Search

Commands

You can register additional commands to run before or after any backup job. For maximum flexibility, commands can be registered:

  • for a Protected Item (e.g. to dump a database), or
  • for a Storage Vault (e.g. to perform custom network authentication), or
  • for a Schedule (e.g. to shut down the computer afterward)

During a backup job, the commands are run in this order: Schedule Before, Protected Item Before, Storage Vault Before, Backup, Storage Vault After, Protected Item After, Schedule After.

Shell built-ins can be used as part of the command execution – the specified command is passed to either cmd.exe or /bin/sh as appropriate for your operating system.