Руководство norton ghost

Программа Symantec Ghost — безотказная программа для клонирования дисков, разделов, создания их образов и восстановления дисков и разделов из файлов образов. Инструкция создана на примере версии Symantec Ghost 11.5. 

Загрузитесь с загрузочного диска или флешки, содержащих программу Symantec Ghost. После запуска программы нажмите ОК:

ghost-011

Создание образа раздела (диска)

1 Нажимаем Local.
2 Выбираем Partition, т.е. Партицию (раздел).
3 Выбираем пункт To Image. Это означает, что мы хотим сохранить партицию в образ:

ghost-012
4 Выберите физический диск.
5 Нажмите ОК:

ghost-013
6 Выберите партицию (раздел).
7 Нажмите ОК:

ghost-014
8 В верхнем выпадающем меню выберите другой диск, куда вы хотите поместить образ первого диска.
9 В поле File name задайте имя файла.
10 Нажмите Save для сохранения файла, в который будет записываться образ:

ghost-015
11 Выберите степень сжатия. Рекомендуем выбирать Fast:

ghost-016
12 Теперь программа спрашивает «Продолжить создание образа?» Отвечаем Yes

ghost-017

Запускается процесс создания. Нужно дождаться, когда прогресс дойдёт до 100%:

ghost-019

По завершению вы увидите такое сообщение. Нажмите Continue:

ghost-020

Теперь можно нажать на Quit и перезагрузить компьютер кнопкой RESET.

Внимание! Имейте в виду, для создания полноценной резервной копии Windows 7 или Windows 8.1 создавайте образ не только раздела с самой операционной системой (на примере которого написана инструкция), но загрузочного раздела, если такой имеется на диске. Резервная копия последнего вам также может пригодиться.

Загрузочный раздел Windows7 занимает 100MB. Загрузочный раздел Windows8.1 занимает 350MB.

Восстановления раздела (диска) из образа

1 В главном меню программы нажмите Local.
2 Выберите пункт Partition.
3 Выберите From Image, что означает «из образа»:

ghost-031
4 Вверху в поле Look In выберите локальный диск, содержащий ранее созданный в программе Ghost образ раздела.
5 Найдите нужный файл образа. Он должен иметь расширение *.GHO. Нажмите на нужный файл мышью для его выбора (кнопку Open нажимать скорее всего не придётся):

ghost-032
6 Выберите исходную партицию в образе. Нужно нажать на неё мышью, даже если она в списке одна.
7 Нажмите ОК:

ghost-033
8 Выберите физический диск, на который будем восстанавливать партицию.
9 Нажмите ОК:

ghost-034
10 На выбранном физическом диске выберите партицию, на которую будем развёртывать образ (Другими словами — нужно выбрать партицию,, которую вы хотите «восстановить» или «перезаписать»).
11 Нажмите ОК:

ghost-035
12 Программа спросит «Продолжить с восстановлением партиции? Целевая партиция будет безвозвратно перезаписана.»

Отвечаем Yes (Да):

ghost-036

После этого программа Ghost приступит к восстановлению партиции в указанный раздел из образа:

ghost-037

13 Нажмите кнопку Reset Computer для перезагрузки компьютера и проверки результата:

ghost-038

  • Contents

  • Table of Contents

  • Troubleshooting

  • Bookmarks

Quick Links

Norton Ghost

Personal Edition

User’s Guide

loading

Related Manuals for Symantec NORTON GHOST PERSONAL EDITION

Summary of Contents for Symantec NORTON GHOST PERSONAL EDITION

  • Page 1
    ™ Norton Ghost Personal Edition User’s Guide…
  • Page 2
    Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors.
  • Page 3
    The software which accompanies this license (the «Software») is the property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, you will have certain rights to use the Software after your acceptance of this license. Except as may be modified by a license…
  • Page 4
    (60) days from the date of delivery of the Software to you. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money you paid for the Software.
  • Page 5: Table Of Contents

    Setting up Norton Ghost Minimum system requirements …………13 Hardware requirements for Norton Ghost transfer modes ..14 Installing Norton Ghost Personal Edition ……..14 Installing Norton Ghost in Windows ……..14 Installing Norton Ghost in DOS ……….15 Uninstalling Norton Ghost …………. 16 Uninstalling Norton Ghost in Windows ……..

  • Page 6
    Appendix D Diagnostics Hard drive detection and diagnostic information ……69 Norton Ghost abort error file (ghost.err) ……… 69 Hard disk geometry diagnostics ……….70 Full diagnostic statistics dump summary ……..70 Symantec Service and Support Solutions Disk Replacement Form Index…
  • Page 7: Chapter 1 About Norton Ghost Personal Edition

    PC to a new PC. Caution: Norton Ghost Personal Edition is a powerful utility program that performs complex operations on your computer. It is recommended for experienced and highly skilled PC users only.

  • Page 8: How Norton Ghost Works

    Chapter 1: About Norton Ghost Personal Edition partitions, Norton Ghost positions each partition or logical drive on the target disk using the same rules as FDISK, copying the partitions on a file- by-file basis. An image file can be stored on a CD, Superdisk, JAZ or ZIP drive, or other removable media.

  • Page 9: Save And Load Image Files To And From Removable Media

    How Norton Ghost works Norton Ghost usage, both the source and destination must be free from file corruption and physical hard disk drive problems prior to cloning. Note: When cloning an entire hard disk drive, the existing partition configuration is overwritten and need not be set in advance. Internal transfer operations are one of the fastest methods of cloning, and offer a simple quick hard disk drive backup or migration tool.

  • Page 10: Clone Hard Disk Drives And Partitions Peer-To-Peer

    Chapter 1: About Norton Ghost Personal Edition For restoration purposes, once the device is working and has a drive letter, Norton Ghost can use that drive to perform the required task. Clone hard disk drives and partitions peer-to-peer Peer-to-peer connections are typically used when there are two computers that you wish to connect.

  • Page 11
    How Norton Ghost works These components can be loaded from a boot disk to allow Norton Ghost to use NetBIOS to communicate and clone between master and slave. Master Crossover Ethernet Cable Slave Using the parallel (LPT) port With two computers and a parallel data transfer cable (not provided with Norton Ghost) you can clone two computers, master to slave.
  • Page 12
    Chapter 1: About Norton Ghost Personal Edition…
  • Page 13: Chapter 2 Setting Up Norton Ghost

    Setting up Norton Ghost Minimum system requirements The system requirements to run Norton Ghost are: 386SX processor (486 or above recommended) 4 MB RAM (8 MB RAM for NTFS), 16 MB recommended DOS 5.0 or above VGA monitor…

  • Page 14: Hardware Requirements For Norton Ghost Transfer Modes

    Windows or DOS. Installing Norton Ghost in Windows To install Norton Ghost in Windows: Insert the Norton Ghost Personal Edition CD in your CD-ROM drive. After a moment, the Norton Ghost setup program starts automatically.

  • Page 15: Installing Norton Ghost In Dos

    Replacement form in this guide for information about getting floppy disks. Follow the instructions that appear on the screen. The setup program places a Norton Ghost Personal Edition program group in your Start menu and installs the files necessary to run Norton Ghost Personal Edition.

  • Page 16: Uninstalling Norton Ghost

    Chapter 2: Setting up Norton Ghost Uninstalling Norton Ghost Uninstalling Norton Ghost in Windows To uninstall Norton Ghost in Windows: Click the Start button, then select Settings > Control Panel. Double-click Add/Remove programs. In the list of installed programs, select Norton Ghost Personal Edition.

  • Page 17: Setting Up Transfer Methods

    Setting up transfer methods Use the following DOS command to copy the system files to the formatted disk: C:> sys c: a: Use the following DOS command to format and copy the system files to the unformatted disk: C:> format a: /s Copy GHOSTPE.EXE onto the boot disk.

  • Page 18: Peer-To-Peer Connections

    All operator input will be on the master computer. Use the previous table to choose which machine will be the master and which will be slave. Peer-to-peer NetBIOS network connections NetBIOS is only available for peer-to-peer connections. Sample third-party files are available on the Symantec FTP site at: ftp://ftp.symantec.com/public/english_us_canada/products/ ghost/…

  • Page 19
    Setting up transfer methods Sourcing NetBIOS The following steps explain the NetBIOS setup procedure. Install network interface cards. Once the network interface cards are installed, the two peer machines need to be connected using cabling. The type and setup of the connection will depend on your individual network requirements.
  • Page 20
    Chapter 2: Setting up Norton Ghost…
  • Page 21: Chapter 3 Using Norton Ghost

    Using Norton Ghost This chapter describes how to perform operations. The procedures assume that all hardware is configured properly and communication methods are established. See “Setting up transfer methods” on page 17 for more information. Information on the following tasks is provided: Starting Norton Ghost Navigating in Norton Ghost without a mouse Cloning disks…

  • Page 22
    Chapter 3: Using Norton Ghost No other devices. Other peripheral devices not needing additional setup (for example, Jaz or Zip drive). SCSI tape drive requiring DOS ASPI driver setup. Third-party device requiring DOS driver setup. Peer-to-peer connection using LPT printer port. Peer-to-peer connection using NetBIOS and network interface cards connection.
  • Page 23: Starting Norton Ghost

    Starting Norton Ghost Select source hard disk drive, partitions, or image file. Select destination hard disk drive, partition, or image file. Warning: Choose carefully. Make sure you select the correct destination to overwrite. In most cases, you will not be able to recover from an incorrectly selected destination drive.

  • Page 24: Navigating Without A Mouse

    Chapter 3: Using Norton Ghost Ghost to access and use some hardware. See “Setting up transfer methods” on page 17 for more information. Navigating without a mouse Depending upon how Norton Ghost is started, mouse support may not be available. To use Norton Ghost without a mouse: Use arrow keys to navigate the menu.

  • Page 25: Cloning From Disk To Disk

    Cloning disks LPT > Master NetBIOS > Master Cloning from disk to disk To clone disk to disk: From the main menu, select Disk > To Disk. The Source Drive dialog box displays. Select the source drive. The Source Drive dialog box displays the details of every disk Norton Ghost can find on the local machine.

  • Page 26
    Chapter 3: Using Norton Ghost Confirm or change the destination drive partition layout. The Destination Drive Details dialog box displays a suggested partition layout for the destination drive. By default Norton Ghost allocates any extra space that the new disk has to the first FAT or NTFS partition that it discovers.
  • Page 27: Cloning A Disk To Image File

    Cloning disks Select Yes to proceed with the disk cloning. The system performs a quick integrity check of the file structure on the source disk and then copies the source disk to the destination. If you need to abort the process use Ctrl-C, but be aware that this leaves the destination disk in an unknown state.

