Quest SecureCopy - 7.6.3 - InstallGuide
Quest SecureCopy - 7.6.3 - InstallGuide
Install Guide
© 2023 Quest Software Inc.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the
applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the
written permission of Quest Software Inc.
The information in this document is provided in connection with Quest Software products. No license, express or implied, by
estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest
Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE
AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY
EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE,
SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS,
BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS
DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest
Software makes no representations or warranties with respect to the accuracy or completeness of the contents of this
document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest
Software does not make any commitment to update the information contained in this document.
If you have any questions regarding your potential use of this material, contact:
Quest Software Inc.
20 Enterprise, Suite 100,
Aliso Viejo, CA 92656
Refer to our Web site (https://www.quest.com) for regional and international office information.
Patents
Quest Software is proud of our advanced technology. Patents and pending patents may apply to this product. For the most
current information about applicable patents for this product, please visit our website at https://www.quest.com/legal .
Trademarks
Quest, the Quest logo, Secure Copy, and Join the Innovation are trademarks and registered trademarks of Quest Software Inc.
For a complete list of Quest marks, visit https://www.quest.com/legal/trademark-information.aspx. All other trademarks and
registered trademarks are property of their respective owners.
Legend
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not
followed.
IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.
About us .................................................................................................................................. 10
1
Requirement Details
Processor 1 GHz processor
Memory Minimum 1 Gbyte
Hard Disk Space Minimum 100 Mbytes
Recommended 1 Gbyte
NOTE: Log files are created when a copy job runs and can grow very large
depending on the scope of the copy job.
Monitor 1152 x 864 screen resolution with 16-bit color
Required software
● Microsoft® .NET Framework 4.5.2 or greater
Destination folder
Secure Copy® needs to be installed on only one machine, which does not need to be the source machine or the
target machine. Ideally, install Secure Copy on the source machine, which is most probably retired after the
migration is done. The only time it is not recommended is when the source machine is too old to be quick enough
or reliable enough for the copy process to be successful.
NOTE: Secure Copy streams RPC commands to the source and target machines as part of the copy
process. Having the Secure Copy on a third machine causes numerous network connections to open
and thus consume additional resources, which causes a minor latency between Secure Copy and the
source and target machines.
NOTE: For the resume option, Secure Copy will generate more read requests against the storage.
Thus, starting copy from scratch for very large volumes is recommended as an approach.
NOTE: While some RAM is consumed at the source and target machines; however, the majority of the
RAM is consumed on the machine running Secure Copy to build copy jobs. In the process of building
copy jobs, Secure Copy generates lists of files that are portioned out among the available threads and
batches. Maximizing the available RAM on the machine running Secure Copy allows it to perform tasks
without caching to disk because of lack of memory.
7 Click Next.
8 Select a location for the log files. The default location is C:\Program Files\Quest\Secure Copy 7\Logs\.
9 Click Finish.
NOTE: If Secure Copy is unable to migrate the scheduled jobs, you receive a message. You will
need to check the scheduled tasks and manually update the application path to reflect the new
Secure Copy installation path.
Quest provides software solutions for the rapidly-changing world of enterprise IT. We help simplify the challenges
caused by data explosion, cloud expansion, hybrid datacenters, security threats, and regulatory requirements.
We are a global provider to 130,000 companies across 100 countries, including 95% of the Fortune 500 and 90%
of the Global 1000. Since 1987, we have built a portfolio of solutions that now includes database management,
data protection, identity and access management, Microsoft platform management, and unified endpoint
management. With Quest, organizations spend less time on IT administration and more time on business
innovation. For more information, visit www.quest.com.