This tab sheet contains some start-up related settings.
Make config file writeable for all users (necessary to use SyncoveryCL command line as normal user).
Use Internet Connectivity Detection:
Syncovery will query https://www.syncovery.com/whoami.php regulary to detect your Internet connection.
The requests may be logged on the server but the data is not used for anything other than statistics. Syncovery does not send any further information and no personal data other than your IP address.
Check When Jobs Are Run Manually Too
Additional Logging (for troubleshooting)
Use Global Speed Limit Mechanism (needs scheduler restart)
Ignore Weekdays Restrictions In All Profiles
Force separate folder monitor thread for each real-time profile
Allow different users to run the same job at the same time without warning
Enable status web pages for each SyncoveryCL process (ports 8998 and below).
Global Exclusion Masks(separate with semicolon or Enter)
File masks which should not be zipped (unless encryption is also chosen)
File masks which should not be updated on Block Level (and no Synthetic Backup)
Make databases writeable for all users (to use SyncoveryCL via command line as normal user).
Service Start/Stop Scheduler Start/Stop Service Error Application Error General Warnings Profile Run Started Profile Run Completed Without Errors Profile Run Completed With Errors Profile Run General Error(immediately logged before profile completion) Profile Run With Warnings Profile Modified by User
Thread Count for File List Building Folders can be scanned using multithreading. Spesify how many folders should be procesed
simultaneously for these types of storages by each job. The maximum is 500.
Please note: a higher number of threads can cause high CPU and disc or network usage. Threads will
also compete with each other when allocating memory, so more threads can actually be slower than just a few threads.
Internet protocol and cloud servers( such as FTP or GoogleDrive ) usually allow only a limited
number of simultaneous connections for each users( such as 3 or 8 ) On this page, you can configure the certificates that should be used for authentication of this software as a client.
When you have configured you certificates, you can choose them individually for each profile on the Scurity tab sheet in this dialog box.
Key files must continue to exist in their specified locations
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|