Before you delete a log, you may want to export it to a file. See Exporting logs.
To delete a selected log file
1 Click Logs and Reports.
2 Right-click a log file, and choose Delete.
3 Click Yes to delete the log file.
You can run reports about the selected copy job.
To run a report
1 Click Logs and Reports.
2 Select a log file from the Logs and Reports pane.
3 Open the Reports tab and select a report.
NOTE: For those reports that can be sorted by Message or Source, select the desired option before running the report. |
Table 20. List of reports
Report |
Description |
Summary Report |
Lists job summary information. |
Copied Files Report |
Lists copied files, sorted by Message, Source, or File Type. NOTE: Select the method of sorting prior to running the report. |
Skipped Files Report |
Lists skipped files, sorted by Message, Source, or File Type. NOTE: Select the method of sorting prior to running the report. |
Purged Files and Folders Report |
Lists purged files and folders, sorted by Message, Source, or File Type. NOTE: Select the method of sorting prior to running the report. |
Local Groups and Users Report |
Lists migrated local groups and users. |
Failed Job Report |
Lists fatal errors that prevented the copy job from completing. |
Errors Report |
Lists errors, sorted by Message, Source, or File Type. Select the method of sorting prior to running the report. |
File Verification Report |
Lists any differences in the SHA512 checksum comparisons of file verification, if Verify File Copy is selected on the Performance page. See Verifying file copy. |
License Information Report |
Lists licensed servers. |
Console's Server List Report |
Lists the server licenses used by this console. |
Verbose Report |
Displays the contents of the Log Viewer tab as a report. |
Analysis Report |
Displays the post-migration analysis. |
The File System Statistics Analyzer uses algorithms similar to Secure Copy to gauge both the scope and performance of the file systems of servers. In most cases, outputs from the analyzer are requested when performance issues are identified with Secure Copy. Extremely large file systems, poor communications between sources and targets, conflicts with other pieces of software, and other situations can cause the indexing performance of Secure Copy to suffer. One of the first elements of diagnosis in these situations is to try and gauge the overall size of the file systems configured for indexing.
To analyze file systems statistics
1 Click Analyze.
-OR-
Choose File | Analyze.
2 Choose the item on which to collect statistics.
3 Table 21. List of reports
Report |
Description |
Enumerate all fixed drives on this computer |
Select to gather statistics on all fixed drives on the computer. |
Enumerate server |
Select and type the name of the server on which to collect statistics. |
Enumerate paths |
Select and click Browse to locate a folder or click Add to type a folder name. You can add multiple paths to the list. · To remove a selected path, click Remove. · To import a .TXT or .CSV file of paths, click Import, locate the file, and click Open. |
Output File |
The default output file is C:\Program Files\Quest\Secure Copy 7\Logs\Outputlog.csv. · To change the path or file name, click Browse. · To view the contents of the output file, click View. |
Threads |
To change the number of threads, choose a different value. By default, 1 thread is used to perform enumeration. In some instances, target systems respond favorably to having more threads employed to enumerate file system information. |
Use Backup Privileges |
Select to leverage the Backup Operators right to avoid access denials in cases where no native rights exist to enumerate or read security information. |
Capture Security Information |
Select to force the application to read security from every resource encountered, in addition to recording file size and count information. Performance when using this option is generally much lower than without, but provides a much better indication of the performance of an Secure Copy agent used in the same scenario. |
No SACL |
Select to suppress the capture of system access control lists (SACL). |
No status |
Select to hide the command window and run the analyzer in quiet mode. · Click Run. · To view the output file, click View. |
4
© ALL RIGHTS RESERVED. Feedback Nutzungsbedingungen Datenschutz Cookie Preference Center