Profile Settings

Profile name
Left Hand side
Right Hand side



Copying directions
Include Subfolders
Left to Right
Right to Left
None
All
Selected



Sync Operation Mode:
Standard Copying
SmartTracking
Exact Mirror
Move Files to Destination
Case Sensitivity:
Case Sensitive Mode











  • Schedule
  • Access/Retries
  • Comparison
  • Files
  • Folders
  • Job
  • Masks/Filters
  • Safety
  • Special
  • Versioning
  • Compress/Encrypt
  • Schedule
  • More
  • Weekdays and Time window
  • Monitoring / Realtime

Schedule This Profile
Run Every Day (or Specified Weekdays) At
Run Every
Days
Hours
Minutes
Seconds
Run Monthly

Run Only Once

Specify Next Run

Interval specifies the idle time between runs

Run Missed Daily Job Immediately When Scheduler Starts

Add Random Delay Up To
Minutes
 
Warn if Profile Not Run For
Days
 
Run Upon Scheduler Start

Run Upon Shutdown or Reboot

Run Upon Logout

Additional Times

Run Also At These Times Of Day:


Profile can run on these Days

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday
Time Window
Run Only Between
Ignore this limitation on Saturday and Sundays

Interrupt Running Profile At End Of Time Window

Interrupt in Middle Of File


Real Time Synchronization
Use a single never-ending profile run (to keep FTP connections)
Run profile when drive is available
Once
Repeatedly
Delay between access attempts
minutes
seconds
Minimum pause between actions
hours
minutes
seconds

  • File Access
  • Waiting and Retrying

Volume Shadowing

Do Not Use


Use To Copy Locked Files


Use For All Files


Create Shadow Before Listing

   
Ignore These Errors

Any Errors Listing Folders

Access Denied Reading Files

Files That No Longer Exist

Ignore Locked Files On Destination

Any Errors Deleting Files

Any Errors Deleting Folders

   
Additional Settings

Database Safe: Enforce Exclusive Access

Prior to Copying, Check All Files Can be Copied

Take Admin Ownership Temporarily if Needed


Wait for File Access    
- Wait up to (Minutes):  
 
Wait and Retry if Transfer or Reading Problem

Re-Run profile if an error occurs while


Building file list
Running the profile
Re-Run Once
Re-Run Until Success
Maximum Re-Runs
Retry After (Seconds): 
Avoid re-run due to locked files
  • Comparison
  • More

When File Size Is Identical

Ignore Small Time Differences
Up To (Seconds):
 
Ignore Exact Hour Differences
Up To (Hours):
 
Ignore Seconds
Ignore Timestamp Altogether
Never Copy Files With Identical Sizes On Source And Destination, Adjust Timestamp Only
When File Size Is Different

What should be done with files that have
the same timestamp but different sizes?
Ask
Copy Left to Right
Copy Right to Left
Copy Larger Files

Always copy files, even if timestamp unchanged
Strip Read-Only Attributes
Binary comparison of Existing files when building the File List
Remember Results

Use remotely generated MD5 Checksums For Comparisons On:
Left Side
Right Side

Compare / Mirror:
Folder Timestamps
File Attributes
Folder Attributes
Case Sensivity: Adjust At Destination
Detect Hard Links
Verify Sync Statistics After Completion
Enforce Hard Links for Existing files

For settings related to security and permissions, please see the Special tab sheet.

  • Files
  • Deletions
  • More
Detect Moved Files and Renamed Folders - Adjust On:
Left
Right
Automatic
Detect renamed Files (based on timestamp and filesize)
Verify copied files (can double execution time)    
Re-copy Once if verification fails
Automatically resume (copy with temp filenames, keep incomplete files when stopped)
Protect Files from being replaced with 0-Byte Files
Do not scan destination - copy all files regardless their existence at destination.
Number of files to copy in parallel:  
    Bypass File Buffering:  
Left
Right
Split Large Files Into Parts Of This File Size (Internet Protocols only):  
  Bytes (for example: 2G; 0 = no splitting)

