Submit a ticketCall us

Systems Monitoring for Dummies
Our new eBook will teach you the fundamentals and help you create monitors and alerts that are effective, meaningful, and actionable. Monitoring is more than a checkbox on your to-do list. This free eBook will give you practical advice to help you succeed in all aspects of monitoring – discovery, alerting, remediation, and troubleshooting. Don’t miss out on this indispensable resource for newbies, experienced IT pros, and everyone in between. Register Now.

Home > Success Center > Serv-U Managed File Transfer & Serv-U FTP Server > Serv-U File Server Administrator Guide > Get started > Glossary


Table of contents
No headers


A listening service in Serv-U that is configured in a domain to accept incoming FTP, FTPS, SFTP, HTTP or HTTPS connections.


A configuration option that can be set at the server, domain, group, or user level. Limits can be set for password complexity requirements, session timeout, Web Client customization, and more.


A Serv-U event primarily consists of an event type (for example, User Login or File Upload Failed), and an action type (for example, Show Balloon Tip or Send Email). Serv-U events are used to automate behavior and to provide greater visibility of important file transfer processes.


A Serv-U feature that allows administrators to block IP addresses who attempt to connect repeatedly with incorrect credentials. By handling only IP addresses who repeatedly fail to log on correctly, anti-hammering allows for smart blocking of bots and hackers.

IP access rules

IP access rules are used in Serv-U to determine who can connect to the server. Rules set up at the server and domain levels define who is allowed to make an initial connection to Serv-U. Rules set up at the group and user levels define who can connect using a given user account.

Directory access

Directory access encompasses all of the permissions applied to a server, domain, group, and user that grant and deny access to files and folders. Directory access rules are the foundation of file access rights, because they determine what a user can or cannot access, and how they can access it.

Last modified