Программа Symantec Ghost — безотказная программа для клонирования дисков, разделов, создания их образов и восстановления дисков и разделов из файлов образов. Инструкция создана на примере версии Symantec Ghost 11.5.
Загрузитесь с загрузочного диска или флешки, содержащих программу Symantec Ghost. После запуска программы нажмите ОК:
Создание образа раздела (диска)
1 Нажимаем Local.
2 Выбираем Partition, т.е. Партицию (раздел).
3 Выбираем пункт To Image. Это означает, что мы хотим сохранить партицию в образ:
4 Выберите физический диск.
5 Нажмите ОК:
6 Выберите партицию (раздел).
7 Нажмите ОК:
8 В верхнем выпадающем меню выберите другой диск, куда вы хотите поместить образ первого диска.
9 В поле File name задайте имя файла.
10 Нажмите Save для сохранения файла, в который будет записываться образ:
11 Выберите степень сжатия. Рекомендуем выбирать Fast:
12 Теперь программа спрашивает «Продолжить создание образа?» Отвечаем Yes
Запускается процесс создания. Нужно дождаться, когда прогресс дойдёт до 100%:
По завершению вы увидите такое сообщение. Нажмите Continue:
Теперь можно нажать на Quit и перезагрузить компьютер кнопкой RESET.
Внимание! Имейте в виду, для создания полноценной резервной копии Windows 7 или Windows 8.1 создавайте образ не только раздела с самой операционной системой (на примере которого написана инструкция), но загрузочного раздела, если такой имеется на диске. Резервная копия последнего вам также может пригодиться.
Загрузочный раздел Windows7 занимает 100MB. Загрузочный раздел Windows8.1 занимает 350MB.
Восстановления раздела (диска) из образа
1 В главном меню программы нажмите Local.
2 Выберите пункт Partition.
3 Выберите From Image, что означает «из образа»:
4 Вверху в поле Look In выберите локальный диск, содержащий ранее созданный в программе Ghost образ раздела.
5 Найдите нужный файл образа. Он должен иметь расширение *.GHO. Нажмите на нужный файл мышью для его выбора (кнопку Open нажимать скорее всего не придётся):
6 Выберите исходную партицию в образе. Нужно нажать на неё мышью, даже если она в списке одна.
7 Нажмите ОК:
8 Выберите физический диск, на который будем восстанавливать партицию.
9 Нажмите ОК:
10 На выбранном физическом диске выберите партицию, на которую будем развёртывать образ (Другими словами — нужно выбрать партицию,, которую вы хотите «восстановить» или «перезаписать»).
11 Нажмите ОК:
12 Программа спросит «Продолжить с восстановлением партиции? Целевая партиция будет безвозвратно перезаписана.»
Отвечаем Yes (Да):
После этого программа Ghost приступит к восстановлению партиции в указанный раздел из образа:
13 Нажмите кнопку Reset Computer для перезагрузки компьютера и проверки результата:
-
Contents
-
Table of Contents
-
Troubleshooting
-
Bookmarks
Quick Links
™
Norton Ghost
Personal Edition
User’s Guide
Related Manuals for Symantec NORTON GHOST PERSONAL EDITION
Summary of Contents for Symantec NORTON GHOST PERSONAL EDITION
-
Page 1
™ Norton Ghost Personal Edition User’s Guide… -
Page 2
Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. -
Page 3
The software which accompanies this license (the «Software») is the property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, you will have certain rights to use the Software after your acceptance of this license. Except as may be modified by a license… -
Page 4
(60) days from the date of delivery of the Software to you. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money you paid for the Software. -
Page 5: Table Of Contents
Setting up Norton Ghost Minimum system requirements …………13 Hardware requirements for Norton Ghost transfer modes ..14 Installing Norton Ghost Personal Edition ……..14 Installing Norton Ghost in Windows ……..14 Installing Norton Ghost in DOS ……….15 Uninstalling Norton Ghost …………. 16 Uninstalling Norton Ghost in Windows ……..
-
Page 6
Appendix D Diagnostics Hard drive detection and diagnostic information ……69 Norton Ghost abort error file (ghost.err) ……… 69 Hard disk geometry diagnostics ……….70 Full diagnostic statistics dump summary ……..70 Symantec Service and Support Solutions Disk Replacement Form Index… -
Page 7: Chapter 1 About Norton Ghost Personal Edition
PC to a new PC. Caution: Norton Ghost Personal Edition is a powerful utility program that performs complex operations on your computer. It is recommended for experienced and highly skilled PC users only.
-
Page 8: How Norton Ghost Works
Chapter 1: About Norton Ghost Personal Edition partitions, Norton Ghost positions each partition or logical drive on the target disk using the same rules as FDISK, copying the partitions on a file- by-file basis. An image file can be stored on a CD, Superdisk, JAZ or ZIP drive, or other removable media.
