This document describes the new features, defects resolved, and known issues for:
To upgrade to this release, you must have WS_FTP Server version 7.6 or higher.
Depending on which WS_FTP Server product you purchased, portions of this document may not apply.
ID |
Category |
Issues |
---|---|---|
WSRVR-3832 WSRVR-3835 |
Security |
CVE-2019-12144, CVE-2019-12145: Supplied filenames are validated to ensure that they are valid Windows filenames. Credit: Dan Bastone of Aon's Cyber Solutions. |
WSRVR-3833 |
Security |
CVE-2019-12146: Destination directories containing invalid Windows paths are rejected as invalid paths. Credit: Devon Greene of Aon's Cyber Solutions. |
WSRVR-3834 |
Security |
CVE-2019-12143: Authenticated users cannot download files outside of their home directory. If a user does not have access to a file, they receive a permission denied error. Credit: Devon Greene of Aon's Cyber Solutions. |
ID |
Category |
Issues |
---|---|---|
WSRVR-2349 |
Install, Security |
Installation log file in PostgreSQL configuration no longer contains plain text passwords. |
WSRVR-3045 |
Logging |
Previously, logging for WTM uploads and downloads showed a relative path to the file location on the WS_FTP Server. Now, logging shows absolute paths for all uploaded and downloaded files on the WS_FTP Server. |
WSRVR-3184 |
Server Admin |
Manage Server > Listeners > SSH > Edit SSH Settings > RSA and DSA host key > Select > Create had a dropdown for selecting SHA1 or SHA2 for the host key creation. This was removed. |
WSRVR-3271 |
Install |
If you installed and then uninstalled WS_FTP Server, user folders were left behind, along with other configuration files. A new install would detect these folders and a message erroneously warned that it would delete these folders. This message was not accurate. The new installation does not delete the user folders. The message is updated now to indicate the detection of folders, but not their deletion. All folders and their contacts that were left behind from prior installations remain intact. |
WSRVR-3317 |
Install |
Ipswitch Scheduler and Ipswitch SSH Server didn't show a description in Services for new installs. This has been corrected. |
WSRVR-3321 |
Links |
Previously, clicking on "Help System" in the bottom right corner led to an error page. This has been corrected. |
WSRVR-3322 |
Links |
Help > About Ipswitch > iCare Community Program link was broken. This has been removed. |
WSRVR-3335 |
Logging |
Logging for LDAP connection failures was improved. |
WSRVR-3369 |
FTP, Security |
When listeners were set to "SSL Enabled" and hosts were set to "Force SSL" and the USER command was sent, there was a continued connection when the user didn't exist on a host, but a dropped connection when the user did exist on the host. This was not fixed completely in the prior release. The logic was updated to get: "530 Non SSL connections forbidden." Now all connections are dropped when all hosts on a particular listener are set to "Force SSL" and the connection doesn't send the AUTH command before the USER command. |
WSRVR-3372 |
Database, Install |
Corrected a problem that blocked installation on Windows 2016 Datacenter Removed MDAC check from installer code that was failing for Windows 2016 DataCenter installations. |
WSRVR-3412 |
Documentation |
Added missing response file to Silent Install section. |
ID |
Category |
Issues |
---|---|---|
WSRVR-1703 |
SSH |
The last log on date is now updated for users that log on with an SSH client key. In previous releases, the last log on date was not updated for users that logged on with an SSH client key. |
WSRVR-3183 |
SSH, SSL |
You can utilize all defined SHA2 MAC algorithms in WS_FTP Server 2017 (8.0.1). In the WS_FTP Server 2017 (8.0) release, it was not possible to connect with an SSH Client using hmac-sha2-384 and hmac-sha2-512. |
WSRVR-3188 |
Install, SSL |
