How Can We Help?

Search for answers or browse our knowledge base.

Documentation | Demos | Support

< All Topics
Print

Configuring SMB as a Source

Purpose

Aparavi allows business users to automate data actions by linking SMB sources and targets, no code or command line necessary.

Configuring pre-defined SMB sources allows users to easily manage their entire data footprint while providing a rich user experience where non-technical users can build custom workflows for data hygiene, compliance, and retention use cases.

The Sources subtab offers the ability to add and manage configured SMB sources within the system. The ability to alter the time of scan intervals, include and exclude paths, and settings for scanning features, all reside within this section.

Please Note: Configuring the SMB source and at least 1 include path must be completed before the system will begin scanning.

Scan Time Intervals

By default, the system sets the scan time interval to once per day. However, this setting can be customized to scan at another interval or by manually performing a scan from the navigation tree.

1. Click on the Policies tab. By default, the system will navigate to the Sources subtab.

Sources Subtab

2. Click on the drop-down menu next to the Time of Scan section. Once selected, the system will display a list of preset intervals to choose from.

Scan Time Intervals

3. The ability to customize the time interval is also available by choosing Custom Schedule from the drop-down menu. Once this option is selected, two additional fields will appear to alter the time of scan.

Custom Time Scan

4. Click on the Save All Changes button to save the settings.

Save All Changes

5. Click the Ok button to confirm the scan time interval changes.

Confirm Changes

Once the changes have been saved, all configured sources will scan at the time interval chosen.

Scan Time Changed

Configuring New Sources

When configuring a source, this triggers the system at the time interval chosen to scan all folders and files within the folder path specified. The platform allows for all nodes to inherit identical settings for the Sources subtab. If the various nodes should have their own set of specifications instead, disabling this feature is also available.

Adding SMB Sources

Please Note: The system needs at least one SMB source and one include path to complete a file scan.

1. Click on the Policies tab. By default, the system will navigate to the Sources subtab.

Sources Subtab

2. Click on the Add Source button, located in the upper right-hand corner of the screen.

Add Source Button

3. When selected, the Add Source pop-up box will display, offering several sources to choose for configuration. Choose the SMB option.

Add SMB Source

4. Inside the Add Source pop-up box, enter the fields to configure the SMB source.

SMB Source
  • Configure Parameters: 
    • Server: Defines the server name (IP Address or DNS Name)
    • Share Name: Defines the SMB File Share Name
    • Username: Defines the username to connect to the file share
    • Password: Defines password to connect to the file share
Parameters Section

5. Click on the Include Paths section and include at least one path. Although multiple include paths can be entered, the system has an order of precedence for the paths that must be followed. In addition to configuring include paths, an optional step is to enter an exclude path within the section below. When entered, the system will skip the path and not scan the folders and files within it.

Configure Paths

6. Click on the Estimations Section and enter the SMB data.

Estimations Section

7. After completing all sections within the Add source pop-up box, select the Validate button. If the validation was successful, the Ok button inside the pop-up box will become active.

Validate SMB Source

8. Click on the Ok button to save the changes.

OK Button

9. Click on the Save All Changes button, located in the bottom right-hand corner. Once clicked a pop-up box will appear requesting to confirm all changes.

Save All Changes

10. Click the Ok button to confirm the saved changes.

Confirm Changes

Once the Source has been configured, the system will display an alert message and begin scanning from the SMB source.

Source Configured

Editing SMB Sources

1. Click on the Policies tab. By default, the system will navigate to the Sources subtab.

Sources Subtab

2. Click on the Edit button to the right of the configured source.

Edit Button

3. Inside the Edit Source pop-up box, edit the previously configured fields.

Edit Source

4. Once the sections within the Edit source pop-up box are updated, select the Validate button. If the validation was successful, the Ok button inside the pop-up box will become active.

Validation Successful

5. Click on the Ok button to save the changes.

This image has an empty alt attribute; its file name is image-86-1024x482.png
OK Button

6. Click on the Save All Changes button, in the bottom right-hand corner. Once clicked, a pop-up box will appear requesting to confirm all changes.

Save All Changes

7. Click the Ok button to confirm the saved changes.

Confirm Changes

Once the Source has been updated, the system will display an alert message and begin scanning using the updated SMB source settings.

SMB Source Updated

Deleting SMB Sources

1. Click on the Policies tab. By default, the system will navigate to the Sources subtab.

Sources Subtab

2. Click on the Delete button to the right of the configured source. Once selected, the source will disappear from the subtab.

Delete Button

3. Click on the Save All Changes button, in the bottom right-hand corner. Once clicked, a pop-up box will appear requesting to confirm all changes.

Save All Changes

4. Click the Ok button to confirm the saved changes.

Confirm Changes

From this point forward, the system will no longer scan from the SMB source that was deleted.

Source Deleted
Was this article helpful?
0 out Of 5 Stars
5 Stars 0%
4 Stars 0%
3 Stars 0%
2 Stars 0%
1 Stars 0%
How can we improve this article?
Please submit the reason for your vote so that we can improve the article.
Previous File System as a Source
Next Source Inheritance Settings
Table of Contents