Submit a ticketCall us

Training ClassSign up for Network Performance Monitor (NPM) and Scalability instructor-led classes

Attend our instructor-led classes, provided by SolarWinds® Academy, to discuss the more advanced monitoring mechanisms available in NPM as well as how to tune your equipment to optimize its polling capabilities. NPM classes offered:
NPM Custom Monitoring and Polling
Orion Platform Scalability

Reserve your seat.

Home > Success Center > Serv-U Managed File Transfer & Serv-U FTP Server > Serv-U Managed FTS & FTP Documentation > Serv-U File Server Administrator Guide > Get started > Glossary


Table of contents
No headers


A listening service in Serv-U that is configured in a domain to accept incoming FTP, FTPS, SFTP, HTTP or HTTPS connections.


A configuration option that can be set at the server, domain, group, or user level. Limits can be set for password complexity requirements, session timeout, Web Client customization, and more.


A Serv-U event primarily consists of an event type (for example, User Login or File Upload Failed), and an action type (for example, Show Balloon Tip or Send Email). Serv-U events are used to automate behavior and to provide greater visibility of important file transfer processes.


A Serv-U feature that allows administrators to block IP addresses who attempt to connect repeatedly with incorrect credentials. By handling only IP addresses who repeatedly fail to log on correctly, anti-hammering allows for smart blocking of bots and hackers.

IP access rules

IP access rules are used in Serv-U to determine who can connect to the server. Rules set up at the server and domain levels define who is allowed to make an initial connection to Serv-U. Rules set up at the group and user levels define who can connect using a given user account.

Directory access

Directory access encompasses all of the permissions applied to a server, domain, group, and user that grant and deny access to files and folders. Directory access rules are the foundation of file access rights, because they determine what a user can or cannot access, and how they can access it.

Last modified