If there are no bindings on the targeted IIS website, the installer creates a binding. If there is one binding on the targeted IIS website, the installer will select and use that binding. If there are multiple bindings on the targeted IIS website, you must remove any bindings on the targeted IIS website, other than the SSL binding selected for use with the WS_FTP Server. In the WS_FTP Server 2017 (8.0) release, the AHT and WTM logon failed if there was a pre-existing binding on the targeted IIS website, and the user elected to create a new binding during the installation. |
WSRVR-3191 |
Install, Licensing |
The number of license activations and the license file path in the registry were corrected. In the WS_FTP Server 2017 (8.0) release, the “Too many activations for this license” message displayed when a user canceled an installation and used the same license to install on another machine. |
WSRVR-3250 |
SSH, FTP |
Fixed an issue that in previous releases, under heavy load, occasionally caused the WS_FTP Server SSH or FTP services to crash while making or removing directory calls. |
ID |
Category |
Issues |
---|---|---|
WSRVR-1499 |
SSH |
WS_FTP Server 7.6 SSH service stops responding to connections until it is restarted. Added handler for Maverick clients to handle bad packet sizes. |
WSRVR-1566 |
Security |
Password length increased from 40 to 128 characters for both the create user and change password pages. There is no length check (like previous versions). The control stops accepting characters after the 128th. |
WSRVR-1587 |
Security |
When listeners were set to "SSL Enabled" and hosts were set to "Force SSL" and the USER command was sent, there was a continued connection when the user didn't exist on a host, but a dropped connection when the user did exist on the host. Now all connections are dropped when all hosts on a particular listener are set to "Force SSL" and the connection doesn't send the AUTH command before the USER command. |
WSRVR-1589 |
Security |
Added functionality to add/remove specific ciphers for SSL listeners. 2017 installs/upgrades will populate tables with ciphers from the current OpenSSL dll, and by default will enable all. End users can remove/add/prioritize from this list using new/modified UI pages (Add Cipher and Remove Cipher). |
WSRVR-1607 |
Security |
Prior to 2017, WSFTP provided the ability to set the SSL security level on SSL listeners with these options:
In 2017 these values have changed to explicit protocols where the security level can be changed to one or a combination of:
For new installs SSL listeners are defaulted to Enable TLS 1.2 only. Upgrades are mapped to the pre-2017 equivalent. |
WSRVR-1630 |
Settings |
Fixed issue where iftpaddu.exe ignored default host settings. Added default host settings to command line user creation. |
WSRVR-1645 |
SSL |
Added SHA dropdown to Create SSL Certificate page that allows user to select either SHA1 or SHA2 when creating certificates. |
WSRVR-1718 |
FTP |
In CuteFTP 8.3.4.0007 and CuteFTP 9.0.5.0007 (current) if the "Protocol type:" of the Site Profile was set to "FTP with SSL (AUTH SSL - Explicit) and the Global setting of "Reuse cached session for data connection" was applied (Tools > Global Options > Security > SSL Secutiry > Check "Reused cached session for data connection"), when the connection attempt was made it would crash the WS_FTP Server Service. The service had to be manually restarted before connections could be made. Added handler for socket shutdown so service no longer crashes. |
WSRVR-2028 |
Core |
Prior versions used file creation time for folder cleanup settings. In 2017, a Use File Create Time option (uncheck for File Copy Time) was added to the Host Details, Create Host, and Edit Folder pages. Selecting this checkbox will use the file copy time for cleanup. The default for install/upgrade is checked. |
WSRVR-2078 |
Core, Security, SSH |
A checkbox (Disable Diffie-Hellman Group1) was added under System Details. New installs and upgrades will default to off (unchecked). Checking this box will exclude this group from the kex algorithm. |
