Chat now with support
Chat with Support

Secure Copy 7.6.1 - User Guide

Using Secure Copy Setting copy options Running copy jobs Using the command line Managing licenses Running Update Utilities Troubleshooting PowerShell cmdlets

Analyzing file systems statistics

The File System Statistics Analyzer uses algorithms similar to Secure Copy to gauge both the scope and performance of the file systems of servers. In most cases, outputs from the analyzer are requested when performance issues are identified with Secure Copy. Extremely large file systems, poor communications between sources and targets, conflicts with other pieces of software, and other situations can cause the indexing performance of Secure Copy to suffer. One of the first elements of diagnosis in these situations is to try and gauge the overall size of the file systems configured for indexing.

Click Analyze.
Choose File | Analyze.

Enumerate all fixed drives on this computer

Select to gather statistics on all fixed drives on the computer.

Enumerate server

Select and type the name of the server on which to collect statistics.

Enumerate paths

Select and click Browse to locate a folder or click Add to type a folder name. You can add multiple paths to the list.

To import a .TXT or .CSV file of paths, click Import, locate the file, and click Open.

Output File

The default output file is C:\Program Files\Quest\Secure Copy 7\Logs\Outputlog.csv.


To change the number of threads, choose a different value. By default, 1 thread is used to perform enumeration. In some instances, target systems respond favorably to having more threads employed to enumerate file system information.

Use Backup Privileges

Select to leverage the Backup Operators right to avoid access denials in cases where no native rights exist to enumerate or read security information.

Capture Security Information

Select to force the application to read security from every resource encountered, in addition to recording file size and count information. Performance when using this option is generally much lower than without, but provides a much better indication of the performance of an Secure Copy agent used in the same scenario.


Select to suppress the capture of system access control lists (SACL).

No status

Select to hide the command window and run the analyzer in quiet mode.

Click Run.

Using the command line

Using SecureCopyCmd.exe

You can run Secure Copy from the command line by using SecureCopyCmd.exe. You can run the File System Statistics Analyzer from the command line using FileSystemStatistics.exe.

SecureCopyCmd.exe is the engine that Secure Copy uses for copy processes and it uses all of the features that are available in Secure Copy. SecureCopyCmd.exe runs from the command line, but offers only limited options to script, because it references the features of a saved job by using the name of that job.

NOTE: You must use SecureCopyCmd.exe from a computer that has a fully licensed version of Secure Copy 7 installed. You cannot copy SecureCopyCmd.exe from computer to computer.


Specify jobs database (.ssd file)


Specify job using Job Name


Define a new source path.

IMPORTANT: If you add /source to the command, it overrides the source(s) specified in the copy job identified by the job id or name.


Define a new target path.

IMPORTANT: If you add /target to the command, it overrides the target(s) specified in the copy job identified by the job id or name.


Specify true or false.


Test the job.


Delete the job.


Runs job without user interface.

Using Analyzer from the command line

You can run the File System Statistics Analyzer from the command line using FileSystemStatistics.exe, which is located in the Secure Copy 7 installation folder.

The File System Statistics Tool (FileSystemStatistics.exe) is located in the Secure Copy installation folder: C:\Program Files\Quest\Secure Copy 7.

If neither /roots or /server are specified, the application will enumerate all fixed drives on the local computer, and process them.

/roots <roots>

/server <server>

/out <filename>

A file in which to write the applications output. The data written to this file is in comma separated (csv) format and is suitable for import into Microsoft Excel.

Avoids the use of the backup rights. If this flag is not specified, the backup right is enabled. Note that backup rights must be held on both the server where this application is run, and the target server.

Instructs the application to capture security information in addition to count and size information.

Suppresses the command window and runs the tool in quiet mode.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating