Choose Window > Saved Jobs to open the Saved Jobs tab.

Choose Window > Show Toolbar to toggle the toolbar on or off.

Choose Window > Toolbar Captions to toggle the lettering under the toolbar buttons on or off.

Help Menu

Choose Help > Contents or press F1 to open the online help for Secure Copy.

Choose Help > About to see information about the version of Secure Copy installed on your computer, to apply a license file, or to visit the ScriptLogic web site.

Page 14: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 10

UPDATED 25 AUGUST 2005

CREATING A NEW JOB

Important: When you click , all displayed entries are erased. You are not prompted to save the current job. If you want to save the current job before you create a new one, click , save the file, and then click .

When you open Secure Copy, the Secure Copy tab is blank and ready for you to create a new job. If a job is already present, click to blank the Secure Copy tab.

Create initial source folder under target folder

Creates a folder structure on the target that is the same as the source folder structure.

There are two ways to add paths to the Source Paths and Target Paths boxes: browse for a path or type a path directly. In addition, you can create a new folder on the target to receive the source.

Note: By default, Secure Copy creates a folder structure on the target that mimics the folder structure in the target. To ignore the source folder structure, clear the Create initial source folder under target folder checkbox.

Caution: If the Synchronize Target with Source check box is selected on the General Copy Options dialog box, and you copy from multiple source paths, only those files in the last source file in the list are synchronized with the target. All other files in the target are deleted.

Page 15: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 11

UPDATED 25 AUGUST 2005

Browsing for a Path

1. On the Secure Copy tab, click . The Select Folder list box appears.

2. Expand the hierarchical list, and then select the paths to copy (source) and to copy to (target). See Selecting Folders.

The Select Folder list box supports multi-state checkboxes, which allow you to specify exactly what folders you want copied.

Checkbox Indication

The folder and its subfolders are not selected. No files or folders will be included in the copy process.

The folder and all subfolders are selected. All files and folders underneath this folder will be included in the copy process.

The folder is selected, and some of the subfolders are selected. All the files in this folder and subfolders that are selected will be included in the copy process.

The folder is not selected, but some of the subfolders are selected. Only the selected subfolders underneath this folder will be copied.

Note: For the target, you also can create a new folder to receive the selected source folders. See Creating a New Folder.

3. Click OK.

Page 16: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 12

UPDATED 25 AUGUST 2005

Selecting Folders and Files

Single left-click on parent folder Selects the parent folder, all subfolders, and all files within parent folder.

Single right-click on parent folder Selects the parent folder and only files within parent folder.

Single left-click followed by a right-click on parent folder Selects only folders within the parent folder.

Page 17: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 13

UPDATED 25 AUGUST 2005

Typing a Path

To bypass the system browser, you can type a path directly.

1. Click . The Enter Path box opens.

2. Type a path for the folder, and then click OK.

Creating a New Folder

You may want to create a new folder on the target drive to receive the selected source folders.

1. In the Step 2: Select target folders area, click . The Select Folder list box appears.

2. In the Select Folder list box, select the folder under which to create the new folder, and then click New Folder. The Enter Folder Name dialog box opens.

3. Type a name for the folder, and then click OK.

Removing a Path

1. In the Source Paths or Target Paths lists, select a path, and then click . A message appears asking for confirmation.

2. Click Yes to remove the path from the list.

SETTING OPTIONS FOR THE COPY PROCESS

The Step 3:Choose from available copy options area displays the currently selected options.

Click Options. The Secure Copy Options dialog box opens to the General Copy

Options area. Set the desired options, and then click OK.

Page 18: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 14

UPDATED 25 AUGUST 2005

Setting General Copy Options

Copy only changed source files to target

If the source and target have files with the same name, Secure Copy compares the file size and time/date stamp. If the file size is different or the target file is older than the source file, Secure Copy overwrites the target with the source. The target is not purged; files and folders that are in the target, but not in the source, remain in the target after the copy process completes. If the target path is empty, all files and folders are copied from the source to the target.

