Changing the Data Source
Creating a Custom Report
Creating Key Pairs for OpenPGP
Banning Unwanted File Types
OpenPGP Key Ring Manager
Specifying File Deletion Options
Configuration and Security Best Practices
Using an ODBC Data Source for User Authentication
Changing the Data Source
Creating Tables for your ODBC Data Source
Using a DSN-Less Connection with ODBC Authentication
Purging Data from the Database
Database Audit Settings
Changing the User Database Refresh Rate for a Site
Database User Account Privileges
Upgrading the EFT Database
Database Audit Settings
ARM Schema
Installing and Configuring the Auditing and Reporting Module
System Requirements for EFT
Configuration and Security Best Practices
Upgrading the EFT Database
EFT Database Utility
Database User Account Privileges
Upgrading the EFT Database
Database User Account Privileges
EFT Database Utility
Upgrading the EFT Database
Database User Account Privileges
Upgrading the EFT Database
EFT Database Utility
Default Paths
Specifying Default Paths
Default Time Stamp
Specifying the Default Time Stamp
Custom Command Example
Using Conditions
Creating an SSH Key Pair
Sending Files to an AS2 Partner via Event Rules
Configuring the AS2 Module
Defining Custom Reports
Defining Event Rules
Defining Connections to EFT
Adding EFT Administrators
Delegated Administration
Deleting Groups
Viewing and Removing Commands
Creating Renaming and Deleting Server Groups
Deleting a User Account
Deleting a Virtual Folder
Managing Event Rules
Events and Available Variables
Deleting Key Pairs for OpenPGP
Deleting a Physical Folder
Deleting a Report
Creating Settings Templates
Defining Event Rules
Renaming Deleting and Moving a Server
Flooding and Denial of Service Prevention
Disconnecting Users after a Defined Number of Invalid Commands
Importing a Certificate
SSL Certificate Compatibility
Using Ciphers for SSL Connections with EFT
Using Ciphers for Outbound (Event Rule) SSL Connections
Extending the Trial
Activating the Software
Enabling or Disabling a Settings Template or User
Enabling and Disabling Commands
Enabling Protocols in a Settings Template
Security Tab of a User Account
Enabling or Disabling RADIUS for a Settings Template
Enabling or Disabling RADIUS for a User Account
Activating DMZ Gateway
Routing Outbound Traffic through a Proxy
Configuring Perimeter Network Security
Connecting to an LDAP Server
IDN Support in EFT
Connecting to an LDAP Server
IDN Support in EFT
Connections Tab of a Site
Flooding and Denial of Service Prevention
Download Action
Events and Available Variables
AS2 Inbound Parameters
Configuring AS2 Inbound Partners Using the Wizard