  • Page 28
    Chapter 3: Using Norton Ghost Specify the drive or device, and specify the full pathname. The image file may reside on a local drive (but not the one that is being copied from). When using peer-to-peer connections, the image file will be created on the slave machine. On pressing Enter, the compress image question displays.
  • Page 29: Cloning A Disk From An Image File

    Cloning disks Norton Ghost displays the final “Proceed with disk dump?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the image file creation. The system performs a quick integrity check of the file structure on the source disk and then copies the source disk to the destination image file.

  • Page 30
    Chapter 3: Using Norton Ghost Specify the drive or device and select the full pathname. Note that the image file may reside on a local drive (but not the one that is being copied to). When using peer-to-peer connections, the file will be located on the slave machine.
  • Page 31
    Cloning disks held in the source partition. On selecting OK, Norton Ghost displays the final “Proceed with disk load?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the disk cloning.
  • Page 32: Cloning Partitions

    Chapter 3: Using Norton Ghost Cloning partitions Partition cloning procedures are accessed from the main menu. To specify a transfer method, select one of the following: Local LPT > Master NetBIOS > Master The source and destination partitions must be correctly configured before cloning partitions.

  • Page 33
    Cloning partitions Select the source partition. The Source Partition dialog box displays the details of all the partitions on the selected source drive. On selection of the source partition, the Destination Drive dialog box displays. Select the destination drive. The Destination Drive dialog box displays the details of every disk Norton Ghost can find on the destination machine.
  • Page 34: Cloning From Partition To Image File

    Chapter 3: Using Norton Ghost Warning: Choose carefully as this is the partition that is going to be overwritten. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the partition copy. If you need to abort the process use Ctrl-C, but be aware that this leaves the destination drive in an unknown state.

  • Page 35
    Cloning partitions The Source Drive dialog box displays the details of every disk Norton Ghost can find on the local machine. On selection of the source drive, the Source Partition dialog box displays. Select the source partitions to be included in the destination image file.
  • Page 36: Cloning A Partition From An Image File

    Chapter 3: Using Norton Ghost Norton Ghost displays the final “Proceed with partition dump?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the image file creation.

  • Page 37
    Cloning partitions Select the source partition from the image file. The Source Partition dialog box displays the details of all the partitions in the image file. On selection of the source partition, the Destination Drive dialog box displays. Select the destination drive. The Destination Drive dialog box displays the details of every disk Norton Ghost can find on the local machine.
  • Page 38
    Chapter 3: Using Norton Ghost Warning: Choose carefully as this is the partition that is going to be overwritten. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the partition cloning. Norton Ghost overwrites the destination partition using the partition details contained in the image file.
  • Page 39: Managing Image Files

    Managing image files Managing image files Norton Ghost can create an image file that contains all the information required to recreate a complete disk or partition. Image files are a useful way to store and reliably compress images of model system configurations, or to create backup copies of complete drives or partitions.

  • Page 40: Image Files And Crc32

    Chapter 3: Using Norton Ghost Image files and CRC32 Cyclic Redundancy Checking (CRC) is a data error checking technique. CRC ensures that the original data that was written to the image file is the same as the data that is being used from the image file. The 32 value in CRC32 indicates the CRC technique uses a 32-bit value to store error checking information.

  • Page 41
    Managing image files Spanned image files Spanned image files are similar to size-limited multi-segment image files. The difference is that each segment file (or span) of the image file is limited by the actual volume size of the media the image is being saved to. This allows you to specify a drive and filename and let Norton Ghost sort out when to request another volume or location for the remaining data.
  • Page 42
    Chapter 3: Using Norton Ghost If you select compression and there is still a possibility of insufficient space, the following message displays: If spanning is not enabled, an error message displays: Before starting to save the disk contents to the image file, Norton Ghost displays the source and destination details and gives you a chance to back out.
  • Page 43: Image Files And Tape Drives

    Managing image files The screen below shows how Norton Ghost will prompt you for span set disk one and for subsequent volumes. How to load from a spanned image When loading a disk or partition from an image file, the process is the same as loading from an unspanned image file.

  • Page 44: Viewing Image File Content And Selective File Restoration

    Chapter 3: Using Norton Ghost When using tape drives with Norton Ghost, the tape drive can be selected as the source or destination device in the File Locator window. Each SCSI tape device is shown as MTx, where x is a number starting at 0 and increases incrementally for each drive present.

  • Page 45
    Managing image files boxes to prompt for the disk and partition to save. A sample screen is shown below: Norton Ghost creates an index in the image file as it works that allows Ghost Explorer to create a display of files very quickly. For more information on Ghost Explorer, see the Ghost Explorer online help.
  • Page 46
    Chapter 3: Using Norton Ghost…
  • Page 47: Appendix A Norton Ghost Command-Line Switches

    Norton Ghost command-line switches Norton Ghost can be run: Interactively with no command-line switches Interactively with selected switches The Norton Ghost command-line switches are used to alter Norton Ghost’s behavior and automate procedures. To list Norton Ghost’s command-line switches, type: ghostpe.exe -h.

  • Page 48
    Appendix A: Norton Ghost command-line switches -clone,mode=pdump,src=1:2,dst=g:part2.gho -fcr -afile=filename Overrides the default abort error log file (ghost.err) to the directory and file given in filename. -autoname Automatically names spanned image files during creation. Avoids the user prompt asking for confirmation of the next destination location for the remainder of the image file.
  • Page 49
    Command-line switches MODE={copy | load | dump | pcopy | pload | pdump} MODE defines the type of clone command: copy — disk-to-disk copy load — file-to-disk load dump — disk-to-file dump pcopy — partition-to-partition copy pload — file-to-partition load pdump — partition-to-file dump SRC={drive | file | drive:partition | @MTx}…
  • Page 50
    Appendix A: Norton Ghost command-line switches dump Disk image filename, for example g:imagessystem2.img. If using a tape drive set to @MTx(x=0…). pcopy/pload Destination partition, For example, 2:2 indicates the LOAD second partition on drive two. pdump Partition image filename e.g, g:imagespart1.img:2. SZE{E | F | L | n={nnnnM | nnP| F | V}} SZE is used to set the size of the destination partitions for either a disk load or disk copy operation.
  • Page 51
    Command-line switches Rule 2: If the destination disk is smaller than the original source disk (but still large enough to accommodate the data from the source disk), the free space left over after the data space has been satisfied will be distributed between the destination partitions in proportion to the data usage in the source partitions.
  • Page 52
    Appendix A: Norton Ghost command-line switches dst=1,szeL -CRC32 The -CRC32 switch allows making a list of the files on a disk or partition, or in an image file with CRC values for each, and to verify that list against the original or a clone.
  • Page 53
    Command-line switches dcreate Create an ASCII CRC32 file from an image file. dverify Verify an image file from an ASCII CRC32 file. Examples of -CRC32 usage To create a CRC32 file (called ghost.crc) while making an image file: ghostpe.exe -fcr To create a list of files and CRC32 values for a disk: ghostpe.exe -CRC32,action=create,src=1,crcfile=ghost.crc To verify the list against an image file:…
  • Page 54
    Appendix A: Norton Ghost command-line switches Same as previous but specify the disk, CRC file, and list file. This example uses disk 1 as the source drive, myfile.txt as the ASCII CRC32 file, and myfile.out as the verification list file. To verify the contents of the primary drive against a CRC32 file: ghostpe.exe -CRC32,action=verify,src=1, crcfile=myfile.txt,vlist=myfile.out,vexcept=myfile.exc…
  • Page 55
    Command-line switches Files specified before the first [Partition:x] heading will be used to match files in any partition. A directory of * matches any subdirectory, regardless of nesting. The above exclusion file will match any file with an extension of .1 in any subdirectory on the second partition.
  • Page 56
    Appendix A: Norton Ghost command-line switches Norton Ghost. This switch may also assist when tape drives are incorrectly reported as drives. Valid values for number are 128 to 255. -f32 Allows Norton Ghost to convert all FAT16 volumes to FAT32 volumes when the destination partition is larger than 2047 MB in size.
  • Page 57
    Command-line switches Displays the fingerprint details written on a hard disk drive created by Norton Ghost. The fingerprint displays the process used to create the drive or partition and the time, date, and disk the operation was performed on. -fnf Disables the creation of a fingerprint when cloning hard disk drives or partitions.
  • Page 58
    Appendix A: Norton Ghost command-line switches image file or to another disk, Norton Ghost examines the source partition and decides whether to copy just the files and directory structure, or to do a sector-by-sector copy. If it understands the internal format of the partition, it defaults to copying the files and directory structure.
  • Page 59
    Command-line switches main menu. See “Peer-to-peer connections” on page 18, for more information. -lps LPT slave mode. This switch causes Norton Ghost to automatically go into LPT slave mode, and is the equivalent of selecting LPT Slave in the main menu.
  • Page 60
    Appendix A: Norton Ghost command-line switches Ignores the NTFS volume CHKDSK bit. Norton Ghost checks the CHKDSK bit on a NTFS volume before performing operations. When Norton Ghost indicates the CHDSK bit is set, we recommend running CHKDSK on the volume to ensure the drive is in a sound state before cloning.
  • Page 61
    Command-line switches Override. Allows the override of internal space and integrity checks. Use of this switch should be avoided. -pwd and -pwd=x Specifies password protection to be used when creating an image file. x indicates the password for the image file. If no password is given in the switch Norton Ghost will prompt for one.
  • Page 62
    Appendix A: Norton Ghost command-line switches Skips files as outlined in the skipfile.txt file. For example, the skipfile.txt contains: **.tmt [partition:1] windows **.exe [Partition:2] **me.txt This would skip all *.tmt files on any partition, the windows directory and any *.exe files on the first partition, and any file that ended with the me.txt on the second partition.
  • Page 63
    Command-line switches Sets the ASPI driver to report a read/write as successful only when the data has been transferred to the physical medium. Useful when using older or unreliable tape devices or sequential media. -tapespeed=x Allows control of tape speed. Where x equals 0 to F. 0 is default, 1-F increases tape speed.
  • Page 64
    Appendix A: Norton Ghost command-line switches -z or -z1 low compression (fast) -z2 high compression (medium) -z3 thru -z9 higher compression (slower)
  • Page 65: Appendix B Frequently Asked Questions

    Frequently asked questions When I compare the contents of the original source disk to the disk Norton Ghost created there is a difference in the number of files. Why? In addition to files skipped using the -skip switch, some temporary files are not included when cloning a FAT volume.