Ignore NTFS/FAT time differences up to 2 seconds Select to skip files where the last-modified date and time differs by less than 2 seconds. File-time granularity is 100 nanoseconds on NTFS and 2 seconds on FAT, so copying a file from NTFS to FAT causes file times to be rounded to a value that the FAT file system can manage. When both the source and destination volumes are NTFS, the file times are compared exactly. When either the source or destination volume is not an NTFS volume, Secure Copy considers file times to be identical if they are within 2 seconds of each other. Without this 2-second margin, Secure Copy might classify unmodified files as older or newer files, which would result in unnecessary copying of unchanged files.

Sometimes you may want to override this handling of file times. For example, you copy an NTFS tree to a FAT volume. Secure Copy rounds the file times. You then copy the FAT tree (with its rounded file times) to a local NTFS drive. Later, when you want to recreate the original tree exactly, you do not want to refresh the entire tree.

Copy all files from source to target Copies all files and folders from the source to the target. If the source and target have files and folders with the same name, Secure Copy overwrites the target with the source. The target is not purged; files and folders that are in the target, but not in the source, remain in the target after the copy process completes. If the target path is empty, all files and folders are copied from the source to the target.

Page 19: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 15

UPDATED 25 AUGUST 2005

Synchronize Target with Source Select to activate the options for synchronizing the target with the source.

Purge orphaned files/folders in target folder Select to make all files and folders in the target identical to those in the source. This options deletes files or folders in the target that also do not exist in the source.

Important: Only select this option with a single source path and a single target.

Purge orphaned files/folders in SUBFOLDERS of the target Select this option to make all subfolders in the target identical to subfolders with the same name in the source. This option deletes files and folders in the target subfolders that also do not exist in subfolders with the same name in the source.

Important: Only select this option with multiple source paths if you are certain that none of the source paths have subfolders with duplicate names.

Override security on Access Denied (you must be an administrator) Allows an administrator to perform a copy without changing any of the permissions or ownership for the objects.

In a traditional copy process, a user must have permissions on a file or folder to copy it. If the user is denied access, they must first take ownership of the object, and then set the appropriate permissions before copying it. Imagine the nightmare scenario of migrating 10,000 user home and profile directories from one server to another. These directories would take forever to repermission and copy.

Don’t Copy Permissions (copy data only) Copying the permissions on data is not always necessary for every copy job. A user may just want to migrate data from one drive to another, or from one server to another.

Generate Log File Writes the information about the copy job progress to a text file. Click to select a location and specify a name for the log file. After the log file is generated, click to view the file contents.

Verbose Logging Provides more detail in the log text file. Available only if Generate Log File is selected.

Page 20: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 16

UPDATED 25 AUGUST 2005

Setting Advanced Options

Reset Last Accessed Date on source files

Copying files and permissions causes the Last Accessed Date to be set to the current date. Selecting this option causes Secure Copy to change the Last Accessed Date to the date it was last accessed before the copy, which is useful if you want to later audit your files to see if they need to be archived or deleted. Selecting this option also prevents the copy process from interfering with Windows 2000/XP/2003 features, such as Remote Storage.

Synchronize Last Accessed Date and Created Date on target w/source Use when you want the copy on the target to be identical to the copy on the source. This specifically includes the Last Accessed Date and the Created Date. If this option is not checked, this information comes from the settings that the operating system sets automatically.

Always copy perms, even on skipped files Copies the permissions of source files and folders from the source to the target, even if the files and folders are exactly the same. This option is helpful in a situation where the permissions were changed on the source, but the files were not modified. The copy process skips the files because of the file size and time/date stamp are identical. If this option is selected, the permissions are copied even if the file is not.

Clear Archive Bit on source after copying After files and folders are copied, Secure Copy clears the archive bit on those files and folders.

Verify file copy Creates a verify log text file.

