Available Actions

Once an Event Rule is triggered, assuming all Conditions are met, EFT can launch one or more of the following user-definable Actions. Some Actions require a specific module.

  • Protocol: Upload (formerly "Copy/Move (push) file to host") - The designated file is automatically moved to another location.

  • Protocol: Download (formerly "Download (pull) file from host") - Downloads a specified file.

  • Protocol: Synchronize - Synchronize local and remote folders

  • Protocol: AS2 (formerly "AS2 Send file to host" Action) - You can send files via AS2 to a partner that does not have inbound access defined in EFT’s account management system.

  • Protocol: Email (formerly "Send notification email") - An email message is sent to the address specified.

  • Cloud: Download; Cloud: Upload (formerly Cloud Storage actions) - Supports transfers from/to Amazon S3 and Azure containers including advanced settings like multi-part, encryption, requestor-pay, and others. GET, POST, PUT, DELETE at a specific URL and save the response to a specific file.

  • NOTE: The Cloud Connector Module (CCM) is required for all cloud-based activities.
  • Cloud: REST/Web Services (formerly "Invoke Web Services") - GET, POST, PUT, DELETE at a specific URL and save the response to a specific file.

  • Compression - Compress or decompress file in the format of Zip, 7Zip, Gzip, Bzip2, Tar, Tar and Gzip, or ZCompress. You can also add context variables to the Action.

  • Cryptography: OpenPGP (formerly "OpenPGP operations") - (Requires OpenPGP module) The designated cryptographic action is performed on the file.

  • CSV: Export to dataset - Used in conjunction with Protocol: Listing to Dataset and Loop: Dataset Action (or with an existing dataset) to create a CSV file, which can then be used in other applications.

  • CSV: Import from dataset - Reads data from a comma-separated values (CSV) file, and populates the specified dataset with those values.

  • File: Scan (formerly Scan file using Content Integrity Control) - Used to send a file to an antivirus or data loss prevention scanner for processing.

  • File: Operation - Create, rename, or delete specified file. Optionally use specified credentials.

  • Folder: Operation - Create, rename, or delete specified folder. Optionally use specified credentials.

  • Flow: Abort User Operation - Used after the File: Scan Action for a Message Composed event in case a file is attached to the message that did not pass the ICAP scan.

  • Flow: Subroutine (formerly "Call Event Rule subroutine") - Allows you to call an Event Rule Subroutine event (a sub task) from the current rule

  • Flow: Stop processing - If the previous trigger or Condition occurs, stop processing this Rule (default), more Rules, or this Rule and more Rules:

    • this rule - this Rule is not processed.

    • more rules - this is Rule is processed but no further Rules are processed.

    • this and more rules - no more Rules are processed.

  • Flow: Variable (formerly "Create or set variable") - Used to create or modify a variable to be used in Event Rules

  • Loop: Dataset (formerly "Loop through Dataset") - Used to read from a remote directory listing to create a dataset or read from a CSV file to create a dataset. reads through ("parses") a dataset until the end of the dataset is reached or a Loop Break is used to stop the loop.

  • Script: Advanced Workflow (formerly "Execute Advanced Workflow")  - An Advanced Workflow is triggered.

  • Script: Custom Command (formerly "Execute command in folder") - The custom command in a specific location is triggered.

  • Script PowerShell (formerly "Run PowerShell script") - Used in Event Rules to execute a PowerShell script

  • System Backup -  Automatically backs up EFT configuration for use in disaster recovery or EFT migration.

  • System Cleanup - Cleans up a specified folder

  • System: Report (formerly "Generate Report") - (Requires database and Auditing and Reporting module) A report is generated and emailed or saved to a file at a specific date and time.

  • User: Action- Lock, disable, ban, delete, or kick user account

  • Windows Event Log - Defines the parameters to display in the Windows Event Log when the Event is triggered.

For details of adding Actions to Rules, see the examples at the links above.