Commands
You can register additional commands to run before or after any backup job. For maximum flexibility, commands can be registered:
for a Protected Item (e.g. to dump a database), or
for a Storage Vault (e.g. to perform custom network authentication), or
for a Schedule (e.g. to shut down the computer afterward)
During a backup job, the commands are run in this order: Schedule Before, Protected Item Before, Storage Vault Before, Backup, Storage Vault After, Protected Item After, Schedule After.
Shell built-ins can be used as part of the command execution - the specified command is passed to either cmd.exe
or /bin/sh
as appropriate for your operating system.
Last updated