Set Password for migrated user accounts Applies a password to migrated user accounts. Available only if Migrate Local Groups/Users to Destination Server is selected on the Migrate Local Groups tab. Type the password in the New Password box.

Thread count Select the number of copy threads for an individual smaller copy job. The minimum is 2 and the maximum is 20.

Page 21: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 17

UPDATED 25 AUGUST 2005

Batch count Select the maximum number of files in an individual smaller copy job. The minimum number of files is 25 and the maximum is 100.

Batch size Select the maximum number of bytes in an individual smaller copy job. The minimum is 1 byte and the maximum is 10.

Retry on locked file Requests a retry of any files that were not copied during the initial pass through the directory structure.

Retry attempts Choose the number of times to attempt a retry on locked files. Active only if Retry on locked file is selected.

Minutes between retries Choose the number of minutes to wait between each retry on locked files. Active only if Retry on locked file is selected.

Page 22: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 18

UPDATED 25 AUGUST 2005

Compressing Files

Specify how Secure Copy handles file compression during the copy process.

Never compress target files

Disregards any file or folder compression that may exist on the source or target. Copies all files and folders uncompressed. This option offers the greatest speed for the copy process, and is recommended if there is not a space requirement on the target.

Always compress target files Only use this option in cases when space is a premium as it adds substantial overhead and time to the copy job. This option also adds to the fragmentation on the target volume. Use only if absolutely necessary.

Compress target files only if source is compressed Compresses the files and folders on the target if they are compressed on the source. This option provides consistency among the file systems on the source and target, but also adds to the time required to perform the process. Use only if necessary.

Page 23: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 19

UPDATED 25 AUGUST 2005

Migrating File Shares

Secure Copy allows the migration of file shares from one server to another server or to multiple servers. Secure Copy recreates the file shares of the source server on the target server with share permissions intact, which greatly reduces the time for file share creation on the target server.

Migrate File Shares to Destination Server

Secure Copy recreates on the target server, the file shares that are on the source server. Shares whose folders are not specified in the source paths are not copied. In other words, as Secure Copy runs the copy process, it checks each source path and its subfolders to see if they are shared. If so, and if this option is specified, Secure Copy recreates the share on the target computer and creates the appropriate share permissions as dictated by those of the source.

The sub options are used if the share name already exists or if the share needs to be created on a Windows NT/2000/2003 cluster.

Skip it (ignore) If a share already exists on the target, Secure Copy does not create the share on the target.

Overwrite (remove old share, create new one) If a share already exists on the target, Secure Copy unshares the share on the target, and then writes over it with the source share.

Add the prefix Add the suffix

In cases where there may be multiple shares of the same name and you want to recreate the shares using the new folders from the source, but manually renaming the shares when prompted may be unfeasible, such as in the case of a scheduled job, you can have Secure Copy add a prefix or a suffix to the new share name. This gives a uniform naming convention to the new shares and prevents unnecessary user intervention.

Cluster Group Name If you are copying data to a cluster, type the name of the cluster. Secure Copy migrates the shares to the specified cluster.

Page 24: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 20

UPDATED 25 AUGUST 2005

Migrating Local Groups

Secure Copy allows an administrator to recreate local groups and users on a target server if the local group or user has permissions on the data that is being copied. When the data is copied, the security shows a SID and an Account Unknown because the local storage area management (SAM) database on the target server does not have an entry for the local group/user on the source server.

Migrate Local Groups/Users to Destination Server

Enables functionality available in the dialog box.

Note: Secure Copy only migrates local groups and users who already have permissions on the data that is being copied.

Local Groups Migrates local groups from the source to the target.

Local Users Migrates local users from the source to the target.

Target Server Migrates the local groups/users from the source server to the target server.

Active Directory Migrates the source local groups/users to a Windows 2000/2003 server-based domain. In the Destination OU box, type a path using standard LDAP format, or click to browse for an organizational unit (OU).

NT Domain Migrates the source local groups/users to a Windows NT 4.0 domain. In the Destination Domain box, type the NetBIOS name of the domain, or click to browse for a domain.

