Chat now with support
Chat mit Support

Secure Copy 7.6.3 - User Guide

Using Secure Copy Setting copy options Running copy jobs Using the command line Managing licenses Running Update Utilities Troubleshooting PowerShell cmdlets

Deleting logs


Previous

Before you delete a log, you may want to export it to a file. See Exporting logs.

To delete a selected log file

1    Click Logs and Reports.

2    Right-click a log file, and choose Delete.

3    Click Yes to delete the log file.

Next


Running reports


Previous

You can run reports about the selected copy job.

To run a report

1    Click Logs and Reports.

2    Select a log file from the Logs and Reports pane.

3    Open the Reports tab and select a report.

NOTE: For those reports that can be sorted by Message or Source, select the desired option before running the report.

Table 20. List of reports

Report

Description

Summary Report

Lists job summary information.

Copied Files Report

Lists copied files, sorted by Message, Source, or File Type.

NOTE: Select the method of sorting prior to running the report.

Skipped Files Report

Lists skipped files, sorted by Message, Source, or File Type.

NOTE: Select the method of sorting prior to running the report.

Purged Files and Folders Report

Lists purged files and folders, sorted by Message, Source, or File Type.

NOTE: Select the method of sorting prior to running the report.

Local Groups and Users Report

Lists migrated local groups and users.

Failed Job Report

Lists fatal errors that prevented the copy job from completing.

Errors Report

Lists errors, sorted by Message, Source, or File Type. Select the method of sorting prior to running the report.

File Verification Report

Lists any differences in the SHA512 checksum comparisons of file verification, if Verify File Copy is selected on the Performance page. See Verifying file copy.

License Information Report

Lists licensed servers.

Console's Server List Report

Lists the server licenses used by this console.

Verbose Report

Displays the contents of the Log Viewer tab as a report.

Analysis Report

Displays the post-migration analysis.

Next


Analyzing file systems statistics


Previous

The File System Statistics Analyzer uses algorithms similar to Secure Copy to gauge both the scope and performance of the file systems of servers. In most cases, outputs from the analyzer are requested when performance issues are identified with Secure Copy. Extremely large file systems, poor communications between sources and targets, conflicts with other pieces of software, and other situations can cause the indexing performance of Secure Copy to suffer. One of the first elements of diagnosis in these situations is to try and gauge the overall size of the file systems configured for indexing.

To analyze file systems statistics

1    Click Analyze.

-OR-

Choose File | Analyze.

2    Choose the item on which to collect statistics.

3    Table 21. List of reports

Report

Description

Enumerate all fixed drives on this computer

Select to gather statistics on all fixed drives on the computer.

Enumerate server

Select and type the name of the server on which to collect statistics.

Enumerate paths

Select and click Browse to locate a folder or click Add to type a folder name. You can add multiple paths to the list.

·       To remove a selected path, click Remove.

·       To import a .TXT or .CSV file of paths, click Import, locate the file, and click Open.

Output File

The default output file is C:\Program Files\Quest\Secure Copy 7\Logs\Outputlog.csv.

·       To change the path or file name, click Browse.

·       To view the contents of the output file, click View.

Threads

To change the number of threads, choose a different value. By default, 1 thread is used to perform enumeration. In some instances, target systems respond favorably to having more threads employed to enumerate file system information.

Use Backup Privileges

Select to leverage the Backup Operators right to avoid access denials in cases where no native rights exist to enumerate or read security information.

Capture Security Information

Select to force the application to read security from every resource encountered, in addition to recording file size and count information. Performance when using this option is generally much lower than without, but provides a much better indication of the performance of an Secure Copy agent used in the same scenario.

No SACL

Select to suppress the capture of system access control lists (SACL).

No status

Select to hide the command window and run the analyzer in quiet mode.

·    Click Run.

·    To view the output file, click View.

                                                         4

Next


Using the command line


Previous

    Using SecureCopyCmd.exe

    Using Analyzer from the command line

Next


Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen