Chat now with support
Chat with Support

Secure Copy 7.5 - Installation Guide

Supported NAS devices

NOTE: Files, folders and shares can be copied with permissions on the following NAS devices. Local users and local groups on some devices, for example, NetApp®, EMC® VNX® and EMC® Isilon®, cannot be migrated correctly.
EMC Centerra® by EMC Celerra® NAS
Dell Compellant® Fluid FS 4.0.230

User privilege requirements

To use Secure Copy®, a user must hold administrative rights. These rights are required for the installation and use of the product. Additionally, users must have administrative rights on any servers or workstations that are involved in the copy process.

Secure Copy runs under the context of the logged on user. For full access to all files and folders on the source machine, the user must be a member of the Administrators and Backup Operators groups on the source machine.

In a Windows-to-Windows data copy, the user must only be a member of the Administrators group to effectively grant the user the Backup Operator privileges and enable the Override Security on Access Denied feature. However, when copying to or from certain network storage devices such as a NetAPP Filer, the Override security on Access Denied option does not function. In this case, it is necessary for the user to be a member of the Backup Operators group on this machine to avoid being denied access to certain files. If there is any question as to whether a machine may not support this option, ensure the user is a member of the Backup Operators group to prevent being denied access to files or folders.

Destination folder

Secure Copy® needs to be installed on only one machine, which does not need to be the source machine or the target machine. Ideally, install Secure Copy on the source machine, which is most probably retired after the migration is done. The only time it is not recommended is when the source machine is too old to be quick enough or reliable enough for the copy process to be successful.

NOTE: Secure Copy streams RPC commands to the source and target machines as part of the copy process. Having the Secure Copy on a third machine causes numerous network connections to open and thus consume additional resources, which causes a minor latency between Secure Copy and the source and target machines.

NOTE: While some RAM is consumed at the source and target machines; however, the majority of the RAM is consumed on the machine running Secure Copy to build copy jobs. In the process of building copy jobs, Secure Copy generates lists of files that are portioned out among the available threads and batches. Maximizing the available RAM on the machine running Secure Copy allows it to perform tasks without caching to disk because of lack of memory.

Upgrading to Secure Copy 7.5

To see what is new in Secure Copy®, refer to the What’s New in Secure Copy 7.5 document or the Secure Copy 7.5 Release Notes.

During the licensing process, you can import log files, scheduled jobs, and the jobs database from the previous version of Secure Copy. See Licensing Secure Copy.

As with all software installations, it is recommended that you back up your files before installing the new software. The simplest way to back up your files is to navigate to the directory on the server where Secure Copy is installed. Press CTRL-A to select all files in this folder. Press CTRL-C to copy the files to the clipboard. Create a new folder and press CTRL-V to paste these files into this new backup folder.

Related Documents