Page 25: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 21

UPDATED 25 AUGUST 2005

Always perform the following action Always add a prefix or suffix to the migrated groups/users to avoid conflicts. This option is helpful to administrators who use local groups and users with the same names on many servers throughout the enterprise.

Add the prefix Add the suffix

Type the prefix or suffix in the box. Adding a prefix or suffix allows administrators to enforce a standard naming convention, or to differentiate the migrated groups and users from their already existing counterparts.

Use the existing group/user If a local group/user name already exists on the target, Secure Copy applies those permissions to the migrated data.

Add members of the source group to existing group Migrates the users of a group on the source server to the group with the same name on the target server.

Synchronize target members with source members If a local group/user already exists on the target, the source local group/user overwrites the target.

Add the prefix Add the suffix

In cases where there may be multiple local groups/users of the same name and manually renaming the local groups/users when prompted may be unfeasible, such as in the case of a scheduled job, you can have Secure Copy add a prefix or a suffix to the new local group/user name. This gives a uniform naming convention to the new local groups/users and prevents unnecessary user intervention.

Don’t append users to Target server’s BUILTIN group Does not append users to the BUILTIN group in the target server.

File Path Renames specific local groups during a migration by applying the contents of a map text file, which contains the old and new names. See Using Map Files.

To create a map file, create a text document in Notepad, add one line for each map, and then save the file. Click to select the location of the map file. To view the contents of the map file, click .

Example ServerAGroup = ServerBGroup ServerALocalGroupB = ServerBLocalGroupB

Page 26: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 22

UPDATED 25 AUGUST 2005

Filtering Files

Secure Copy offers users the ability to filter which files and folders are copied based on a few criteria.

Apply the following filter to the files

Includes or excludes files depending on their extensions. This option gives administrators control over what content gets migrated, which is especially useful for the elimination of files that may not be necessary or appropriate in a corporate environment, such as TMP, MP3, MOV, MPG, WMA or any hundreds of others.

Conversely, it can allow for migrations based on file types. For example, if one server will hold data such as multimedia for a company, a system administrator can specify that only the files for that use will go to the new server. In this case they might copy only JPG, MPG, SWF, MOV, WAV, or any other file with an extension that may be of importance.

Add an Extension 1. Click . The Enter extension box opens.

Important: When typing the extension, do not include the period or the extension will not be included or excluded based on the criteria. Secure Copy does not support wildcard values, such as * or ?

2. Type an extension without the period, and then click OK.

Remove an Extension In the Extensions list, select a extension, and then click .

Include files that match these extensions Includes those files with the extension(s) listed in the Extensions list. Active when Apply the following filter to the files is selected.

Exclude files that match these extensions Excludes those files with the extension(s) listed in the Extensions list. Active when Apply the following filter to the files is selected.

Page 27: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 23

UPDATED 25 AUGUST 2005

Exclude all folders with the following names Excludes folders based on their names. During a migration this might be helpful for the elimination of folders that are not necessary and can be recreated later. Some examples are temp folders and Temporary Internet Files folders.

Add a Folder 1. Click . The Enter Folder Name to Exclude box opens.

Important: Secure Copy does not support wildcard values, such as * or ?.

2. Type a folder name, and then click OK.

Remove a Folder In the Folder Name list, select a folder name, and then click .

Include files modified between dates Includes files that were modified between the selected start and end dates. From the Start Date and End Date lists, select start and end dates.

Include files between these sizes Includes files whose size is between the specified minimum and maximum size. In the Min size and Max size boxes, type values in kilobytes (KB).

Limit folder recursion depth Limits the depth of the subfolders beneath the source folder that is selected for copy. In the Folder depth box, type a value to represent the level of subfolders (1 = one level; 2 = two levels).

Page 28: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 24

UPDATED 25 AUGUST 2005

TESTING A JOB

Before running a copy job, you might want to test it to see if any errors are generated.

