Installation manual
Copy Destination Locations
There are several preset destinations available in the “Place Items In” destination pop-
up menu, including the Applications folder. If you don’t see the destination you want,
you can specify a full pathname.
Owner and Group for Copied File
By default, the copied les inherit the owner and group of the enclosing destination
folder. However, you have several options. You can:
Preserve current owner Â
Set the owner to the current console user Â
Specify user and group Â
Encryption
You can encrypt the copy transport stream to protect the data sent across the
network. By selecting the “Encrypt network data” option, you exchange performance
for security. This option is also available in the Install Packages dialog.
Copy Failure Handling
By default, if a single computer fails to get the copied le, the copy operation
continues to all participating computers. However, there may be times when you
want a copy operation to stop if one of the copies fails. You can choose to cancel the
entire copy operation if one participating computer reports a failure. This option is also
available in the Install Packages dialog.
Network Bandwidth Limits
File copies are done at the maximum sustainable rate for the network, so Apple
Remote Desktop uses all the resources at its disposal to quickly and eciently nish
the copy. Depending on what else is being done on the network, you may want to
explicitly limit the copy data transfer rate. You can set an approximate maximum data
rate in kilobytes per second for le copies. This option is also available in the Install
Packages dialog.
More Options When the Item Already Exists
If an item with the same name as the item you selected to copy already exists at the
destination, you have several options for handing the name conict. You can:
Replace the existing item Â
Replace the existing item if the existing item is older Â
Rename the existing item Â
Rename the item being copied Â
Always ask which of the above options you want to use Â
11 6 Chapter 8 Administering Client Computers