Symantec 20097684 User Guide

Symantec 20097684 - Norton Ghost 15.0 Manual

Symantec 20097684 manual content summary:

  • Symantec 20097684 | User Guide - Page 1
    Norton Ghost 15.0 User's Guide
  • Symantec 20097684 | User Guide - Page 2
    Norton Ghost 15.0 User's Guide The software described in this book is furnished under a license 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Norton, Norton AntiVirus, LiveUpdate, pcAnywhere, and SmartSector are trademarks or registered trademarks of Symantec
  • Symantec 20097684 | User Guide - Page 3
    Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com
  • Symantec 20097684 | User Guide - Page 4
    example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the
  • Symantec 20097684 | User Guide - Page 5
    Problem description: ■ Error messages and log files ■ Troubleshooting support Web page at the following URL: www.symantec.com/techsupp/ Customer service Customer service information is available at the following URL: www.symantec.com/techsupp/ Customer Service support
  • Symantec 20097684 | User Guide - Page 6
    to prevent attacks before they occur. Managed Security Services These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Consulting Services Symantec Consulting Services provide on-site technical expertise from Symantec
  • Symantec 20097684 | User Guide - Page 7
    Norton Ghost 13 About Norton Ghost 13 What is new in Norton Ghost 14 Hiding or showing the Advanced page 15 Getting more information about Norton Ghost 16 Chapter 2 Installing Norton Ghost 17 Before you install 17 System requirements 17 About supported file systems and removable
  • Symantec 20097684 | User Guide - Page 8
    during a backup 68 Advanced options for drive-based backups 70 Compression levels for drive-based backups 74 Running a one-time backup from Norton Ghost 75 About running a one-time backup from Symantec Recovery Disk 76 Running a one-time backup from Symantec Recovery Disk 77 About Offsite
  • Symantec 20097684 | User Guide - Page 9
    107 Opening Windows Services 108 Starting or stopping the Norton Ghost Agent service 108 Setting up recovery actions when the Norton Ghost Agent does not start 109 Viewing Norton Ghost Agent dependencies 110 Controlling access to Norton Ghost 111 Running Norton Ghost using different user
  • Symantec 20097684 | User Guide - Page 10
    122 About the Norton Ghost management information base 122 Customizing the status reporting of a drive (or file and folder backups 122 Viewing drive details 124 Improving the protection level of a drive 124 About using event log information to troubleshoot problems 127 Exploring the contents
  • Symantec 20097684 | User Guide - Page 11
    Limiting the number of file versions to keep 155 Manually deleting files from your file and folder backup Recovery Disk 188 About using the networking tools in Symantec Recovery Disk 188 Starting networking services 189 Using the pcAnywhere thin host point 194 About the Support Utilities 195
  • Symantec 20097684 | User Guide - Page 12
    Using a search engine to search recovery points 201 About using a search engine to search recovery points 201 Enabling search engine support 201 Recovering files using Google Desktop's Search Desktop feature ......... 203 About finding a file using Google Desktop 203 Appendix B About backing
  • Symantec 20097684 | User Guide - Page 13
    . You can schedule backups to capture your changes automatically as you work from day to day. Or start a backup manually at any time. You can also easily configure Norton Ghost to run a backup in response to specific events. For example, a backup can run when a particular application is started. Or
  • Symantec 20097684 | User Guide - Page 14
    Not all listed features are available in all versions of this product. Table 1-1 What is new Norton Ghost Feature Improved support for virtual formats Description Norton Ghost now includes support for the following virtual platforms: ■ VMware ESX 3.5i and 4.0i ■ VMware ESX 3.5 and 4.0 Improved
  • Symantec 20097684 | User Guide - Page 15
    you can create recovery points of a partition without the need to install Norton Ghost or its Agent. See "About running a one-time backup from 3.5 server. See "Defining a virtual conversion job" on page 147. Support for Microsoft Hyper-V You can now convert recovery points to Hyper-V format
  • Symantec 20097684 | User Guide - Page 16
    to more information. The page also includes access to the product help system, the product User's Guide. It also includes access to the Symantec Knowledge Base where you can find troubleshooting information. To access Help and Support 1 Start Norton Ghost. 2 On the Home page, click Help > Help and
  • Symantec 20097684 | User Guide - Page 17
    your work environment and which installation options you choose. This chapter focuses on installing the full version of Norton Ghost from the installation CD. Before you install Norton Ghost, ensure that your computer meets the system requirements. Review the Readme file on the installation CD for
  • Symantec 20097684 | User Guide - Page 18
    are supported: ■ Windows 7 ■ Windows Vista Ultimate ■ Windows Vista Business ■ Windows XP Professional/Home (SP2 or later) ■ Windows XP Media Center (SP2 or later) RAM The following are the memory requirements for each component of Norton Ghost: ■ Norton Ghost Agent: 512 MB ■ Norton Ghost user
  • Symantec 20097684 | User Guide - Page 19
    ESX 3.0, 3.5, and 4.0 ■ VMware ESXi 3.5 and 4.0 ■ VMware Server 1 ■ VMware GSX Server 3.x (replaced by VMware Server) ■ Microsoft Virtual Server 2005 R2 and later ■ Microsoft Hyper-V 1.0 and 2.0 About supported file systems and removable media Norton Ghost supports the following file systems and
  • Symantec 20097684 | User Guide - Page 20
    20 Installing Norton Ghost Before you install Supported file systems Removable media Norton Ghost supports the following file systems: ■ FAT16, FAT16X ■ FAT32, FAT32X ■ NTFS ■ GUID Partition Table (GPT) ■ Dynamic disks ■ Linux Ext2, Linux Ext3 ■ Linux swap partitions Note: You must decrypt
  • Symantec 20097684 | User Guide - Page 21
    See "About running a one-time backup from Symantec Recovery Disk" on page 76. The 60-day grace period of Norton Ghost begins when you do any one of the following in the software: ■ Define a drive-based or file and folder backup ■ Recover a computer ■ Copy a drive ■ Consolidate
  • Symantec 20097684 | User Guide - Page 22
    Norton Ghost Installing Norton Ghost Warning: The Symantec Recovery Disk CD provides the tools Norton Ghost 1 Log on to your computer using either the Administrator account or an account that has administrator privileges. 2 Insert the Norton Ghost and Recovery Service The primary service that is
  • Symantec 20097684 | User Guide - Page 23
    Installing Norton Ghost 23 Installing Norton Ghost CD/DVD Support LiveUpdate Required for backing up directly to CD/DVD, 8 Remove the product CD from the media drive, and then click Yes to exit the installation wizard and restart the computer. If you click No, you cannot run Norton Ghost until
  • Symantec 20097684 | User Guide - Page 24
    already installed on your computer. If you plan to install Google Desktop, you can enable search engine support later. 5 Click Finish. Activating Norton Ghost later If you do not activate Norton Ghost before the trial period ends, the software stops working. However, you can activate the product at
  • Symantec 20097684 | User Guide - Page 25
    take effect. About uninstalling Norton Ghost When you upgrade Norton Ghost from a previous version of the product, the install program automatically uninstalls the previous versions. If needed, you can manually uninstall the product. Follow your operating system's instructions on how to uninstall
  • Symantec 20097684 | User Guide - Page 26
    26 Installing Norton Ghost About uninstalling Norton Ghost
  • Symantec 20097684 | User Guide - Page 27
    you make changes to the network interface cards or storage controllers on a computer. See "If driver validation fails" on page 28. Note: The driver validation tool or Symantec Recovery Disk does not support wireless network adapter drivers.