WSRVR-2323 |
Licensing |
If you upgrade from a previous version, and try to use an evaluation license, it will accept the license and allow you to log in, but the system settings (where license is listed), says the file is invalid. On a fresh install, the license works fine. |
WSRVR-2414 |
Web Transfer Module |
Image was missing when file extension contained uppercase letters. In order to add additional image file formats you can edit mimetype.xml file (default location is C:\Program Files (x86)\Ipswitch\WS_FTP Server\WebClients\ThinClient\Bin) and add a new row <mimeMap fileExtension=".newExtension" mimeType="image/newExtension" /> |
ID |
Category |
Issues |
---|---|---|
WSRVR-3314 |
Install |
Before installing WS_FTP Server on a Windows Server 2008 R2, you must pre-install .NET (4.0). |
WSRVR-3332 |
Install |
For PostgreSQL clean installs the "%" character cannot be used for usernames or passwords. For migrations 7.7 -> 8.5 where the username or password contain a "%" character, run the dbconfig tool to update services and connection strings. Select OK in the PostgreSQL Configuration dialogue. |
WSRVR-3483 |
Ad Hoc Transfer Module (potentially Web Transfer Module) |
WS_FTP does not support for Windows .Net 4.7. |
WSRVR-3531 |
Browsers |
Windows Server 2012 does not support Internet Explorer 10. Alternative browsers can be used, such as Chrome and Firefox. |
You must remove any SSL bindings on the targeted IIS Website, other than the SSL binding selected for use with the WS_FTP Server.
AHT and WTM pages display a gray screen if Active Scripting is not enabled in Internet Explorer 11.
To enable active scripting, complete the following steps.
The default IIS port for HTTPS is 443. When IIS is configured to use a different port for HTTPS, the redirect from HTTP to HTTPS fails.
To mitigate this issue, add the correct port number to the Thinclient, AHT, or both web.config files, or disable the HTTP to HTTPS redirect.
To add the correct port number to the Thinclient and AHT web.config files, complete the following steps.
<action type="Redirect" redirectType="Permanent" url="https://
{HTTP_HOST}:443/ThinClient/{R:1}" />
<action type="Redirect" redirectType="Permanent" url="https://
{HTTP_HOST}:443/AHT/{R:1}" />
To disable the HTTP to HTTPS redirect, complete the following steps.
<rule name="HTTP to HTTPS redirect" stopProcessing="true" >
<rule name="HTTP to HTTPS redirect" stopProcessing="true" enabled="false">
<rule name="HTTP to HTTPS redirect" stopProcessing="true" >
<rule name="HTTP to HTTPS redirect" stopProcessing="true" enabled="false">
The default IIS port for HTTP is 80. When IIS is configured to use a different port for HTTP, the redirect from HTTP to HTTPS fails.
To mitigate this issue, replace {HTTP_HOST} with {SERVER_NAME} in the Thinclient, AHT, or both web.config files, or disable the HTTP to HTTPS redirect, as described above.
To replace {HTTP_HOST} with {SERVER_NAME} in the Thinclient and AHT web.config files, complete the following steps.
<action type="Redirect" redirectType="Permanent" url="https://
{HTTP_HOST}:443/ThinClient/{R:1}" />
<action type="Redirect" redirectType="Permanent" url="https://
{HTTP_HOST}:443/AHT/{R:1}" />
<action type="Redirect" url="AHT_UI/public/#/password" appendQueryString="true" logRewrittenUrl="true" />
<conditions>
<add input="
{HTTP}" pattern="off" ignoreCase="true" />
</conditions>
If the IPS_user's password utilizes the % character as the first character in the password, the password authentication fails during installation or upgrade to WS_FTP Server 2017 (8.0.1).
To mitigate this issue, uninstall WS_FTP Server 2017 (8.0.1) and delete the registry key containing the IPS_username. Re-install WS_FTP Server 2017 (8.0.1) with a different password.
WS_FTP Server 2017 (8.0.1) crashes during repair installations and upgrading from 2017 (8.0) if modules are not installed.
To mitigate this issue, install the modules during the installation.
