We have made every attempt to organize the table of contents to the left in the order in which you will need to refer to the topics as you install and configure EFT Server, Sites, Settings Templates, Users, Groups, Commands, Event Rules, and add-on modules. The table of contents is organized in the same order as the tree in the Administrator interface.
|
After release of the product, the online help is updated as errors and omissions are identified. When you search globalscape.com, you are searching across all of GlobalSCAPE products, not just EFT Server. To get help:
|
Refer to the following topics to get started:
For details of how to use this help file and the self-help resources available online, refer to Getting Help.
For a detailed description of EFT Server, refer to Introduction to EFT Server.
For details of what is new in this version of EFT Server, refer to What's New?
For a detailed comparison of EFT Server and EFT Server Enterprise, refer to EFT Server Feature Comparison.
To become familiar with EFT Server and its add-on modules, read each of the topics in this user guide, then follow the procedures in Installing and Activating the Software. If you have already installed the software, follow the procedures in Configuring EFT Server, and the remaining procedures in the order they appear in this user guide.
This user guide provides the following information:
Step 1: Installing and Activating the Software. This section includes information regarding installing EFT Server, setting Windows system services, release notes, and upgrading and activating EFT Server and add-on modules.
Step 2: Configuring the Server. This section helps you make your first connection to EFT Server, and provides information regarding the Administrator Interface, Protocols and Security, user authentication, starting and stopping EFT Server, configuring remote administration, configuring EFT Server's SMTP connections, creating and managing Server administrators, and various other procedures related to configuring the way in which clients connect to EFT Server.
Step 3: Configuring Sites. This section provides information regarding creating and managing connections to EFT Server.
Step 4: Configuring Settings Templates and Users. This section provides information regarding creating and managing users and Settings Templates (to control access to EFT Server resources), configuring Protocols, Network Usage Options, and Password and Account Security Options.
Step 5: Configuring Groups. This section provides information for creating and managing Groups, which set user virtual file system (VFS) permissions to folders.
Step 6: Virtual File System. This section provides information about EFT Server's Virtual File System (VFS), which allows you to grant access to files and folders on your system based on user and Group permissions.
Step 7: Automation: Commands, Advanced Workflows, and Event Rules. These sections provide information regarding defining Commands and Workflows to use with Event Rules to run executables, batch files, and scripts automatically when specific events occur in EFT Server, and information regarding how to specify that an action is to occur when an event takes place and/or a condition is present. (e.g., send an e-mail when a file is uploaded).
The OpenPGP Module. This section provides information regarding creating and managing OpenPGP key pairs to safeguard data at rest.
AS2 Module. This section provides information regarding configuring and using EFT Server's AS2 (Applicability Statement 2) module to exchange structured business data securely using the HTTP (Hypertext Transfer Protocol; An application protocol that runs on top of the TCP/IP suite of protocols used for Internet/intranet communications, typically over port 80.) or HTTP/S (Secure HTTP connection; HTTP is used, but with TCP port 443 and an additional encryption/authentication layer between the HTTP and TCP.) protocol.
High Security Module. This section provides information regarding configuring EFT Server for use with the HS module for high security and/or compliance with the Payment Card Industry Data Security Standard.
Auditing and Reporting Module (ARM). This section provides information regarding using the Auditing and Reporting module to generate predefined and custom reports of EFT Server activities.
DMZ Gateway. This section provides information regarding configuring and managing DMZ Gateway Server to provide secured communications with EFT Server behind intranet firewalls without requiring any inbound firewall holes between the internal network and the DMZ.
Secure Ad Hoc Transfer Module. This section provides information regarding configuring the Secure Ad Hoc Transfer module to allow internal users to send and receive large e-mail file attachments to recipients outside of your organization quickly, reliably, and securely, without manually creating or maintaining FTP accounts on EFT Server.
Web Transfer Client. This section provides information regarding configuring the browser-based file transfer client that allows users to transfer files to/from EFT Server using a connected Web browser.
GlobalSCAPE Server COM API. This section provides information regarding the programmatic interface that allows you to control EFT Server from your own custom applications using any COM-enabled programming language
Getting Help. This section provides information regarding how to use this help file and how to access online self-help and customer support services.
Registrations and Licenses. This section provides information regarding registrations and licenses for the product, including the End-User License Agreement (EULA).