  • Symantec 20097684 | User Guide - Page 28
    the Symantec Recovery Disk CD lets you identify and solve the following types of problems: ■ You cannot start Symantec Recovery Disk. See "To configure a computer 28. To test Symantec Recovery Disk 1 Run the driver validation tool to test whether Symantec Recovery Disk works with the network cards
  • Symantec 20097684 | User Guide - Page 29
    CD. To create a custom Symantec Recovery Disk CD 1 Attach and turn on all storage devices and network devices that you want to make available. 2 Start Norton Ghost. 3 Insert the Symantec Recovery Disk CD into your media drive. If necessary, specify the path or browse to the media drive in which you
  • Symantec 20097684 | User Guide - Page 30
    list of storage and network drivers to be included, and add additional drivers or remove the drivers you do not need. 9 On the Startup Options pane, select On the Options pane, do the following: Automatically start network services Dynamic IP Static IP Select this option if you want networking
  • Symantec 20097684 | User Guide - Page 31
    Scrambles data using a mathematical algorithm so that a third party cannot easily interpret it. This option is available on any operating system that pcAnywhere supports. ■ Symmetric Encodes and decodes data using a cryptographic key. This option is available on any Windows operating system that
  • Symantec 20097684 | User Guide - Page 32
    32 Ensuring the recovery of your computer Creating a custom Symantec Recovery Disk CD 13 On the License Setup pane, specify how you want to enable licensed features in the customized Symantec Recovery Disk (such as the cold imaging feature called Back Up My Computer). 14 Click Finish. Warning: Be
  • Symantec 20097684 | User Guide - Page 33
    This chapter includes the following topics: ■ About key product components ■ How you use Norton Ghost ■ Starting Norton Ghost ■ Configuring Norton Ghost default options About key product components Norton Ghost includes two key components: the program itself, and the Symantec Recovery Disk CD
  • Symantec 20097684 | User Guide - Page 34
    Symantec Recovery Disk in a safe place. See "About recovering a computer" on page 173. How you use Norton Ghost While Norton Ghost does the work of backing up your files, folders, or entire drives, you need to tell Norton Ghost what to backup, when to back it up, and where to put the backed up data
  • Symantec 20097684 | User Guide - Page 35
    folder by default. During installation, a program icon is installed in the Windows system tray from which you can open Norton Ghost. You can also open Norton Ghost from the Windows Start menu. To start Norton Ghost ◆ Depending on the Windows version you are running, use one of the following methods:
  • Symantec 20097684 | User Guide - Page 36
    On the classic Windows taskbar, click Start > Programs > Norton Ghost > Norton Ghost 15.0. ■ On the Windows taskbar, click Start > All Programs > Norton Ghost > Norton Ghost 15.0. ■ In the Windows system tray, double-click the SymantecNorton Ghost 15.0 tray icon. ■ In the Windows system tray, right
  • Symantec 20097684 | User Guide - Page 37
    , you can search for files (by file name) inside a recovery point that was created with search engine support enabled. If Google Desktop is not installed on your computer when you install Norton Ghost, you have the option of clicking a link to the Web site where you can download and install Google
  • Symantec 20097684 | User Guide - Page 38
    have a Network Management System (NMS) application, you can enable SNMP Traps support to send notifications to you NMS application. See "About SNMP traps" on page 122. To configure Norton Ghost default options 1 Start Norton Ghost. 2 Click Tasks > Options. 3 Select an option you want to edit, make
  • Symantec 20097684 | User Guide - Page 39
    on your computer when a backup is running-especially one that is creating an independent recovery point-your computer might slow down. This is because Norton Ghost is using your computer's hard disk and memory resources to perform the backup. However, you can actually change the speed of the backup
  • Symantec 20097684 | User Guide - Page 40
    40 Getting Started Configuring Norton Ghost default options ■ Network cards: Is your network wired or wireless? What are the speeds of your network cards? ■ Network backbone: What is the size of your network pipeline? Does it support 10 MB transfer rates, or 1 GB transfer rates? ■ Network server:
  • Symantec 20097684 | User Guide - Page 41
    select one of the following: Show system tray icon Show missed backups Show system tray questions Show status messages Show error messages Displays the Norton Ghost icon in the system tray. You must select this option to enable or disable any of the remaining options. Notifies you when a backup
  • Symantec 20097684 | User Guide - Page 42
    file types or extensions. Caution: Any file types and extensions you have set up are removed. You must add them again manually. 4 Click OK. To delete a file type (and all of its extensions) 1 In Norton Ghost, on the menu bar, click Tasks > Options. 2 Select a file type in the File types column
  • Symantec 20097684 | User Guide - Page 43
    dialog box lets you see all of your drive nicknames in one view. From this view, you can remove or edit existing names. To remove or edit external drive nicknames 1 In Norton Ghost, on the menu bar, click Tasks > Options. 2 Under Destinations, click External Drives. 3 Select an external drive from
  • Symantec 20097684 | User Guide - Page 44
    use with Offsite Copy File Transfer Protocol, or FTP, is the simplest and most secure way to copy files over the Internet. Norton Ghost serves as an FTP client to copy your recovery points to a remote FTP server related events. They can also provide helpful information when you need to troubleshoot.
  • Symantec 20097684 | User Guide - Page 45
    logging, and the Windows application log. From the Options page, you can configure both methods. To log Norton Ghost messages 1 In Norton Ghost, on the menu bar, click Tasks > Options. 2 Under Notifications, click Log File. 3 Click the Select the priority and type of messages list and select the
  • Symantec 20097684 | User Guide - Page 46
    46 Getting Started Configuring Norton Ghost default options 3 Click the Select the priority and type of messages list functions properly. To enable email notifications for product (event) messages 1 In Norton Ghost, on the menu bar, click Tasks > Options. 2 Under Notifications, click SMTP E-mail.