Use recycle Bin For:
Overwritten Files
The Recycle Bin is not always available (e.g., not on
network drives). Using the Recycle Bin when overwriting
files can be slow and cause it to fill up quickly.
Deleted Files
 
Additional Options for Deleted Files:
Move Files Into Specified Folder:
   
Delete Older Versions Permamently
   
Remember Deletion Time and Date
Double Check the Non-Existence of Files Before deleting them on the Other side
Never Delete any Files (only Folders)
   
Delete Files before copying
Copying Speed Limit (Bandwidth):  
  MBytes/sec
Scheduled Limits...
Copy Only  
  Files Per Run
Copy Only  
  MegaBytes Per Run
Never Replace Any Files
Don't add Any Files
Always Append Smaller Destination Files (Use For Log Files Only)
Ignore Global and Group Speed Limits
Always Consider Larger Files Newer (Ignore Timestamp)
Preserve Last Access Timestamp on Source
Check Destination File (Again) During Copying Phase
And Compare File Details (Again)
Copied Files Get Current System Time As Modif. Timestamp
Use Windows API Copying Function
Skip Files Whose Size Is Changing

For settings related to security and permissions, please see the Special tab sheet.


Create Empty Folders
Use Intermediate Copying Location...
Remove Folders that were Emptied
On the Right Side, Create Folder Each Time
Include Time Of Day in Created Folder Names
Flat Right Side (No Folders)
Copy Latest File If Several Files With the Same Name Exist
Ensure Folder Timestamps Reflect the Most Recently Modified File in the Subtree
Never Delete Any Folders (Only Files)

After Copying and Other Actions, Touch Affected Parent Folders On the:
Left-Hand Side
Right-Hand Side

Execute Command or Script before/after...

Check Free Space Before Copying

Override Email Settings...

Ignore Internet Connectivity Check

Run Only If Neither Side Is Empty

Access Local Files As User...

Network Connections...


PascalScript...

File List Threads:
Default
Custom
Shut computer down after this Job:
When Run Via Scheduler
When Run Manually(Unattended)
When Run Manually(Attended)

  • Inclusion Masks
  • Exclusion Masks
  • General Filters
  • File age and size

Inclusion Masks



 
Specify Folder Masks
Restrictions...
Include Backup Files(*.$?$.*)

Exclusions (Files and Folders)



Exclusion Mode:
Don't Copy
Ignore Totally
 
Use Global Exclusions Also
Syncovery can Use Extended Attributes to Mark Files on the Source Side After Copying
Them to the Destination (similar to clearing the Archive Flag on Windows):
Process Hidden Files
Copy Files With Archive Flag
Search Hidden Folders
Clear Archive Flags
Analyze Reparse Points
Restore Deleted Items
Follow Junction Points/Symbolic Links to Files
Follow Junction Points/Symbolic Links to Folders
Copy Other Reparse Points
 
Symbolic Links to Files:
Ignore
Follow
Copy As Links
Symbolic Links to Folders:
Ignore
Follow
Copy As Links
 
Use .$symlink files to save Symbolic Links:
On the Left-Hand Side
On the Right-Hand Side

File Sizes must be Within


min
  Bytes (e.g.: 10M)

max
  Bytes (e.g.: 1G)

File Dates must be Within
min
max


File Age:  
Days
Hours
Minutes
Target Date for Restore:




Filter by:
Last Modification
File or Metadata Change Time
 
Apply To:
Files
Folders
Both
Scan Only Subfolders Whose Timestamp Has Changed Since the Previous Profile Run

(rarely used because most file systems do not update folder timestamps correctly!)

