|
|
You have seen how you can define resources to help you manage scheduled file transfers. However, there are other transfers occurring in your environment that are not scheduled. The Active File Transfer Monitor lets you monitor these transfers, but you can also manage them by defining rules to detect them and provide appropriate responses. For example, you can define rules to detect unauthorized transfers and raise alerts when they occur.
You can use the following process to define your file transfer rules:
Example: Storage Problems
Storage problems require you to move some huge transferred files to somewhere else to free up storage for critical file transfers. You decide to automate this using a file transfer rule:
Note: For information about NCL, see the Network Control Language Programmer Guide and the Network Control Language Reference Guide.
| Copyright © 2008 CA. All rights reserved. |
|