Profile Settings

Profile name
Left Hand side
Right Hand side
   
   



Copying directions
Include Subfolders
Left to Right
Right to Left
None
All
Selected



Sync Operation Mode:
Standard Copying
SmartTracking
Exact Mirror
Move Files to Destination
Case Sensitivity:
Case Sensitive Mode











  • Schedule
  • Access/Retries
  • Comparison
  • Files
  • Folders
  • Job
  • Masks/Filters
  • Safety
  • Special
  • Versioning
  • Compress/Encrypt
  • Schedule
  • More
  • Weekdays and Time window
  • Monitoring / Realtime

Schedule This Profile
Run Every Day (or Specified Weekdays) At
Run Every
Days
Hours
Minutes
Seconds
Run Monthly

Run Only Once

Specify Next Run

Interval specifies the idle time between runs

Run missed Daily Job Immediately when Scheduler starts

Add random delay up to
Minutes
 
Warn if Profile Not Run For
Days
 
Run Upon Scheduler Start (System Boot)

Run upon shutdown and logout

Additional Times

Run Also At These Times Of Day:


Profile can run on these Days

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday
Time Window
Run Only Between
Ignore this limitation on Saturday and Sundays

Interrupt Running Profile At End Of Time Window

Interrupt in Middle Of File


Real Time Synchronization
Use a single never-ending profile run (to keep FTP connections)
Run profile when drive is available
Once
Repeatedly
Delay between access attempts
minutes
seconds
Minimum pause between actions
hours
minutes
seconds

  • File Access
  • Waiting and Retrying

Ignore These Errors

Any Errors Listing Folders

Access Denied Reading Files

Files That No Longer Exist

Ignore Locked Files On Destination

Any Errors Deleting Files

Any Errors Deleting Folders


Database Safe: Enforce Exclusive Access

Prior to Copying, Check All Files Can be Copied

Take Admin Ownership Temporarily if Needed


Wait for File Access    
- Wait up to (Minutes):  
 
Wait and Retry if Transfer or Reading Problem

Re-Run profile if an error occurs while


Building file list
Running the profile
Re-Run Once
Re-Run Until Success
Maximum Re-Runs
Retry After (Seconds): 
Avoid re-run due to locked files
  • Comparison
  • More

When size identical

Ignore small time difference
Max (Seconds):
 
Ignore exact Hour time difference
Max (Hours):
 
Ignore seconds
 
Ignore Timestamp Altogether
 
Never Copy, Adjust Timestamp Only
When size is different

What should be done with files that have
the same timestamp but different sizes?




Ask

Copy Left to Right

Copy Right to Left

Copy Larger Files


Always copy files, even if timestamp unchanged
Strip Read-Only Attributes
Binary comparison of Existing files when building the File List
Remember Results

Use remotely generated MD5 Checksums For Comparisons On:
Left Side
Right Side

Compare / Mirror:
File Attributes
Folder Timestamps
Folder Attributes
Permissions
ACLs
Case Sensivity: Adjust At destination
Detect Hard Links
Verify Sync Statistics After Completion
Enforce Hard Links for Existing files
  • Files
  • Deletions
  • More

Detect Moved Files and Renamed Folders - Adjust On:
Left
Right
Automatic
Detect renamed Files (based on timestamp and filesize)

Verify copied files (can double execution time)
Re-copy Once if verification fails
Automatically resume (copy with temp filenames, keep incomplete files when stopped)


Protect Files from being replaced with 0-Byte Files


Do not scan destination - copy all files regardless their existence at destination.

Number of files to copy in parallel
Bypass files buffering by Windows
Split Large Files Into Parts Of This File Size (Internet Protocols only):
Bytes (for example: 2G; 0 = no splitting)

Use recycle Bin For:
Overwritten Files
The Recycle Bin is only available on some cloud storages
(not on local hard drives or mounted network shares).
Deleted Files
 
Additional Options for Deleted Files:
Move Files Into Specified Folder:
Delete Older Versions Permamently
Double Check the Non-Existence of Files Before deleting them on the Other side
Never Delete any Files (only Folders)
Delete Files before copying
Limit:  
  MB/sec   
 Advanced...
Copy Only
files per run
Never Replace Any Files
Don't add Any Files
Always Append smalled destination files(Use only for Log files)
Ignore Global and Group Speed Limit
Always Consider Larger Files Newer (Ignore Timestamp)
And Compare File Details (Again)
Check Destination File (Again) During Copying Phase
Preserve Last Access Timestamp on Source
 Owner:   Group:
 Permissions:
Copied Files receive current system time
Use Windows API Copying Function

Create Empty Folders


Use Intermediate Copying Location...


Remove Folders that were Emptied


On the Right Side Create Folder Each Time


Include Time Of Day in Created Folder Names


Flat Right Side(no folders)


Copy latest file if several files with the same name exists


Ensure Folder Timestamps Reflect the Most Recently modified File in the SubTree


Never Delete any Folders (only Files)

Execute Command or Script before/after...

Show Checkboxes In Preview

Override Email Settings...

Run As User...

Check Free Space Before Copying

Ignore Internet Connectivity Check


Run Only If Neither Side Is Empty

Network Connections...