If you upgrade from a previous version and try to use an evaluation license, it will accept the license and allow you to log in, but the system settings (where license is listed), says the file is invalid. On a fresh install, the license works fine.
The workaround requires that you modify your local security policy:
Note: If http://127.0.0.1 has not already been added to the Trusted Sites you will see an error page that reads: This page can’t be displayed. Make sure the web address is correct. Look for the page in your search engine. Refresh the page in a few minutes. You will need to add http://127.0.0.1 to the Trusted Sites through the desktop Internet Explorer page. You can also go to Internet Explorer > Internet Options > Security tab > Trusted Sites > Sites and add 127.0.0.1 to the list of trusted websites. For more information, see Adding a website to your browser's Trusted Sites.
If you change an Ad Hoc Transfer Module or Web Transfer Module password to a new password that does not comply with the Host's password policies (Server > Host details > Password Settings), the user will be signed out of those modules with a password change failure. You may encounter the following errors:
'Change user password failed - user user@host password change failed'
'Change user password failed - user user@host password change failed'
'Failed to Change Password'
If the log settings on WS_FTP Server point to a remote server, upgrading WS_FTP Server will cause the log settings to change to 127.0.0.1. If the log level was set to anything other than Normal, upgrading will cause the log level to return to the default level of Normal.
Internet Explorer 11 may not display the Rename and Delete icons in the Web Transfer Module. To fix this issue, in Internet Explorer go to Security Settings > Downloads > and enable Font Downloads.
If you uninstall WS_FTP Server and leave the configuration data, on re-install you will get an invalid prompt that data in the WS_FTP Server folder exists and will be deleted on uninstall. When continuing the reinstall, the folder is actually not deleted.
When upgrading a system with SQL Express, using port 1433, you will have to enter the port number with the server name during the upgrade. For example: "localhost,1433".
The WS_FTP Server 2017 installation programs installs a new version of the OpenSSL library. The new version (OpenSSL 0.9.8p for 7.5.1; OpenSSL 1.0.1c for 7.6), is required and gets installed to the installation folder (the default is: C:\Program Files\Ipswitch\WS_FTP Server).
If the installation program finds a version of the library in the Windows system folders, it will stop the installation and ask you to move or rename the library files. If these library files are used by other programs, you want to make sure that you retain a copy of them. We suggest you create a backup in another folder, or rename these files, then remove the files from these locations:
32-bit OS |
64-bit OS |
C:\Windows\libeay32.dll |
C:\Windows\libeay32.dll |
C:\Windows\ssleay32.dll |
C:\Windows\ssleay32.dll |
C:\Windows\system32\libeay32.dll |
C:\Windows\SysWOW64\libeay32.dll |
C:\Windows\system32\ssleay32.dll |
C:\Windows\SysWOW64\ssleay32.dll |
C:\Users\[username]\Windows\libeay32.dll or |
C:\Users\[username]\Windows\libeay32.dll or |
C:\Users\[username]\Windows\ssleay32.dll or |
C:\Users\[username]\Windows\ssleay32.dll or |
When a cluster fails over from node 1 to node 2, the number of failed logon attempts does not carry over to node 2. Therefore, the server does not lock out the user even if the failed logon count is cumulatively greater than the limit set by the IP Lockouts rule since the failed logon count per node is less than the IP Lockout rule allows. Once a user fails a number of logons on a single node equal to the IP Lockouts limit, then the user is locked out.
For example, assume a user account’s IP Lockouts rule is set to blacklist the user after 5 failed attempts. If a user fails to log on 3 times while node 1 is the active node and then the cluster fails over, the user will have to fail 5 more log on attempts on node 2 in order for WS_FTP Server to blacklist the user because the failed attempts do not transfer between nodes.
Currently, there is no work around for this issue.
See IP Lockouts do not carry over failed logon attempts after cluster failover in the Ipswitch Knowledge Base for more information.
