Quantcast
Channel: GlobalSCAPE Knowledge Base » Knowledgebase
Browsing all 424 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

USING SYMBOLIC LINKS TO SETUP EFT HIGH AVAILABILTY

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7 and laterDISCUSSIONA symbolic link (also symlink or soft link) is a special type of file that contains a reference to another file or directory in the...

View Article


Configuring Terms of Service Agreement for HTTP

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.1 and laterDISCUSSIONEFT version 7.1 and later supports a Terms of Service agreement in the HTML5 version of the WTC. The agreement appears after the...

View Article


Configuring a Terms of Service Agreement for Secure Ad Hoc Transfer Module

THE INFORMATION IN THIS ARTICLE APPLIES TO:Tested on EFT v6.5 and EFT v7.1DISCUSSIONSecure Ad Hoc Transfer module allows internal employees to send files that may be larger than email will allow. This...

View Article

Image may be NSFW.
Clik here to view.

How to Use EFT OpenPGP Keyring within AWE

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6.5 and laterDISCUSSIONYou can use Advanced Workflow Engine (AWE) workflows to design scripts, batch files, macros, or any other code-intensive process...

View Article

Image may be NSFW.
Clik here to view.

Emailing a report as a PDF attachment in EFT Event Rules

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONWhen the Auditing and Reporting module is activated, you can configure an Event Rule to generate a report, then email it or save it...

View Article


Image may be NSFW.
Clik here to view.

How to Use Active Directory as Authentication Source and Role Provider on EFT...

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT Web Admin, v3.6 and laterDISCUSSIONMake a backup of EFT Web Admin application files (e.g. C:\Program Files (x86)\Globalscape\EFT WebAdmin\webapps\).Open a...

View Article

Image may be NSFW.
Clik here to view.

Connecting Microsoft Excel to EFT ARM Tables

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT 6 and laterDISCUSSIONAdd a new Data source. Create connection to your SQL Server. Select the tables. Save your data connection file. Import Data. Use...

View Article

Image may be NSFW.
Clik here to view.

Use EFT Admins as Authentication Source and SQL Roles on EFT Web Admin

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT Web Admin, v3.6 and laterDISCUSSIONMake a backup of EFT Web Admin application files (e.g. C:\Program Files (x86)\Globalscape\EFT...

View Article


EFT Sync Tool - MX Error 71 (00000047) MXE_AW_INVALID_TASK_NAME

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT Sync/Migration Tool and COM APISYMPTOMWhen you use EFT Sync/Migration Tool to synchronize Advanced Workflows between two servers, you might receive an...

View Article


AWS EFT Usage Instructions

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7 and laterDISCUSSIONYou don't need to have your own infrastructure and server hardware to deploy an enterprise-level managed file transfer (MFT) server....

View Article

Where can I find the EFT EULA/license?

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, all versions QUESTIONWhere can I find the license /EULA for my version of EFT?ANSWERThe license is installed with every version of EFT. You can find...

View Article

Image may be NSFW.
Clik here to view.

Configuring EFT to Use SMTP Servers that require TLS Authentication

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONThis article provides the procedure for configuring EFT to use an SMTP server that requires TLS authentication (e.g., Amazon Web...

View Article

Using JQuery and AngularJS to Customize the Web Transfer Client in EFT v7.2...

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.2 and laterDISCUSSIONThe Web Transfer Client in EFT version 7.2 and later can be customized if you are familiar with with HTML, Javascript, jQuery, and...

View Article


Is EFT affected by CVE-2015-4000 (AKA "Logjam")?

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, all versions QUESTIONIs EFT affected by CVE-2015-4000 (AKA "Logjam")? ANSWERNo. EFT provides COMPLETE control over ciphers and key exchange. We do not...

View Article

Changing the path to the shared configuration folder for EFT with HA

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.0 and laterDISCUSSIONTo change the path to the shared configuration folder for an EFT server in HA mode create the following registry key, set the...

View Article


Mail Express® is NOT vulnerable to the Apache Commons Library exploit

THE INFORMATION IN THIS ARTICLE APPLIES TO:Mail Express®, all versionsDISCUSSIONMail Express is not vulnerable to the Apache Commons Library exploit, because Mail Express doesn’t use any of the...

View Article

Image may be NSFW.
Clik here to view.

Allowed MACs for HMAC-SHA2-512 and HMAC-SHA2-256 are disabled upon ugrade

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.2.1 and laterDISCUSSIONWhen EFT version 7.2.0 build is upgraded to version 7.2.1, the allowed MACs for HMAC-SHA2-512 and HMAC-SHA2-256 are disabled,...

View Article


Timer event rules skip their scheduled execution time due to delays caused by...

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.2.1 and laterDISCUSSIONThe registry setting below will enable or disable legacy ClientFTP logic to perform transfer retries in serial mode when using...

View Article

Backup will backup all files that reside in the server's configuration path

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.2.1 and laterDISCUSSIONThe site backup will backup all files that reside in the server's configuration path; therefore, if you have a 300MB file in the...

View Article

Assigning Workspace Permissions

THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.2.1 and laterDISCUSSIONWhen an EFT AD site is configured and AD users are granted strict permissions to files/folders, and a Workspace is created for a...

View Article
Browsing all 424 articles
Browse latest View live