1. Open the Secure Copy tab to test the displayed job, or select one or more jobs on the Saved Jobs tab.

2. From the Job menu, choose Test Job, or click . The testing mode window opens to display the progress of the test.

To cancel a test while it is running, click Cancel.

If any errors occur during the test, an explanation and path displays. To save the errors to a comma/quote delimited log file (.txt), click Save As, locate a destination, name the file, and then click OK.

Note: To maximize the performance of Secure Copy, you can set various options on the Advanced Options window to increase the number of copy threads used. See Maximizing Copy Performance.

3. If Close this window automatically when no errors occur is selected, the window closes if the test is successful; otherwise, click Close.

Page 29: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 25

UPDATED 25 AUGUST 2005

RUNNING A JOB

Before running a job, you might want to test the process to see if any errors are generated. No files are copied during the test. See Testing a Job.

1. Open the Secure Copy tab to run the displayed job, or select one or more jobs on the Saved Jobs tab.

2. From the Job menu, choose Run Now, or click . The Job window opens to display the progress of the job.

To cancel a job while it is running, click Cancel.

If any errors occur, an explanation and path displays. To save the errors to a comma/quote delimited log file (.txt), click Save As, locate a destination, name the file, and then click OK.

If the job is successful, a message displays in the window header.

Note: To maximize the performance of Secure Copy, you can set various options on the Advanced Options window to increase the number of copy threads used. See Maximizing Copy Performance.

3. If Close this window automatically when no errors occur is selected, the window will close if the test is successful; otherwise, click Close.

If you ran saved jobs, the Last Run and Status columns update with the run time and job status.

Page 30: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 26

UPDATED 25 AUGUST 2005

SAVING A JOB

Secure Copy includes the ability to save and load copy jobs, which is extremely valuable to administrators who use jobs frequently or create complex jobs that require occasional modification.

Note: Secure Copy maintains the job name and configuration settings of all saved jobs in a file — SecureCopy3.SSD — in the installation directory of the program. You can modify this file using a text editor, such as Notepad, or by loading the job in Secure Copy, and then making changes. You also can use a saved job to create a new job, by saving it with a different name after you modify the job. See Loading a Saved Job.

1. From the Secure Copy tab, open the Job menu, and then choose Save Job or Save Job As, or click . The Enter Job Name box appears.

2. Type a name for the job, and then click OK. The saved job is accessible from the Saved Jobs tab.

LOADING A SAVED JOB

1. Open the Saved Jobs tab, and then select a job.

2. From the Job menu, choose Load Job, or click .

The Secure Copy tab opens displaying the source and target paths, and the selected copy options.

3. Make any modifications to the job, and then save the job with the same name or save the job as a different name.

Page 31: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 27

UPDATED 25 AUGUST 2005

SCHEDULING JOBS

Secure Copy includes the ability to schedule copy jobs to occur when they are convenient to personnel, without interfering with business practices. The best time for data migration is during hours of non-operation or non-peak usage. Quite often this is not feasible for the average 9 to 5 administrator. Secure Copy uses the features of the Microsoft Task Scheduler service to handle all functions of job scheduling.

1. Open the Secure Copy tab to test the displayed job, or select one or more jobs on the Saved Jobs tab.

2. From the Job menu, select Schedule Job, or click . The Task tab displays the job in the Run box.

3. In the Comments box, type any comments about the task.

4. Your user account name displays in the Run as box. If you want another user account to run the task, change the entry.

If you want to change the user who can run the task, click Set Password. The Set Account Information dialog box displays. You can change the user account here also. Type a password, and then click OK.

Note: The Enabled checkbox is selected by default, which enables the task to run at the specified time. To disable the task from running, clear the Enabled checkbox.

5. Open the Schedule tab to create a new schedule or edit an existing schedule.

Page 32: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 28

UPDATED 25 AUGUST 2005

6. To create a new schedule, click New. The default values display. If Show multiple schedules is selected, you can create more than one schedule for the task.

7. From the Schedule Task list, select how often you want the task to run: Daily, Weekly,

Monthly, Once, At System Startup, At Logon, or When Idle. The Schedule Task area of the dialog box changes depending on which option you select.

8. From the Start time list, select the time for the task to start.

9. To set more options, click Advanced. The Advanced Schedule Options dialog box appears.

10. Set the desired options, and then click OK.

Page 33: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 29

UPDATED 25 AUGUST 2005

11. Open the Settings tab. Here you can set more options for the selected task.

12. Click Apply at any time to apply your selections to the task. To apply the settings and

close the dialog box, click OK.

Note: If the job was not enabled, Secure Copy automatically enables the job so the scheduled task can run. To disable the job so the scheduled task does not run, right-click the job, and then choose Disable Job. To enable the job again, right-click the job, and then choose Enable Job.

Managing Scheduled Jobs

The Task Scheduler service is included with Microsoft Internet Explorer 5.0 and later with the Offline Browsing Pack installed. As such it is included in Windows 2000/XP/2003. It is an add-on to Windows NT 4.0.

To view scheduled jobs in Windows NT 4.0, open My Computer.

To view scheduled jobs in Windows 2000/XP/2003, click Start, point to Programs > Accessories > System Tools, and then choose Scheduled Tasks.

Page 34: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 30

UPDATED 25 AUGUST 2005

USING SECUREJOBCOPY4.EXE

SecureJobCopy4.exe is the engine that Secure Copy uses for copy processes and it uses all of the features that are available in Secure Copy. SecureJobCopy4.exe runs from the command line, but offers only limited options to script, because it references the features of a saved job by using the name of that job.

Note: You must use SecureJobCopy4.exe from a computer that has a fully licensed version of Secure Copy 4 installed. You cannot copy SecureJobCopy4.exe from machine to machine, as it works only as an evaluation version and is limited to copying a small amount of objects.

REMOVING SECURE COPY 4

Proper removal of Security Explorer can be achieved in a few ways. You can use the Add/Remove Programs control panel applet for a full removal.

1. From the Windows Control Panel, double-click Add/Remove Programs. The Add/Remove Programs window opens.

2. From the list of currently installed programs, select Secure Copy 4.

3. Click Remove. A message box prompts you for confirmation.

4. To remove the application, click Yes. A status dialog box displays for the few seconds necessary to remove the application.

After removal is complete, Secure Copy will have been removed from your system. Note that the installation directory that contained Secure Copy remains after the process is complete. This directory contains the license file for the product and any files created after the product was installed. These may be deleted manually if you wish to completely remove Secure Copy.

Page 35: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 31

UPDATED 25 AUGUST 2005

Applying Secure Copy Options There are several options that you can select to perform various tasks. This chapter includes information about ways to apply Secure Copy Options to maximize your use of Secure Copy.

MAXIMIZING COPY PERFORMANCE

There are three parameters on the Advanced Options tab that you can use to maximize copy performance: Thread count, Batch count, and Batch size. See Setting Advanced Options.

By default, the maximum number of files in a batch is 25 and the maximum size of the batch is 1MB. The minimum number of threads is 2 by default. By increasing the thread count, you are adding more threads that copy batches of files. Each of the file threads deals with one batch of files at a time.

In normal operation, these default settings should be adequate. However, if you have a large number of small files and many batches, you might start by creating at least 10 threads, and then monitoring network card utilization.

The goal of adjusting these three parameters is to maximize your network bandwidth. Other factors that prevent Secure Copy from using all the network bandwidth include slow disk speeds, disk fragmentation, and other activity on the network and file server.

Page 36: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 32

UPDATED 25 AUGUST 2005

USING MAP FILES

A map file is a text file that creates a mapping between source and target groups and users. Using a map file give you greater flexibility in the way that local groups/users are migrated, either from one computer to another, to an NT domain, or to Active Directory.

Note: Map files cannot be used to create mappings for domain groups.

Map files are most commonly used when local group/user accounts include the source computer's name.