When a cluster fails over from node 1 to node 2 while an Ad Hoc Transfer user attempts to send a package from the AHT site, the file transfer fails, the user is logged out, and the browser displays the Microsoft error "Internet Explorer cannot display the webpage." After node 2 becomes the active node, users attempting to log on to the AHT site again receive an error message about an unhandled exception.
To resolve this issue, the user must restart the browser session before logging back onto the site. Then the user can send packages normally.
See An unhandled exception when using AHT and switching nodes after a failed send in the Ipswitch Knowledge Base for more details and the content of the exception.
When a cluster fails over from node 1 to node 2 during an upload, the transfer fails and the file transfer client‘s connection to the cluster drops (the message is "Connection is dead"). The upload does not resume when the user logs back into the server. Although the partially uploaded file is present, it cannot be deleted. This is caused by the share host (Windows UNC or Linux NAS) holding an open handle for node 1 on the partially uploaded file, presumably waiting for the client to (possibly) reconnect. Node 2 cannot modify the file at this time.
Since resuming the transfer is impossible, the user must delete the file and then restart the transfer.
To delete the file, the user must wait a few minutes until the share host releases its hold on the file handle, and then the user can delete the file. ("A few minutes" ranges from about 2 minutes on Windows, up to about 10 minutes on a Linux NAS.)
To delete the file sooner, an administrator can force a failover so that node 1 is active, allowing the user to modify the file again.
See Unable to resume transfer or delete file after failover in the Ipswitch Knowledge Base for more information.
When a cluster fails over from node 1 to node 2 during an upload using the Web Transfer Client, both the browser session and the file transfer fail. When the user logs back in, the upload does not resume. Although the partially uploaded file is present, it cannot be deleted. This is caused by the share host (Windows UNC or Linux NAS) holding an open handle for node 1 on the partially uploaded file. Node 2 cannot modify the file at this time.
Since resuming the transfer is impossible, the user must delete the file and then restart the transfer, or overwrite the file on another upload attempt.
To delete or overwrite the file, the user must wait a few minutes until the share host releases its hold on the file handle, and then the user can delete the file. ("A few minutes" ranges from about 2 minutes on Windows, up to about 10 minutes on a Linux NAS.)
To delete the file sooner, an administrator can force a failover so that node 1 is active, allowing the user to modify files again.
See Unable to delete files in the Web Transfer Client after failover in the Ipswitch Knowledge Base for more information.
If you installed WS_FTP Server 6.x with the default SSL certificate, when you upgrade to WS_FTP Server 7.x, that default certificate is maintained. If you then enable FIPS mode, which requires the use of FIPS-validated ciphers in the certificate, the default certificate will cause a connection error when a user attempts a secure connection. The server log will show the following error:
To work around this issue, you need to use a certificate that uses a FIPS-validated algorithm, such as SHA1. You can select to use your own certificate, or create a new certificate in the WS_FTP Server Manager (from the Home page, select SSL Certificates).
For a standalone WS_FTP Server installation:
Operating System |
Edition |
Supported Versions |
Windows Server 2016 |
|
|
Windows Server 2012 R2 |
|
|
Windows Server 2012 |
|
|
Windows Server 2008 R2 |
|
|
For a WS_FTP Server failover cluster using Microsoft Clustering Services:
Operating System |
Edition |
Supported Versions |
Windows Server 2012 R2 |
|
|
Windows Server 2012 |
|
|
Windows Server 2008 R2 |
Enterprise |
|
For a WS_FTP Server failover cluster using Microsoft Network Load Balancing:
Operating System |
Edition |
Supported Versions |
Windows Server 2012 R2 |
|
|
Windows Server 2012 |
|
|
Windows Server 2008 R2 |
|
|
Windows Server Components Activated Automatically
The WS_FTP Server installer automatically activates certain components in your Windows Server installation. This is necessary because after installation, Windows Server does not turn on non-core operating system components. However, before installing WS_FTP Server, you should be sure that these changes conform to your organization’s security policies.
