Profile Settings

Profile name
Left Hand side
Right Hand side
   
   



Copying directions
Include Subfolders
Left to Right
Right to Left
None
All
Selected



Sync Operation Mode:
Standard Copying
SmartTracking
Exact Mirror
Move Files to Destination
Case Sensitivity:
Case Sensitive Mode











  • Schedule
  • Access/Retries
  • Comparison
  • Files
  • Folders
  • Job
  • Masks/Filters
  • Safety
  • Special
  • Versioning
  • Compress/Encrypt
  • Schedule
  • More
  • Weekdays and Time window
  • Monitoring / Realtime

Schedule This Profile
Run Every Day (or Specified Weekdays) At
Run Every
Days
Hours
Minutes
Seconds
Run Monthly

Run Only Once

Specify Next Run

Interval specifies the idle time between runs

Run Missed Daily Job Immediately When Scheduler Starts

Add Random Delay Up To
Minutes
 
Warn if Profile Not Run For
Days
 
Run Upon Scheduler Start (System Boot)

Run upon shutdown and logout

Additional Times

Run Also At These Times Of Day:


Profile can run on these Days

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday
Time Window
Run Only Between
Ignore this limitation on Saturday and Sundays

Interrupt Running Profile At End Of Time Window

Interrupt in Middle Of File


Real Time Synchronization
Use a single never-ending profile run (to keep FTP connections)
Run profile when drive is available
Once
Repeatedly
Delay between access attempts
minutes
seconds
Minimum pause between actions
hours
minutes
seconds

  • File Access
  • Waiting and Retrying

Ignore These Errors

Any Errors Listing Folders

Access Denied Reading Files

Files That No Longer Exist

Ignore Locked Files On Destination

Any Errors Deleting Files

Any Errors Deleting Folders


Database Safe: Enforce Exclusive Access

Prior to Copying, Check All Files Can be Copied

Take Admin Ownership Temporarily if Needed


Wait for File Access    
- Wait up to (Minutes):  
 
Wait and Retry if Transfer or Reading Problem

Re-Run profile if an error occurs while


Building file list
Running the profile
Re-Run Once
Re-Run Until Success
Maximum Re-Runs
Retry After (Seconds): 
Avoid re-run due to locked files
  • Comparison
  • More

When size identical

Ignore small time difference
Max (Seconds):
 
Ignore exact Hour time difference
Max (Hours):
 
Ignore seconds
 
Ignore Timestamp Altogether
 
Never Copy, Adjust Timestamp Only
When size is different

What should be done with files that have
the same timestamp but different sizes?




Ask

Copy Left to Right

Copy Right to Left

Copy Larger Files


Always copy files, even if timestamp unchanged
Strip Read-Only Attributes
Binary comparison of Existing files when building the File List
Remember Results

Use remotely generated MD5 Checksums For Comparisons On:
Left Side
Right Side

Compare / Mirror:
File Attributes
Folder Timestamps
Folder Attributes
Permissions
ACLs
Case Sensivity: Adjust At Destination
Detect Hard Links
Verify Sync Statistics After Completion
Enforce Hard Links for Existing files
  • Files
  • Deletions
  • More
Detect Moved Files and Renamed Folders - Adjust On:
Left
Right
Automatic
Detect renamed Files (based on timestamp and filesize)

Verify copied files (can double execution time)
Re-copy Once if verification fails
Automatically resume (copy with temp filenames, keep incomplete files when stopped)


Protect Files from being replaced with 0-Byte Files


Do not scan destination - copy all files regardless their existence at destination.

Number of files to copy in parallel:
  Bypass File Buffering:
Left
Right
Split Large Files Into Parts Of This File Size (Internet Protocols only):
Bytes (for example: 2G; 0 = no splitting)

Use recycle Bin For:
Overwritten Files
The Recycle Bin is only available on some cloud storages
(not on local hard drives or mounted network shares).
Deleted Files
 
Additional Options for Deleted Files:
Move Files Into Specified Folder:
Delete Older Versions Permamently
Double Check the Non-Existence of Files Before deleting them on the Other side
Never Delete any Files (only Folders)
Delete Files before copying
Copying Speed Limit (Bandwidth):  
  MBytes/sec
Scheduled Limits...
Copy Only  
  Files Per Run
Never Replace Any Files
Don't add Any Files
Always Append Smaller Destination Files (Use For Log Files Only)
Ignore Global and Group Speed Limits
Always Consider Larger Files Newer (Ignore Timestamp)
And Compare File Details (Again)
Check Destination File (Again) During Copying Phase
Preserve Last Access Timestamp on Source
Copied Files Get Current System Time As Modif. Timestamp
Use Windows API Copying Function
 Owner:   Group:
 Permissions:

Create Empty Folders


Use Intermediate Copying Location...


Remove Folders that were Emptied


On the Right Side, Create Folder Each Time


Include Time Of Day in Created Folder Names


Flat Right Side (No Folders)


Copy Latest File If Several Files With the Same Name Exist


Ensure Folder Timestamps Reflect the Most Recently Modified File in the Subtree


Never Delete Any Folders (Only Files)

Execute Command or Script before/after...

Check Free Space Before Copying

Override Email Settings...

Ignore Internet Connectivity Check

Access Local Files As User...

Run Only If Neither Side Is Empty

Network Connections...


PascalScript...

