How to Read CRS Registry Flags to Determine Configuration

Last reviewed: February 3, 1998
Article ID: Q177747
The information in this article applies to:
  • Microsoft Commercial Internet System, version 1.0
  • Site Server version 2.0

SUMMARY

All Content Replication System (CRS) configuration information is contained in the Windows NT registry:

   HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CRS

Some of the information is readily accessible, such as the TransactionMethod. This value is set to YES or NO. Other values are harder to read. This article describes how to read the Flags value for each project.

MORE INFORMATION

The table below shows all the possible Flags values and how to set them either from the Command line or the Web based CRS Administration. The syntax from the Command line is either where <Project> is the name of the project:

   AddProj <Project> <Directory> [Dest1] Flags=VALUE
   CRS EDITPROJ <Project> FLAGS=VALUE

The VALUE will always be checked for validity. A numeric value is considered valid. On the other hand, the token "FLAGS" will not be checked. If the word "FLAG" is entered by mistake, a new value will be created.

For example to add the Force flag to an existing project named Test1 we would use this command:

   CRS EDITPROJ Test1 FLAGS=Force

To turn off all of the flags of an existing project named Test1 we use this command:

   CRS EDITPROJ Test1 FLAGS=0

The best way to verify is to open the registry with REGEDT32.EXE The Content Replication System project information is located in:

   HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CRS\Projects\<Project>

The Flags value will tell exactly how the customer has configured CRS. To request and interpret the information:

  1. Request that the customer save the CRS registry information from:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CRS

  2. Use the Registry/Save Subtree menu to make a text copy. Then have the customer mail the information to you.

  3. When you look into the registry information, you will find the value: Flags. You can use notepad's Search/Find menu to do this.

  4. Once you have the value then you can use the table below to determine the configuration.

          Flags value  1
          Command Line Flags=NoDelete
    
          Web Admin    Options -> Preserve deleted content on the target
          Bit Value     00000000 00000000 00000000 00000001
    
          Flags value  2
          Command Line Flags=ACLs
          Web Admin    Options -> Replicate ACLs and files
          Bit Value     00000000 00000000 00000000 00000010
    
          Flags value  4
          Command Line Flags=DirsOnly
          Web Admin    Options -> Replicate ACLs and directory structure only
          Bit Value     00000000 00000000 00000000 00000100
    
           Flags value  8
          Command Line Flags=Force
          Web Admin    Force replication of all files
          Bit Value     00000000 00000000 00000000 00001000
    
          Flags value  16
          Command Line Flags=Permit
          Web Admin    Options -> Replicate ACLs only and apply to files
          Bit Value     00000000 00000000 00000000 00010000
    
          Flags value  64
          Command Line Flags=Incremental
          Web Admin    Options -> Check time stamp only
          Bit Value     00000000 00000000 00000000 01000000
    
          Flags value  128
          Command Line Flags=Fastmode
          Web Admin    Options -> Turn off framing for local replication
          Bit Value     00000000 00000000 00000000 10000000
    
          Flags value  256
          Command Line Flags=Automatic
          Web Admin    Schedule -> set to Automatic
          Bit Value     00000000 00000000 00000001 00000000
    
          Flags value  512
          Command Line Flags=Route
          Web Admin    CRS -> Routes
          Bit Value     00000000 00000000 00000010 00000000
    
          Flags value  1024
          Command Line Flags=Notify
          Web Admin    CRS -> Settings
          Bit Value     00000000 00000000 00000100 00000000
    
          Flags value  4096
          Command Line Flags=ExcludeAll
          Web Admin    Source -> Exclude all subdirectories
          Bit Value     00000000 00000000 00010000 00000000
    
    
Example: Flags = 4575

  1. Use CALC.EXE to translate the value to binary.

          4575 = 00010001 11011111
    

  2. Look at the table for the value of each bit.

       1    Preserve deleted content on the target
                                     00000000 00000000 00000000 00000001
    
       2    Replicate ACLs and files
                                     00000000 00000000 00000000 00000010
    
       4    Replicate ACLs and directory structure only
                                     00000000 00000000 00000000 00000100
    
       8    Force replication of all files
                                     00000000 00000000 00000000 00001000
    
       16   Replicate ACLs only and apply to files
                                     00000000 00000000 00000000 00010000
    
       64   Check time stamp only    00000000 00000000 00000000 01000000
    
       128  Turn off framing for local replication
                                     00000000 00000000 00000000 10000000
    
       256  Schedule -> set to Automatic
                                     00000000 00000000 00000001 00000000
    
       4096 Source -> Exclude all subdirectories
                                     00000000 00000000 00010000 00000000
       -----------------------------------------------------------------
       Total= 4575                   00000000 00000000 00010001 11011111
    
    
Thus we can see that this user has chosen every checkbox available in the Web Administration interface.
Keywords          : kbusage
Version           : Winnt:1.0,2.0
Platform          : winnt
Issue type        : kbinfo
Solution Type     : Info_Provided


================================================================================


THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

Last reviewed: February 3, 1998
© 1998 Microsoft Corporation. All rights reserved. Terms of Use.