...
Click the Add button from the File Shares tab.
Enter the UNC folder path of the File Share in Folder Path. Format: \\ComputerName\Folder. Is required.
Choose an Active Directory Domain in the Default Domain lookup. Is required.
Choose a Default OU for users and groups if necessary. Format is OU=Department
Select the organization format of the File Share.
First level folders are folders are matters (workspaces or projects)
Second level folders are are matters (workspaces or projects)
Custom: Allows a custom level of folders to determine the root matter/workspace/project. Select from the selection button.
Set metadata filters up Enable Metadata Filter. Select to filter the metadata Metadata of the fileshareFileShare. Client and matter Matter expressions can be set. The Format would be, for example, by default:
Client Number Regular Expression: ^\s*([a-zA-Z0-9]+)[^--]+ and
Matter Number Regular Expression: (?<=-)[^-]+(\s*). These expressions will filter matter and client when the client/matter number is setup set up as 1000-001 for example.
When the file share sync is ready to begin, select the Sync Enabled button to Yes.
Enter the timeframe for the sync. For example, Sync every 30 minutes.
Select whether or not to sync documents.
Select whether or not to perform personal data detection. Personal data could be any sensitive information for example social security numbers, and the personal data would be scrubbed.
Select whether to sync the Audit. This is important as if the Event Log or Audit is truncated or removed prematurely, delta syncs may not capture the last sync information.
A nickname for the sync can be given.
...
FileShare now supports importing non-inherited folders and files from the FileShare. A flag is inherited and displayed when non-inherited folders are imported.
Process:
if someone removes (exclude) or adds/edits (include) a user/group or access in the Folder Security that violates the policy setup in Control Center.
That is then synced using the linkfileshare job by the Fileshare app.
After the job completes, it gets pushed to the control center to then re-apply the security control.
CSVs:
CSVs are stored in three locations:
...