Skip to main content

Who is this article for?
Find your product plan in the Code42 console on the Account menu.

Incydr Professional, Enterprise, and Gov F2
Incydr Basic, Advanced, and Gov F1
Other product plans

Incydr Professional and Enterprise, yes.

Incydr Basic and Advanced, no.

CrashPlan Cloud, no.

Other product plans, no.

CrashPlan for Small Business, no.

This article applies to Code42 cloud environments.

Code42 Support

Deployment script and command reference for Incydr Professional and Enterprise


When you create a deployment policy in the Code42 console, the process generates user-detection scripts and arguments for Code42 app install commands. This article provides details about the scripts for Windows, Mac, and Linux devices. 

This article is only for Code42 environments with Incydr Professional and Enterprise. To find the product plan in use at your environment, access the Account menu in the Code42 console. 

Use the correct scripts!
Use the scripts for the product plan in your Code42 environment. If you use scripts that are not made for the product plan in your Code42 environment, they will break your deployment.

This article is only for Code42 environments with Incydr Professional and Enterprise. For deployment scripts to use in Code42 environments with other product plans, see Deployment script and command reference for Incydr Basic and Advanced, CrashPlan Cloud, and other plans.


This article assumes you understand the introduction to deployment provided by the article Deploy Code42 apps.

  • These instructions apply to the Code42 cloud. If you work in an on-premises Code42 environment, see Manage app installations in your Code42 environment.
  • To use these deployment tools, you need to sign in to your Code42 console as a user with the Security Administrator role. 
  • In the Code42 federal environment, app installations must be deployed with a deployment policy to ensure the use of FIPS encryption in the Code42 app. Users cannot download the installation package from the Code42 console or an email message.

Deployment is a secure process:

  • During installation, device-server communications are encrypted.
  • Devices can use a proxy to reach your authority server. See the PROXY_URL parameter.
  • Deployment can run silently, with no intervention from users at devices.

About user detection scripts

Code42 relies on usernames having an email format, for instance, A user detection script detects the usernames in another system, such as a directory service, and transforms them to a username format that Code42 can use. When you create a user detection script, you must customize it for the system where you need to detect usernames.

To make it easier to create a user detection script that's right for your situation, we provide example scripts for Windows and Mac systems. You can use these examples as a starting place when creating your own user detection script.




Related topics

  • Was this article helpful?