  • Symantec 20097684 | User Guide - Page 47
    Getting Started 47 Configuring Norton Ghost default options 3 Click the Select the priority and type of messages list and select the priority level at which an email should be sent. All
  • Symantec 20097684 | User Guide - Page 48
    48 Getting Started Configuring Norton Ghost default options
  • Symantec 20097684 | User Guide - Page 49
    your individual files and folders, you do the following: ■ Define a backup ■ Run the backup See "How you use Norton Ghost" on page 34. When you define a backup, you decide on the following: ■ What to back up (files and data to remote locations ■ When to run the backup (automatically or manually)
  • Symantec 20097684 | User Guide - Page 50
    Best practices for backing up your data About choosing a backup type ■ What compression levels to specify for recovery points, and whether to enable security settings (encryption and password protection). ■ Which of the many other options you want to use. You can customize each backup according to
  • Symantec 20097684 | User Guide - Page 51
    Best practices for backing up your data 51 Best practices for backing up About backups When you back up your computer, you choose from two types of backups: ■ drive-based backup: backs up an entire hard drive ■ file and folder backup: backs up only the files and folders you select Which backup type
  • Symantec 20097684 | User Guide - Page 52
    external drive makes your backup data more portable. Should you need to remove your critical data from a particular location, you can quickly grab an if you plug the drive into a second computer running another copy of Norton Ghost, the nickname appears. Note: You might also consider placing a sticky
  • Symantec 20097684 | User Guide - Page 53
    up If you are working at your computer and a back up starts to run, you might notice that the performance of your computer slows down. Norton Ghost requires significant system resources to run a back up. If slowing occurs, you can reduce the speed of the back up to improve computer performance until
  • Symantec 20097684 | User Guide - Page 54
    and review the events log on the Advanced page. to identify any potential problems. The event log records events when they occur, backups and any errors backup: ■ Norton Ghost does not need to be running for a scheduled backup to start. After you define a backup, you can close Norton Ghost. ■ The
  • Symantec 20097684 | User Guide - Page 55
    a backup is interrupted, consider running it again. ■ If you experience problems while creating a backup, you may need to reboot the computer. After . After you define a backup and schedule it to run, you can close Norton Ghost. The program does not need to be running for a backup to start. However
  • Symantec 20097684 | User Guide - Page 56
    56 Best practices for backing up your data About selecting a backup destination About selecting a backup destination You should review the following information before deciding where to store recovery points and file and folder backup data. Note: If you choose to use CDs or DVDs as your backup
  • Symantec 20097684 | User Guide - Page 57
    , you should provide the remote computer name and user name. For example: remote_computer_name\username. CD-RW/DVD-RW When you save backup data to removable media, it is automatically split into the correct sizes if the backup spans more than one media. If more than one drive is being backed
  • Symantec 20097684 | User Guide - Page 58
    recovery ■ Must have supported ■ Can schedule backups and restore data existing network backup strategies) Removable media (local) ■ Protection from hard drive failure not create incremental backups of shared data drives if Norton Ghost is installed on both operating systems and they are
  • Symantec 20097684 | User Guide - Page 59
    : ■ About defining a drive-based backup ■ Defining a drive-based backup ■ Compression levels for drive-based backups ■ Running a one-time backup from Norton Ghost ■ About running a one-time backup from Symantec Recovery Disk ■ About Offsite Copy ■ How Offsite Copy works About defining a drive-based
  • Symantec 20097684 | User Guide - Page 60
    60 Backing up entire drives Defining a drive-based backup Defining a drive-based backup Define a drive-based backup to take a shapshot of your entire hard drive. To define a drive-based backup 1 On the Home or Tasks page, click Run or Manage Backups. 2 In the Run or Manage Backups window, click
  • Symantec 20097684 | User Guide - Page 61
    pointlist, click Next, review the options you have selected, then click Finish. No Schedule Weekly Monthly Runs the backup only when you run it yourself, manually. Runs the backup at the time and on the days of the week that you specify. When you select this option, the Select the days
  • Symantec 20097684 | User Guide - Page 62
    time, and select the days of the week when the backup should run. If you only want to run the backup when you start it manually, uncheck Schedule and skip to the next step. 17 (Optional) Click the Custom button and specify how frequently a new recovery point set should be started
  • Symantec 20097684 | User Guide - Page 63
    BitLocker Drive Encryption to encrypt the data on a data drive (any drive that does not have the operating system installed on it), be aware that Norton Ghost does not work with locked data drives. Instead, you must unlock the bitlocked drive before you can backup it up. Generally, you should accept
  • Symantec 20097684 | User Guide - Page 64
    Page. Table 6-2 Backup destination options Option Description Folder field Indicates the location where you want to store the recovery points. If Norton Ghost detects that this location does not have enough available space, it alerts you. You should choose another location that has more space
  • Symantec 20097684 | User Guide - Page 65
    Backing up entire drives 65 Defining a drive-based backup Table 6-3 Options Name Recovery point options Description Type a name for your backup. Note: This option does not appear if you create a recovery point using the Back Up My Computer feature in Symantec Recovery Disk. Compression Verify
  • Symantec 20097684 | User Guide - Page 66
    point using the Back Up My Computer feature in Symantec Recovery Disk. Include system and temporary files Select this option to include indexing support for operating system and temporary files when a recovery point is created on the client computer. Note: This option does not appear if you
  • Symantec 20097684 | User Guide - Page 67
    Backing up entire drives 67 Defining a drive-based backup Table 6-4 Advanced scheduling options Option Description Schedule (Backup Time) Do one or more of the following: ■ Click Schedule, and then select the days and a start time for when the backup should run. ■ Select Run more than once per
  • Symantec 20097684 | User Guide - Page 68
    to the network. This is because the Norton Ghost 15.0 service runs as the local System account. When entering network credentials, the following rules this dialog because the service runs in a different context and cannot recognize the mapped drive. By going to the Tools menu and selecting
  • Symantec 20097684 | User Guide - Page 69
    . Warning: The command files cannot depend on any user interaction or have a visible user interface. You should test all command files independently of Norton Ghost before you use them during a backup. When the backup begins, the command file is run during the specified stage. If an error occurs
  • Symantec 20097684 | User Guide - Page 70
    an error recovery mechanism built into it. If the computer has one or more services that must be stopped at this stage (such as stopping a non-VSS aware immediately. No other command files will run. See "How you use Norton Ghost" on page 34. Run after snapshot creation Run after recovery point
  • Symantec 20097684 | User Guide - Page 71
    Lets you run a backup even if there are bad sectors on the hard disk. Although most drives do not have bad sectors, the potential for problems increases during the lifetime of the hard disk. Use password Sets a password on the recovery point when it is created. Passwords can include standard
  • Symantec 20097684 | User Guide - Page 72
    and then click Finish. About recovery point encryption You can enhance the security of your data by using the Advanced Encryption Standard (AES) to encrypt were created with earlier versions of Symantec LiveState Recovery or Norton Ghost. However, encrypting those files makes them readable with the
  • Symantec 20097684 | User Guide - Page 73
    in a secure place. Passwords are case sensitive. When you access or restore a recovery point that is password encrypted, Norton Ghost prompts Support cannot open an encrypted recovery point. Besides bit strength, the format of the password can improve the security of your data. For better security
  • Symantec 20097684 | User Guide - Page 74
    74 Backing up entire drives Compression levels for drive-based backups 3 In the tree panel of the Recovery Point Browser, select the recovery point. For example: C_Drive001.v2i. 4 On the File menu, click Verify Recovery Point. If the Verify Recovery Point option is unavailable, you must first
  • Symantec 20097684 | User Guide - Page 75
    software. Or, you can run it when you learn about a new computer security threat. You can also use Symantec Recovery Disk to create one time cold from Symantec Recovery Disk" on page 76. To run a one-time backup from Norton Ghost 1 On the Tasks page, click One Time Backup. 2 Click Next. 3 Select
  • Symantec 20097684 | User Guide - Page 76
    feature in Symantec Recovery Disk. Sometimes known as a cold backup or offline backup, you can create recovery points of a partition without the need to install Norton Ghost or its agent. With a cold backup, all files are closed when the backup occurs. You do not copy any data that may be in the
  • Symantec 20097684 | User Guide - Page 77
    in Symantec Recovery Disk. Sometimes known as a cold backup or offline backup, you can create recovery points of a partition without the need to install Norton Ghost or its agent. To run a one-time backup from Symantec Recovery Disk 1 If you intend to store the resulting recovery point on a USB
  • Symantec 20097684 | User Guide - Page 78
    78 Backing up entire drives About running a one-time backup from Symantec Recovery Disk 6 In the Backup Destination panel, set the options you want, then click Next. Folder field Map a network drive Recovery point file names field Lets you browse to and specify the location where you want to
  • Symantec 20097684 | User Guide - Page 79
    CPU usage might be higher than normal. Other processes on the computer might also be slower. To compensate, you can adjust the operation speed of Norton Ghost. This might improve the performance of other resource-intensive applications that you are running at the same time. 8 If you want to verify
  • Symantec 20097684 | User Guide - Page 80
    you run a backup even if there are bad sectors on the hard disk. Although most drives do not have bad sectors, the potential for problems increases during the lifetime of the hard disk. Sets a password on the recovery point when it is created. Passwords can include standard characters. Passwords
  • Symantec 20097684 | User Guide - Page 81
    Backing up entire drives 81 About Offsite Copy 12 Click Next. 13 Click Finish to run the backup. 14 When the backup is finished, click Close to return to the main Symantec Recovery Disk window. About Offsite Copy Backing up your data to a secondary hard disk is a critical first step to protecting
  • Symantec 20097684 | User Guide - Page 82
    morning, you plug the drive back in to the computer. Norton Ghost detects the presence of the Offsite Copy destination drive and automatically out of disk space, Offsite Copy identifies the oldest recovery points and removes them to make room for the most current recovery points. Offsite Copy
  • Symantec 20097684 | User Guide - Page 83
    for safe keeping. On Wednesday morning, you bring drive B to the office. You plug in drive B and Norton Ghost detects that drive B is an Offsite Copy destination. Norton Ghost then automatically begins copying Monday night's base recovery point and Tuesday night's incremental recovery point. At the
  • Symantec 20097684 | User Guide - Page 84
    all recovery points that were created since the last connection. If there is no room to hold all of the recovery points available, Offsite Copy removes the oldest recovery points from the network server. In turn, it makes room for the newest recovery points.