When you install WS_FTP Server, the install activates the following 2008 R2 Server roles:
Configuring the database for remote connections
By default, the Microsoft SQL Server database will only accept connections coming from the local system. To use a remote notification server, to allow multiple servers to share a data store, or to allow a remote Web Transfer Client connection, you have to enable remote connections.
Microsoft's Knowledge Base (KB) provides the following information on remote connections:
"When you try to connect to an instance of Microsoft SQL Server 2005 from a remote computer, you may receive an error message. This problem may occur when you use any program to connect to SQL Server. For example, you receive the following error message when you use the SQLCMD utility to connect to SQL Server:
Sqlcmd: Error: Microsoft SQL Native Client: An error has occurred while establishing a connection to the server. When connecting to SQL Server 2005, this failure may be caused by the fact that under the default settings SQL Server does not allow remote connections.This problem may occur when SQL Server 2005 is not configured to accept remote connections. By default, SQL Server 2005 Express Edition and SQL Server 2005 Developer Edition do not allow remote connections.
For instructions, see the Microsoft KB article: How to Configure SQL Server 2005 to Allow Remote Connections.
During installation, you can select Microsoft Internet Information Services (IIS) as your web server (instead of WS_FTP's Web Server). If you choose this option, you need to have Microsoft Internet Information Services (IIS) 7.0 or later installed on your computer. If you opt to use IIS, WS_FTP Server requires the ASP .NET Web Server Role Service.
cscript %SystemDrive%\inetpub\AdminScripts\adsutil.vbs set w3svc/AppPools/Enable32bitAppOnWin64 1
After running the command, you must restart IIS.
If you specify a user other than the default user to serve as the run as user on the IIS virtual folder (if you are using Microsoft IIS as your web server), you may get a HTTP 401 error when you attempt to open the WS_FTP Server Manager. If this occurs, you must open the WSFTPSVR
virtual folder in IIS and change the anonymous access user password to match the specified user's password.
WS_FTP Server requires the Microsoft .NET Framework and other Microsoft packages for scripting and software accessibility. Microsoft .NET Framework 4.0 is included in the installation program.
WS_FTP Server utilizes third-party open source software subject to the licenses described below.
WS_FTP Server |
||
Library |
Version |
License |
PostgreSQL |
9.3 |
|
zlib |
1.2.5 |
|
OpenSSL |
1.0.2K |
|
Distributed 3rd Party Code |
|
|
Greta |
Last copyright 2002 |
|
Web Transfer Module |
||
Library |
Version |
License |
1.4.6 |
||
1.4.7 |
||
2.9.1 |
||
0.13.4 |
||
0.2.15 |
||
3.3.5 |
||
4.6.3 |
||
2.2.0 |
||
3.10.1 |
||
0.3.9 |
||
2.10.6 |
||
1.5.1 |
||
Ad Hoc Transfer Module |
||
Library |
Version |
License |
1.4.6 |
||
1.4.7 |
||
2.9.0 |
||
0.13.4 |
||
0.2.15 |
||
3.3.5 |
||
4.6.3 |
||
2.2.0 |
||
3.10.1 |
||
0.3.9 |
||
1.5.1 |
net.exe
has been removed from the computer on which you want to install WS_FTP Server, you must create a user account to serve as the WS_FTP Server account in Windows before installing. The account name must begin with IPS_
, and it is recommended that it be configured so that the password never expires.During the install, when you reach the Create User Accounts dialog, specify this username without the IPS_
at the beginning.
For example, if you created a Windows user account called IPS_wsftpadmin
, enter wsftpadmin
for the username on the Create User Accounts dialog.
Note: If you are upgrading a previous version of WS_FTP Server with hosts that use Windows NT user databases exclusively, the username you create must be IPS_
plus the username of an existing Windows NT user that has system administrator privileges in WS_FTP Server.
