Profile Settings

Profile Name:
Priority:
Left-Hand Side
Right-Hand Side
Additional Destinations ...



Copying Directions
Include Subfolders
Left to Right  
Right to Left
None
All
Selected



Sync Operation Mode:
Standard Copying
SmartTracking
Exact Mirror
Move Files to Destination
Case Sensitivity:
Case Sensitive Mode








  • Schedule
  • Access/Retries
  • Comparison
  • Files
  • Folders
  • Job
  • Masks/Filters
  • Safety
  • Special
  • Versioning
  • Compress/Encrypt
  • Schedule
  • More
  • Weekdays and Time window
  • Monitoring / Realtime

Schedule This Profile
Run Every Day (Or Specified Weekdays) At
Run Every
Days
Hours
Minutes
Seconds
Run Monthly

Run Only Once

Specify Next Run

Interval specifies the idle time between runs

Run Upon Scheduler Start

Run Upon Logout

Run Upon Shutdown or Reboot

Run Missed Daily Job Immediately When Scheduler Starts

Add Random Delay Up To
Minutes
 
Warn if Profile Not Run For
Days
Additional Times

Run Also At These Times Of Day:


Profile can run on these Days

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday
Time Window
Run Only Between
and
Ignore this limitation on Saturday and Sundays

Interrupt Running Profile At End Of Time Window

Interrupt in Middle Of File


Real Time Synchronization
Use a single never-ending profile run (to keep FTP connections)
Run profile when drive is available
Once
Repeatedly
Delay between access attempts
minutes
seconds
Minimum pause between actions
hours
minutes
seconds

  • File Access
  • Waiting and Retrying

Volume Shadowing

Do Not Use


Use To Copy Locked Files


Use For All Files


Create Shadow Before Listing

   
Ignore These Errors

Any Errors Listing Folders

Access Denied Reading Files

Files That No Longer Exist

Ignore Locked Files On Destination

Any Errors Deleting Files

Any Errors Deleting Folders

   
Additional Settings

Database Safe: Enforce Exclusive Access

Take Admin Ownership Temporarily if Needed

Prior to Copying, Check All Files Can be Copied


Wait for File Access    
- Wait up to (Minutes):  
 
Wait and Retry if Transfer or Reading Problem

Re-Run profile if an error occurs while


Building file list
Running the profile
Re-Run Once
Re-Run Until Success
Maximum Re-Runs
Retry After (Seconds): 
Avoid re-run due to locked files
  • Comparison
  • More

When File Size Is Identical

Ignore Small Time Differences
Up To (Seconds):
 
Ignore Exact Hour Differences
Up To (Hours):
 
Ignore Seconds
 
When File Size Is Different

What should be done with files that have
the same timestamp but different sizes?
Label as Conflict
Copy Left to Right
Copy Right to Left
Copy Larger Files
Ignore Timestamp Altogether
Never Copy Files With Identical Sizes On Source And Destination, Adjust Timestamp Only

Always copy files, even if timestamp unchanged
Strip Read-Only Attributes
Binary comparison of existing files when building the File List
Remember Results
Use remotely generated MD5 Checksums For Comparisons On:
Left Side
Right Side

Compare / Mirror:
Folder Timestamps
File Attributes
Folder Attributes
Adjust Case Spelling At Destination
Detect Hard Links
Verify Sync Statistics After Completion
Enforce Hard Links for Existing files

For settings related to security and permissions, please see the Special tab sheet.

  • Files
  • Deletions
  • More
Detect Moved Files and Renamed Folders - Adjust On:
Left
Right
Automatic
Detect Renamed Files (based on timestamp and file size)
Allow Moves Between Users
Verify copied files (can double execution time)    
Re-copy Once if verification fails
Automatically resume (copy with temporary filenames, keep incomplete files when stopped)
Protect Files from being replaced with 0-Byte Files
Do not scan destination - copy all files regardless their existence at destination.
Number of files to copy in parallel:  
Bypass File Buffering:  
On the Left Side
On the Right Side
Split Large Files Into Parts Of This File Size (Internet Protocols only):  
  Bytes (for example: 2G; 0 = no splitting)

Use recycle Bin For:
Overwritten Files
The Recycle Bin is not always available (e.g., not on
network drives). Using the Recycle Bin when overwriting
files can be slow and cause it to fill up quickly.
Deleted Files
 