  • Page 66
    Appendix B: Frequently asked questions Can Norton Ghost compress an image file? Yes. Norton Ghost includes several levels of compression that offer a range of performance and storage gains. After cloning and restarting Windows 95, Windows 95 keeps finding a new NIC card.
  • Page 67: Appendix C Troubleshooting

    “Diagnostics” on page 69 for information on the ghost.err file generated when an abort error occurs. Further information is available on Symantec’s Norton Ghost technical support website. See “Symantec Service and Support Solutions.” 8005, 8012 Norton Ghost is being run in a non-DOS environment. Either boot the system to DOS or create a DOS boot disk with required device drivers to start the system and run Norton Ghost.

  • Page 68
    Norton Ghost to continue. You can locate the offender by looking at the drive:pathfilename at the bottom of the Norton Ghost window when this error occurs. Visit the Symantec website at www.symantec.com for details on how to purchase Norton Ghost. 15150 Probable corrupt image file.
  • Page 69: Appendix D Diagnostics

    Diagnostics This appendix contains information that may be helpful for diagnostic purposes. Hard drive detection and diagnostic information Norton Ghost has the ability to generate several different diagnostic reports outlining the hard drive devices detected, other system-related information, and error conditions when they are detected. Norton Ghost abort error file (ghost.err) An error message consists of an error number, a description, and possibly a suggestion of what can be done to remedy the problem.

  • Page 70: Hard Disk Geometry Diagnostics

    Appendix D: Diagnostics Hard disk geometry diagnostics A list of all detected hard drives on the system and their associated geometry values can be reported to screen using the command line switch -di. To generate a file containing the details, the DOS redirect output can be used as shown in the following example: c: >…

  • Page 71: Symantec Service And Support Solutions

    Symantec Service and Support Solutions Symantec is committed to excellent service worldwide. Our goal is to provide you with professional assistance in the use of our software and services, wherever you are located. Technical Support and Customer Service solutions vary by country. If you have questions about the services described below, please refer to the section “Worldwide Service and Support”…

  • Page 72
    Symantec online support technicians. File downloads Point your web browser to http://service.symantec.com to search for and download technical notes and software updates. You can also click the LiveUpdate button in programs enabled with this feature to automatically download and install software updates and virus definitions.
  • Page 73
    Technical information may still be available through online support. When Symantec announces that a product will no longer be marketed or sold, telephone support will be discontinued 60 days later. Support will only be available for discontinued products through online services.
  • Page 74
    +61 (2) 9817 4550 Most International Partners provide Customer Service and Technical Support for Symantec products in your local language. For more information on other Symantec and International Partner locations, please call our Technical Support automated fax retrieval service, in the United States at +1 (541) 984-2490, choose Option 2, and request document 1400.
  • Page 75: Disk Replacement Form

    Street Address (No P.O. Boxes, Please) _______________________________________________________________________________________ City ________________________________________________________________________State _______ Zip/Postal Code _________________ Country* __________________________________________________________Daytime Phone _______________________________________ Software Purchase Date___________________________________________________________________________________________________ *This offer limited to U.S., Canada, and Mexico. Outside North America, contact your local Symantec office or distributer. Briefly describe the problem:_______________________________________________________________________________________________ _____________________________________________________________________________________________________________________ Disk Replacement Price $ 10.00…

  • Page 76
    Disk Replacement Form…
  • Page 77
    conversion from FAT16, 56 NTFS abort log, 48, 69 switches, 59–60 ASPI driver, 17, 22 files automation skipping, 61 clone switch and examples, 48 fingerprint. See Ghost close on completion, 57 format NetBIOS, 59 logical, 7 reboot on completion, 61 switches, 47–63 version checking, 63 Ghost…
  • Page 78: Index

    Index See also image files multi-segment See also slave See also image files spanned partition features, 39 cloning, 7 loading, 43 peer to peer connection multi-segment, 40–43, 48, 62 LPT. See parallel port transfer password, 61 procedures, 21–23 SCSI tape, 43 disk, 24–31 size limited.

  • Page 79
    Index tape drive See image files See SCSI tape uninstalling, 16 Windows — running Ghost inside, 23 Zip drive. See image files spanned…
  • Page 80
    Index…

Norton Ghost User’s Guide

Thesoftwaredescribedinthisbookisfurnishedunderalicenseagreementandmaybeused only in accordance with the terms of the agreement.

Documentation version 8.0

Legal Notice

Copyright © 2008 Symantec Corporation.

All rights reserved.

Federalacquisitions:CommercialSoftware — GovernmentUsersSubjecttoStandardLicense

Terms and Conditions.

Symantec,theSymantecLogo,LiveUpdate,SymantecpcAnywhere,SymantecBackupExec, Norton, Symantec NetBackup, and Symantec Backup Exec Restore Anyware are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, .NET, and the Windows logo are registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. VeriSign® is a registered trademark of Verisign, Inc.

Gear Software is a registered trademark of GlobalSpec, Inc.

Google and Google Desktop are trademarks of Google, Inc.

Maxtor OneTouch is a trademark of Maxtor Corporation.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.

THEDOCUMENTATIONISPROVIDED»ASIS»ANDALLEXPRESSORIMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLYINVALID.SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTAL ORCONSEQUENTIALDAMAGESINCONNECTIONWITHTHEFURNISHINGPERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

TheLicensedSoftwareandDocumentationaredeemedtobe»commercialcomputersoftware»

and»commercialcomputersoftwaredocumentation»asdefinedinFARSections12.212and DFARS Section 227.7202.

Symantec Corporation

20330 Stevens Creek Blvd.

Cupertino, CA 95014 USA

http://www.symantec.com

Technical Support

Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product feature and function,installation,andconfiguration.TheTechnicalSupportgroupalsoauthors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.

Symantec’s maintenance offerings include the following:

A range of support options that give you the flexibility to select the right amount of service for any size organization

A telephone and web-based support that provides rapid response and up-to-the-minute information

Upgrade insurance that delivers automatic software upgrade protection

Global support that is available 24 hours a day, 7 days a week worldwide. Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program

Advanced features, including Technical Account Management

For information about Symantec’s Maintenance Programs, you can visit our Web site at the following URL:

www.symantec.com/techsupp/

Select your country or language under Global Support. The specific features that are available may vary based on the level of maintenance that was purchased and the specific product that you are using.

Contacting Technical Support

Customers with a current maintenance agreement may access Technical Support information at the following URL:

www.symantec.com/techsupp/

Select your region or language under Global Support.

Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be atthecomputeronwhichtheproblemoccurred,incaseitisnecessarytorecreate the problem.

When you contact Technical Support, please have the following information available:

Product release level

Hardware information

Available memory, disk space, and NIC information

Operating system

Version and patch level

Network topology

Router, gateway, and IP address information

Problem description:

Error messages and log files

Troubleshooting that was performed before contacting Symantec

Recent software configuration changes and network changes

Licensing and registration

IfyourSymantecproductrequiresregistrationoralicensekey,accessourtechnical support Web page at the following URL:

www.symantec.com/techsupp/

SelectyourregionorlanguageunderGlobalSupport,andthenselecttheLicensing and Registration page.

Customer service

Customer service information is available at the following URL:

www.symantec.com/techsupp/

Select your country or language under Global Support.

Customer Service is available to assist with the following types of issues:

Questions regarding product licensing or serialization

Product registration updates such as address or name changes

General product information (features, language availability, local dealers)

Latest information about product updates and upgrades

Information about upgrade insurance and maintenance contracts

Information about the Symantec Value License Program

Advice about Symantec’s technical support options

Nontechnical presales questions

Issues that are related to CD-ROMs or manuals

Maintenance agreement resources

If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:

Asia-Pacific and Japan: contractsadmin@symantec.com

Europe, Middle-East, and Africa: semea@symantec.com

North America and Latin America: supportsolutions@symantec.com

Additional Enterprise services

Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.

Enterprise services that are available include the following:

SymantecEarlyWarningSolutions

These solutions provide early warning of cyber attacks, comprehensive threat

analysis, and countermeasures to prevent attacks before they occur.

Managed Security Services

Theseservicesremovetheburdenofmanagingandmonitoringsecuritydevices

and events, ensuring rapid response to real threats.

Consulting Services

Symantec Consulting Services provide on-site technical expertise from

Symantecanditstrustedpartners.SymantecConsultingServicesofferavariety

of prepackaged and customizable options that include assessment, design,

implementation, monitoring and management capabilities, each focused on

establishingandmaintainingtheintegrityandavailabilityofyourITresources.

Educational Services

Educational Services provide a full array of technical training, security

education, security certification, and awareness communication programs.

To access more information about Enterprise services, please visit our Web site at the following URL:

www.symantec.com

Select your country or language from the site index.

Contents

Technical Support …………………………………………………………………………………..

3

Chapter 1

Introducing Norton Ghost™ ………………………………………..

13

Getting started ………………………………………………………………….

13

What’s new in Norton Ghost 14.0 …………………………………………….

14

New features and enhancements added in the previous

release …………………………………………………………………

15

About the Advanced page ……………………………………………………..

17

Where to find more information ………………………………………………

18

Chapter 2

Installing Norton Ghost ………………………………………………

19

Preparing for installation ………………………………………………………

19

System requirements ……………………………………………………..

19

Supported file systems and removable media …………………………

20

Unavailable features ………………………………………………………

21

Installing Norton Ghost ………………………………………………………..

22

Completing the installation ………………………………………………

24

Activating Norton Ghost later ……………………………………………

25

Setting up your first backup ……………………………………………..

25

Updating Norton Ghost ………………………………………………………..

25

Uninstalling the product ……………………………………………………….

26

Chapter 3

Ensuring the recovery of your computer ……………………

27

About ensuring the recovery of your computer …………………………….

27

Testing Symantec Recovery Disk ……………………………………………..

28

If driver validation fails ………………………………………………………..

28

Creating a custom Symantec Recovery Disk CD …………………………….

29

Chapter 4

Getting Started …………………………………………………………..

31

Key product components ………………………………………………………

31

How you use Norton Ghost …………………………………………………….

32

Starting Norton Ghost ………………………………………………………….

33

Configuring Norton Ghost default options ………………………………….

34

Selecting a default backup destination …………………………………

36

8Contents

Adjusting the effects of a backup on computer performance ………..

37

Adjusting default tray icon settings …………………………………….

38

Managing file types ………………………………………………………

39

Using aliases for external drives …………………………………………

41

Configuring FTP settings for use with Offsite Copy …………………..

42

Logging Norton Ghost messages ………………………………………..

42

Enabling email notifications for product (event) messages ………….

44

Chapter 5

Best practices for backing up your data ……………………

47

About backing up your data ……………………………………………………

47

Choosing a backup type ………………………………………………………..

48

Best practices for backing up …………………………………………………

48

About backups ……………………………………………………………..

49

Before you back up ………………………………………………………..