  • Symantec 20097684 | User Guide - Page 85
    FTP server. You must also provide the correct FTP connection information to Norton Ghost in order for this method to work correctly. When Offsite Copy is no room to hold all of the recovery points available, Offsite Copy removes the oldest recovery points or recovery point sets from the FTP server.
  • Symantec 20097684 | User Guide - Page 86
    86 Backing up entire drives How Offsite Copy works
  • Symantec 20097684 | User Guide - Page 87
    7 Chapter Backing up files and folders This chapter includes the following topics: ■ Defining a file and folder backup ■ About folders that are excluded by default from file and folder backups Defining a file and folder backup When you define and run a file and folder backup, copies are made of each
  • Symantec 20097684 | User Guide - Page 88
    Next. Selecting file types lets Norton Ghost find and include files that match the files you want backed up. If a file type is not included in the predefined list, click Add File Type. You can also manually an additional level of security, click Use AES encryption
  • Symantec 20097684 | User Guide - Page 89
    to a schedule. If you want to run the backup only when you start it manually, uncheck Schedule. 11 Enter a start time and select the days of the week Windows folder ■ Program Files folder ■ Temporary folder ■ Temporary Internet Files folder These folders are typically not used for storing personal
  • Symantec 20097684 | User Guide - Page 90
    90 Backing up files and folders About folders that are excluded by default from file and folder backups See "Defining a file and folder backup" on page 87. You can include these folders when you define a file and folder backup.
  • Symantec 20097684 | User Guide - Page 91
    8 Chapter Running and managing backup jobs This chapter includes the following topics: ■ Running an existing backup job immediately ■ Running a backup with options ■ Adjusting the speed of a backup ■ Stopping a task ■ Verifying that a backup is successful ■ Editing backup settings ■ Enabling event-
  • Symantec 20097684 | User Guide - Page 92
    : If necessary, you can run a quick backup of a particular drive without using a defined backup. See "Running a one-time backup from Norton Ghost" on page 75. Norton Ghost can be configured to run a backup automatically when an event occurs on your computer, such as installing a new software program
  • Symantec 20097684 | User Guide - Page 93
    Note: Using this option does not change the settings of the defined backup. To do that, you must open the backup and edit its settings manually. See "Editing a backup schedule" on page 97. See "Editing backup settings" on page 95. To run a backup with options 1 On the Home page, click Run
  • Symantec 20097684 | User Guide - Page 94
    you are running during a backup, your computer could become sluggish. You can manually adjust the effect of a backup on the performance of your computer to match following: ■ On the Tools menu, click Cancel the Current Operation. ■ On the Tools menu, click Progress and Performance, and then click
  • Symantec 20097684 | User Guide - Page 95
    Running and managing backup jobs 95 Verifying that a backup is successful ■ On the Windows system tray, right-click the Norton Ghost tray icon, and then click Cancel the Current Operation. Verifying that a backup is successful After a backup completes, you can validate the success of the backup
  • Symantec 20097684 | User Guide - Page 96
    , Norton Ghost can run a backup when it detects that new software is about to be installed. If a problem occurs ThreatCon is Symantec's early warning security threat system. When Symantec identifies , Norton Ghost detects changes in the threat level. Your computer must be connected to the Internet at
  • Symantec 20097684 | User Guide - Page 97
    susceptible to online threats. But if you connect your computer to the Internet at any time, it becomes vulnerable. You do not have to enable is turned off, triggered events will not run it, nor can you run it manually. You can also delete a defined backup (not recovery points). See "Deleting backup
  • Symantec 20097684 | User Guide - Page 98
    , and then click Remove. 3 Click Yes. Adding users who can back up your computer You can use the Security Configuration Tool to control which users on your computer can access and configure key features of Norton Ghost. For example, all users with Limited Windows accounts can run existing backup
  • Symantec 20097684 | User Guide - Page 99
    rights for users or groups 1 On the Windows taskbar, click Start > Programs > Symantec Norton Ghost > Security Configuration Tool On Windows Vista and Windows 7, click Start > All Programs > Symantec > Security Configuration Tool. 2 Select a user or group from the Group or user names box. 3 Choose
  • Symantec 20097684 | User Guide - Page 100
    100 Running and managing backup jobs Adding users who can back up your computer
  • Symantec 20097684 | User Guide - Page 101
    Adding computers to the Computer List ■ Deploying the Norton Ghost Agent ■ Using the Norton Ghost Agent ■ About managing the Norton Ghost Agent through Windows Services ■ About best practices for using services ■ Controlling access to Norton Ghost About backing up other computers from your computer
  • Symantec 20097684 | User Guide - Page 102
    computers to the Computer List 1 On the Norton Ghost menu bar, click Computers > Add. 2 Do one of the following: ■ Type the name of the computer ■ Type the IP address of the computer If you are in a workgroup environment instead of a domain you must manually
  • Symantec 20097684 | User Guide - Page 103
    with Windows Vista, you cannot deploy the Norton Ghost Agent to Windows Vista without making security configuration changes. The same issue occurs when you attempt to deploy the agent from Windows Vista to another computer. You can manually install the agent on the target computer using the product
  • Symantec 20097684 | User Guide - Page 104
    be sure to warn the user of the impending reboot so that they can save their work. 5 Click OK. To manually install the Norton Ghost Agent 1 Insert the Norton Ghost product CD into the media drive of the computer. The installation program should start automatically. 2 If the installation program does
  • Symantec 20097684 | User Guide - Page 105
    on a remote computer. Because the Norton Ghost Agent functions as a service, it does not have a graphical interface. See "About managing the Norton Ghost Agent through Windows Services" on page 106. See "Controlling access to Norton Ghost " on page 111. The Norton Ghost Agent does, however, have
  • Symantec 20097684 | User Guide - Page 106
    Agent " on page 105. To use the features of Norton Ghost, the Norton Ghost Agent must be started and properly configured. You can use the Windows Services tool to manage and troubleshoot the agent. Note: To manage the Norton Ghost Agent, you must be logged on as a local administrator. You can manage
  • Symantec 20097684 | User Guide - Page 107
    Check the Events tab first before using The Events tab in the Advanced view can help you Services. to track down the source of a problem, particularly when it is associated with the Norton Ghost Agent. You should view the most recent log entries in the Events tab for more information about
  • Symantec 20097684 | User Guide - Page 108
    use to log on to the Norton Ghost Agent service, or you used the Security Configuration Tool to give additional users the ability to back up computers. See "Controlling access to Norton Ghost " on page 111. You can stop the agent if you believe it is causing a problem on the computer, or you want
  • Symantec 20097684 | User Guide - Page 109
    Backing up remote computers from your computer 109 About best practices for using services If you stop the Norton Ghost Agent service while Norton Ghost is running, you receive an error message, and Norton Ghost is disconnected from the agent. In most cases, you can click Reconnect from the Task
  • Symantec 20097684 | User Guide - Page 110
    count is reset to zero, the next failure triggers the action set for the first recovery attempt. 7 Click OK. Viewing Norton Ghost Agent dependencies The Norton Ghost Agent depends on other required services to run properly. If a system component is stopped or is not running properly, the dependent
  • Symantec 20097684 | User Guide - Page 111
    To view Norton Ghost Agent dependencies 1 In the Services window, under Name, click Norton Ghost. See "Opening Windows Services " on page 108. 2 On the Action menu, click Properties. 3 Click the Dependencies tab. Controlling access to Norton Ghost You can use the Security Configuration Tool to
  • Symantec 20097684 | User Guide - Page 112
    you are finished. To change permissions for a user or a group 1 On the Windows taskbar, click Start > Programs > Symantec Norton Ghost > Security Configuration Tool. 2 In the Permissions for Norton Ghost dialog box, select the user or group whose permissions you want to change, and then do one of
