Copy Options
In this section, you can configure advanced settings for handling locked files, transferring file properties, and performing integrity checks and error handling.Handling Locked and Open Files
- Use Windows service 'Volume Shadow Copy' to copy locked files
- Identify blocking process of locked files
Transfer of File Properties and Metadata
- Transfer file date after copying
- Transfer attributes of source files to existing destination files
- Transfer case sensitivity of source files to existing destination files
- Activate NTFS compression for copied destination file
- Transfer access permissions of files and folders
Integrity Check and Error Handling
- Delete destination file if source file could not be copied successfully
- Monitor file size for changes before copying
- Compare source and destination file contents after copying
- File Comparison Method
- Use Windows service 'Volume Shadow Copy' to copy locked files
Allows copying of files that are opened and locked by other applications. Such files are usually logged with an error message (32 or 33). This feature is available starting with the AllSync Professional Edition.
The following notes apply when using the Windows service Volume Shadow Copy:- AllSync must be started with administrator privileges.
- The Windows service Volume Shadow Copy must be enabled (Startup type: Manual or Automatic).
- Only local drives are supported (no network drives or removable media).
- The locked files must be located in the source folder.
- FAT32 drives are only supported if an additional NTFS-formatted drive is available.
- Identify blocking process of locked files
Identifies the Windows process that is blocking access to a file (error 32, 33, or 103). The check is performed first for the source file, then for the destination file. During compression, only the source file is checked.
The following information about the blocking process is displayed in the log:- Process name
- Process ID
- Full path to the executable file
- Transfer file date after copying a file
Transfers the creation and modification date of the source file to the destination file. - Transfer attributes of source files to existing destination files
This option transfers the attributes of a source file to the existing destination file during a copy operation. Ensures that after a copy operation, the files in the destination have the same attributes as the files in the source. Attributes are only transferred if the source and destination file are identical according to the copy rules. - Transfer case sensitivity of source files to existing destination files
This option transfers the name of a source file to the existing destination file if the names differ in case sensitivity. Ensures that after a copy operation, the file names in the destination match the case sensitivity of the source file names. Renaming of destination files is only performed if the source and destination file are identical according to the copy rules. - Activate NTFS compression for copied destination file
This option enables NTFS compression for the destination file after copying. - Transfer access permissions of files and folders
The partition of the source and destination data must be formatted with the NTFS file system. This option is available starting with the AllSync Business Edition.
Notes- When transferring access permissions within the local computer, the AllSync user must be logged in as administrator and have the required read and write permissions for the source and destination data.
- When transferring access permissions between two computers in a network, both computers must be joined to the same domain. Additionally, the AllSync user must be logged in as domain administrator and have the required read and write permissions for the source and destination data.
- Only when copying or creating files and folders
Copies permissions only when a file or folder is newly created or copied. - Additionally transfer owner
Additionally transfers the owner of a file or folder. - Transfer access permissions with the option 'Move files and folders to a backup folder'
Transfers access permissions with the option 'Move files and folders to a backup folder'.
- Delete destination file if source file could not be copied successfully
Deletes the destination file if an error occurs while copying the source file or if the file comparison reveals that the source and destination file are not identical. - Monitor file size for changes before copying
Waits to copy until the file size no longer changes. The interval for checking the file size is defined in milliseconds. - Compare files after copying
Compares the content of the source and destination file after copying. An error message is displayed in the log if the content is not identical. This option is available starting with the AllSync Professional Edition.
Skip comparison for files above the following size
This option excludes files from comparison once they exceed a specified size. - File Comparison Method
Specify the method used to compare the contents of two files. This setting is used by the following options:- Compare files after copying
- Copy rules with content comparison
- Perform file comparison if no file conflict was detected
Comparison Methods- Automatic
For network folders, the Byte-by-Byte method is used; otherwise, SHA-1 (160-bit) is always applied. - Byte-by-Byte
Each file is read block by block and compared using a data block. The process stops as soon as a difference is found. Otherwise, the comparison continues until the end of both files is reached. - CRC32 (32-bit)
Each file is read block by block and a CRC32 checksum is generated. Finally, the checksums are compared to determine if the files are identical. This comparison method is available only for backward compatibility and should not be used for content comparison. - MD5 (128-bit)
Each file is read block by block and a MD5 checksum is generated. Finally, the checksums are compared to determine if the files are identical. - SHA-1 (160-bit)
SHA-2 (256-bit)
SHA-2 (384-bit)
SHA-2 (512-bit)
Each file is read block by block and a SHA checksum is generated. Finally, the checksums are compared to determine if the files are identical.
Checksums
The higher the bit rate of a checksum, the lower the likelihood that two different files will produce the same checksum. A higher bit rate also increases the time required to generate a checksum.
Overview
The following table helps you choose the appropriate checksum method:Method Speed Accuracy Recommended Byte-by-Byte Very fast (especially for differences) 100 % ✔ Highly recommended CRC32 Fast Very low ✘ Not recommended MD5 Fast Medium – reliable but not collision-proof ✔ Recommended SHA-1 Medium Good – low collision probability ✔ Recommended SHA-2 Slow (varies by bit length) Very high – extremely collision-resistant ✔ Recommended





