EFT banning load balancer IP address
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT version 7.x and laterSYMPTOMEFT banning load balancer IP addressRESOLUTIONSet an IP access rule to allow the load balancer IP on EFTTurn off DoS/Flood...
View ArticleDMZ Gateway® Flood Protection Setting
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.x and later DMZ Gateway®, v3.0 and laterDISCUSSIONThe flood protection property can be edited in the DMZ Gateway configuration file...
View ArticleInstalling and Upgrading EFT in an Active-Active HA Cluster
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7 and laterDISCUSSIONEFT can be installed in an active-passive cluster for failover clustering or (in v7 and later) an active-active cluster for "always...
View ArticleCreating Fixed File Formats for Mainframe File Submissions
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7 and laterDISCUSSIONEFT, together with the Automated Workflow Engine, can be leveraged to ensure that submitted or uploaded files are transformed into a...
View ArticleTransforming UNIX-based Text Files to DOS Format
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONThe Advanced Workflow Engine for EFT is able to help in a multitude of automation functions. Many customers, when integrating with...
View ArticleRestore EFT Enterprise configuration and modify DMZ Gateway IP address
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONThe attached VB script automates the EFT Enterprise restore function and allows you to change/set the DMZ Gateway IP address. This...
View ArticleIntegrating EFT HA in a network with a Cisco switch
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v7.2 and laterDISCUSSIONGlobalscape engineers had the opportunity to test EFT HA against a Cisco Nexus 5672 and a Cisco Nexus 9396PX switch running NX OS...
View ArticleIncrease number of email addresses you can share Workspace with at one time
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, version 7.1 and later (with Workspaces)QUESTIONIn the WTC help topic Sharing Folders, it says I can only share a Workspace with 10 email addresses at a...
View ArticleRemoving "Lost Password" and "Reset" from the Mail Express Login Page
THE INFORMATION IN THIS ARTICLE APPLIES TO:Mail Express v4.x and laterDISCUSSIONThis article describes the process to change specific cosmetic features of the Mail Express Internal Login Page. You are...
View ArticleActivating the Accelerate module
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, v7.3DMZ Gateway, v3.4Accelerate moduleQUESTIONHow do I activate the Accelerate module in EFT and DMZ?ANSWERThe Accelerate module requires that a special...
View ArticleEnforcing Settings in EFT Like Group Policy Does for AD
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterUsing EFT's COM API to enforce specific settings inside of EFT so that they are enforced at all timesDISCUSSIONOften changing a setting in EFT...
View ArticleRequesting New Event Rule Automations for Clients
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT Enterprise, all versionsWhat to ask for when an employee or dept. has a requirement to transfer files from the EFT serverDISCUSSIONMost customers usually...
View ArticleGenerate a report on users with the EFT Migration and Sync Tool
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONUser data is different than User configuration and is not in the ARM module. Only metrics from the user accounts who upload and...
View ArticleRunning Reports on User Configuration with VB Scripting
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONUser data is different than User Configuration and is not in the ARM module. Only metrics from users who upload and downloads files...
View ArticleRemove NULL Characters from a File Using Advanced Workflows
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONThe Advanced Workflow Engine, AWE, has numerous actions from which you can create an advanced workflow and insert it into an Event...
View ArticleWhat is Common Access Card authentication?
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, version 6.4.3 and laterQUESTIONWhat is Common Access Card authentication?ANSWERA CAC is about the size of and has a magnetic stripe on the back like a...
View ArticleError: "Connection profile does not exist on the other server"
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, v7.1 and laterSYMPTOMError: "Connection profile does not exist on the other server"WORKAROUNDTo prevent this errorCreate an Event Rule with a Connection...
View ArticleOn guest (external user) accounts, the value in Last Modified by field is...
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, v7.1 and laterSYMPTOMOn guest (external user) accounts, the value in Last Modified by field is "[ws-invite]".WORKAROUNDThis behavior is as designed.MORE...
View ArticleDoes EFT support SHA-2 cryptographic algorithms?
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT, version 7.2.1 and laterQUESTIONDoes EFT support SHA-2 cryptographic algorithms?ANSWERYes. SHA256 is part of SHA-2, and EFT supports SHA256 for...
View ArticleHow to use Microsoft ADPlus to capture hang and crash logs for EFT Server
THE INFORMATION IN THIS ARTICLE APPLIES TO:EFT v6 and laterDISCUSSIONIn order for support to properly determine root cause of a crash or hang of EFT Server, the client must be able to provide a crash...
View Article