49

During a backup ……………………………………………………………

51

When the backup is complete ……………………………………………

51

Additional tips about backups …………………………………………………

52

After defining your backup job ………………………………………………..

53

Viewing the properties of a backup job …………………………………

53

About selecting a backup destination ……………………………………….

54

About backing up dual-boot computers ……………………………………..

56

Chapter 6

Backing up entire drives …………………………………………….

57

Defining a drive-based backup ……………………………………………….

57

Running a One Time Backup ……………………………………………..

63

Files excluded from drive-based backups ………………………………

65

About network credentials ……………………………………………….

66

Run command files during a backup ……………………………………

66

Setting advanced options for drive-based backups …………………………

68

Editing advanced backup options ……………………………………….

69

About recovery point encryption ……………………………………….

70

Verifying a recovery point after creation ………………………………

71

Viewing the progress of a backup ……………………………………….

72

About setting a compression level for drive-based backups ……………….

72

About Offsite Copy ……………………………………………………………..

73

How Offsite Copy works ………………………………………………………..

73

Using external drives as your Offsite Copy destination ………………

74

Using a network server as your Offsite Copy destination …………….

75

Using an FTP server as your Offsite Copy destination ………………..

76

Contents 9

Chapter 7

Backing up files and folders ……………………………………….

79

Defining a file and folder backup …………………………………………….

79

Folders excluded by default from file and folder backups …………………

82

Chapter 8

Running and managing backup jobs ………………………….

83

Running an existing backup job immediately ………………………………

83

Run a backup with options ……………………………………………….

84

Adjusting the speed of a backup ……………………………………………..

85

Stopping a backup or recovery task …………………………………………..

86

Verifying that a backup is successful ………………………………………..

86

Editing backup settings ………………………………………………………..

87

Enabling event-triggered backups ……………………………………………

87

Enabling Symantec ThreatCon Response ………………………………

88

Editing a backup schedule …………………………………………………….

89

Turning off a backup job ………………………………………………………

90

Deleting backup jobs …………………………………………………………..

90

Adding users who can back up your computer ……………………………..

90

Chapter 9

Backing up remote computers from your

computer ……………………………………………………………….

93

About backing up other computers from your computer ………………….

93

Adding computers to the Computer List ……………………………………..

94

Deploying the agent …………………………………………………………….

95

Using the Norton Ghost Agent ……………………………………………….

97

Managing the agent through Windows Services ……………………………

98

Best practices for using services ……………………………………………..

99

Opening Services ………………………………………………………..

100

Starting or stopping the agent service ………………………………..

100

Setting up recovery actions when the agent does not start …………

101

Viewing Norton Ghost Agent dependencies ………………………….

102

Controlling access to Norton Ghost ………………………………………..

103

Running Norton Ghost using different user rights ………………….

105

Chapter 10

Monitoring the status of your backups …………………….

107

About monitoring backups …………………………………………………..

107

Rescanning a computer’s hard disk ……………………………………

108

Monitoring backup protection from the Home page ……………………..

108

Monitoring backup protection from the Status page …………………….

109

Configuring Norton Ghost to send SNMP traps ……………………………

112

About the Norton Ghost management information base …………..

113

10 Contents

Customize status reporting …………………………………………………..

113

Viewing drive details ………………………………………………………….

114

Improving the protection level of a drive …………………………………..

115

Using event log information to troubleshoot problems ………………….

116

Chapter 11

Exploring the contents of a recovery point ………………

119

About exploring recovery points ……………………………………………

119

Exploring a recovery point through Windows Explorer ………………….

120

Mounting a recovery point from Windows Explorer …………………

121

Opening files within a recovery point ………………………………………

121

Using a search engine …………………………………………………………

122

Unmounting a recovery point drive ………………………………………..

123

Viewing the drive properties of a recovery point ………………………….

123

Chapter 12

Managing backup destinations ………………………………..

125

About backup destinations …………………………………………………..

125

How backup data works ………………………………………………………

125

About drive-based backups ……………………………………………..

126

About file and folder backups …………………………………………..

126

Managing recovery points ……………………………………………………

127

Cleaning up old recovery points ………………………………………..

127

Deleting a recovery point set ……………………………………………

128

Deleting recovery points within a set ………………………………….

128

Making copies of recovery points ……………………………………..

129

Converting a recovery point to a virtual disk format ……………………..

130

Managing file and folder backup data ………………………………………

133

Viewing how much file and folder backup data is being

stored …………………………………………………………………

133

Limiting the number of file versions to keep …………………………

134

Manually deleting files from your file and folder backup …………..

134

Finding versions of a file or folder ……………………………………..

134

Automating management of backup data ………………………………….

135

Moving your backup destination …………………………………………….

136

Chapter 13

Recovering files, folders, or entire drives …………………

139

About recovering lost data …………………………………………………..

139

Recovering files and folders by using file and folder backup data ………

139

Recovering files and folders by using a recovery point …………………..

141

Opening files and folders stored in a recovery point ………………..

143

If you cannot find the files or folders you want ………………………

143

Recovering a secondary drive ………………………………………………..

144

Contents 11

About LightsOut Restore ……………………………………………………..

147

Setting up and using LightsOut Restore ………………………………

147

Configuring LightsOut Restore …………………………………………

148

Chapter 14

Recovering a computer ……………………………………………..

151

About recovering a computer ……………………………………………….

151

Starting a computer by using the recovery environment ………………..

152

Configuring your computer to boot from a CD ……………………….

153

Preparing to recover a computer …………………………………………….

154

Scanning for viruses …………………………………………………….

154

Checking your hard disk for errors …………………………………….

156

Recovering a computer ………………………………………………………

156

Restoring multiple drives by using a system index file …………………..

160

Recovering files and folders from the recovery environment …………..

161

Exploring your computer ……………………………………………….

163

Using the networking tools in the recovery environment ……………….

163

Starting networking services …………………………………………..

163

Using the pcAnywhere thin host for a remote recovery ……………

163

Mapping a network drive in the recovery environment …………….

166

Configuring network connection settings ……………………………

166

Viewing properties of recovery points and drives …………………………

167

Viewing properties of a recovery point ……………………………….

168

Viewing the properties of a drive within a recovery point ………….

168

About the Support Utilities ………………………………………………….

169

Chapter 15

Copying a drive …………………………………………………………

171

About copying a drive …………………………………………………………

171

Preparing to copy drives ……………………………………………………..

171

Copying one hard drive to another hard drive …………………………….

172

Drive-to-drive copying options …………………………………………

173

Appendix A

Using a search engine to search recovery points …….

175

About using a search engine to search recovery points …………………..

175

Enabling search engine support …………………………………………….

175

Recovering files using Google Desktop’s Search Desktop feature ……….

177

If a file cannot be found using Google Desktop ………………………

178

Index …………………………………………………………………………………………………….

179

12 Contents

Chapter 1

Introducing Norton Ghost™

This chapter includes the following topics:

Getting started

What’s new in Norton Ghost 14.0

About the Advanced page

Where to find more information

Getting started

Norton Ghost provides advanced backup and recovery for your computer. Protect yourdocuments,financialrecords,presentations,photos,music,videos,historical documents, or any other kinds of data you keep on your computer by making a backup of your computer’s entire hard disk. Or, limit your backup to include only those files and folders that mean the most to you.

You can schedule backups to capture your changes automatically as you work from day to day. Or start a backup manually at any time. You can also easily configureNortonGhosttorunabackupinresponsetospecificevents.Forexample, abackupcanbestartedwhenaparticularapplicationisstarted,orwhenaspecified amount of new data has been added to the drive.

When you experience a problem with your computer, you can restore a file, folder, or an entire drive, to return your computer to a previous, working state with the operating system, applications, and data files intact. Or if you accidently delete a personal file, get it back with a few simple steps.

14Introducing Norton Ghost™

What’s new in Norton Ghost 14.0

Using easy-to-follow wizards, set up fast and reliable backups that run while you continue to work. Or schedule your backups to run after hours when you are no longer using your computer.

When disaster strikes, Norton Ghost helps you recover your computer from the effects of many common problems, including

Virus attacks: Damage might be done before a virus is quarantined.

Faulty software installations: Some software can negatively affect your computer’s performance, slowing it down to the point that opening programs or documents can require too much time. But once installed, uninstalling a product might not recover unintentional damage done during an install.

Hard drive failure: Data can become corrupted on your system drive (typically C), making it impossible to start your operating system

Filesaccidentallydeletedoroverwritten:Accidentaldeletionoffilesiscommon, but often costly.

Corrupted files: Individual files and folders can become corrupted by viruses, or when a program used to modify them encounters an error.

What’s new in Norton Ghost 14.0

Norton Ghost includes many enhancements and new features. Refer to the following table for information about the latest features and enhancements:

Note: Not all features listed are available in all versions of this product.

Feature

Description

Support for NTFS partitions

NortonGhostnowsupportsNTFSpartitions

up to 16TB (formatted with 4k clusters).

Offsite Copy

The new Offsite Copy feature adds an

additional level of protection to your data

by copying recovery points to a second hard

disk drive. You can use an external USB or

FireWire drive, or copy them over the

networktoaremotelocationthroughalocal

area connection, or using FTP.

See “About Offsite Copy” on page 73.

Introducing Norton Ghost™ 15

What’s new in Norton Ghost 14.0

Create and manage aliases for your external drives

Symantec ThreatCon integration

Send Feedback tool

To help you more easily identify external drivesforuseasbackupdestinations,Norton Ghost lets you assign an alias to each externaldrive. Doingsodoesnotchangethe drive label, but is for use only when you are accessing those drives from within Norton Ghost.

See “Using aliases for external drives” on page 41.

Symantec ThreatCon is Symantec’s early threat warning system. You can now configure Norton Ghost to detect a change in the threat level whenever your computer isconnectedtotheInternet.Whenthethreat level meets or exceeds the level you specify, Norton Ghost automatically starts a backup job. You can specify a different ThreatCon level for each backup.

See “Enabling Symantec ThreatCon Response” on page 88.

We want to hear what you think. From the Homepage,youcannowshareyouropinion with us. We look at every comment we receive and consider how we can make our product better. Tell us what you think.

Help and Support center

To help you help yourself, a new Help and

Support dialog provides direct links to

available resources for helping you to get

the most out of Norton Ghost.

New features and enhancements added in the previous release

If you are upgrading from an earlier release, you might be interested to know of the following enhancements added in previous releases of Norton Ghost.

Feature Description

Enhanced ease-of-use

An improved user interface simplifies what you need to know and do to successfully

back up or recover files, folders, or your entire computer. And for Norton Ghost experts,

the Advanced page gives you a single view to most product features.