Example You need to migrate data from Server1 to Server2. Permission entries on the data include the local groups LocalGroup1_Server1 and LocalGroup2_Server1.

If the data is copied using the Migrate Local Groups option, the data is copied to Server2, but the access control lists for the data would still reference LocalGroup1_Server1 and LocalGroup2_Server1.

Using a map file provides a means of modifying the behavior of the local group migration so that once the job completes, the access control lists for the data would reference LocalGroup1_Server2 and LocalGroup2_Server2.

1. Using Notepad, create a map file by typing each name mapping on a new line.

2. In Secure Copy, click , and then click Migrate Local Groups. See Migrating Local Groups.

3. Select Migrate Local Groups/Users to Destination Server.

4. Under Map file, select File Path, and then click to locate the map file you created.

Note: To view or edit the contents of the map file, click .

5. Select any other options on the Migrate Local Groups window, and then click OK.

6. On the Secure Copy tab, specify the source and destination paths. See Creating a New Job.

7. Run the job. See If Close this window automatically when no errors occur is selected, the window closes if the test is successful; otherwise, click Close.

8. Running a Job.

Page 37: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 33

UPDATED 25 AUGUST 2005

COPYING FOLDER STRUCTURES WITHOUT FILES

At times it may be desirable to replicate a directory structure from one computer to another, but not include files that may reside within that structure.

By using a combination of folder and file selection filters, it is possible to create a copy job that includes all the folders/directories of a specified source path, but does not include any files within that path.

1. On the Secure Copy tab, specify the source and destination paths. See Creating a New Job.

Note: It may be desirable to uncheck Create initial source folder under target folder, especially when the source path is a drive root (i.e., \\server1\c$\).

2. Click , and then click Filter Files.

3. Select Exclude all folders with the following names. Leave the Folder Name list empty.

4. Select Apply the following filter to the files.

5. Click , type an extension that does not exist within the selected source structure, such as xyz, and then click OK.

6. Click OK to close the Secure Copy Options window.

7. Run the job. See If Close this window automatically when no errors occur is selected, the window closes if the test is successful; otherwise, click Close.

8. Running a Job.

Page 38: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 34

UPDATED 25 AUGUST 2005

CREATING LOG FILES

Three types of log files can be created, which include varying levels and types of information: basic, verbose, and verify.

Note: Unless the name of a log file is changed, it is overwritten by successive copy jobs. To prevent a log from being overwritten, append the name of the log file with either of the following case-sensitive variables, which provide a unique timestamp: %DATE%

#DATE#

The format of the timestamp is: yyyy_mm_dd_hh_mm_ss

Basic Log File

The basic log file is created on the General Copy Options window. See Setting General Copy Options.

Contents Start Time (day, date, and time)

Source Path Count

End Time (day, date, and time)

Summary Information:

Number of folders and files processed

Number of Copied Files and Total Bytes Transferred

Number of Skipped Files and Total Bytes Skipped

Verbose Log File

Contents are the same as the basic log file, but each folder and file is listed in the order it was processed. See Setting General Copy Options.

Verify File Copy Log File

The verify log file is created on the Advanced Options window. See Setting Advanced Options.

Contents Start Time (day, date, and time)

For each file copied the following information is logged:

CRC Source: <a 32-bit CRC value created when read> (sourcepath\filename)

CRC Dest : <a 32-bit CRC value created when written> (destinationpath\filename)

CRC Match?: [Yes | No]

End Time (day, date, and time)

Summary Information:

Number of folders and files processed

Number of Copied Files and Total Bytes Transferred

Number of Skipped Files and Total Bytes Skipped

Page 39: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 35

UPDATED 25 AUGUST 2005

Troubleshooting FREQUENTLY ASKED QUESTIONS

I get errors when I try to run the Secure Copy 4 installation file on Windows NT 4.0. Why is this?