-
Page 9: Save And Load Image Files To And From Removable Media
How Norton Ghost works Norton Ghost usage, both the source and destination must be free from file corruption and physical hard disk drive problems prior to cloning. Note: When cloning an entire hard disk drive, the existing partition configuration is overwritten and need not be set in advance. Internal transfer operations are one of the fastest methods of cloning, and offer a simple quick hard disk drive backup or migration tool.
-
Page 10: Clone Hard Disk Drives And Partitions Peer-To-Peer
Chapter 1: About Norton Ghost Personal Edition For restoration purposes, once the device is working and has a drive letter, Norton Ghost can use that drive to perform the required task. Clone hard disk drives and partitions peer-to-peer Peer-to-peer connections are typically used when there are two computers that you wish to connect.
-
Page 11
How Norton Ghost works These components can be loaded from a boot disk to allow Norton Ghost to use NetBIOS to communicate and clone between master and slave. Master Crossover Ethernet Cable Slave Using the parallel (LPT) port With two computers and a parallel data transfer cable (not provided with Norton Ghost) you can clone two computers, master to slave. -
Page 12
Chapter 1: About Norton Ghost Personal Edition… -
Page 13: Chapter 2 Setting Up Norton Ghost
Setting up Norton Ghost Minimum system requirements The system requirements to run Norton Ghost are: 386SX processor (486 or above recommended) 4 MB RAM (8 MB RAM for NTFS), 16 MB recommended DOS 5.0 or above VGA monitor…
-
Page 14: Hardware Requirements For Norton Ghost Transfer Modes
Windows or DOS. Installing Norton Ghost in Windows To install Norton Ghost in Windows: Insert the Norton Ghost Personal Edition CD in your CD-ROM drive. After a moment, the Norton Ghost setup program starts automatically.
-
Page 15: Installing Norton Ghost In Dos
Replacement form in this guide for information about getting floppy disks. Follow the instructions that appear on the screen. The setup program places a Norton Ghost Personal Edition program group in your Start menu and installs the files necessary to run Norton Ghost Personal Edition.
-
Page 16: Uninstalling Norton Ghost
Chapter 2: Setting up Norton Ghost Uninstalling Norton Ghost Uninstalling Norton Ghost in Windows To uninstall Norton Ghost in Windows: Click the Start button, then select Settings > Control Panel. Double-click Add/Remove programs. In the list of installed programs, select Norton Ghost Personal Edition.
-
Page 17: Setting Up Transfer Methods
Setting up transfer methods Use the following DOS command to copy the system files to the formatted disk: C:> sys c: a: Use the following DOS command to format and copy the system files to the unformatted disk: C:> format a: /s Copy GHOSTPE.EXE onto the boot disk.
-
Page 18: Peer-To-Peer Connections
All operator input will be on the master computer. Use the previous table to choose which machine will be the master and which will be slave. Peer-to-peer NetBIOS network connections NetBIOS is only available for peer-to-peer connections. Sample third-party files are available on the Symantec FTP site at: ftp://ftp.symantec.com/public/english_us_canada/products/ ghost/…
-
Page 19
Setting up transfer methods Sourcing NetBIOS The following steps explain the NetBIOS setup procedure. Install network interface cards. Once the network interface cards are installed, the two peer machines need to be connected using cabling. The type and setup of the connection will depend on your individual network requirements. -
Page 20
Chapter 2: Setting up Norton Ghost… -
Page 21: Chapter 3 Using Norton Ghost
Using Norton Ghost This chapter describes how to perform operations. The procedures assume that all hardware is configured properly and communication methods are established. See “Setting up transfer methods” on page 17 for more information. Information on the following tasks is provided: Starting Norton Ghost Navigating in Norton Ghost without a mouse Cloning disks…
-
Page 22
Chapter 3: Using Norton Ghost No other devices. Other peripheral devices not needing additional setup (for example, Jaz or Zip drive). SCSI tape drive requiring DOS ASPI driver setup. Third-party device requiring DOS driver setup. Peer-to-peer connection using LPT printer port. Peer-to-peer connection using NetBIOS and network interface cards connection. -
Page 23: Starting Norton Ghost
Starting Norton Ghost Select source hard disk drive, partitions, or image file. Select destination hard disk drive, partition, or image file. Warning: Choose carefully. Make sure you select the correct destination to overwrite. In most cases, you will not be able to recover from an incorrectly selected destination drive.
-
Page 24: Navigating Without A Mouse
Chapter 3: Using Norton Ghost Ghost to access and use some hardware. See “Setting up transfer methods” on page 17 for more information. Navigating without a mouse Depending upon how Norton Ghost is started, mouse support may not be available. To use Norton Ghost without a mouse: Use arrow keys to navigate the menu.
-
Page 25: Cloning From Disk To Disk
Cloning disks LPT > Master NetBIOS > Master Cloning from disk to disk To clone disk to disk: From the main menu, select Disk > To Disk. The Source Drive dialog box displays. Select the source drive. The Source Drive dialog box displays the details of every disk Norton Ghost can find on the local machine.