When multiple hosts with firewall settings configured share a single listener, the firewall settings for the first of those hosts that a user logs into are applied to all of the hosts that share the listener and have firewall settings configured. Hosts that do not have firewall settings configured are not effected by this issue. We recommend that all hosts that are assigned to a common listener share the same firewall settings.
The minimum recommended hardware is the same as recommended for Windows Server 2008 R2. (For more information, see the Windows Server information on Microsoft's web site.) If you are using a later version operating system, you should meet the hardware requirements for that system.
Component |
Requirement |
Processor |
Minimum: 1 GHz (x86 processor) or 1.4 GHz (x64 processor) |
RAM |
|
Hard Drive |
Hard drive capacity depends on how much data you plan to store. |
Virtualization Requirements
The WS_FTP Server Manager provides web-based administration from the local machine and also allows remote management of the server. WS_FTP Server Server Manager is a part of WS_FTP Server and is installed on the same machine.
Web Interface Requirements
See the Ad Hoc Transfer Plug-in for Outlook Requirements.
The WS_FTP Server Web Transfer Client and the Ad Hoc Transfer Module come bundled with the WS_FTP Server installer. If your license includes these modules, make sure your system can support these requirements.
The Web Transfer Module needs access to the file system on your FTP host or hosts so it can upload and download files. During the WS_FTP Server Web Transfer Client installation, you will specify a Windows user account with permissions to the top folder of each WS_FTP Server host (for each host for which you will enable WS_FTP Server Web Transfer Client). We recommend you create a Windows user account for use by the Web Transfer Module. Note that this Windows user account is used differently depending on the WS_FTP Server host settings and the user database configured for that host:
Before you install the Ad Hoc Transfer Module, verify that the WS_FTP Server computer has the following:
The end user can use any computer with an operating system that can support the following:
The WS_FTP installer automatically activates certain components in your Windows Server installation (in addition to the ones activated by a normal Server install). Before installing WS_FTP Server, you should be sure that these changes conform to your organization’s security policies.
The following list shows features activated by the Ad Hoc Transfer Module install under the IIS7 role. Features shown as indented indicate a nested relationship with the non-indented feature above it.
Common HTTP Features
Application Development
Health and Diagnostics
Security
Performance
Management Tools
The following list shows the Windows Server stand-alone features activated during WS_FTP Server install:
.Net Framework 4.5.2 Features
Remote Server Administration Tools
Windows Process Activation Service
Additionally, the Web Transfer Module install process does the following:
Also, if HTTPS is not enabled on the site hosting the Web Transfer Module, the install will:
The following software must be installed on the machine on which you install the Ad Hoc Transfer Plug-in for Outlook. If the required software is needed by only one of the clients, it is noted as such.
If you are running the installer live (not doing a silent install), the installer automatically installs the Microsoft Visual Studio redistributable programs. You do not need to download anything from Microsoft. If running a silent install, you must download and install these redistributable programs before running the install. See the Requirements in the Silent Install section.
On the last screen of the installer, you can select to View Install Log.
For detailed instructions for installing and configuring WS_FTP Server and activating a new or upgraded license, see the WS_FTP Server Installation and Configuration Guide.
WS_FTP Server 2017 supports direct upgrade installations from version 7.6 or higher only.
For more assistance with WS_FTP Server, consult the following resources:
Copyright
©1991-2017 Ipswitch, Inc. All rights reserved.
This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the express prior written consent of Ipswitch, Inc.
The content of this document is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc., also assumes no liability for damages resulting from the use of the information contained in this document.
WS_FTP, the WS_FTP logos, Ipswitch, and the Ipswitch logo, MOVEit and the MOVEit logo, MessageWay and the MessageWay logo are trademarks of Ipswitch, Inc. Other products and their brands or company names, are or may be trademarks or registered trademarks, and are the property of their respective companies.
This document was published on Sunday, August 20, 2017 at 00:27.