The Secure Copy 4 setup file is distributed in a Windows Installer package due to the inherently robust nature of this package. Additionally this format provides for ease of distribution, publication, installation and uninstallation. The Windows Installer service is built into the Windows 2000/XP/2003 operating systems, but not into Windows NT 4.0. To install Secure Copy 4 correctly on Windows NT 4.0, you need to first install the Windows Installer service.

I am licensed for multiple servers, but I get an error message when I try to apply my license file to another server. It states that the license file has already been applied and to please select a fresh file to unlock the product. Why?

This behavior is by design. Please contact technical support for a resolution.

When I copy the command line version of Secure Copy to another server it is limited as to how many objects it can copy. Why is this?

The command line version needs to run from a machine where Secure Copy is installed as the command line version uses the same license file.

Page 40: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 36

UPDATED 25 AUGUST 2005

Index

A Add button, 13 Advanced Options, 16 archive bit

clearing, 16

B batch count, 17 batch size, 17 browse

bypass, 13 path, 11

BUILTIN group, 21 buttons

Add, 13 Del, 13 Options, 13 View, 15, 21

C canceling

running job, 25 checkboxes, 11 clearing

archive bit, 16 cluster group name, 19 compressing

files, 18 copying

folder structures, 33 only changed files, 14 permissions, 16 setting options, 13

creating folder structures, 10 log files, 34 map files, 32 new folders, 13 new jobs, 10

D Delete button, 13

E Enter Folder Name box, 13 Enter Path box, 13 entering

path, 13 excluding

files and folders, 23 exiting

Secure Copy, 9

F file compression, 18 File menu, 9 file shares

migrating, 19 files

copy only changed, 14 filtering, 22 selecting, 12

filtering files, 22 folders

copying structures, 33 creating new, 13 selecting, 12

G General Copy Options, 14 generating

log file, 15 verbose log file, 15

H Help menu, 9

I including

files, 23

Page 41: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 37

UPDATED 25 AUGUST 2005

J Job menu, 8 jobs

creating new, 10 loading saved, 26 managing scheduled, 29 running, 25 saving, 26 scheduling, 27 testing, 24

L last accessed date, 16 loading

saved job, 26 local groups

migration, 20 log file, 15, 34

verbose, 15, 34 verify, 16, 34

M managing

scheduled jobs, 29 map files, 21, 32 menus

File, 9 Help, 9 Job, 8 Window, 9

migrate user accounts setting password, 16

migrating file shares, 19 local groups, 20

modify saved job, 26

multithreading, 16

O opening

Secure Copy, 7 options

advanced, 16 general copy, 14

Options button, 13 overriding

security, 15

P path

browsing for, 11 removing, 13 typing in, 13

permissions copy, 16

R recursion depth, 23 removing

folder from list, 23 path from list, 13 Secure Copy, 30

running a job, 25

S Saved Jobs tab, 8, 26 saving

copy job, 26 scheduling

copy job, 27 Secure Copy

exiting, 9 removing, 30 starting, 7

Secure Copy tab, 7 blanking, 10

SecureJobCopy4.exe, 30 security

override, 15 Select Folder list, 11 selecting

folders and files, 12 setting password

migrated user accounts, 16 shares. See file shares. source

synchronize with target, 16, 21 starting

Secure Copy, 7 synchronize

last accessed date, 16 synchronizing

created date, 16

T tabs

Saved Jobs, 8, 26 Secure Copy, 7

target synchronize with source, 16, 21

testing a job, 24 thread count, 16 toolbar, 8

captions, 9 toggle, 9

Page 42: Secure Copy User Guide - AxanTech · SECURE COPY™ 4 3 UPDATED 25 AUGUST 2005 SAVE JOBS FOR FUTURE OR SCHEDULED USE Secure Copy allows you to define a job, which is a set of source

SECURE COPY™ 4 38

UPDATED 25 AUGUST 2005

V verbose log file, 15, 34 verify log file, 16, 34 View button, 15, 21

W wildcards, 22 Window menu, 9 Windows Installer, 35