  • Symantec 20097684 | User Guide - Page 113
    or group 1 On the Windows Start menu, click Programs > Symantec Norton Ghost > Security Configuration Tool. 2 Select the user or group that you want to remove, and then click Remove. 3 Click OK when you are finished. Running Norton Ghost using different user rights If the permissions for a user are
  • Symantec 20097684 | User Guide - Page 114
    114 Backing up remote computers from your computer Controlling access to Norton Ghost
  • Symantec 20097684 | User Guide - Page 115
    of a drive (or file and folder backups) ■ Viewing drive details ■ Improving the protection level of a drive ■ About using event log information to troubleshoot problems About monitoring backups You should monitor your backups to ensure that you can effectively recover lost data when you need it. The
  • Symantec 20097684 | User Guide - Page 116
    . For example, adding hard disk space or creating a partition. When you use Refresh, Norton Ghost scans all attached hard disks for any configuration changes. It also updates information on removable media, media drives, basic drives, file systems, and hard drive letters. To rescan a computer's hard
  • Symantec 20097684 | User Guide - Page 117
    Monitoring the status of your backups 117 Monitoring backup protection from the Home page Table 10-1 Icon Backup protection levels (continued) Title Description Partially backed up A backup is defined, but it is not scheduled or has not run for a long time. This status can indicate that the
  • Symantec 20097684 | User Guide - Page 118
    to occur. Indicates that the backup is unavailable. Indicates that the backup did not run as scheduled. This problem could occur if an error prevents the backup from running or if you manually cancel a backup before it completes. Indicates a drive-based backup that is scheduled to run at a future
  • Symantec 20097684 | User Guide - Page 119
    . timeline. Indicates that the backup is unavailable. Indicates that the backup did not run as scheduled. This problem could occur if an error prevents the backup from running or if you manually cancel a backup before it completes. Indicates that the backup is scheduled to run at a future time.
  • Symantec 20097684 | User Guide - Page 120
    . Indicates that the backup is not available. Indicates that the backup did not run as scheduled. This problem could occur if an error prevents the backup from running, or if you manually canceled a backup before it completed. Indicates that the backup is scheduled to run at a future time
  • Symantec 20097684 | User Guide - Page 121
    are scheduled and that at least one is unavailable. Indicates that two or more backups have run and the last backup was unsuccessful. This problem could occur if an error prevents a backup from running. Indicates that the backup is scheduled to run at a future time. To monitor backup protection
  • Symantec 20097684 | User Guide - Page 122
    service on your computer in order for SNMP traps to work from Norton Ghost. By default, Norton Ghost is not enabled to send traps to NMS managers. You can configure Norton Ghost named BESR_MIB.MIB, is located in the Support folder on the Norton Ghost product CD. Customizing the status reporting of
  • Symantec 20097684 | User Guide - Page 123
    status of your backups 123 Customizing the status reporting of a drive (or file and folder backups) that your computer is at risk. You can configure Norton Ghost to ignore drive D so that it does not calculate the status of drive D in the Backup Status panel on the Home page. Or, you can
  • Symantec 20097684 | User Guide - Page 124
    124 Monitoring the status of your backups Viewing drive details Viewing drive details The Advanced page lets you view details about your hard drives. You can view the following drive details: Name Type Destination Last Run Next Run Displays the name that you assigned to the backup when you
  • Symantec 20097684 | User Guide - Page 125
    Monitoring the status of your backups 125 Improving the protection level of a drive To improve the protection level of a drive 1 On the Status page, select a drive that requires attention from the Drives column.
  • Symantec 20097684 | User Guide - Page 126
    to edit, and then select one of the following menu items: Run Backup Now Run Backup With Options Change Schedule Edit Settings Edit Offsite Remove Backup Job Runs the selected backup job immediately. Opens the Run Backup With Options dialog, which lets you select the desired recovery point type
  • Symantec 20097684 | User Guide - Page 127
    Monitoring the status of your backups 127 About using event log information to troubleshoot problems See "Editing backup settings" on page 95. About using event log information to troubleshoot problems When Norton Ghost performs an action, it records the event (for example, when a backup job runs
  • Symantec 20097684 | User Guide - Page 128
    128 Monitoring the status of your backups About using event log information to troubleshoot problems
  • Symantec 20097684 | User Guide - Page 129
    About using a search engine ■ Dismounting a recovery point drive ■ Viewing the drive properties of a recovery point About exploring recovery points You can use Norton Ghost to explore files in a recovery point by assigning it a drive letter that is visible from Windows Explorer. You can perform the
  • Symantec 20097684 | User Guide - Page 130
    the computer. Mounted drives do not take up extra hard-disk space. All security on the NTFS volumes remains intact when they are mounted. You do not a recovery point through Windows Explorer When you explore a recovery point, Norton Ghost mounts the recovery point as a drive letter and opens it in
  • Symantec 20097684 | User Guide - Page 131
    point Mounting a recovery point from Windows Explorer You can also manually mount a recovery point as a drive by opening your backup EFS) NTFS volumes. To open files within a recovery point 1 On the Tools page, click Run Recovery Point Browser. 2 Navigate to your backup destination folder
  • Symantec 20097684 | User Guide - Page 132
    com file extension. To restore files within a recovery point 1 On the Tools page, click Run Recovery Point Browser. 2 Navigate to your backup destination can configure your backups to support one of these search engines. Be sure to select the Enable search engine support at the time you define
  • Symantec 20097684 | User Guide - Page 133
    Exploring the contents of a recovery point 133 Dismounting a recovery point drive Dismounting a recovery point drive All of your mounted recovery point drives are unmounted when you restart the computer. You can also unmount the drives without restarting the computer. To dismount a recovery point
  • Symantec 20097684 | User Guide - Page 134
    134 Exploring the contents of a recovery point Viewing the drive properties of a recovery point To view the drive properties of a recovery point 1 In the Recovery Point Browser, in the tree panel, click the recovery point that contains the drive that you want to view. 2 Select a drive. 3 Do one of
  • Symantec 20097684 | User Guide - Page 135
    of backup data ■ Moving your backup destination About backup destinations A backup destination is the location in which your backup data is stored. Norton Ghost includes features for managing the size of your backup destinations so that you can use your computer's valuable disk space for other
  • Symantec 20097684 | User Guide - Page 136
    . File and folder backups let you select individual files or folders to back up. You can also specify a file type to back up and let Norton Ghost locate and back up all files of the type you specified. For example, if you have Microsoft Word documents
  • Symantec 20097684 | User Guide - Page 137
    can control the use of disk space. Managing recovery point storage Norton Ghost includes several features that help you manage your backup data. virtual conversion" on page 141. To manage recovery point storage manually 1 On the Tools page, click Manage Backup Destination. 2 From the Manage Backup
  • Symantec 20097684 | User Guide - Page 138
    exploring recovery points" on page 129. To clean up old recovery points 1 On the Tools page, click Manage Backup Destination. 2 Click Clean Up. The recovery point sets that can be safely removed without eliminating your latest recovery point are selected automatically. You can select or deselect the
  • Symantec 20097684 | User Guide - Page 139
    files within a recovery point" on page 131. You can manually select which recovery points to remove, if you know which recovery points that you want to keep within a set. To delete recovery points within a set 1 On the Tools page,
  • Symantec 20097684 | User Guide - Page 140
    recovery points to a CD or DVD, and then manually delete the original recovery points. You should verify the copies of the recovery points to ensure that they are on the disk and are valid. To make copies of recovery points 1 On the Tools page, click Manage Backup Destination. 2 Select a recovery
