|Content Previous Next|
The event occurs at each start of the task according to the schedule. The specified file operations are performed over the monitored files (see File operations), the applications are started (see Launching programs) and messages are dispatched (see dispatch of messages).
The event occurs, when the monitored object is modified:
if the object is a file or a web page and it was modified,
if the object is a group of files or directories and some files were modified or the new files fitting with the given mask appeared
if the object for ICMP (ping) check was selected and it was unavailable for monitoring before the check.
In this case the file operations are performed over the modified files, the applications are launched and the messages are dispatched.
The event occurs, when the inspected object has become inaccessible for monitoring:
a file, a group of files, directories or the web page was deleted,
the remote computer does not respond to the pings.
In this case the applications are launched and the messages are dispatched as indicated in the task.
This is a combination of Creating and Deleting types. It transfers new/changed and deletes files into the Target location(s) if files appear/changed/removed in the Source one.
This mode of monitoring makes synchronization Source and Destination resources. Any changes in Source are reflected to Destination and any changes in Destination are reflected to Source. This synchronization type requires the single resource in the destination list. The recourse should be the top line of the list. Please note, if Source or Destination location is FTP server the comparison can be made in file size only.
The event will occur at each check of a task according to the schedule as long as the monitored object remains unmodified. On detection of changes the applications are launched and the messages are dispatched as indicated in the task, the task itself is stopped and the object is not monitored anymore.
Compares Source with every item from the Destinations list. If a file from Source neither exists nor equals the file with the same name in Destination File Replication Monitor replicates this file to this Destination. Please note, if Source or Destination location is FTP server the comparison can be made on the bases of file size only.
Looks for files having duplicates in the Source. After the second, third, etc. copy of a file is found the copy is marked as "Duplicate". Then duplicates can be copied, moved or deleted if the file operation specified or the duplicate file list can be recorded to a log file, send by email, etc. according to the operations specified in the Targets and Actions section. The duplicate files are identified by the parameters specified in the Source window.
|Content Previous Next|