This tab sheet contains options related to how your profiles and settings are saved.
Make config file writeable for all users (necessary to use SyncoveryCL command line as normal user).
Encrypt:
Protect With:
Encryption Password:
Repeat:
Store the Settings Password in a File (secured with an encryption key based on the machine ID)
Pathname of password file:
This tab sheet contains start-up related settings.
Scheduler Idle Time After Startup:
Minutes
Use Internet Connectivity Detection:
Syncovery will query https://www.syncovery.com/whoami.php regulary to detect your Internet connection.
The requests may be logged on the server but the data is not used for anything other than statistics.
Syncovery does not send any further information and no personal data other than your IP address.
Run jobs only if connection name contains one of these settings
        
Connection name must not contain
Checking Interval:
Minutes (minimum 5)
Check When Jobs Are Run Manually Too
Logging:
Abbreviated Logs
Path for logging:
Number of Log Files to Keep (per Profile):
Delete Logs With "Nothing To Do"
Additional Logging (for troubleshooting)
Internet Protocol Logging
Output Left/Right File Listrings
SmartTracking Details
Keep Checkpoint History
File List Building Details
Speed Limit Details
File Security Details
File Share Details
Time Stamp Setting Details
Synthetic Details
With Extremely Detailed Timing Info
Even More Detailed
Transfer Details (especially for large files and resuming)
Profile Run General Error (immediately logged before profile completion)
Profile Run With Warnings
Profile Modified by User
CPU Usage
CPU 0
CPU 1
CPU 2
CPU 3+
Thread Priority:
Thread Count for File List Building
Folders can be scanned using multithreading. Spesify how many folders should be procesed
simultaneously for these types of storages by each job. The maximum is 500.
Local folders
Internet Protocols
Network folders
Remote Listing and Database Cache
Please note: a higher number of threads can cause high CPU and disc or network usage. Threads will
also compete with each other when allocating memory, so more threads can actually be slower than
just a few threads.
Internet protocol and cloud servers (such as FTP or GoogleDrive) usually allow only a limited
number of simultaneous connections for each users (such as 3 or 8)
On this page, you can configure the private keys that should be used for authentication as a client.
When private keys are set up, you can choose them individually for each profile on the Security tab sheet of the Internet Protocol Settings dialog.
Private Key Name For Reference in This Program:
Private Key File:
Public Key File (optional):
Key files must continue to exist in their specified locations
Enable Profile Priority Mechanism
Prevent Starting Lower Priority Jobs While Higher Ones Are Running
Pause Lower Priority Jobs When a Higher One Starts
Limit Lower Priority Jobs to a Single Copying Thread While Higher Ones are Running
Allow Up To
Jobs to Run Simultaneously Without Enforcing the Above Rules
Profiles can be assigned a priority level on the profile editor dialog box. Profiles with level 0 will be exempted from any of these limitations.