  • Symantec 20097684 | User Guide - Page 141
    virtual conversion You can use Norton Ghost to convert recovery points of a physical computer to VMware Virtual Disk, Microsoft Virtual Disk, or a VMware ESX Server. Virtual disks are excellent for testing and evaluation purposes. The following platforms support
  • Symantec 20097684 | User Guide - Page 142
    from the list. Lets you browse to another recovery point location. For example, you can browse an external (USB) drive, network location, or removable media to select a recovery point (.v2i) or incremental recovery point (.iv2i) file. Select this option, and then do the following: ■ Click Browse
  • Symantec 20097684 | User Guide - Page 143
    Managing backup destinations 143 Running a one-time virtual conversion System Uses the current system index file that is located in the recovery point storage location. The system index file displays a list of all of the drives on your computer and any associated recovery points from which you can
  • Symantec 20097684 | User Guide - Page 144
    144 Managing backup destinations Running a one-time virtual conversion If you selected VMware Virtual Disk or Microsoft Virtual Disk as the conversion format. ■ Folder for virtual disks Type the path to the folder where you want to place the virtual disk files. ■ Browse Click Browse to locate the
  • Symantec 20097684 | User Guide - Page 145
    Managing backup destinations 145 Running a one-time virtual conversion If you selected VMware ESX ■ ESX server name or IP address Server as the conversion format. Type the name of the server or the server's IP address. ■ ESX Server Credentials In the ESX Server Credentials group box, type a
  • Symantec 20097684 | User Guide - Page 146
    its original state prior to recovery. For more detailed information about Mini-Setup. you can perform a search for "Mini-Setup" on the Microsoft Help and Support Web site.
  • Symantec 20097684 | User Guide - Page 147
    virtual disk is stored on a FAT32 drive (any file system that does not support files larger than 2 GB). Or, if you want to copy the virtual disks are excellent for testing and evaluation purposes. The following platforms support virtual disks created from recovery points: ■ VMware Workstation 4, 5,
  • Symantec 20097684 | User Guide - Page 148
    148 Managing backup destinations Defining a virtual conversion job You can also create a one-time virtual conversion. See "Running a one-time virtual conversion" on page 141. See "Viewing the properties of a virtual conversion job" on page 153. See "Viewing the progress of a virtual conversion job"
  • Symantec 20097684 | User Guide - Page 149
    Managing backup destinations 149 Defining a virtual conversion job If you selected VMware Virtual Disk or ■ Folder for virtual disks Microsoft Virtual Disk as the conversion format. Type the path to the folder where you want to place the virtual disk files. ■ Browse Click Browse to locate the
  • Symantec 20097684 | User Guide - Page 150
    150 Managing backup destinations Defining a virtual conversion job If you selected VMware ESX Server as the ■ ESX server name or IP address conversion format. Type the name of the server or the server's IP address. ■ ESX Server Credentials In the ESX Server Credentials group box, type a valid
  • Symantec 20097684 | User Guide - Page 151
    its original state prior to recovery. For more detailed information about Mini-Setup. you can perform a search for "Mini-Setup" on the Microsoft Help and Support Web site.
  • Symantec 20097684 | User Guide - Page 152
    your virtual disk is stored on a FAT32 drive (any file system that does not support files larger than 2 GB). Or, if you want to copy the virtual disk this option to run the conversion only when you run it yourself, manually. Select this option to run the conversion at the specified start time and
  • Symantec 20097684 | User Guide - Page 153
    After you create a conversion job, you can use Run Now to create an on-demand recovery point conversion to virtual disk format. A manual conversion starts immediately. To run an existing virtual conversion job immediately 1 On the Tasks page, click Run or Manage Virtual Conversions. 2 Select
  • Symantec 20097684 | User Guide - Page 154
    click Run or Manage Virtual Conversions. 2 Select the names of one or more conversion jobs that you want to delete. 3 On the toolbar, click Remove. 4 Click Yes to confirm the deletion. About managing file and folder backup data Because drive-based backups capture your entire hard drive, the size of
  • Symantec 20097684 | User Guide - Page 155
    files. To limit the number of file versions to keep 1 On the Tools page, click Manage Backup Destination. 2 Click Settings. 3 Select Limit file versions Manually deleting files from your file and folder backup You can manually delete the files that are stored in your backup destination. To manually
  • Symantec 20097684 | User Guide - Page 156
    file, and then click Show Versions. Automating management of backup data Norton Ghost can monitor your backup storage space and notify you when it gets Ghost notifies you when the disk reaches 90 percent of its total capacity. To automate management of backup data 1 On the Tools page, click Manage
  • Symantec 20097684 | User Guide - Page 157
    you want Norton Ghost to manage the backup data automatically, without prompting you. If you select this option, Norton Ghost automatically deletes connected before you proceed. To move your backup destination 1 On the Tools page, click Manage Backup Destination. 2 In the Manage Backup Destination
  • Symantec 20097684 | User Guide - Page 158
    158 Managing backup destinations Moving your backup destination 5 Select the defined backups that should use the new backup destination. Deselect the defined backups that you do not want to move. 6 Select Save as default backup destination if you want to use this destination as the default backup
  • Symantec 20097684 | User Guide - Page 159
    folder backup data ■ Recovering files and folders using a recovery point ■ Recovering a secondary drive ■ Restoring using LightsOut Restore About recovering lost data Norton Ghost can restore lost files, folders, or entire drives by using recovery points or file and folder backup data. You must have
  • Symantec 20097684 | User Guide - Page 160
    160 Recovering files, folders, or entire drives Recovering files and folders by using file and folder backup data Norton Ghost includes a search tool to help you locate the files that you want to recover. To recover files and folders by using file and folder backup data 1 On the
  • Symantec 20097684 | User Guide - Page 161
    If you want to use a different recovery point than the one selected for you in the Recovery Point box, click Change. Note: If Norton Ghost cannot locate any recovery points, the Select Recovery Point dialog box opens automatically. In the Select Recovery Point dialog box, click View by and select
  • Symantec 20097684 | User Guide - Page 162
    type your network credentials. See "About network credentials" on page 68. ■ Select each recovery point that you want to recover. If necessary, add, change, or remove recovery points from the list. ■ Click Finish. 4 In the Find files to recover box, type the whole name or partial name of a file or
  • Symantec 20097684 | User Guide - Page 163
    folders you want If you cannot find the files or folders that you want to restore by browsing through a recovery point, you can use the Norton Ghost Explore feature. This feature assigns a drive letter to a recovery point (mounts the recovery point) as if it were a working drive. You can then use
  • Symantec 20097684 | User Guide - Page 164
    164 Recovering files, folders, or entire drives Recovering a secondary drive Recovering a secondary drive If you lose data on a secondary drive, you can use an existing recovery point for that drive to restore the data. A secondary drive is a drive other than the drive on which your operating system
  • Symantec 20097684 | User Guide - Page 165
    Windows to attempt to force a lock on the drive. If Ignore fails, you might be prompted to insert the Symantec Recovery Disk CD and manually start the recovery environment so that you can complete the recovery. When the recovery is finished, the computer restarts automatically. Recovery options The
  • Symantec 20097684 | User Guide - Page 166
    disk signature Restores the original, physical disk signature of the hard drive. Disk signatures are part of all Windows operating systems that Norton Ghost supports. Disk signatures are required to use the hard drive. Select this option if either of the following situations are true: ■ Your
  • Symantec 20097684 | User Guide - Page 167
    , or entire drives 167 Restoring using LightsOut Restore The Norton Ghost LightsOut Restore feature enables administrators to restore a computer from hardware device such as RILO or DRAC. 3. Install Norton Ghost on servers that need to be protected, and then create the desired recovery points.