-
Page 26
Chapter 3: Using Norton Ghost Confirm or change the destination drive partition layout. The Destination Drive Details dialog box displays a suggested partition layout for the destination drive. By default Norton Ghost allocates any extra space that the new disk has to the first FAT or NTFS partition that it discovers. -
Page 27: Cloning A Disk To Image File
Cloning disks Select Yes to proceed with the disk cloning. The system performs a quick integrity check of the file structure on the source disk and then copies the source disk to the destination. If you need to abort the process use Ctrl-C, but be aware that this leaves the destination disk in an unknown state.
-
Page 28
Chapter 3: Using Norton Ghost Specify the drive or device, and specify the full pathname. The image file may reside on a local drive (but not the one that is being copied from). When using peer-to-peer connections, the image file will be created on the slave machine. On pressing Enter, the compress image question displays. -
Page 29: Cloning A Disk From An Image File
Cloning disks Norton Ghost displays the final “Proceed with disk dump?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the image file creation. The system performs a quick integrity check of the file structure on the source disk and then copies the source disk to the destination image file.
-
Page 30
Chapter 3: Using Norton Ghost Specify the drive or device and select the full pathname. Note that the image file may reside on a local drive (but not the one that is being copied to). When using peer-to-peer connections, the file will be located on the slave machine. -
Page 31
Cloning disks held in the source partition. On selecting OK, Norton Ghost displays the final “Proceed with disk load?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the disk cloning. -
Page 32: Cloning Partitions
Chapter 3: Using Norton Ghost Cloning partitions Partition cloning procedures are accessed from the main menu. To specify a transfer method, select one of the following: Local LPT > Master NetBIOS > Master The source and destination partitions must be correctly configured before cloning partitions.
-
Page 33
Cloning partitions Select the source partition. The Source Partition dialog box displays the details of all the partitions on the selected source drive. On selection of the source partition, the Destination Drive dialog box displays. Select the destination drive. The Destination Drive dialog box displays the details of every disk Norton Ghost can find on the destination machine. -
Page 34: Cloning From Partition To Image File
Chapter 3: Using Norton Ghost Warning: Choose carefully as this is the partition that is going to be overwritten. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the partition copy. If you need to abort the process use Ctrl-C, but be aware that this leaves the destination drive in an unknown state.
-
Page 35
Cloning partitions The Source Drive dialog box displays the details of every disk Norton Ghost can find on the local machine. On selection of the source drive, the Source Partition dialog box displays. Select the source partitions to be included in the destination image file. -
Page 36: Cloning A Partition From An Image File
Chapter 3: Using Norton Ghost Norton Ghost displays the final “Proceed with partition dump?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the image file creation.
-
Page 37
Cloning partitions Select the source partition from the image file. The Source Partition dialog box displays the details of all the partitions in the image file. On selection of the source partition, the Destination Drive dialog box displays. Select the destination drive. The Destination Drive dialog box displays the details of every disk Norton Ghost can find on the local machine. -
Page 38
Chapter 3: Using Norton Ghost Warning: Choose carefully as this is the partition that is going to be overwritten. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the partition cloning. Norton Ghost overwrites the destination partition using the partition details contained in the image file. -
Page 39: Managing Image Files
Managing image files Managing image files Norton Ghost can create an image file that contains all the information required to recreate a complete disk or partition. Image files are a useful way to store and reliably compress images of model system configurations, or to create backup copies of complete drives or partitions.
-
Page 40: Image Files And Crc32
Chapter 3: Using Norton Ghost Image files and CRC32 Cyclic Redundancy Checking (CRC) is a data error checking technique. CRC ensures that the original data that was written to the image file is the same as the data that is being used from the image file. The 32 value in CRC32 indicates the CRC technique uses a 32-bit value to store error checking information.
-
Page 41
Managing image files Spanned image files Spanned image files are similar to size-limited multi-segment image files. The difference is that each segment file (or span) of the image file is limited by the actual volume size of the media the image is being saved to. This allows you to specify a drive and filename and let Norton Ghost sort out when to request another volume or location for the remaining data. -
Page 42
Chapter 3: Using Norton Ghost If you select compression and there is still a possibility of insufficient space, the following message displays: If spanning is not enabled, an error message displays: Before starting to save the disk contents to the image file, Norton Ghost displays the source and destination details and gives you a chance to back out. -
Page 43: Image Files And Tape Drives
Managing image files The screen below shows how Norton Ghost will prompt you for span set disk one and for subsequent volumes. How to load from a spanned image When loading a disk or partition from an image file, the process is the same as loading from an unspanned image file.
-
Page 44: Viewing Image File Content And Selective File Restoration
Chapter 3: Using Norton Ghost When using tape drives with Norton Ghost, the tape drive can be selected as the source or destination device in the File Locator window. Each SCSI tape device is shown as MTx, where x is a number starting at 0 and increases incrementally for each drive present.