  • Attended Mode
  • Special Safety
  • Unattended Mode

Warnings in Attended mode
(these options currently do not apply to the Linux version)

Warn if Moving Files (Deleting from Source)


Warn Before Overriding Read-Only Files


Warn Before Overriding Larger Files with Smaller Ones


Warn Before Overriding Newer Files with Older Ones


Warn Before Deleting Files



Special Safety Checks
(these can prevent deletions)

Warn If Deleting More Files Than
% From Either Left or Right Side
Warn If Deleting All Files In Any (Sub-)Folder
Warn If Deleting More Than
% Of the Files From Any (Sub-)Folder

Safety Settings for Unattended Mode  
Read-Only Files May be Overwritten When the Job Runs Unattended or Scheduled


Larger Files May be Replaced With Smaller Ones if the Smaller One is Newer


Exact Mirror Mode May Replace Newer Files With Older Ones
Unattended File Deletion Allowed, Maximum
% Of The Files From One Side
Stop If the Job Would Delete More Than
Files
Ransomware Protection: Replace Max.
% Of The Files on One Side
Enable Special Safety Checks From Special Safety Tab Sheet (can prevent deletions)
  • Special Features
  • More
  • Database
Cache Destination File List...

Left side listing uses Remote Service

Block Level Copying
Right side listing uses Remote Service

Using

Checksums
File System Monitoring
Use Different Folders for Communication


Right side uses Remote Service
No full copying if service unavailable
Request only one file at a time
Fast Mode (Process target directly. no temp file. Left to Right is always fast)
Copying Order:
Process Security and Shares...

If Destination Machine Modifies Received Files, Changing their Size upon Reception, then Copy such Updated Files Back

Set Target Volume Label To:
Double-Check Each File's Destination Timestamp After Copying

Detect Changed Files Via File System Monitoring Even If Timestamps Unchanged


The settings here are filled in automatically and rarely need to be changed by the user.
To specify the folder where the database should be stored, see Program Options.

Open Database Read-Only
Fast Mode: Don't Check All DB Entries

Database Name to Use (Profile name):  
Database Contains Paths Relative To:
Left Side
Right Side
  • Versioning
  • Synthetic Backup
  • More
Keep Older Versions When Replacing:  
  Per File   Renaming Of Older Versions
Only on Right-Hand Side
   
Add .$1$., .$2$. etc.
Add Timestamp
Move into folder:
As Subfolder in Each Folder
Recreate tree below one "Older" folder
Don't Rename newest older version
Keep One Version Of Deleted Files

 
FileName Encoding: On the Right Side, Put Timestamps Into All File Names

(Also Preserves Timestamps on Servers That Normally Lose Them)

Use Synthetic Backup (Combines Block Level Copying, Zipping and Versioning)


Use Checkpoints To Reduce The Number Of Incremental Versions Needed For Restore


Create Checkpoint Every  

 
Checkpoints are relative to:  

 
Build all incremental images against the preceeding checkpoint(uses more space)

 
Remove unneeded incrementals older than
  days

If all blocks in a file change, keep only number of versions from Versioning Tab sheet



Do Not Decode Left-Hand Filenames When Building The File List


Do Not Decode Right-Hand Filenames When Building The File List


Use Windows 10 File History Encoding Format Rather Than Syncovery Native


Decode all known Timestamp Encoding Formats


Clean up identical duplicates of files with differently encoded Unicode umlauts


Remove parenthesized version numbers before extension on the right side: file(2).ext


Remove the versioning tags -1 and -2 and rename such files immediately


Clean up all older versions based on the specified number to keep(If unchecked, the limit is enforced only for files that are copied)


Files Backed Up With V4 Used UTC/GMT (World Time) For Encoding (Like V5)


  • Zipping
  • Encryption

Compress Each File Individually (when copying left to right - use right to left copying direction to decompress)


Compression Format:   



Compression Level:   



Use Compressed Packages (many files per archive)...


Compress directly to destination


Unzip all Zip or Sz files which are copied to the destination


Limit Zip File Size To
Bytes (such as 10M or 1G)

Encrypt Files Copied Left to Right (Encryption Implies Zipping)
 
Decrypt Files Copied Right to Left


Password Phrase:
Confirm:


Encrypt File Names
Encrypt Names of Existing Files On the Right-Hand Side
 
Encrypt Folder Names (including existing folders on the right hand side)