File List Threads:
Default
Custom
Shutdown computer after this Job

When Run Via Scheduler

When Run Manually(Unattended)

When Run Manually(Attended)

PascalScript...
  • Inclusion Masks
  • Exclusion Masks
  • General Filters
  • File age and size

Inclusion Masks



 
Specify Folder Masks
Restrictions...
Include Backup Files(*.$?$.*)

Exclusions (Files and Folders)



Exclusion Mode:
Don't Copy
Ignore Totally
 
Use Global Exclusions Also

Process Hidden Files
Search Hidden Folders
 
Syncovery can Use Extended Attributes to Mark Files on the Source Side After Copying Them to the Destination
(similar to clearing the Archive Flag on Windows):
Mark Copied Files With an Extended Attribute
Copy Only Files That Have Not Previously Been Marked As Copied (or Have Changed Since)
Analyze Reparse Points
Follow Junction Points/ Symbolic Links to Files
Follow Junction Points/ Symbolic Links to Folders
Copy Other Reparce Points
Symbolic Links to Files:
Ignore
Follow
Copy As Links
Symbolic Links to Folders:
Ignore
Follow
Copy As Links

File Sizes must be Within


min
  Bytes (e.g.: 10M)

max
  Bytes (e.g.: 1G)

File Dates must be Within
min
max


File Age:  
Days
Hours
Minutes
Target Date for Restore:




Filter by
 
Apply To
Last Modification
Creation
 
Files
Folders
Both
  • Attended Mode
  • Special Safety
  • Unattended Mode

Warnings in Attended mode
(these options currently do not apply to the Linux version)

Warn if Moving Files(Deleting from Source)


Warn Before Overriding Read-Only Files


Warn Before Overriding Larger Files with Smaller Ones


Warn Before Overriding Newer Files with Older Ones


Warn Before Deleting Files



Special Safety Checks
(these can prevent deletions)

Raise If Deleting Files More Than
% From Either Left or Right Side
Raise If Deleting All Files In Any (Sub)Folder
Raise If Deleting More than
% Files from Any (Sub)Folder

Safety Settings for Unattended Mode  

Overwrite Read-Only Files


Overwrite Larger Files with Smaller Ones If File Dates Require It


Newer Files Can Be Overwritten If Necessary
File Deletion Allowed, Maximum
% Of The Files from Either Side
Ransomware protection: Replace Max.
% Of The Files from Either Side
Enable Special Safety Checks From Special Safety Tab Sheet (can prevent deletions)
  • Special Features
  • Database
Cache Destination File List...


Left side listing uses Remote Service



Right side listing uses Remote Service

Block Level Copying


Use Different Folders for Communication


Right side uses Remote Service
No full copying if service unavailable
Request only one file at a time
Fast Mode (Process target directly. no temp file. Left to Right is always fast)
If Destination Machine Modifies Received Files, Changing their Size upon Reception, then Copy such Updated Files Back

Copying Order:
Set Target Volume Label To:


The settings here are filled in automatically and rarely need to be changed by the user.
To specify the folder where the database should be stored, see Program Options.

Open Database Read-Only
Fast Mode: Don't Check All DB Entries

Database Name to Use (Profile name):
Database Contains Paths Relative To
Left
Right
  • Versioning
  • Synthetic Backup
  • More

Keep Older Versions When Replacing:
Per File     Renaming Of Older Versions
Only on Right-Hand Side
   
Add .$1$., .$2$. etc.
Add Timestamp
Move into folder:
As Subfolder in Each Folder
Recreate tree below one "Older" folder
Don't Rename newest older version
Keep One Version Of Deleted Files

 
FileName Encoding: On the Right Side, Put Timestamps Into All File Names

(Also Preserves Timestamps on Servers That Normally Lose Them)

Use Synthetic Backup (Combines Block Level Copying, Zipping and Versioning)


Use Checkpoints To Reduce The Number Of Incremental Versions Needed For Restore


Create Checkpoint Every  

 
Checkpoints are relative to:  

 
Build all incremental images against the preceeding checkpoint(uses more space)

 
Remove unneeded incrementals older than
  days

If all blocks in a file change, keep only number of versions from Versioning Tab sheet



Do Not Decode Left-Hand Filenames When Building The File List


Do Not Decode Right-Hand Filenames When Building The File List


Clean up identical duplicates of files with differently encoded Unicode umlauts


Remove parenthesized version numbers before extension on the right side: file(2).ext


Remove the versioning tags -1 and -2 and rename such files immediately


Clean up all older versions based on the specified number to keep(If unchecked, the limit is enforced only for files that are copied)


Files Backed Up With V4 Used UTC/GMT (World Time) For Encoding (Like V5)


  • Zipping
  • Encryption

Compress Each File Individually (when copying left to right) Use right to left to decompress


Compression Format:   



Compression Level:   



Use ZIP Packages (many files per ZIP archive)...


Compress directly to destination


Unzip all ZIP files which are copied to the destination


Limit Zip File Size To
Bytes(for example 10M or 1G)

Encrypt Files Copied Left to Right (Encryption Implies Zipping)
 
Decrypt Files Copied Right to Left


Password Phrase:
Confirm:


Encrypt File Names
Encrypt Names of Existing Files On the Right-Hand Side
 
Encrypt Folder Names (including existing folders on the right hand side)