-
Page 45
Managing image files boxes to prompt for the disk and partition to save. A sample screen is shown below: Norton Ghost creates an index in the image file as it works that allows Ghost Explorer to create a display of files very quickly. For more information on Ghost Explorer, see the Ghost Explorer online help. -
Page 46
Chapter 3: Using Norton Ghost… -
Page 47: Appendix A Norton Ghost Command-Line Switches
Norton Ghost command-line switches Norton Ghost can be run: Interactively with no command-line switches Interactively with selected switches The Norton Ghost command-line switches are used to alter Norton Ghost’s behavior and automate procedures. To list Norton Ghost’s command-line switches, type: ghostpe.exe -h.
-
Page 48
Appendix A: Norton Ghost command-line switches -clone,mode=pdump,src=1:2,dst=g:part2.gho -fcr -afile=filename Overrides the default abort error log file (ghost.err) to the directory and file given in filename. -autoname Automatically names spanned image files during creation. Avoids the user prompt asking for confirmation of the next destination location for the remainder of the image file. -
Page 49
Command-line switches MODE={copy | load | dump | pcopy | pload | pdump} MODE defines the type of clone command: copy — disk-to-disk copy load — file-to-disk load dump — disk-to-file dump pcopy — partition-to-partition copy pload — file-to-partition load pdump — partition-to-file dump SRC={drive | file | drive:partition | @MTx}… -
Page 50
Appendix A: Norton Ghost command-line switches dump Disk image filename, for example g:imagessystem2.img. If using a tape drive set to @MTx(x=0…). pcopy/pload Destination partition, For example, 2:2 indicates the LOAD second partition on drive two. pdump Partition image filename e.g, g:imagespart1.img:2. SZE{E | F | L | n={nnnnM | nnP| F | V}} SZE is used to set the size of the destination partitions for either a disk load or disk copy operation. -
Page 51
Command-line switches Rule 2: If the destination disk is smaller than the original source disk (but still large enough to accommodate the data from the source disk), the free space left over after the data space has been satisfied will be distributed between the destination partitions in proportion to the data usage in the source partitions. -
Page 52
Appendix A: Norton Ghost command-line switches dst=1,szeL -CRC32 The -CRC32 switch allows making a list of the files on a disk or partition, or in an image file with CRC values for each, and to verify that list against the original or a clone. -
Page 53
Command-line switches dcreate Create an ASCII CRC32 file from an image file. dverify Verify an image file from an ASCII CRC32 file. Examples of -CRC32 usage To create a CRC32 file (called ghost.crc) while making an image file: ghostpe.exe -fcr To create a list of files and CRC32 values for a disk: ghostpe.exe -CRC32,action=create,src=1,crcfile=ghost.crc To verify the list against an image file:… -
Page 54
Appendix A: Norton Ghost command-line switches Same as previous but specify the disk, CRC file, and list file. This example uses disk 1 as the source drive, myfile.txt as the ASCII CRC32 file, and myfile.out as the verification list file. To verify the contents of the primary drive against a CRC32 file: ghostpe.exe -CRC32,action=verify,src=1, crcfile=myfile.txt,vlist=myfile.out,vexcept=myfile.exc… -
Page 55
Command-line switches Files specified before the first [Partition:x] heading will be used to match files in any partition. A directory of * matches any subdirectory, regardless of nesting. The above exclusion file will match any file with an extension of .1 in any subdirectory on the second partition. -
Page 56
Appendix A: Norton Ghost command-line switches Norton Ghost. This switch may also assist when tape drives are incorrectly reported as drives. Valid values for number are 128 to 255. -f32 Allows Norton Ghost to convert all FAT16 volumes to FAT32 volumes when the destination partition is larger than 2047 MB in size. -
Page 57
Command-line switches Displays the fingerprint details written on a hard disk drive created by Norton Ghost. The fingerprint displays the process used to create the drive or partition and the time, date, and disk the operation was performed on. -fnf Disables the creation of a fingerprint when cloning hard disk drives or partitions. -
Page 58
Appendix A: Norton Ghost command-line switches image file or to another disk, Norton Ghost examines the source partition and decides whether to copy just the files and directory structure, or to do a sector-by-sector copy. If it understands the internal format of the partition, it defaults to copying the files and directory structure. -
Page 59
Command-line switches main menu. See “Peer-to-peer connections” on page 18, for more information. -lps LPT slave mode. This switch causes Norton Ghost to automatically go into LPT slave mode, and is the equivalent of selecting LPT Slave in the main menu. -
Page 60
Appendix A: Norton Ghost command-line switches Ignores the NTFS volume CHKDSK bit. Norton Ghost checks the CHKDSK bit on a NTFS volume before performing operations. When Norton Ghost indicates the CHDSK bit is set, we recommend running CHKDSK on the volume to ensure the drive is in a sound state before cloning. -
Page 61
Command-line switches Override. Allows the override of internal space and integrity checks. Use of this switch should be avoided. -pwd and -pwd=x Specifies password protection to be used when creating an image file. x indicates the password for the image file. If no password is given in the switch Norton Ghost will prompt for one. -
Page 62
Appendix A: Norton Ghost command-line switches Skips files as outlined in the skipfile.txt file. For example, the skipfile.txt contains: **.tmt [partition:1] windows **.exe [Partition:2] **me.txt This would skip all *.tmt files on any partition, the windows directory and any *.exe files on the first partition, and any file that ended with the me.txt on the second partition. -
Page 63
Command-line switches Sets the ASPI driver to report a read/write as successful only when the data has been transferred to the physical medium. Useful when using older or unreliable tape devices or sequential media. -tapespeed=x Allows control of tape speed. Where x equals 0 to F. 0 is default, 1-F increases tape speed. -
Page 64
Appendix A: Norton Ghost command-line switches -z or -z1 low compression (fast) -z2 high compression (medium) -z3 thru -z9 higher compression (slower) -
Page 65: Appendix B Frequently Asked Questions
Frequently asked questions When I compare the contents of the original source disk to the disk Norton Ghost created there is a difference in the number of files. Why? In addition to files skipped using the -skip switch, some temporary files are not included when cloning a FAT volume.