  • Symantec 20097684 | User Guide - Page 168
    dialog appears. Do one of the following: ■ If you have a license file, browse to its location. ■ If you have the serial number that came with Norton Ghost, click Get License. ■ If you do not have a license file, click Buy Now to purchase the product. ■ If you received a product license key, enter
  • Symantec 20097684 | User Guide - Page 169
    7 You might be shown a list of network and storage drivers that are not supported in the Symantec recovery environment. Select the box next to the network driver that you for Symantec Recovery Disk. Option Automatically start network services Description Select this option if you want networking to
  • Symantec 20097684 | User Guide - Page 170
    when you start the Symantec recovery environment. Useful for troubleshooting a system recovery. Click Configure to specify pcAnywhere log on . This option is available on any Windows operating system that supports the Microsoft CryptoAPI. Reconfiguring Using the LightsOut Restore Wizard You can
  • Symantec 20097684 | User Guide - Page 171
    drives 171 Restoring using LightsOut Restore Reconfiguring Using the LightsOut Restore Option Wizard 1 From Windows, click Start > All Programs > Symantec > Norton Ghost 15.0 > LightsOut Restore Setup. 2 Make your desired changes in the wizard screens, and then click Finish. 3 Click Yes if you
  • Symantec 20097684 | User Guide - Page 172
    172 Recovering files, folders, or entire drives Restoring using LightsOut Restore
  • Symantec 20097684 | User Guide - Page 173
    Disk ■ About using the networking tools in Symantec Recovery Disk ■ About viewing properties of recovery points and drives ■ About the Support Utilities About recovering a computer If a recovery environment that provides temporary access to Norton Ghost recovery features. For example, you can access
  • Symantec 20097684 | User Guide - Page 174
    your computer, watch for instructions on your computer monitor, or refer to your manufacturer's instructions. Starting a computer by Recovery Disk in a safe place. See If driver validation fails in the Norton Ghost™ User's Guide. Note: Symantec Recovery Disk requires a minimum of 512 MB of RAM to
  • Symantec 20097684 | User Guide - Page 175
    drive of the computer. If Norton Ghost was installed by your computer manufacturer, the recovery environment already could be installed on your computer's hard drive. Either watch your computer monitor after the computer restarts for on-screen instructions
  • Symantec 20097684 | User Guide - Page 176
    176 Recovering a computer How to prepare to recover a computer 3 In the BIOS setup window, select Boot Sequence, and then press Enter. 4 Follow the on-screen instructions to make the CD or DVD device be the first bootable device in the list. 5 Put your Symantec Recovery Disk CD into the CD drive,
  • Symantec 20097684 | User Guide - Page 177
    working computer that has Internet access. You can save the virus definitions to a disk and then use them on the troubled computer. Note: you have a CD burner. See If driver validation fails in the Norton Ghost User's Guide. To locate the latest virus definitions 1 Insert the Symantec Recovery Disk
  • Symantec 20097684 | User Guide - Page 178
    178 Recovering a computer Recovering a computer ■ Scroll down and select Run command. ■ Click OK. 3 Click Run Update Locator. 4 Click Find and retrieve virus definitions. If more recent virus definitions are not found, you can still scan for viruses on your damaged computer by using the virus
  • Symantec 20097684 | User Guide - Page 179
    Recovering a computer 179 Recovering a computer recover your computer or other hard drive back to the state it was in when the recovery point was created. See "Recovering a computer from a virtual disk file" on page 183. To recover a computer 1 Start the computer by using the Symantec Recovery Disk
  • Symantec 20097684 | User Guide - Page 180
    then click Open. 6 Click Next. 7 In the Drives to Recover panel, select each recovery point that you want to recover. If necessary, add or remove recovery points from the list. If you are recovering your computer, select the drive on which Windows is installed. On most computer systems, this drive
  • Symantec 20097684 | User Guide - Page 181
    Recovering a computer 181 Recovering a computer 10 Select Reboot when finished if you want the computer to restart automatically after the recovery process finishes. 11 Click Finish. 12 Click Yes to begin the recovery process. Edit target drive and options The following table describes the options
  • Symantec 20097684 | User Guide - Page 182
    is installed. Restores the original, physical disk signature of the hard drive. Disk signatures are part of all Windows operating systems that Norton Ghost supports. Disk signatures are required to use the hard drive. Select this option if either of the following situations are true: ■ Your computer
  • Symantec 20097684 | User Guide - Page 183
    original drive, but the drive's partitions were modified since the recovery point was created. ■ You suspect that a virus or some other problem has corrupted your drive's master boot record. Recovering a computer from a virtual disk file Using the recovery environment, you can recover your computer
  • Symantec 20097684 | User Guide - Page 184
    184 Recovering a computer Recovering a computer from a virtual disk file To recover a computer from a virtual disk file 1 Start the computer by using the Symantec Recovery Disk CD. See "Starting a computer by using Symantec Recovery Disk" on page 174. 2 On the Home panel, click Recover My Computer.
  • Symantec 20097684 | User Guide - Page 185
    Recovering a computer 185 Recovering a computer from a virtual disk file Virtual disk recovery options The following table describes the recovery options that are available when you recover a virtual disk. Option Description Verify recovery point before restore Verifies whether a recovery point
  • Symantec 20097684 | User Guide - Page 186
    of the hard drive. Disk signatures are part of all Windows operating systems that Norton Ghost supports. Disk signatures are required to use the hard drive. Select this option if either point was created. ■ You suspect that a virus or some other problem has corrupted your drive's master boot record.
  • Symantec 20097684 | User Guide - Page 187
    recovery point from the list, and then click OK. Note: If you have trouble finding the recovery points in a network location, in the File name box, type . If you are still having problems, try entering the computer's IP address. See "About using the networking tools in Symantec Recovery Disk" on
  • Symantec 20097684 | User Guide - Page 188
    using Symantec Recovery Disk ◆ In the Analyze pane, click Explore My Computer. About using the networking tools in Symantec Recovery Disk If you store your recovery points on a network, you need access to to recover your computer across a network. See "Starting networking services" on page 189.