16Introducing Norton Ghost™

What’s new in Norton Ghost 14.0

Feature

Description

Windows Vista support

Norton Ghost has been designed and tested to run in the new Windows Vista operating

system, and still supports previous versions of Windows.

See “System requirements” on page 19.

Improved Easy Setup

Now setting up your first backup is even easier with the enhanced Easy Setup, which

appears either during install (unless you choose to skip it), or automatically the first

time you run Norton Ghost. Specify a few preferences, and Norton Ghost can start

backing up your computer on a regular basis.

File and folder backup

Limit your backup to include a select set of files or folders. File and folder backups are

especially useful if your backup storage space is limited and you make frequent changes

to important documents that you want to back up.

One Time backups

Need to back up your data quickly? The new One Time Backup feature lets you define

and run a backup at any time without saving the backup job for later use.

Desktop search engine

Search for and recover files stored in recovery points using Google Desktop™.

support

Convert a recovery point

Convert recovery points to one of two virtual disk formats for use in a virtual

to virtual disk format

environment.

LightsOut Restore

Restore a computer from a remote location, regardless of the state of the computer,

provided that its file system is intact.

Simplifiedscheduleeditor

You can now easily edit your existing backup schedules without having to click through

multiple dialogs or complete the entire backup wizard again.

Manage backup data

Because recovery points and file and folder backup data require storage space, Norton

Ghost gives you the freedom of where and how to handle the amount of disk space used

for storing backup data. Norton Ghost offers simple tools for managing your backup

data, and can even manage it for you automatically.

Improved backup and

The home page offers the backup protection status in a single view. But you can also

recovery status

usethenewBackupsCalendartoviewpastandupcomingscheduledbackupstoseehow

protected your data really is.

Automatic backup

Norton Ghost automatically detects when a new storage device is connected to your

destination detection

computer, and can prompt you to change your default backup destination to the new

drive.

Browse lost or damaged

Enhancedbrowsingoffilesandfoldersinsiderecoverypointsmakesrecoveryquickand

files and folders

easy; the new file and folder backup feature also lets you quickly search for and recover

files or folders.

Introducing Norton Ghost™ 17

About the Advanced page

Feature

Description

Event-triggered backups

In addition to scheduled and manual backups, Norton Ghost can detect certain events

and run a backup automatically whenever they occur, providing an added level of

protection for your computer.

Performance throttling

Manually adjust the effect of a running backup on the performance of your computer

to better match your needs at the moment. This feature is especially useful if you are

working on your computer and don’t want the backup process to slow you down.

And if you know the demographics of your network traffic, you can now set network

throttling to prevent network overload.

Maxtor OneTouch™

If you have a Maxtor OneTouch™ external hard drive, you can back up your computer

integration

with the push of a button. No need to start Norton Ghost.

Modifiable Symantec

When you cannot start Windows, the newly enhanced Symantec Recovery Disk (SRD)

Recovery Disk

makes recovery easier than ever.

If the Symantec Recovery Disk is missing specific drivers, use the Create Recovery Disk

feature to create a modified Symantec Recovery Disk that includes the exact drivers

needed to successfully boot your computer into the recovery enironment.

Note: If you purchased Norton Ghost pre-installed on a new computer, some features

intherecoveryenvironmentmayormaynotbeincluded,dependingonhowthecomputer

manufacturerchosetoinstallit. Therecoveryenvironmenthaslikelybeenpre-installed

on a special partition on your computer.

About the Advanced page

The Advanced page offers experienced Norton Ghost users a single view of the mostcommonproductfeatures.IfyouhaveagoodunderstandingofNortonGhost, you might prefer to perform most tasks from the Advanced view.

Note: When refering to the documentation while using the Advanced page, the first one or two steps do not apply because they indicate where to access each feature from the other pages of the product interface. From that point on, follow the remaining steps of each procedure.

The Advanced page can be hidden from view if you do not plan to use it.

To hide the Advanced page

1Start Norton Ghost.

2On the View menu, click ShowAdvancedPage.

18Introducing Norton Ghost™

Where to find more information

To show the Advanced page

1Start Norton Ghost.

2On the View menu, click ShowAdvancedPage.

Where to find more information

TolearnmoreaboutNortonGhost,visitthenewHelpandSupportpage.Depending on which version and language of the product you have installed, the Help and Supportpageincludesone-clickaccesstomoreinformation,includingtheproduct help system, the product User’s Guide, and access to the Symantec Knowledge Base where you can find troubleshooting information.

To access Help and Support

1Start Norton Ghost.

2On the Home page, click Help>HelpandSupport.

Chapter 2

Installing Norton Ghost

This chapter includes the following topics:

Preparing for installation

Installing Norton Ghost

Updating Norton Ghost

Uninstalling the product

Preparing for installation

Before you install Norton Ghost, make sure that your computer meets the system requirements.

System requirements

Table 2-1 lists the system requirements for Norton Ghost.

Table 2-1

Minimum system requirements

Component

Minimum Requirements

Operating system

The following Windows 32or 64-bit operating systems are supported:

Windows Vista Home Basic

Windows Vista Home Premium

Windows Vista Ultimate

Windows Vista Business

Windows XP Professional/Home (SP2 or later)

Windows XP Media Center

20Installing Norton Ghost

Preparing for installation

Table 2-1

Minimum system requirements (continued)

Component

Minimum Requirements

RAM

The following memory requirements are grouped by key components:

Norton Ghost Agent: 256 MB

Norton Ghost user interface and Recovery Point Browser: 256 MB

Symantec Recovery Disk: 512 MB minimum

Note: If you are installing a multilingual or double-byte version of the product, you must

have a minimum of 768 MB of RAM to run the Symantec Recovery Disk.

Norton Ghost LightsOut Restore feature: 1 GB

Available hard

Wheninstallingtheentireproduct:Approximately250to300MB,dependingonthelanguage

disk space

of the product you are installing

Microsoft .NET Framework 2.0: 280 MB of hard disk space is required for 32-bit computers,

and 610 MB is required for 64-bit computers

Recoverypoints:Sufficientharddiskspaceonalocalharddiskornetworkserverforstoring

recovery points.

The size of recovery points depends on the amount of data you have backed up and the type

of recovery point being stored.

See “Best practices for backing up ” on page 48.

Norton Ghost LightsOut Restore feature: 2 GB

CD-ROM or

The drive can be any speed, but it must be capable of using as the startup drive from the BIOS.

DVD-ROM drive

Norton Ghost uses Gear Software technology. To verify that your CD writer or DVD writer is

compatible, visit http://www.gearsoftware.com/support/recorders/index.cfm. You can look up

information about your writer if you know the name of the manufacturer and model number

of your writer.

Software

The Microsoft .NET Framework 2.0 is required to run Norton Ghost.

If the .NET Framework is not already installed, then you will be prompted to install it after

Norton Ghost is installed and your computer is rebooted.

Virtual platforms

The following virtual platforms are supported:

(for converted

VMware GSX Server 3.1 and 3.2

recovery points)

VMware Server 1.0 (replacement/rename for GSX Server)

VMware ESX Server 2.5 and 3.0

VMware Infrastructure 3 (replacement/rename for ESX Server)

Microsoft Virtual Server 2005 R2

Supported file systems and removable media

Norton Ghost supports the following file systems and removable media:

Installing Norton Ghost 21

Preparing for installation

Supported file

Norton Ghost supports FAT16, FAT16X, FAT32, FAT32X, NTFS, GUID Partition Table (GPT),

systems

dynamic disks, Linux Ext2, Linux Ext3, and Linux swap partitions.

Note: YoumustdecryptencryptedNTFSdrivesbeforeyouattempttorestorethem. Youcannot

view the files that are in a recovery point for an encrypted NTFS drive.

Removable media

You can save recovery points locally (that is, on the same computer where Norton Ghost is

installed)ortomostCD-R,CD-RW,DVD-R(W),andDVD+RWrecorders.Youcanfindanupdated

list of supported drives on the Symantec Web site.

Norton Ghost also lets you save recovery points to most USB devices, 1394 FireWire devices,

REV, Jaz, Zip drives, and magneto-optical devices.

Unavailable features

Norton Ghost is packaged to meet various markets. Some features might not be available, depending on the product you have purchased. However, all features are documented. You should be aware of which features are included with the version of the product you have purchased. If a feature is not accessible in the product user interface, it is likely not included with your version of the product.

RefertotheSymantecWebsiteforinformationaboutfeaturesincludedwithyour version of Norton Ghost.

When you delay licensing

If you choose to delay installation of the product license (for a maximum of 30 days from the date of installation), the following features are unavailable until you install a valid license:

Copy Drive

Create Recovery Disk

LightsOut Restore

Convert to Virtual Disk

All other features are enabled during the 30 day grace period.

If you are using an Evaluation copy of the product, it also expires after 30 days. However, all features are enabled until the end of the evaluation period, at which time you must purchase the product or uninstall it. You can purchase a license at any time (even after the evaluation period expires) without reinstalling the software.

22Installing Norton Ghost

Installing Norton Ghost

Note: Ifthisproductcamepre-installedfromacomputermanufacturer,yourtrial periodcouldbeaslongas90days.Theproductlicensingoractivationpageduring install will indicate the duration of your trial period.

See “Activating Norton Ghost later” on page 25.

Installing Norton Ghost

Beforeyoubegin,youshouldreviewtherequirementsandscenariosforinstalling

Norton Ghost.

See “System requirements” on page 19.

Note: During the installation process, you might be required to restart the computer.Toensureproperfunctionalityafterthecomputerrestarts,logonagain usingthesameusercredentialsthatyouusedtologonwhenyouinstalledNorton Ghost.

The installation program scans your hardware for the required drivers. If the programdoesnotfindtherequireddrivers,youreceiveadrivervalidationmessage. If you receive this message, you should test the Symantec Recovery Disk (SRD). TestingtheSRDverifieswhetherthedriversarerequiredorifthedevicesonyour systemhavecompatibledriversthatareavailableontheSRD.Thedrivervalidation process should not interfere with your ability to install the product.

See “About ensuring the recovery of your computer” on page 27..

Warning: The SRD provides the tools that you need to recover your computer. It is included with your product either on a separate CD, or on your product CD, depending on the version of the product that you purchased. You should store the CD in a safe place.

To install Norton Ghost

1LogontoyourcomputerusingeithertheAdministratoraccountoranaccount that has administrator privileges.

2Insert the Norton Ghost product CD into the media drive of the computer.

The installation program should start automatically.

Installing Norton Ghost

23

Installing Norton Ghost

3If the installation program does not run, type the following command at a command prompt:.

<drive>:autorun.exe

where <drive> is the drive letter of your media drive.

4In the CD browser panel, click InstallNortonGhost.

