|
||
Left to Right |
||
Right to Left |
None |
All |
Selected |
|
Schedule This Profile |
Days
|
Hours
|
Minutes
|
Sec
|
|
|
|
|
Specify Next Run |
Interval-Idle Time Between Runs |
Scheduler Start |
|
Shutdown Or Reboot |
|
Logout |
|
Run Missed Job At Scheduler Start |
Add Random Delay
|
|
Minutes
|
|
Warn If Not Run For
|
|
Days
|
|
|
|
|
|
|
|
Monday |
Tuesday |
||
Wednesday |
Thursday |
||
Friday |
Saturday |
||
Sunday |
Time Window | Run Only Between |
Ignore Limitation On Saturday&Sundays |
|
Interrupt Profile At End Of Time Window |
|
Interrupt In Middle Of File |
Real Time Synchronization |
|
Use a single never-ending profile run (to keep FTP connections) |
|
Run profile when drive is available |
Once |
Repeatedly |
Minutes
|
Seconds
|
Minimum Pause Between Actions |
|
Hours |
|
Minutes |
|
Seconds |
Any Errors Listing Folders |
|
Access Denied Reading Files |
|
Files That No Longer Exist |
|
Ignore Locked Files On Destination |
|
Any Errors Deleting Files |
|
Any Errors Deleting Folders |
Database Safe Copying: Enforce Exclusive Access |
|
Take Admin Ownership Temporarily If Needed to Replace (Update) Files |
|
Prior To Copying, Verify That All Files Can Be Copied |
Wait For File Access |
Wait Up To(Mins)
|
|
Wait And Retry If Transfer Or Reading Problem |
Building File List |
Running The Profile |
Re-Run Once
|
Re-Run Until Success
|
Maximum Re-Runs
|
|
Retry After(Seconds) |
Avoid Re-Run Due To Locked Files |
Ignore Small Time Difference |
max(seconds) |
Ignore Exact Hour Time Difference |
Max(Hours) |
Ignore Seconds |
|
Ignore Timestamp Altogether |
|
Never Copy, Adjust Timestamp Only |
Ask |
Copy Left to Right |
Copy Right to Left |
Copy Larger Files |
Always Copy Files, Even Timestamp Unchanged |
||
Strip Read-Only Attributes | ||
Binary Comparison Of Existing Files |
Left Side |
Right Side |
File Attribute Comparison |
|
Folder Attribute Comparison |
|
Case Sensivity: Adjust At Destination |
|
Folder Timestamp Comparison |
|
Verify Sync Statistics After Completion |
|
Detect Hard Links |
|
Enforce Hard Links For Existing Files |
Detect Moved Files And Renamed Folders |
Adjust On: |
Left |
Right |
Automatic |
Detect Renamed Files |
|
Verify Copied Files |
|
Re-copy Once If Verification Fails |
|
Automatically Resume |
|
Protect Files From Being Replaced With 0-Byte Files |
|
Do Not Scan Destination |
Bypass Buffering Left |
Bypass Buffering Right |
Bytes (e.g. 2G; 0 = no splitting) |
Overwritten Files |
Deleted Files |
Move Files Into A Specified Folder |
Delete Older Versions Permamently |
|
Double Check The Non-Existence Of Files Before Deleting On The Other Side |
|
Never Delete Any Files(Only Folders) |
|
Delete Files Before Copying |
Use Windows API Copying Function |
Copy Only |
Files Per Run |
||
Copy Only |
MegaBytes Per Run |
||
Limit |
MB/sec |
Copied Files receive current syetem time |
|
Never Replace Any Files |
|
Don't Add Any Files |
|
Always Append Smalled Destination Files |
|
Ignore Global and Group Speed Limit |
|
Always Consider Larger Files Newer |
|
And Compare File Details(Again) |
|
Check Destination File(Again) During Copying |
|
Preserve Last Access Timestamp on Source |
Create Empty Folders |
|
Use Intermediate Copying Location... |
|
Remove Folders That Were Emptied |
|
On The Right Side Create Folder Each Time |
|
Include Time Of Day In Created Folder Names |
|
Flat Right Side(No Folders) |
|
Copy Latest File If Several Files With The Same Name Exists |
|
Ensure Folder Timestamps Reflect The Most Recently Modified File In The SubTree |
Execute Command Or Script Before/After |
|
Show Checkboxes In Preview |
|
Override Email Settings... |
|
Check Free Space Before Copying |
|
Run As User |
|
Ignore Internet Connectivity Check |
|
Network Connections... |
|
Run Only If Neither Side Is Empty |
When Run Via Scheduler |
|
When Run Manually(Unattended) |