  • Symantec 20097684 | User Guide - Page 189
    services If you need to start networking services, you can do so manually. To start networking services ◆ On the Network panel, click Start My Networking Services Recovery Disk. The thin host in Symantec Recovery Disk does not support file transfers and cannot be used to add drivers for network or
  • Symantec 20097684 | User Guide - Page 190
    the networking tools in Symantec remotely manage a recovery or perform other tasks that are supported in Symantec Recovery Disk. Note: The client computer cannot connection item. For more information, see the Symantec pcAnywhere User's Guide. Note: You do not need to choose to automatically logon
  • Symantec 20097684 | User Guide - Page 191
    using the networking tools in Symantec Recovery on the Protect Item tab. The thin host does not support encryption. 5 In pcAnywhere, start the remote control session. from within Symantec Recovery Disk If you started the networking services after you started the recovery environment, you can map a
  • Symantec 20097684 | User Guide - Page 192
    192 Recovering a computer About using the networking tools in Symantec Recovery Disk ■ On the left side of browse to the drive/share on the network (usually caused by the lack of an available DHCP service), you can assign a unique static IP address to the computer that is running the recovery
  • Symantec 20097684 | User Guide - Page 193
    Recovering a computer 193 About viewing properties of recovery points and drives 6 Type the address of the computer that you want to ping on the network segment. 7 Click OK. If you specified a computer name or a computer name and domain as the address method, make note of the IP address that is
  • Symantec 20097684 | User Guide - Page 194
    point The name of the computer on which the recovery point was created If you enabled search engine support for the recovery point, this property is displayed. Identifies the application (Norton Ghost) that was used to create the recovery point. To view the properties of a recovery point 1 In the
  • Symantec 20097684 | User Guide - Page 195
    ask you to use to troubleshoot any hardware issues that you encounter. You might be required to supply the information that is generated by these utilities if you call Symantec Technical Support for help resolving problems. Note: You should only use these tools as directed by Symantec Technical
  • Symantec 20097684 | User Guide - Page 196
    196 Recovering a computer About the Support Utilities
  • Symantec 20097684 | User Guide - Page 197
    15 Chapter Copying a drive This chapter includes the following topics: ■ About copying a drive ■ Preparing to copy drives ■ Copying one hard drive to another hard drive About copying a drive You can use the Copy Drive feature to copy your operating system, applications, and data from one hard drive
  • Symantec 20097684 | User Guide - Page 198
    power cord. ■ Discharge electricity by touching a grounded metal object. ■ Remove the computer cover. 2 Change the jumper settings on the hard drive . 5 Anchor the drive in the bay area according to the manufacturer's instructions. 6 Do the following to change the BIOS settings to recognize the new
  • Symantec 20097684 | User Guide - Page 199
    another hard drive To copy one hard drive to another hard drive 1 On the Tools page, click Copy My Hard Drive. 2 Complete the steps in the wizard to copying the clusters and sectors that contain data. However, in a high-security environments, you might want to copy all clusters and sectors in their
  • Symantec 20097684 | User Guide - Page 200
    200 Copying a drive Copying one hard drive to another hard drive Table 15-1 Drive-to-drive copying options (continued) Option Description Ignore bad sectors during copy This option copies the drive even if there are errors on the disk. Copy MBR This option copies the master boot record from
  • Symantec 20097684 | User Guide - Page 201
    support ■ Recovering files using Google Desktop's Search Desktop feature About using a search engine to search recovery points Norton Ghost supports you enable search engine support, Norton Ghost creates a catalog of the file names. Enabling search engine support To use this feature with a search
  • Symantec 20097684 | User Guide - Page 202
    Google Desktop from the Web and follow instructions for installation. 4 When installed, click OK in the Norton Ghost Options window. For more information, visit desktop.google.com. To enable Google Desktop support 1 Start Norton Ghost. 2 Click Tasks > Options > Google Desktop. 3 Select Enable
  • Symantec 20097684 | User Guide - Page 203
    this procedure. 5 Click OK to install the Google Plugin. To enable search engine support for a backup job 1 Start Norton Ghost. 2 Do one of the following: ■ Edit an existing backup job and select Enable search engine support for Google Desktop and Backup Exec Retrieve on the Options page of the
  • Symantec 20097684 | User Guide - Page 204
    204 Using a search engine to search recovery points Recovering files using Google Desktop's Search Desktop feature ■ Right-click the Google Desktop icon in the system tray and click Indexing > Re-Index. Re-indexing can take a significant amount of time. Be sure to wait until it completes before
  • Symantec 20097684 | User Guide - Page 205
    and a VHD on that physical disk in the same backup job. This limitation also applies to Norton Ghost. You cannot back up a physical disk and its VHD counterpart in the same backup job using Norton Ghost. Also not supported is the ability to back up a VHD that is hosted on or "nested" within another
  • Symantec 20097684 | User Guide - Page 206
    to each of the clustered Hyper-V host computers, a given volume cannot be locked for backup . However, clustered disks can be backed up by Norton Ghost because one host has exclusive access to the disk. To create a backup of a running virtual machine, the following conditions must be met: If
  • Symantec 20097684 | User Guide - Page 207
    , running Norton Ghost as 113 Advanced page about 15 showing or hiding 15 Advanced scheduling options 66 agent dependencies, viewing 108, 110 Microsoft Services 106 set security for 111 setting up recovery actions for 109 starting, stopping, or restarting 108 troubleshooting in Services 106 Agent
  • Symantec 20097684 | User Guide - Page 208
    95, 118 viewing progress 74 benefits of using Norton Ghost 13 best practices, services 107 boot configuration database 62 C cancelling the current Norton Ghost Agent 107 dependencies, viewing agent 108, 110 devices supported storage 19 disable a backup 97 disabled features 20 disk media supported
  • Symantec 20097684 | User Guide - Page 209
    about 127 use to troubleshoot 127 event-triggered backups 155 files locating versions of 156 manually deleting from file and folder backup support for 206 I independent recovery point 63 installation after 23 disabled features 20 prepare for 17 steps 21 supported file systems 19 supported removable
  • Symantec 20097684 | User Guide - Page 210
    disks, support for 205 N network adjust throttling during backup 39 network credentials, about 68 network drive, how to map 191 network services configuring connection settings 192 getting a static IP address 192 starting in Symantec Recovery Disk 189 using in Symantec Recovery Disk 188 Norton Ghost
  • Symantec 20097684 | User Guide - Page 211
    Explorer 131 Offsite Copy 81 recovery points (continued) on removable media 58 opening files within 131 protecting password protecting 71 68 search engine enabling support 202 use for searching recovery points 201 search engines using 132 Secondary drive recovering 164 security agent 98, 111 allow
  • Symantec 20097684 | User Guide - Page 212
    stopping agent 108 stopping computer agent services 105 stopping tasks 94 Support Utilities 195 Symantec Backup Exec troubleshooting agent 106 U unmounting recovery point drives 133 updating automatically with LiveUpdate 25 upgrading trial version of Norton Ghost 20 users rights to run Norton Ghost
  • Symantec 20097684 | User Guide - Page 213
    W Windows 7 support for 14, 17 Windows Explorer mount recovery points from 131 viewing file and folder version information in 156 Index 213
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213

Norton Ghost 15.0 User's
Guide