Starting and Stopping EFT
EFT starts automatically and runs as a Windows system service. If you close the administration interface, EFT continues to run in the background as a system service.
On the Recovery tab of the service's properties:
-
On non-HA installations, the service is configured to "Take no action" on failure.
-
On HA installations, the service is configured to "Restart the Service" on failure.
For the procedure for a remote EFT connection, refer to Starting and Stopping EFT Remotely.
When you stop the service, EFT breaks all
existing connections and waits until all socket threads die. The
service can terminate when Timer Event processing is still in
progress. The triggering of Monitor Folder and Timer Event Rules
occurs almost simultaneously and is controlled by the operating
system, not by EFT.
To stop EFT in the administration interface
-
In the administration interface, connect to EFT and click the Server tab.
-
On the Server tab, click the Server that you want to start/stop.
-
In the right pane, click the General tab.
-
Click Stop service, then click Apply. EFT status indicator turns from green to red.
To start or stop EFT using Windows Services
-
Click Start > Run. The Run dialog box appears.
-
In the Open box, type services.msc then press ENTER.
-
Right-click the EFT Server service and click Start (or Stop).
To start or stop EFT from the command line
-
Click Start > Run. The Run dialog box appears.
-
In the Open box, type cmd or command then press ENTER. The Windows Command Prompt dialog box appears.
-
To start EFT, at the prompt type the following command (include the quotation marks):
Net start "globalscape EFT"
-
To stop EFT, at the prompt type the following command (include the quotation marks):
Net stop "globalscape EFT"
-
After the service is started or stopped, type Exit (or close the Command Prompt).
Secure the Server Service
Any time you run a service, you expose your computer to outside users. The potential exists for exposing files and programs on your computer and network to malicious outside users, particularly if EFT is compromised. Although you can set folder permissions from within EFT administration interface, you can add an extra level of protection by establishing a user account for EFT and then limiting folder access through EFT's user account permissions. This establishes a stopgap until server/system integrity can be restored if EFT is ever compromised.
To configure EFT to run securely, you should:
-
Assign permissions to EFT's user account and assign EFT to the account
-
If necessary, configure EFT's user account to map a virtual folder to a network drive.