|
When Run Manually(Attended) |
Default |
Custom |
Specify Folder Masks |
|
Restrictions.. |
|
Include Backup Files(*.$?$.*) |
Don't Copy |
Ignore Totally |
Use Global Exclusion Also |
Process Hidden Files |
|
Copy Files With Archive Flag |
|
Search Hidden Folders |
|
Clear Archive Flags |
|
Analyze Reparse Points |
|
Follow Junction Points/Symbolic Links To Files |
|
Follow Junction Points/Symbolic Links To Fldrs |
|
Copy Other Reparse Points |
File Sizes |
min |
min |
File Dates |
max |
max |
File Age |
Days |
Hours |
Minutes |
Filter by |
Last Modification |
Creation |
Apply To |
Files |
Folders |
Both |
Target Date For Restore |
Date
|
Time
|
If Moving Files(Deleting from Source) |
|
Before Overriding Read-Only Files |
|
Before Overriding Larger Files With Smaller |
|
Before Overriding Newer Files With Older |
|
Before Deleting Files |
Warn If Deleting Files More Than |
% From Either L or R Side |
Warn If Deleting All Files In Any(Sub)Folder |
Warn If Deleting More than |
% Files Any(Sub)Folder |
Overwrite Read-Only Files |
|
Overwrite Larger Files With Smaller Ones |
Newer Files Can Be Overwritten If Necessary |
|
File Deletion Allowed, Maximum |
% Of The Files From Either Side |
Ransomware Protection: Replace Max. |
% Of The Files From Either Side |
Enable Special Safety Checks From Special Safety Tab Sheet(Can Prevent Deletions) |
Cache Destination File List... |
|
Process Security and Shares... |
|
Left side listing uses Remote Service |
|
Block Level Copying |
|
Right side listing uses Remote Service |
|
Right side uses Remote Service |
|
No full copying if service unavailable |
|
Request only one file at a time |
|
Fast Mode( process target directly. no temp file. Reft to Right is always fast) |
Use Different Folders for Communication... |
|
If Destination Machine Modifiers Received Files, Changing their Size Upon Reception |
|
Then Copy Such Updated Files Back |
Open Database Read-Only |
|
Fast Mode: Don't Check All DB Entries |
Left
|
|
Right
|
|
Keep Older Versions When Replacing |
Per File |
Only on Right-Hand Side |
Move Into Folder: |
As Subfolder In Each Folder |
|
Recreate Tree Below One "Older" folder |
|
Don't Rename newest older version |
Add .$1$., .$2$. etc. |
Add Timestamp |
FileName Encoding: On The Right Side,
Put Timestamps Into All File Names(Preserves
Timestamps On Servers That Normally Loose It) |
Use Synthetic Backup |
Use Checkpoints To Reduce The Number Of Incremental Versions Needed For Restore |
Create Checkpoint Every |
Build All Incremental Images Against The Preceeding Checkpoint(Uses More Space) |
Remove Incrementals Older |
Days |
If All Blocks In A File Change, Keep Only Number Of Versions From Versioning Tab Sheet |
Do Not Decode Left-Hand Filenames When Building The File List |
|
Do Not Decode Right-Hand Filenames When Building The File List |
|
Clean Up Identical Duplicates Of Files With Differently Encoded Unicode Umlauts |
|
Remove Parenthesized Version Numbers Before Extension On The Right Side: File(2).ext |
|
Remove The Versioning Tags -1 And -2 And Rename Such Files Immediately |
|
Clean Up All Older Versions Based On The Specified Number To Keep(If Unchecked, The Limit Is Enforced Only For Files That Are Copied) |
|
Files Backed Up With V4 Used UTC/GMT (World Time) For Encoding (Like V5) |
ZIP Each File Individually (When Copying Left To Right) Use Right To Left To Unzip |
|
Use ZIP Packages (Many Files Per ZIP Archive)... |
|
Zip Directly To Destination |
|
Unzip All ZIP Files Which Are Copied To The Destination |
|
Limit Zip File Size To |
Bytes(e.g 10M or 1G) |
Encrypt Files Copied Left To Right(Encryption Implies Zipping) |
Decrypt Files Copied Left to Right |
Password Phrase: |
|
Confirm: |
Encrypt File Names |
|
Encrypt Names Of Existing Files On The Right |
|
Encrypt Folder Names(On The Right Hand Side) |