File List Threads:
Default
Custom
Shut computer down after this Job:
When Run Via Scheduler
When Run Manually(Unattended)
When Run Manually(Attended)

  • Inclusion Masks
  • Exclusion Masks
  • General Filters
  • File age and size

Inclusion Masks



 
Specify Folder Masks
Restrictions...
Include Backup Files(*.$?$.*)

Exclusions (Files and Folders)



Exclusion Mode:
Don't Copy
Ignore Totally
 
Use Global Exclusions Also

Process Hidden Files
Search Hidden Folders
 
Syncovery can Use Extended Attributes to Mark Files on the Source Side After Copying Them to the Destination
(similar to clearing the Archive Flag on Windows):
Mark Copied Files With an Extended Attribute
Copy Only Files That Have Not Previously Been Marked As Copied (or Have Changed Since)
Analyze Reparse Points
Follow Junction Points/ Symbolic Links to Files
Follow Junction Points/ Symbolic Links to Folders
Copy Other Reparce Points
Symbolic Links to Files:
Ignore
Follow
Copy As Links
Symbolic Links to Folders:
Ignore
Follow
Copy As Links

File Sizes must be Within


min
  Bytes (e.g.: 10M)

max
  Bytes (e.g.: 1G)

File Dates must be Within
min
max


File Age:  
Days
Hours
Minutes
Target Date for Restore:




Filter by:
Last Modification
Creation
 
Apply To:
Files
Folders
Both
  • Attended Mode
  • Special Safety
  • Unattended Mode

Warnings in Attended mode
(these options currently do not apply to the Linux version)

Warn if Moving Files (Deleting from Source)


Warn Before Overriding Read-Only Files


Warn Before Overriding Larger Files with Smaller Ones


Warn Before Overriding Newer Files with Older Ones


Warn Before Deleting Files



Special Safety Checks
(these can prevent deletions)

Warn If Deleting More Files Than
% From Either Left or Right Side
Warn If Deleting All Files In Any (Sub-)Folder
Warn If Deleting More Than
% Of the Files From Any (Sub-)Folder

Safety Settings for Unattended Mode  

Overwrite Read-Only Files


Overwrite Larger Files with Smaller Ones If File Dates Require It


Newer Files May Be Overwritten If Necessary
File Deletion Allowed, Maximum
% Of The Files from Either Side
Ransomware protection: Replace Max.
% Of The Files from Either Side
Enable Special Safety Checks From Special Safety Tab Sheet (can prevent deletions)
  • Special Features
  • More
  • Database
Cache Destination File List...

Left side listing uses Remote Service

Block Level Copying
Right side listing uses Remote Service

Using

Checksums
File System Monitoring
Use Different Folders for Communication


Right side uses Remote Service
No full copying if service unavailable
Request only one file at a time
Fast Mode (Process target directly. no temp file. Left to Right is always fast)
Copying Order:
Process Security and Shares...

If Destination Machine Modifies Received Files, Changing their Size upon Reception, then Copy such Updated Files Back

Set Target Volume Label To:
Double-Check Each File's Destination Timestamp After Copying

Detect Changed Files Via File System Monitoring Even If Timestamps Unchanged


The settings here are filled in automatically and rarely need to be changed by the user.
To specify the folder where the database should be stored, see Program Options.

Open Database Read-Only
Fast Mode: Don't Check All DB Entries

Database Name to Use (Profile name):  
Database Contains Paths Relative To:
Left Side
Right Side
  • Versioning
  • Synthetic Backup
  • More
Keep Older Versions When Replacing:
  Per File   Renaming Of Older Versions
Only on Right-Hand Side
   
Add .$1$., .$2$. etc.
Add Timestamp
Move into folder:
As Subfolder in Each Folder
Recreate tree below one "Older" folder
Don't Rename newest older version
Keep One Version Of Deleted Files

 
FileName Encoding: On the Right Side, Put Timestamps Into All File Names

(Also Preserves Timestamps on Servers That Normally Lose Them)

Use Synthetic Backup (Combines Block Level Copying, Zipping and Versioning)


Use Checkpoints To Reduce The Number Of Incremental Versions Needed For Restore


Create Checkpoint Every  

 
Checkpoints are relative to:  

 
Build all incremental images against the preceeding checkpoint(uses more space)

 
Remove unneeded incrementals older than
  days

If all blocks in a file change, keep only number of versions from Versioning Tab sheet



Do Not Decode Left-Hand Filenames When Building The File List


Do Not Decode Right-Hand Filenames When Building The File List


Use Windows 10 File History Encoding Format Rather Than Syncovery Native


Decode all known Timestamp Encoding Formats


Clean up identical duplicates of files with differently encoded Unicode umlauts


Remove parenthesized version numbers before extension on the right side: file(2).ext


Remove the versioning tags -1 and -2 and rename such files immediately


Clean up all older versions based on the specified number to keep(If unchecked, the limit is enforced only for files that are copied)


Files Backed Up With V4 Used UTC/GMT (World Time) For Encoding (Like V5)


  • Zipping
  • Encryption

Compress Each File Individually (when copying left to right - use right to left copying direction to decompress)


Compression Format:   



Compression Level:   



Use ZIP Packages (many files per ZIP archive)...


Compress directly to destination


Unzip all ZIP files which are copied to the destination


Limit Zip File Size To
Bytes (such as 10M or 1G)

Encrypt Files Copied Left to Right (Encryption Implies Zipping)
 
Decrypt Files Copied Right to Left


Password Phrase:
Confirm:


Encrypt File Names
Encrypt Names of Existing Files On the Right-Hand Side
 
Encrypt Folder Names (including existing folders on the right hand side)