File Monitor Source System (Deprecated)

Definition

You can use the file monitor source system to monitor a specific directory locally on your computer or remotely on another computer in the network.

In the PCo Management Console, you define which directory you want to be monitored using the file monitor source system. If PCo finds a file that meets the configuration criteria that you specified in the PCo Management Console, PCo generates, for example, a notification message and sends it to the connected destination system. In this way you can transfer file contents to the destination system. You can also define specific actions that can be performed for the files that were found, for example, renaming a file.

Use

You can implement the file monitor source system in the notification process and in the query process. For more information about query functions for the file monitor source system, see Query Functions of the File Monitor Source System.

Structure

The following tabs are available for the file monitor source system:

Settings Tab

Authentication Tab

Reliable Connection Tab

Integration

Access Authorizations

The file monitor source system allows access only to the folders that are not system folders.

The file monitor source system allows access only to the folders for which the user has one of the following access authorizations:

  • All authorizations (Full Control)

  • Individual authorizations Read, Write, Delete

The agent instance then runs using either a local system account or in a network in the user's domain that the file monitor source system uses.

To grant the user the authorizations for a particular folder, proceed as follows:

  1. Call the Explorer.

  2. Browse for the folder for which you want to grant access authorizations.

  3. Click on the folder.

  4. Choose the right-hand mouse button. Choose Properties from the context menu.

  5. Click the Security tab.

  6. Check the list Group or User Names.

  7. Ensure that either Full Control or Read/Write/Delete is set for the user.

The authorization checks are performed in the following places:

  • While PCo performs the Search Folders function, the folder that you want to monitor or rename is checked.

  • When the agent instance is started it is also checked whether there are appropriate authorizations for the folder. If the authorizations are missing, the agent instance cannot be started and the system issues a corresponding message.

  • When a tag query is called it is also checked whether the authorizations exist.