Search

Before and After Commands

You can register additional commands to run before- or after any backup job. For maximum flexibility, commands can be registered

  • for a Protected Item (e.g. to dump a database), or
  • for a Storage Vault (e.g. to perform custom network authentication), or
  • for a Schedule (e.g. to shut down the computer afterward).

During a backup job, the commands are run in this order:

  1. Schedule Before
  2. Protected Item Before
  3. Storage Vault Before
  4. Backup Job
  5. Storage Vault After
  6. Protected Item After
  7. Schedule After

Shell built-ins can be used as part of the command execution - the specified command is passed to either cmd.exe or /bin/sh as appropriate for your operating system.

en_USEN