Additional Options for Deleted Files:
Move Files Into Specified Folder:
   
Delete Older Versions Permamently
   
Remember Deletion Time and Date
Never Delete any Files (only Folders)
   
Delete Files before copying
Double-Check the Non-Existence of Files Before deleting them on the Other side
Copying Speed Limit (Bandwidth):  
  MBytes/sec
Scheduled Limits...
Copy Only  
  Files Per Run
Copy Only  
  MegaBytes Per Run
Never Replace Any Files
Don't add Any Files
Always Append Smaller Destination Files (Use For Log Files Only)
Ignore Global and Group Speed Limits
Always Consider Larger Files Newer (Ignore Timestamp)
Preserve Last Access Timestamp on Source
Copied Files Get Current System Time As Modif. Timestamp
Use Windows API Copying Function
Skip Files Whose Size Is Changing
Create Links To Source Files Instead of Copying Files
Check Destination File (Again) During Copying Phase
Use Remote Service to Delete Files (on the Right Side)
And Compare File Details (Again)
Via Internet Protocols Too
Use Remote Service to Move or Rename Files and Folders

Create Empty Folders
Use Intermediate Copying Location...
Remove Folders that were Emptied
Never Delete Any Folders (Only Files)
Flatten the Right Side
In Case Of Duplicate Filenames (choose max. one checkbox):
to max subfolder levels:  
Copy Newest File
Add Timestamps
On the Right Side, Create Folder Each Time  
Include Time Of Day in Created Folder Names
Ensure Folder Timestamps Reflect the Most Recently Modified File in the Subtree
After Copying and Other Actions, Touch Affected Parent Folders On the:  
Left-Hand Side  
Right-Hand Side
Scan Destination Subfolders Even If Not Present On Source Side (To Detect Moved Files)
Create Folder Symlinks from Destination to Source - Don't Copy Any Files

Execute Command or Script before/after...
Check Free Space Before Copying
Override Email Settings...
Ignore Internet Connectivity Check
Run Only If Neither Side Is Empty
Access Local Files As User...
Network Connections...
PascalScript...
File List Threads:
Default
Custom
Shut computer down after this Job:
When Run Via Scheduler
When Run Manually(Unattended)
When Run Manually(Attended)

  • Inclusion Masks
  • Exclusion Masks
  • General Filters
  • File age and size

Inclusion Masks



 
Specify Folder Masks...  
Restrictions...  
Include Backup Files(*.$?$.*)

Exclusions (Files and Folders)



Exclusion Mode:
Don't Copy
Ignore Totally
 
Use Global Exclusions Also
Syncovery can Use Extended Attributes to Mark Files on the Source Side After Copying
Them to the Destination (similar to clearing the Archive Flag on Windows):
Process Hidden Files
Copy Only Files With Archive Flag
Search Hidden Folders
Clear Archive Flags
Analyze Reparse Points
Restore Deleted Items
Follow Symbolic Links to Files
Skip Offline Files
Follow Symbolic Links to Folders
Copy Pinned Files Only (Left Side)
Copy Other Reparse Points
Copy Pinned Files Only (Right Side)
Use .$symlink files to save Symbolic Links:
On the Left-Hand Side
On the Right-Hand Side
 
Symbolic Links to Files:
Ignore
Follow
Copy As Links
Symbolic Links to Folders:
Ignore
Follow
Copy As Links

File Sizes must be within min.
  Bytes (e.g.: 10M)   and max.
  Bytes (e.g.: 1G)
File Dates must be within min.
and max.
File Age:  
Days
Hours
Minutes
Filter by:
Last Modification
Creation
 
Apply To:
Files
Folders
Both
Target Date for Restore:
Scan Only Subfolders Whose Timestamp Has Changed Since the Previous Profile Run

(rarely used because most file systems do not update folder timestamps correctly!)