-
Page 66
Appendix B: Frequently asked questions Can Norton Ghost compress an image file? Yes. Norton Ghost includes several levels of compression that offer a range of performance and storage gains. After cloning and restarting Windows 95, Windows 95 keeps finding a new NIC card. -
Page 67: Appendix C Troubleshooting
“Diagnostics” on page 69 for information on the ghost.err file generated when an abort error occurs. Further information is available on Symantec’s Norton Ghost technical support website. See “Symantec Service and Support Solutions.” 8005, 8012 Norton Ghost is being run in a non-DOS environment. Either boot the system to DOS or create a DOS boot disk with required device drivers to start the system and run Norton Ghost.
-
Page 68
Norton Ghost to continue. You can locate the offender by looking at the drive:pathfilename at the bottom of the Norton Ghost window when this error occurs. Visit the Symantec website at www.symantec.com for details on how to purchase Norton Ghost. 15150 Probable corrupt image file. -
Page 69: Appendix D Diagnostics
Diagnostics This appendix contains information that may be helpful for diagnostic purposes. Hard drive detection and diagnostic information Norton Ghost has the ability to generate several different diagnostic reports outlining the hard drive devices detected, other system-related information, and error conditions when they are detected. Norton Ghost abort error file (ghost.err) An error message consists of an error number, a description, and possibly a suggestion of what can be done to remedy the problem.
-
Page 70: Hard Disk Geometry Diagnostics
Appendix D: Diagnostics Hard disk geometry diagnostics A list of all detected hard drives on the system and their associated geometry values can be reported to screen using the command line switch -di. To generate a file containing the details, the DOS redirect output can be used as shown in the following example: c: >…
-
Page 71: Symantec Service And Support Solutions
Symantec Service and Support Solutions Symantec is committed to excellent service worldwide. Our goal is to provide you with professional assistance in the use of our software and services, wherever you are located. Technical Support and Customer Service solutions vary by country. If you have questions about the services described below, please refer to the section “Worldwide Service and Support”…
-
Page 72
Symantec online support technicians. File downloads Point your web browser to http://service.symantec.com to search for and download technical notes and software updates. You can also click the LiveUpdate button in programs enabled with this feature to automatically download and install software updates and virus definitions. -
Page 73
Technical information may still be available through online support. When Symantec announces that a product will no longer be marketed or sold, telephone support will be discontinued 60 days later. Support will only be available for discontinued products through online services. -
Page 74
+61 (2) 9817 4550 Most International Partners provide Customer Service and Technical Support for Symantec products in your local language. For more information on other Symantec and International Partner locations, please call our Technical Support automated fax retrieval service, in the United States at +1 (541) 984-2490, choose Option 2, and request document 1400. -
Page 75: Disk Replacement Form
Street Address (No P.O. Boxes, Please) _______________________________________________________________________________________ City ________________________________________________________________________State _______ Zip/Postal Code _________________ Country* __________________________________________________________Daytime Phone _______________________________________ Software Purchase Date___________________________________________________________________________________________________ *This offer limited to U.S., Canada, and Mexico. Outside North America, contact your local Symantec office or distributer. Briefly describe the problem:_______________________________________________________________________________________________ _____________________________________________________________________________________________________________________ Disk Replacement Price $ 10.00…
-
Page 76
Disk Replacement Form… -
Page 77
conversion from FAT16, 56 NTFS abort log, 48, 69 switches, 59–60 ASPI driver, 17, 22 files automation skipping, 61 clone switch and examples, 48 fingerprint. See Ghost close on completion, 57 format NetBIOS, 59 logical, 7 reboot on completion, 61 switches, 47–63 version checking, 63 Ghost… -
Page 78: Index
Index See also image files multi-segment See also slave See also image files spanned partition features, 39 cloning, 7 loading, 43 peer to peer connection multi-segment, 40–43, 48, 62 LPT. See parallel port transfer password, 61 procedures, 21–23 SCSI tape, 43 disk, 24–31 size limited.
-
Page 79
Index tape drive See image files See SCSI tape uninstalling, 16 Windows — running Ghost inside, 23 Zip drive. See image files spanned… -
Page 80
Index…
Norton Ghost User’s Guide
Thesoftwaredescribedinthisbookisfurnishedunderalicenseagreementandmaybeused only in accordance with the terms of the agreement.
Documentation version 8.0
Legal Notice
Copyright © 2008 Symantec Corporation.
All rights reserved.
Federalacquisitions:CommercialSoftware — GovernmentUsersSubjecttoStandardLicense
Terms and Conditions.
Symantec,theSymantecLogo,LiveUpdate,SymantecpcAnywhere,SymantecBackupExec, Norton, Symantec NetBackup, and Symantec Backup Exec Restore Anyware are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, .NET, and the Windows logo are registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. VeriSign® is a registered trademark of Verisign, Inc.
Gear Software is a registered trademark of GlobalSpec, Inc.
Google and Google Desktop are trademarks of Google, Inc.
Maxtor OneTouch is a trademark of Maxtor Corporation.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THEDOCUMENTATIONISPROVIDED»ASIS»ANDALLEXPRESSORIMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLYINVALID.SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTAL ORCONSEQUENTIALDAMAGESINCONNECTIONWITHTHEFURNISHINGPERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
TheLicensedSoftwareandDocumentationaredeemedtobe»commercialcomputersoftware»
and»commercialcomputersoftwaredocumentation»asdefinedinFARSections12.212and DFARS Section 227.7202.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014 USA
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product feature and function,installation,andconfiguration.TheTechnicalSupportgroupalsoauthors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
Symantec’s maintenance offerings include the following:
■A range of support options that give you the flexibility to select the right amount of service for any size organization
■A telephone and web-based support that provides rapid response and up-to-the-minute information
■Upgrade insurance that delivers automatic software upgrade protection
■Global support that is available 24 hours a day, 7 days a week worldwide. Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program
■Advanced features, including Technical Account Management
For information about Symantec’s Maintenance Programs, you can visit our Web site at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support. The specific features that are available may vary based on the level of maintenance that was purchased and the specific product that you are using.
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support information at the following URL:
www.symantec.com/techsupp/
Select your region or language under Global Support.
Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be atthecomputeronwhichtheproblemoccurred,incaseitisnecessarytorecreate the problem.
When you contact Technical Support, please have the following information available:
■Product release level
■Hardware information
■Available memory, disk space, and NIC information
■Operating system
■Version and patch level
■Network topology
■Router, gateway, and IP address information
■Problem description:
■Error messages and log files
■Troubleshooting that was performed before contacting Symantec
■Recent software configuration changes and network changes
Licensing and registration
IfyourSymantecproductrequiresregistrationoralicensekey,accessourtechnical support Web page at the following URL:
www.symantec.com/techsupp/
SelectyourregionorlanguageunderGlobalSupport,andthenselecttheLicensing and Registration page.
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support.
Customer Service is available to assist with the following types of issues:
■Questions regarding product licensing or serialization
■Product registration updates such as address or name changes
■General product information (features, language availability, local dealers)
■Latest information about product updates and upgrades
■Information about upgrade insurance and maintenance contracts
■Information about the Symantec Value License Program
■Advice about Symantec’s technical support options
■Nontechnical presales questions
■Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:
■Asia-Pacific and Japan: contractsadmin@symantec.com
■Europe, Middle-East, and Africa: semea@symantec.com
■North America and Latin America: supportsolutions@symantec.com
Additional Enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
SymantecEarlyWarningSolutions |
These solutions provide early warning of cyber attacks, comprehensive threat |
analysis, and countermeasures to prevent attacks before they occur. |
|
Managed Security Services |
Theseservicesremovetheburdenofmanagingandmonitoringsecuritydevices |
and events, ensuring rapid response to real threats. |
|
Consulting Services |
Symantec Consulting Services provide on-site technical expertise from |
Symantecanditstrustedpartners.SymantecConsultingServicesofferavariety |
|
of prepackaged and customizable options that include assessment, design, |
|
implementation, monitoring and management capabilities, each focused on |
|
establishingandmaintainingtheintegrityandavailabilityofyourITresources. |
|
Educational Services |
Educational Services provide a full array of technical training, security |
education, security certification, and awareness communication programs. |
To access more information about Enterprise services, please visit our Web site at the following URL:
www.symantec.com
Select your country or language from the site index.
