Available Actions
Once an Event Rule is triggered, assuming all Conditions are met, EFT can launch one or more of the following user-definable Actions. Some Actions require a specific module.
-
Protocol: Upload (formerly "Copy/Move (push) file to host") - The designated file is automatically moved to another location.
-
Protocol: Download (formerly "Download (pull) file from host") - Downloads a specified file.
-
Protocol: Synchronize - Synchronize local and remote folders
-
Protocol: AS2 (formerly "AS2 Send file to host" Action) - You can send files via AS2 to a partner that does not have inbound access defined in EFT’s account management system.
-
Protocol: Email (formerly "Send notification email") - An email message is sent to the address specified.
-
Cloud: Download; Cloud: Upload (formerly Cloud Storage actions) - Supports transfers from/to Amazon S3 and Azure containers including advanced settings like multi-part, encryption, requestor-pay, and others. GET, POST, PUT, DELETE at a specific URL and save the response to a specific file.
-
Cloud: REST/Web Services (formerly "Invoke Web Services") - GET, POST, PUT, DELETE at a specific URL and save the response to a specific file.
-
Compression - Compress or decompress file in the format of Zip, 7Zip, Gzip, Bzip2, Tar, Tar and Gzip, or ZCompress. You can also add context variables to the Action.
-
Cryptography: OpenPGP (formerly "OpenPGP operations") - (Requires OpenPGP module) The designated cryptographic action is performed on the file.
-
CSV: Export to dataset - Used in conjunction with Protocol: Listing to Dataset and Loop: Dataset Action (or with an existing dataset) to create a CSV file, which can then be used in other applications.
-
CSV: Import from dataset - Reads data from a comma-separated values (CSV) file, and populates the specified dataset with those values.
-
File: Scan (formerly Scan file using Content Integrity Control) - Used to send a file to an antivirus or data loss prevention scanner for processing.
-
File: Operation - Create, rename, or delete specified file. Optionally use specified credentials.
-
Folder: Operation - Create, rename, or delete specified folder. Optionally use specified credentials.
-
Flow: Abort User Operation - Used after the File: Scan Action for a Message Composed event in case a file is attached to the message that did not pass the ICAP scan.
-
Flow: Subroutine (formerly "Call Event Rule subroutine") - Allows you to call an Event Rule Subroutine event (a sub task) from the current rule
-
Flow: Stop processing - If the previous trigger or Condition occurs, stop processing this Rule (default), more Rules, or this Rule and more Rules:
-
this rule - this Rule is not processed.
-
more rules - this is Rule is processed but no further Rules are processed.
-
this and more rules - no more Rules are processed.
-
Flow: Variable (formerly "Create or set variable") - Used to create or modify a variable to be used in Event Rules
-
Loop: Dataset (formerly "Loop through Dataset") - Used to read from a remote directory listing to create a dataset or read from a CSV file to create a dataset. reads through ("parses") a dataset until the end of the dataset is reached or a Loop Break is used to stop the loop.
-
Script: Advanced Workflow (formerly "Execute Advanced Workflow") - An Advanced Workflow is triggered.
-
Script: Custom Command (formerly "Execute command in folder") - The custom command in a specific location is triggered.
-
Script PowerShell (formerly "Run PowerShell script") - Used in Event Rules to execute a PowerShell script
-
System Backup - Automatically backs up EFT configuration for use in disaster recovery or EFT migration.
-
System Cleanup - Cleans up a specified folder
-
System: Report (formerly "Generate Report") - (Requires database and Auditing and Reporting module) A report is generated and emailed or saved to a file at a specific date and time.
-
User: Action- Lock, disable, ban, delete, or kick user account
-
User: Create - Added to an event rule when you want a certain event to trigger the creation of a new user. (This action is available to any event trigger.)
-
Windows Event Log - Defines the parameters to display in the Windows Event Log when the Event is triggered.
For details of adding Actions to Rules, see the examples at the links above.