Starting and Stopping EFT

EFT starts automatically and runs as a Windows system service. If you close the administration interface, EFT continues to run in the background as a system service.    

On the Recovery tab of the service's properties:

  • On non-HA installations, the service is configured to "Take no action" on failure.

  • On HA installations, the service is configured to "Restart the Service" on failure.

For the procedure for a remote EFT connection, refer to Starting and Stopping EFT Remotely.

When you stop the service, EFT breaks all existing connections and waits until all socket threads die. The service can terminate when Timer Event processing is still in progress. The triggering of Monitor Folder and Timer Event Rules occurs almost simultaneously and is controlled by the operating system, not by EFT. Refer to Event Rule Order of Execution for more information.

To stop EFT in the administration interface

  1. In the administration interface, connect to EFT and click the Server tab.

  2. On the Server tab, click the Server that you want to start/stop.

  3. In the right pane, click the General tab.

  4. Click Stop service, then click Apply. EFT status indicator turns from green to red.

To start or stop EFT using Windows Services

  1. Click Start > Run. The Run dialog box appears.

  2. In the Open box, type services.msc then press ENTER.

  3. Right-click the EFT Server service and click Start (or Stop).

To start or stop EFT from the command line

  1. Click Start > Run. The Run dialog box appears.

  2. In the Open box, type cmd or command then press ENTER. The Windows Command Prompt dialog box appears.

  3. To start EFT, at the prompt type the following command (include the quotation marks):

    Net start "globalscape EFT"
  4. To stop EFT, at the prompt type the following command (include the quotation marks):

    Net stop "globalscape EFT"
  5. After the service is started or stopped, type Exit (or close the Command Prompt).

Secure the Server Service

Any time you run a service, you expose your computer to outside users. The potential exists for exposing files and programs on your computer and network to malicious outside users, particularly if EFT is compromised. Although you can set folder permissions from within EFT administration interface, you can add an extra level of protection by establishing a user account for EFT and then limiting folder access through EFT's user account permissions. This establishes a stopgap until server and system integrity can be restored if EFT is ever compromised.

To configure EFT to run securely, you should:

  1. Create a user account for EFT 

  2. Assign permissions to EFT's user account and assign EFT to the account

  3. Log EFT on as a service

  4. If necessary, configure EFT's user account to map a virtual folder to a network drive.