サポートと今すぐチャット
サポートとのチャット

Secure Copy 7.6 - Installation Guide

Supported NAS devices

Supported cloud storage services

User privilege requirements

To use Secure Copy®, a user must hold administrative rights. These rights are required for the installation and use of the product. Additionally, users must have administrative rights on any servers or workstations that are involved in the copy process.

Secure Copy runs under the context of the logged on user. For full access to all files and folders on the source machine, the user must be a member of the Administrators and Backup Operators groups on the source machine.

In a Windows-to-Windows data copy, the user must only be a member of the Administrators group to effectively grant the user the Backup Operator privileges and enable the Override Security on Access Denied feature. However, when copying to or from certain network storage devices such as a NetAPP Filer, the Override security on Access Denied option does not function. In this case, it is necessary for the user to be a member of the Backup Operators group on this machine to avoid being denied access to certain files. If there is any question as to whether a machine may not support this option, ensure the user is a member of the Backup Operators group to prevent being denied access to files or folders.

Destination folder

Secure Copy® needs to be installed on only one machine, which does not need to be the source machine or the target machine. Ideally, install Secure Copy on the source machine, which is most probably retired after the migration is done. The only time it is not recommended is when the source machine is too old to be quick enough or reliable enough for the copy process to be successful.

NOTE: Secure Copy streams RPC commands to the source and target machines as part of the copy process. Having the Secure Copy on a third machine causes numerous network connections to open and thus consume additional resources, which causes a minor latency between Secure Copy and the source and target machines.

NOTE: While some RAM is consumed at the source and target machines; however, the majority of the RAM is consumed on the machine running Secure Copy to build copy jobs. In the process of building copy jobs, Secure Copy generates lists of files that are portioned out among the available threads and batches. Maximizing the available RAM on the machine running Secure Copy allows it to perform tasks without caching to disk because of lack of memory.
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択