Contents
Technical Support ………………………………………………………………………………….. |
3 |
|
Chapter 1 |
Introducing Norton Ghost™ ……………………………………….. |
13 |
Getting started …………………………………………………………………. |
13 |
|
What’s new in Norton Ghost 14.0 ……………………………………………. |
14 |
|
New features and enhancements added in the previous |
||
release ………………………………………………………………… |
15 |
|
About the Advanced page …………………………………………………….. |
17 |
|
Where to find more information ……………………………………………… |
18 |
|
Chapter 2 |
Installing Norton Ghost ……………………………………………… |
19 |
Preparing for installation ……………………………………………………… |
19 |
|
System requirements …………………………………………………….. |
19 |
|
Supported file systems and removable media ………………………… |
20 |
|
Unavailable features ……………………………………………………… |
21 |
|
Installing Norton Ghost ……………………………………………………….. |
22 |
|
Completing the installation ……………………………………………… |
24 |
|
Activating Norton Ghost later …………………………………………… |
25 |
|
Setting up your first backup …………………………………………….. |
25 |
|
Updating Norton Ghost ……………………………………………………….. |
25 |
|
Uninstalling the product ………………………………………………………. |
26 |
|
Chapter 3 |
Ensuring the recovery of your computer …………………… |
27 |
About ensuring the recovery of your computer ……………………………. |
27 |
|
Testing Symantec Recovery Disk …………………………………………….. |
28 |
|
If driver validation fails ……………………………………………………….. |
28 |
|
Creating a custom Symantec Recovery Disk CD ……………………………. |
29 |
|
Chapter 4 |
Getting Started ………………………………………………………….. |
31 |
Key product components ……………………………………………………… |
31 |
|
How you use Norton Ghost ……………………………………………………. |
32 |
|
Starting Norton Ghost …………………………………………………………. |
33 |
|
Configuring Norton Ghost default options …………………………………. |
34 |
|
Selecting a default backup destination ………………………………… |
36 |
8Contents
Adjusting the effects of a backup on computer performance ……….. |
37 |
|
Adjusting default tray icon settings ……………………………………. |
38 |
|
Managing file types ……………………………………………………… |
39 |
|
Using aliases for external drives ………………………………………… |
41 |
|
Configuring FTP settings for use with Offsite Copy ………………….. |
42 |
|
Logging Norton Ghost messages ……………………………………….. |
42 |
|
Enabling email notifications for product (event) messages …………. |
44 |
|
Chapter 5 |
Best practices for backing up your data …………………… |
47 |
About backing up your data …………………………………………………… |
47 |
|
Choosing a backup type ……………………………………………………….. |
48 |
|
Best practices for backing up ………………………………………………… |
48 |
|
About backups …………………………………………………………….. |
49 |
|
Before you back up ……………………………………………………….. |
49 |
|
During a backup …………………………………………………………… |
51 |
|
When the backup is complete …………………………………………… |
51 |
|
Additional tips about backups ………………………………………………… |
52 |
|
After defining your backup job ……………………………………………….. |
53 |
|
Viewing the properties of a backup job ………………………………… |
53 |
|
About selecting a backup destination ………………………………………. |
54 |
|
About backing up dual-boot computers …………………………………….. |
56 |
|
Chapter 6 |
Backing up entire drives ……………………………………………. |
57 |
Defining a drive-based backup ………………………………………………. |
57 |
|
Running a One Time Backup …………………………………………….. |
63 |
|
Files excluded from drive-based backups ……………………………… |
65 |
|
About network credentials ………………………………………………. |
66 |
|
Run command files during a backup …………………………………… |
66 |
|
Setting advanced options for drive-based backups ………………………… |
68 |
|
Editing advanced backup options ………………………………………. |
69 |
|
About recovery point encryption ………………………………………. |
70 |
|
Verifying a recovery point after creation ……………………………… |
71 |
|
Viewing the progress of a backup ………………………………………. |
72 |
|
About setting a compression level for drive-based backups ………………. |
72 |
|
About Offsite Copy …………………………………………………………….. |
73 |
|
How Offsite Copy works ……………………………………………………….. |
73 |
|
Using external drives as your Offsite Copy destination ……………… |
74 |
|
Using a network server as your Offsite Copy destination ……………. |
75 |
|
Using an FTP server as your Offsite Copy destination ……………….. |
76 |
Contents 9
Chapter 7 |
Backing up files and folders ………………………………………. |
79 |
Defining a file and folder backup ……………………………………………. |
79 |
|
Folders excluded by default from file and folder backups ………………… |
82 |
|
Chapter 8 |
Running and managing backup jobs …………………………. |
83 |
Running an existing backup job immediately ……………………………… |
83 |
|
Run a backup with options ………………………………………………. |
84 |
|
Adjusting the speed of a backup …………………………………………….. |
85 |
|
Stopping a backup or recovery task ………………………………………….. |
86 |
|
Verifying that a backup is successful ……………………………………….. |
86 |
|