5Read the license agreement, and then click Iacceptthetermsinthelicense agreement.

6Do one of the following:

Click InstallNow to begin the installation.

If you want to customize your settings, click CustomInstall, select or deselect the options you want installed, and then click InstallNow. Installation options include:

User Interface

Installs the product user interface that is required for

interacting with the Norton Ghost Service.

Backup and

The primary service that is required to back up or recover

Recovery Service

your computer.

CD/DVD Support

Required for backing up directly to CD/DVD, and for creating

a customized Symantec Recovery Disk CD. A CD/DVD burner

is required to use this feature.

Recovery Point

Enables you to browse, mount, copy, verify, and restore files

Browser

and folders using recovery points.

LiveUpdate

Keeps your Symantec software up-to-date with the latest

product updates.

Change

Click this button if you want to install Norton Ghostto an

alternate location.

7If a driver that is used on your computer is not available on the Symantec Recovery Disk, you receive a notification message that includes the name of thedriver.Writedownthenameofthedriverfile,andthenclickOKtodismiss the message.

Drivers are critical in the event that you need to use the Symantec Recovery Disk CD to recover your system drive (the drive where your operating system is installed).

See “About ensuring the recovery of your computer” on page 27.

24Installing Norton Ghost

Installing Norton Ghost

8Click Finish to complete the installation.

9Remove the product CD from the media drive, and then click Yes to exit the installation wizard and restart the computer.

If you click No because you plan to restart your computer yourself at a later time, note that you cannot run Norton Ghost until after you restart your computer.

Completing the installation

Afteryouinstalltheproduct,youarepromptedtolicenseoractivateyourproduct. You can then run LiveUpdate to check for product updates, and then configure your first backup.

Note: Ifthisproductcamepre-installedfromacomputermanufacturer,yourtrial period could be as long as 90 days. Refer to the Activate later label.

To complete the installation

1In the Welcome panel, click Next.

If the product was installed by your computer manufacturer, the Welcome page might appear the first time that you run Norton Ghost.

2Do one of the following:

Click I’vealreadypurchasedtheproductandhaveaproductkey.

Note: You can find the product key on the back of your product CD jacket. Do not lose the product key. You must use it when you install Norton Ghost.

Click Activatelater to delay the activation of your license. After the trial period ends, the product will no longer work.

IfthisproductisatrialversionofNortonGhostandyouwanttopurchase a product key, click SymantecGlobalStore to connect to the Symantec Web site.

3Click Next.

4Click RunLiveUpdate to check for any product updates since the product shipped.

5Click LaunchEasySetup to open the Easy Setup box when you complete the install process.

Installing Norton Ghost

25

Updating Norton Ghost

6ClickEnableGoogleDesktopFileandFolderRecoveryifyouwantuseGoogle Desktoptosearchyourrecoverypointsforthefilesandfoldersthatyouwant to recover.

If you select this option, Norton Ghost automatically catalogs each file as it creates a recovery point. Google Desktop can then use this catalog to search for files by name. It does not index the content of the files.

Note: This option is available only if Google Desktop already is installed on your computer. If you plan to install Google Desktop, you can enable search engine support later.

7Click Finish.

Activating Norton Ghost later

IfyoudonotactivateNortonGhostbeforethetrialperiodends,thesoftwarestops working. However, you can activate the product at any time after the trial period expires.

To activate Norton Ghost at any time after installation

1On the Help menu, click UnlockTrialProduct.

2Refer to step 2 in the Tocompletetheinstallation procedure.

Setting up your first backup

Unless you unchecked the Run Easy Setup check box during the setup wizard, the Easy Setup window appears. If you don’t run Easy Setup during the setup wizard, it appears the first time you open the Run or Manage Backups window.

When the Easy Setup window opens, you can either accept the default drive and file and folder backup settings, or you can click on any of the settings to modify them.

If you want the new backup to run immediately, be sure to select Run backup now, and then click OK.

Updating Norton Ghost

You can receive software updates that are associated with your version of the product over your Internet connection. LiveUpdate connects to the Symantec LiveUpdate server and automatically downloads and installs updates for each Symantec product that you own.

26Installing Norton Ghost

Uninstalling the product

You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates.

To update Norton Ghost

1On the Help menu, click LiveUpdate.

2In the LiveUpdate window, click Start to select the updates. Follow the on-screen instructions.

3When the installation is complete, click Close.

Some program updates might require that you restart your computer before the changes take effect.

Uninstalling the product

When you upgrade Norton Ghost from a previous version of the product, the installprogramautomaticallyuninstallsthepreviousversions. Ifneeded,youcan manually uninstall the product.

Follow your operating system’s instructions on how to uninstall software.

Chapter 3

Ensuring the recovery of your computer

This chapter includes the following topics:

About ensuring the recovery of your computer

Testing Symantec Recovery Disk

If driver validation fails

Creating a custom Symantec Recovery Disk CD

About ensuring the recovery of your computer

IfWindowsfailstostartoritdoesnotrunnormally,youcanrecoveryourcomputer by using the Symantec Recovery Disk (SRD). The drivers that are included on the recovery disk must match the drivers required to run your computer’s network cards and hard disks.

To help ensure that you have the drivers that you need to recover your computer, the installation process runs a driver validation test. The driver validation tool compares hardware drivers that are contained on the recovery disk with the drivers that are required to run your computer’s network cards and hard disks.

The installation process automatically runs the driver validation test. You can also run a validation test at anytime by running the Symantec Recovery Disk Wizard.

You should run the driver validation test any time you make changes to the NIC cards or storage controllers on a computer.

See “If driver validation fails” on page 28.

28Ensuring the recovery of your computer

Testing Symantec Recovery Disk

Note: Wirelessnetworkadapterdriversarenotsupportedbythedrivervalidation tool or by the SRD.

Testing Symantec Recovery Disk

You should test the SRD to ensure that the recovery environment runs properly on your computer.

Note: Depending on which version of the product you have purchased, the SRD is either included on your product CD, or as a separate CD. You should place the CD containing the SRD in a safe place. Should you lose the CD, you can create a new one if you have have a CD burner.

Testing the SRD allows you to identify and solve the following types of problems:

You cannot boot into the recovery environment.

See “To configure your computer to boot from a CD” on page 153.

You do not have the necessary storage drivers to access recovery points on the computer.

You need information about your system to help you run the recovery environment.

To test the SRD

1RunthedrivervalidationtooltotestwhethertheSRDworkswiththenetwork cards and storage devices on the computer.

2Boot your computer using the SRD.

See “Starting a computer by using the recovery environment ” on page 152.

3Whenyouhavebootedintotherecoveryenvironment,dooneofthefollowing:

If you want to store recovery points on a network, run a mock restore of arecoverypointthatisstoredonanetworktotestthenetworkconnection.

If you want to store recovery points on the computer, run a mock restore of a recovery point that is stored locally to test the local hard-drive connection.

If driver validation fails

The driver validation test verifies whether the drivers for all storage devices and network cards in use by the computer are available in the recovery environment.

Ensuring the recovery of your computer 29

Creating a custom Symantec Recovery Disk CD

If the drivers are available on the recovery disk, you receive a validation message. If any drivers are missing from the recovery disk, the Driver Validation Results dialog appears.

Without access to the correct drivers, a device cannot be used while running the SRD. Therefore, if the recovery points required for recovering your computer are stored on a network or a local hard drive, you might not have access to them.

You can find the drivers and copy them to a CD or a floppy disk, or you can create a custom Symantec Recovery Disk CD.

See “Creating a custom Symantec Recovery Disk CD” on page 29.

Creating a custom Symantec Recovery Disk CD

Even if driver validation succeeds and your Symantec Recovery Disk CD appears to work, you should create a custom Symantec Recovery Disk CD. A custom CD will contain your computer’s current network and storage device drivers, helping to ensure that in an emergency you can get to the recovery points required to restore your computer.

Note: You must have a writeable DVD/CD-RW drive to create a custom Symantec Recovery Disk.

To create a custom Symantec Recovery Disk CD

1Start Norton Ghost.

2Attach and turn on all storage devices and network devices that you want to make available.

3Insert the Symantec Recovery Disk CD into your CD-ROM drive.

4From the main Norton Ghost window, click Tasks>CreateRecoveryDisk, and then click Next.

5If prompted, click Browse, select the drive that contains the Symantec Recovery Disk CD, click OK, and then click Next.

6Do one of the following:

Click Automatic(Recommended), and then click Next.

Click Custom, and then click Next.

30Ensuring the recovery of your computer

Creating a custom Symantec Recovery Disk CD

Select this option only if you know which drivers to select.

7Follow the on-screen instructions to complete the wizard.

Warning: Be certain to test your new, customized Symantec Recovery Disk CD to make sure that it can start your computer and that you can access the drive containing your recovery points.

See “Testing Symantec Recovery Disk” on page 28.

Chapter 4

Getting Started

This chapter includes the following topics:

Key product components

How you use Norton Ghost

Starting Norton Ghost

Configuring Norton Ghost default options

Key product components

NortonGhostincludestwokeycomponents:theprogramitself,andtheSymantec

Recovery Disk.

Table 4-1

Key product components

Key Component

Description

Norton Ghost program (user interface)

The Norton Ghost program lets you define, schedule, and run backups of

your computer. When you run a backup, recovery points of your computer

are created, which you can then use to recover your entire computer, or

individual drives, files, and folders. You can also manage recovery point

storage (backup destination), and monitor the backup status of your

computer to make sure your valuable data is backed up on a regular basis.

32 Getting Started

How you use Norton Ghost

Table 4-1

Key product components (continued)

Key Component

Description

Symantec Recovery Disk

The Symantec Recovery Disk (SRD) is used to boot your computer into the

recovery environment. If your computer’s operating system fails, use the

SRD to recover your systemdrive (the drive where your operating system

is installed).

Note: Dependingonwhichversionoftheproductyouhavepurchased,the

SRD is either included on your product CD, or as a separate CD. You should

place the CD containing the SRD in a safe place. Should you lose the CD,

you can create a new one if you have have a CD burner.

See “About recovering a computer ” on page 151.

How you use Norton Ghost

While Norton Ghost does the work of backing up your files, folders, or entire drives, you need to tell Norton Ghost what to backup, when to back it up, and where to put the backed up data.

Using Norton Ghost includes the following key tasks:

Defining a backup

Running a backup

Recovering files, folders, or entire drives

Refer to the following figure to understand the relationship of these tasks.

Symantec Norton Ghost - 14.0 Instruction Manual

Getting Started 33

Starting Norton Ghost

Figure 4-1

Using Norton Ghost

Starting Norton Ghost

Norton Ghost is installed in the Windows Program Files folder by default. During installation, a program icon is installed in the Windows system tray from which you can open Norton Ghost. You can also open Norton Ghost from the Windows Start menu.

