Submit a ticketCall us

AnnouncementsChange Is Inevitable

Get valuable help when it comes to tracking and monitoring changes. SolarWinds® Server Configuration Monitor (SCM) is designed to help you: detect, track, and receive alerts when changes occur, correlate system performance against configuration changes, compare server and application configuration against custom baselines, and verify application and system changes.

Learn more.

Home > Success Center > Serv-U Managed File Transfer & Serv-U FTP Server > Serv-U Managed FTS & FTP Documentation > Serv-U File Server Administrator Guide > Get started > Glossary


Table of contents
No headers


A listening service in Serv-U that is configured in a domain to accept incoming FTP, FTPS, SFTP, HTTP or HTTPS connections.


A configuration option that can be set at the server, domain, group, or user level. Limits can be set for password complexity requirements, session timeout, Web Client customization, and more.


A Serv-U event primarily consists of an event type (for example, User Login or File Upload Failed), and an action type (for example, Show Balloon Tip or Send Email). Serv-U events are used to automate behavior and to provide greater visibility of important file transfer processes.


A Serv-U feature that allows administrators to block IP addresses who attempt to connect repeatedly with incorrect credentials. By handling only IP addresses who repeatedly fail to log on correctly, anti-hammering allows for smart blocking of bots and hackers.

IP access rules

IP access rules are used in Serv-U to determine who can connect to the server. Rules set up at the server and domain levels define who is allowed to make an initial connection to Serv-U. Rules set up at the group and user levels define who can connect using a given user account.

Directory access

Directory access encompasses all of the permissions applied to a server, domain, group, and user that grant and deny access to files and folders. Directory access rules are the foundation of file access rights, because they determine what a user can or cannot access, and how they can access it.

Last modified