  • Attended Mode
  • Special Safety
  • Unattended Mode

Warnings in Attended mode
(these options currently do not apply to the Linux version)

Warn if Moving Files (Deleting from Source)


Warn Before Overriding Read-Only Files


Warn Before Overriding Larger Files with Smaller Ones


Warn Before Overriding Newer Files with Older Ones


Warn Before Deleting Files



Special Safety Checks
(these can prevent deletions)

Warn If Deleting More Files Than
% From Either Left or Right Side
Warn If Deleting All Files In Any (Sub-)Folder
Warn If Deleting More Than
% Of the Files From Any (Sub-)Folder

Safety Settings for Unattended Mode  
Read-Only Files May be Overwritten When the Job Runs Unattended or Scheduled
Larger Files May be Replaced With Smaller Ones if the Smaller One is Newer
Exact Mirror Mode May Replace Newer Files With Older Ones
Unattended File Deletion Allowed, Maximum
% Of The Files From One Side
Stop If the Job Would Delete More Than
Files
Ransomware Protection: Replace Max.
% Of The Files on One Side
Enable Special Safety Checks From Special Safety Tab Sheet (can prevent deletions)
  • Special Features
  • More
  • Database
Cache Destination File List...
Left side listing uses Remote Service
Block Level Copying
Right side listing uses Remote Service

Using

Checksums
File System Monitoring
Use Different Folders for Communication
Right side uses Remote Service
No full copying if service unavailable
Request only one file at a time
Process Security and Shares...
Fast Mode (Process target directly. no temp file. Left to Right is always fast)
Copying Order:
Use Remote Service to Copy Files for Block Level Copying + Versioning
If Destination Machine Modifies Received Files, Changing their Size upon Reception, then Copy such Updated Files Back
Set Target Volume Label To:
Double-Check Each File's Destination Timestamp After Copying
Detect Changed Files Via File System Monitoring Even If Timestamps Unchanged
Spawn Separate Sub-Jobs for Each Subfolder on Level:    
  (0 = Base Folder)
Spawn Simultaeously

The settings here are filled in automatically and rarely need to be changed by the user.
To specify the folder where the database should be stored, see Program Options.

Open Database Read-Only
Never Consider the Database Outdated
Fast Mode: Don't Check All DB Entries

Database Name to Use (Profile name):  
Database Contains Paths Relative To:
Left Side
Right Side
  • Versioning
  • Synthetic Backup
  • More
Keep Older Versions When Replacing:  
  Per File   Renaming Of Older Versions
Only on Right-Hand Side
   
Add .$1$., .$2$. etc.
Add Timestamp
Move into folder:
As Subfolder in Each Folder
Don't rename newest older version
Recreate tree below one "Older" folder
Keep One Version Of Deleted Files
FileName Encoding: On the Right Side, Put Timestamps Into All File Names
(Also Preserves Timestamps on Servers That Normally Lose Them)
Delete old file versions after  
  Days
Use Synthetic Backup (Combines Block Level Copying, Zipping and Versioning)
Use Checkpoints To Reduce The Number Of Incremental Versions Needed For Restore
Create Checkpoint Every  
Checkpoints are relative to:  
Build all incremental images against the preceeding checkpoint(uses more space)
Remove unneeded incrementals older than  
  days   and  

If all blocks in a file change, keep only number of versions from Versioning Tab sheet



Do Not Decode Left-Hand Filenames When Building The File List

Do Not Decode Right-Hand Filenames When Building The File List

Use Windows 10 File History Encoding Format Rather Than Syncovery Native

Decode all known Timestamp Encoding Formats

Clean up identical duplicates of files with differently encoded Unicode umlauts

Allow merging duplicate folders on source side

Remove parenthesized version numbers before extension on the right side: file(2).ext

Remove the versioning tags -1 and -2 and rename such files immediately

Clean up all older versions based on the specified number to keep (If unchecked, the limit is enforced only for files that are copied)

Files Backed Up With V4 Used UTC/GMT (World Time) For Encoding (Like V5)

  • Zipping
  • Encryption

Compress Each File Individually (when copying left to right - use right to left copying direction to decompress)

Compression Format:   


Compression Level:   


Use Compressed Packages (many files per archive)...

Compress directly to destination

Unzip all copied Zip/Sz/7z files

Keep unpacked archive files destination

Limit Zip File Size To  
  Bytes (such as 10M or 1G)

Encrypt Files Copied Left to Right (Encryption Implies Zipping)
Decrypt Files Copied Right to Left

Password Phrase:  
Confirm:  

Encrypt PGP
Decrypt PGP
Keep Decrypted PGP Files at Destination
Encrypt File Names
Encrypt Names of Existing Files On the Right-Hand Side
Encrypt Folder Names (including existing folders on the right hand side)