Note: To use the full version of Norton Ghost, you must activate the software.

See “Activating Norton Ghost later” on page 25.

34Getting Started

Configuring Norton Ghost default options

To start Norton Ghost

Do one of the following:

On the classic Windows taskbar, click Start>Programs>NortonGhost.

On the Windows XP or Windows Vista taskbar, click Start>AllPrograms >NortonGhost.

In the Windows system tray, double-click the Norton Ghost tray icon.

In the Windows system tray, right-click the Norton Ghost tray icon, and then click OpenNortonGhost.

Configuring Norton Ghost default options

TheOptionsdialogboxincludesseveralviewsthatletyouconfigurethefollowing

default settings:

Options

Description

General

Specifyadefaultlocationwhereabackupwillcreateandstore

recoverypointsandfileandfolderbackupdata.Ifthelocation

you choose is on a network, you can enter your user

authentication information.

See “Selecting a default backup destination ” on page 36.

Performance

Lets you specify a default speed for backup or recovery

processes.MovingthesliderclosertoFastincreasesthespeed

at which the program backs up or recovers your computer.

However, choosing a slower speed could improve the

performance of your computer, especially if you are working

on your computer during a backup or recovery.

Note: During a backup or recovery, you have the option to

override this default setting to fit your needs at the time.

You can also configure network throttling to limit the effects

of backups on network performance.

See “Adjusting the effects of a backup on computer

performance” on page 37.

See “Enabling network throttling ” on page 38.

Getting Started 35

Configuring Norton Ghost default options

Options

Description

Tray Icon

You can turn the system tray icon on or off and specify

whether to show only error messages when they occur, or to

show both error messages and other information, such as the

completion of a backup.

See “Adjusting default tray icon settings ” on page 38.

File Types

Lets you manage file types and file type categories, which are

used as a method for selecting the types of files you want

included in a file and folder backup.

See “Managing file types ” on page 39.

Google Desktop

If Google Desktop is installed on your computer when you

install Norton Ghost, you have the option of enabling Google

Desktopfileandfolderrecovery.Whenyouenablethisfeature,

you can search for files (by file name) inside a recovery point

that was created with search engine support enabled.

IfGoogleDesktopisnotinstalledonyourcomputerwhenyou

install Norton Ghost, you have the option of clicking a link to

the Web site where you can download and install Google

Desktop for free.

See “About using a search engine to search recovery points”

on page 175.

External Drives

Deleteorrenametheuniquenamesyouhavegiventoexternal

drives used as backup and Offsite Copy destinations.

See “Using aliases for external drives” on page 41.

Configure FTP

Specify default FTP settings to be used with Offsite Copy.

See “Configuring FTP settings for use with Offsite Copy”

on page 42.

Log File

Lets you specify the types of product messages to log (errors,

warnings, and information), where to store the log file, and

set a maximum file size for the log file.

See “Logging Norton Ghost messages” on page 42.

Event Log

Lets you specify the types of product messages to log (errors,

warnings, and information) in the Windows event log.

See “Logging Norton Ghost messages” on page 42.

36Getting Started

Configuring Norton Ghost default options

Options

Description

SMTP E-mail

If you want a history of actions taken by Norton Ghost, or of

error messages and warnings, you can choose to save them

in a log file on your computer, or to have them emailed to an

address you specify.

See“Enablingemailnotificationsforproduct(event)messages

on page 44.

SNMP Trap

IfyouhaveaNetworkManagementSystem(NMS)application,

you can enable SNMP Traps support to send notifications to

you NMS application.

See“ConfiguringNortonGhosttosendSNMPtraps”onpage112.

To configure default options

1Start Norton Ghost and click Tasks>Options.

2Select an option you want to modify, make any necessary changes, and then click OK.

Selecting a default backup destination

You can specify the default destination for storing recovery points and file and folder backup data created when you run a backup. This default location is used if you do not specify a different location when you define a new backup.

To set a default backup destination

1On the menu bar, click Tasks>Options.

2Click General.

3Check Prependcomputernametobackupdatafilenames.

This is especially useful if you back up more than one computer to the same drive. For example, you might back up a laptop and a desktop computer to the same USB or network drive. By prepending the computer name to each backup data file name, you can more easily identify which backup data files belong to which computer.

Getting Started 37

Configuring Norton Ghost default options

4Check Savebackupfilestoauniquesubfolder if you want Norton Ghost to create a new subfolder that will serve as your backup destination.

Note: The new subfolder is given the same name as your computer. For example, if your computer name is «MyLaptop», the new subfolder would be named MyLaptop.

5Enter a path to a folder where you want to store recovery points and file and folder backup data, or click Browse to look for a location.

You cannot use an encrypted folder as your backup destination. If you want to encrypt your backup data to prevent another user from accessing it, refer to the Advanced options when you define or edit a backup.

6If you entered the path to a location on a network, enter the user name and password required to authenticate to the network.

7Click OK.

Adjusting the effects of a backup on computer performance

If you are working on your computer when a backup is running—especially one that is creating an independent recovery point—your computer might slow down. This is because Norton Ghost is using your computer’s hard disk and memory resources to perform the backup.

However, you can actually modify the speed of the backup as a way of minimizing the impact of Norton Ghost on your computer while you work.

To adjust the default effect of a backup on my computer’s performance

1On the main menu bar, click Tasks>Options.

2Click Performance.

3If you want to improve your computer’s speed performance, move the slider bar closer to Slow.

4If you want the backup to complete more quickly, move the slider bar closer to Fast.

5Click OK.

Note:Duringabackuporrecovery,you’llhavetheoptionofoverridingthisdefault setting to fit your needs at that moment.

See “Adjusting the speed of a backup ” on page 85.

38Getting Started

Configuring Norton Ghost default options

Enabling network throttling

Similar to computer performance adjustments, you can also limit the impact of a backup on network performance.

However,becausenetworkperformanceisaffectedbymanyvariables,youshould consider the following issues before enabling this feature:

Networkcards:Isyournetworkwiredorwireless?Whatarethespeedsofyour network cards?

Network backbone: What is the size of your network pipeline? Does it support 10 MB transfer rates, or 1 GB transfer rates?

Networkserver:Howrobustisyourserverhardware?Howfastisitsprocessor? How much RAM does it have? Is it fast or slow?

Backing up: How many computers are scheduled to back up at the same time?

Network traffic: Are backups scheduled to run when network traffic is heavy or light?

Consider using this feature only when you know what your network can handle. If you schedule your backups at staggered intervals, and if you schedule them when network traffic is low, you will likley not need to use this feature.

Gather the required information about your network’s performance and then schedule backups accordingly. Then, if necessary, enable this feature and set the Maximum network throughput to a setting that matches the circumstances.

To enable network throttling

1On the main menu bar, click Tasks>Options.

2Click Performance.

3Check Enablenetworkthrottling.

4In the Maximum network throttling field, enter the maximum amount (in KB) of network throughput that Norton Ghost can send per second.

5Click OK.

Adjusting default tray icon settings

You can turn the system tray icon on or off and specify whether to show only error messages when they occur, or to show both error messages and other information, such as the completion of a backup.

Getting Started 39

Configuring Norton Ghost default options

To adjust default tray icon settings

1On the main menu bar, click Tasks>Options.

2Click TrayIcon and select one of the following:

Show system tray icon

DisplaystheNortonGhosticoninthesystem

tray.

You must select this option to enable or

disable any of the remaining options.

Show missed backups

Notifies you when a backup was scheduled

but did not run.

This can happen when your computer was

turned off at the time a backup was

scheduled to run.

Show system tray questions

Offers helpful prompts in the form of

questions that can help you keep your data

backed up.

Show status messages

Displays messages about the status of

backup operations, such as notifying that a

backup has started, or that your backup

destination is getting full.

Show error messages

Displays error messages when errors occur

sothatyoucanresolveanyissuesthatmight

hinder data protection.

3Click OK.

Managing file types

When you define a file and folder backup, file types are a quick way to include files you use the most. For example, if you keep music files on your computer, you canconfigureafileandfolderbackuptoincludeallmusicfiles(forexample,.mp3,

.wav).

The most common file types and extensions are already defined for you. But you can define additional file type categories as needed, and then edit them at any time. For example, if you install a new program that requires the use of two new file extensions (.pft and .ptp, for example), you can define a new file type and define the two file extensions for that category. Then when you define a file and folder backup, you can select the new category. When the backup is run, all files ending with .pft and .ptp are backed up.

40Getting Started

Configuring Norton Ghost default options

To create a new file type and extensions

1On the main menu bar, click Tasks>Options.

2Click FileTypes.

3At the bottom of the File types list, click the Addafiletype (+) button to add a file type category.

4Type a descriptive name of the new file type category, and then press Enter.

5AtthebottomoftheExtensionsforlist,clicktheAddanextension(+)button, and then type an asterisk (*) and a period, followed by the extension of the file type you want to define, and then press Enter.

6Click OK.

To edit a file type and extensions

1On the main menu bar, click Tasks>Options.

2Click FileTypes.

3Select a file type from the File types list, and then do one of the following:

Click the Renameafiletype button (at the right of the button) to edit the name of the selected file type.

Select an extension in the Extensions for column and click the Rename anextension button (at the right of the button) to edit the name of the extension.

Click either the Restoredefaultfiletypeslist or the Restoredefault extensionlist button to restore all default file types or extensions.

Caution: Any file types and extensions you have set up are removed. Once removed, you will have to add them again manually.

4Click OK.

To delete a file type (and all of its extensions)

1On the main menu bar, click Tasks>Options.

2Select a file type in the File types column.

You cannot delete a default file type. You can delete all but one extension of adefaultfiletype,andyoucanaddadditionalextensionstoadefaultfiletype.

3Click the Removeafiletype () button , and then click OK.

Use this same procedure to remove file extensions from the Extensions for list.

Getting Started 41

Configuring Norton Ghost default options

Using aliases for external drives

When you choose an external drive for use with Norton Ghost as either a backup destination or an Offsite Copy destination, it can become confusing if you are usingmorethanonedrive,especiallywhentheassigneddriveletterchangeseach time you plug in the drive.

To help you manage these destinations, Norton Ghost lets you assign an alias to each external drive. Doing so does not change the drive label, but is for use only when you are accessing those drives from within Norton Ghost.

For example, you might be swapping out two different external drives used as Offsite Copy destinations during any given week. Depending on the drive labels assigned to each drive and whether or not the drive letter previously assigned has changed, it could become confusing as to which drive you are using at any given time.

