- Show all articles ( 9 ) Collapse Articles
You can register additional commands to run before or after any backup job. For maximum flexibility, commands can be registered:
- for a Protected Item (e.g. to dump a database), or
- for a Storage Vault (e.g. to perform custom network authentication), or
- for a Schedule (e.g. to shut down the computer afterward)
During a backup job, the commands are run in this order: Schedule Before, Protected Item Before, Storage Vault Before, Backup, Storage Vault After, Protected Item After, Schedule After.
Shell built-ins can be used as part of the command execution – the specified command is passed to either
/bin/sh as appropriate for your operating system.