However, by associating unique aliases to each drive, then as you use the drive withNortonGhost,thealiasesyouassignedappearinvariouslocationsinNorton Ghost.

Note: It is also a good idea to place physical labels on each external drive to help you manage the task of swapping the drives.

For example, if you assigned the alias, «Drive A: Monday» to one drive, and «Drive B: Wednesday» to a second drive, their aliases appear in Norton Ghost whenever the drives are plugged in to your computer.

See “About Offsite Copy” on page 73.

To make it even easier, the Options dialog box lets you see all of your alias drive names in one view. From this view, you can remove or edit existing names.

To remove or edit external drive aliases

1On the main menu bar, click Tasks>Options.

2Under Destinations, click ExternalDrives.

3Select an external drive from the list and then do one of the following:

Click Remove to remove the alias associated with the external drive.

Click Rename to modify the alias.

42Getting Started

Configuring Norton Ghost default options

Configuring FTP settings for use with Offsite Copy

File Transfer Protocol, or FTP, is the simplest and most secure way to copy files over the Internet. Norton Ghost serves as an FTP client to copy your recovery points to a remote FTP server as a secondary backup of your critical data.

The Options dialog box lets you configure basic FTP settings to help ensure that your recovery points are copied to your FTP server.

To configure default FTP settings

1On the main menu bar, click Tasks>Options.

2Under Destinations, click ConfigureFTP.

3Refer to the following table when making changes:

Connection mode:

Passive(sometimeswritten»PASV»)modehelpsavoidconflicts

Passive

withsecuritysystems.Thismodeisnecessaryforsomefirewalls

(Recommended)

and routers because when using passive mode, the FTP client

opens the connection to an IP Address and port that the FTP

server supplies.

Connection mode:

Use active mode when connections or transfer attempts fail in

Active

passive mode, or when you receive data socket errors. When

an FTP client connects using active mode, the server opens a

connection to an IP Address and port that the FTP client

supplies.

Limit connection

Specify the number of times Norton Ghost tries to connect to

attempts to

an FTP server before giving up. Norton Ghost can attempt a

maximum of 100 times.

Stop trying to

Specify the number of seconds Norton Ghost tries to connect

connect after

to an FTP server before giving up. You can specify up to 600

seconds (10 minutes).

Default port

Specify the port of the FTP server that is listening for a

connection.

YoushouldconsulttheFTPserveradministratortobesurethat

the port you specify is configured to recieve incoming data.

Logging Norton Ghost messages

You can specify which product messages (errors, warnings, and information) are loggedastheyoccur,andwherethelogfileisstored.Productmessagescanprovide useful information about the status of backups or related events, and can also provide helpful information when you are troubleshooting.

Getting Started 43

Configuring Norton Ghost default options

Two logging methods are available: Norton Ghost logging, and the Windows application log.

From the Options page, you can configure both methods.

To configure a Norton Ghost log file

1On the main menu bar, click Tasks>Options.

2Under Notifications, click LogFile.

3Click the Selectthepriorityandtypeofmessages drop-down list and select the priority level at which a message should be logged.

All messages

Send all messages, regardless of priority

levels.

Medium and high priority messages

Send only medium and high priority

messages.

High priority messages only

Send only high priority messages.

No messages

Do not send any messages, regardless of

priority levels.

4Select one or more of the following options:

Errors

Warnings

Information

5In the Log file location field, enter a path to where the log file should be created and stored.

If you don’t know the path, click Browse and select a location.

6IntheMaximumfilesizefield,specifyamaximumsize(inkilobytes)thatthe log file is allowed to grow.

The file is kept within the limit you set by replacing the oldest logged items in the file with new items as they occur.

7Click OK.

To configure which product events are written to a Windows event log

1On the main menu bar, click Tasks>Options.

2Under Notifications, click EventLog.

44Getting Started

Configuring Norton Ghost default options

3Click the Selectthepriorityandtypeofmessages drop-down list and select the priority level at which a message should be logged.

All messages

Send all messages, regardless of priority

levels.

Medium and high priority messages

Send only medium and high priority

messages.

High priority messages only

Send only high priority messages.

No messages

Do not send any messages, regardless of

priority levels.

4Select one or more of the following options:

Errors

Warnings

Information

5Click OK.

Enabling email notifications for product (event) messages

Email notifications can be sent to a specified email address if there are any errors or warnings that occurred when a backup is run.

Note: If you do not have an SMTP server, this feature is unavailable to you.

Notificationscanalsobesenttothesystemeventlogandacustomlogfilelocated in the Agent folder of the product installation.

If notifications are not being delivered, check the setup of your SMTP server to ensure that it is functioning properly.

To enable email notifications

1On the main menu bar, click Tasks>Options.

2Under Notifications, click SMTPE-mail.

Getting Started 45

Configuring Norton Ghost default options

3Click the Selectthepriorityandtypeofmessages drop-down list and select the priority level at which an email should be sent.

All messages

Send all messages, regardless of priority

levels.

Medium and high priority messages

Send only medium and high priority

messages.

High priority messages only

Send only high priority messages.

No messages

Do not send any messages, regardless of

priority levels.

4Select one or more of the following options:

Errors

Warnings

Information

5In the To address text box, type the email address (for example, admin@domain.com) where notifications are to be sent.

6Ifdesired,typetheemailaddressofthesenderintheFromaddresstextfield. If you do not specify a From address, the name of the product will be used.

7In the SMTP server text box, type the path to the SMTP server that will send the email notification (for example, smtpserver.domain.com).

8From the SMTP Authentication drop-down box, select the method to use to authenticate to the SMTP server specified above.

9Enter your SMTP username and password.

If you are not sure what your username and password are, contact a system administrator.

10 Click OK.

46Getting Started

Configuring Norton Ghost default options

Chapter 5

Best practices for backing up your data

This chapter includes the following topics:

About backing up your data

Choosing a backup type

Best practices for backing up

Additional tips about backups

After defining your backup job

About selecting a backup destination

About backing up dual-boot computers

About backing up your data

Tobackupyourcomputeroryourindividualfilesandfolders,youdothefollowing

steps:

Define a backup

Run the backup

See “How you use Norton Ghost” on page 32.

When you define a backup, you make the following decisions:

What to back up (files and folders, or an entire drive)

Where to store the backup data (backup destination)

Whether or not to use Offsite Copy to copy backup data to remote locations

48Best practices for backing up your data

Choosing a backup type

When to run the backup (automatically or manually)

Whatcompressionlevelstospecifyforrecoverypoints,andwhethertoenable security settings (encryption and password protection).

Which of the many other options you want to use. You can customize each backup according to your backup needs.

Choosing a backup type

There are two types of backups available:

Drive-based backup: Backs up an entire hard drive

File and folder backup: Backs up only the files and folders that you select Youcanusethefollowingguidelinestodeterminewhichtypeofbackuptochoose:

Drive-based backup

Use this backup type to do the following:

Back up and recover your computer’s system drive

(typically, the C drive, which includes your operating

system).

Back up and recover a specific hard drive, such as a

secondary drive (which is a drive other than the system

drive on which your operating system is installed).

Recover lost or damaged files or folders from a specific

point in time.

File and folder backup

Use this backup type to do the following:

Back up and recover specific files and folders, for

example personal files that are stored in the My

Documents folder.

Back up and recover files of a specific type, for example

music (.mp3 or .wav) or photographs (.jpg or .bmp).

Recover a specific version of a file from a specific point

in time.

See “Before you back up” on page 49.

Best practices for backing up

As you prepare to back up your computer, review this information:

Before you back up

During a backup

Best practices for backing up your data

49

Best practices for backing up

When the backup is complete

About backups

When you back up your computer, you choose from two types of backups:

drive-basedbackup: backs up an entire hard drive

fileandfolderbackup: backs up only the files and folders you select

Which backup type you choose depends on what you are trying to protect and how much storage space you have to store backup data (recovery points, and file and folder backup data).

The following table highlights the key uses of each backup type:

Backup type

Use to

Drive-based backup

Backupandrecoveryourcomputer(systemdrive,typically

drive C)

Back up and recover a specific hard drive (any secondary

drive, drives other than your system drive)

Recover lost or damaged files or folders using recovery

points

File and folder backup

Back up and recover specific files and folders, such as

personal files stored in the My Documents folder

Back up and recover files of a specific type, such as music

(.mp3, .wav) or photographs (.jpg, .bmp)

Before you back up

Consider these best practices before defining and running your first backup:

Schedule backups when you know your computer will be turned on.

Use a secondary hard disk as your backup destination.

YourcomputermustbeturnedonandWindowsmust be running at the time a backup occurs. If not, any scheduled backups are skipped until the computer is turned on again. You then are prompted to run the missed backup.

See “Choosing a backup type” on page 48.

You should store recovery points on a hard disk other than your primary hard disk C. This practice helps ensure that you can recover your system in the event that your primary hard disk fails.

See“Aboutselectingabackupdestination”onpage54.

50Best practices for backing up your data

Best practices for backing up

Consider using external drives as your backup destination.

Give nicknames to your external drives to help you easily identify them

Use Offsite Copy

Run backups on a regular and frequent basis.

Usinganexternaldrivemakesyourbackupdatamore portable.Shouldyouneedtoremoveyourcriticaldata from a particular location, you can quickly grab an external drive on your way out the door.

See “About Offsite Copy” on page 73.

You can assign a nickname to each external drive to help keep track of where your backup data is stored for each computer you back up. Because drive letters canchangeeachtimeyouunplugandpluganexternal drive into your computer, a nickname ensures that you can always know which drive you are using when you are running Norton Ghost.

Using a nickname does not change the volume label of a drive. A nickname simply helps you identify the drive when using Norton Ghost.

Andthenicknamestickswiththedrive,sothatifyou plug the drive into a second computer running anothercopyofNortonGhost,thenicknameappears.

Note: You might also consider placing a sticky label on each drive that matches the nickname you’ve assigned.

See “Using aliases for external drives” on page 41.

Use Offsite Copy to copy your latest recovery points to either a portable storage device or a remote server. By copying recovery points to a portable hard disk, you can then take a copy of your data with you when you leave the office.

See “About Offsite Copy” on page 73.

Whenyoudefineyourbackups,schedulethemtorun frequentlysothatyouhaverecoverypointsthatspan at least the last two months.

See “Editing a backup schedule ” on page 89.

See “Defining a drive-based backup ” on page 57.

Loading…

Понравилась статья? Поделить с друзьями:
  • Метформин тева 1000 инструкция по применению цена отзывы аналоги
  • Arcoxia 120 mg инструкция по применению на русском
  • Эуфиллин 150 мг инструкция по применению цена
  • Nissan cefiro a32 мануал
  • Таблетки флебодиа 600 инструкция по применению побочные действия