Editing backup settings ……………………………………………………….. |
87 |
|
Enabling event-triggered backups …………………………………………… |
87 |
|
Enabling Symantec ThreatCon Response ……………………………… |
88 |
|
Editing a backup schedule ……………………………………………………. |
89 |
|
Turning off a backup job ……………………………………………………… |
90 |
|
Deleting backup jobs ………………………………………………………….. |
90 |
|
Adding users who can back up your computer …………………………….. |
90 |
|
Chapter 9 |
Backing up remote computers from your |
|
computer ………………………………………………………………. |
93 |
|
About backing up other computers from your computer …………………. |
93 |
|
Adding computers to the Computer List …………………………………….. |
94 |
|
Deploying the agent ……………………………………………………………. |
95 |
|
Using the Norton Ghost Agent ………………………………………………. |
97 |
|
Managing the agent through Windows Services …………………………… |
98 |
|
Best practices for using services …………………………………………….. |
99 |
|
Opening Services ……………………………………………………….. |
100 |
|
Starting or stopping the agent service ……………………………….. |
100 |
|
Setting up recovery actions when the agent does not start ………… |
101 |
|
Viewing Norton Ghost Agent dependencies …………………………. |
102 |
|
Controlling access to Norton Ghost ……………………………………….. |
103 |
|
Running Norton Ghost using different user rights …………………. |
105 |
|
Chapter 10 |
Monitoring the status of your backups ……………………. |
107 |
About monitoring backups ………………………………………………….. |
107 |
|
Rescanning a computer’s hard disk …………………………………… |
108 |
|
Monitoring backup protection from the Home page …………………….. |
108 |
|
Monitoring backup protection from the Status page ……………………. |
109 |
|
Configuring Norton Ghost to send SNMP traps …………………………… |
112 |
|
About the Norton Ghost management information base ………….. |
113 |
10 Contents
Customize status reporting ………………………………………………….. |
113 |
|
Viewing drive details …………………………………………………………. |
114 |
|
Improving the protection level of a drive ………………………………….. |
115 |
|
Using event log information to troubleshoot problems …………………. |
116 |
|
Chapter 11 |
Exploring the contents of a recovery point ……………… |
119 |
About exploring recovery points …………………………………………… |
119 |
|
Exploring a recovery point through Windows Explorer …………………. |
120 |
|
Mounting a recovery point from Windows Explorer ………………… |
121 |
|
Opening files within a recovery point ……………………………………… |
121 |
|
Using a search engine ………………………………………………………… |
122 |
|
Unmounting a recovery point drive ……………………………………….. |
123 |
|
Viewing the drive properties of a recovery point …………………………. |
123 |
|
Chapter 12 |
Managing backup destinations ……………………………….. |
125 |
About backup destinations ………………………………………………….. |
125 |
|
How backup data works ……………………………………………………… |
125 |
|
About drive-based backups …………………………………………….. |
126 |
|
About file and folder backups ………………………………………….. |
126 |
|
Managing recovery points …………………………………………………… |
127 |
|
Cleaning up old recovery points ……………………………………….. |
127 |
|
Deleting a recovery point set …………………………………………… |
128 |
|
Deleting recovery points within a set …………………………………. |
128 |
|
Making copies of recovery points …………………………………….. |
129 |
|
Converting a recovery point to a virtual disk format …………………….. |
130 |
|
Managing file and folder backup data ……………………………………… |
133 |
|
Viewing how much file and folder backup data is being |
||
stored ………………………………………………………………… |
133 |
|
Limiting the number of file versions to keep ………………………… |
134 |
|
Manually deleting files from your file and folder backup ………….. |
134 |
|
Finding versions of a file or folder …………………………………….. |
134 |
|
Automating management of backup data …………………………………. |
135 |
|
Moving your backup destination ……………………………………………. |
136 |
|
Chapter 13 |
Recovering files, folders, or entire drives ………………… |
139 |
About recovering lost data ………………………………………………….. |
139 |
|
Recovering files and folders by using file and folder backup data ……… |
139 |
|
Recovering files and folders by using a recovery point ………………….. |
141 |
|
Opening files and folders stored in a recovery point ……………….. |
143 |
|
If you cannot find the files or folders you want ……………………… |
143 |
|
Recovering a secondary drive ……………………………………………….. |
144 |
Contents 11
About LightsOut Restore …………………………………………………….. |
147 |
|
Setting up and using LightsOut Restore ……………………………… |
147 |
|
Configuring LightsOut Restore ………………………………………… |
148 |
|
Chapter 14 |
Recovering a computer …………………………………………….. |
151 |
About recovering a computer ………………………………………………. |
151 |
|
Starting a computer by using the recovery environment ……………….. |
152 |
|
Configuring your computer to boot from a CD ………………………. |
153 |
|
Preparing to recover a computer ……………………………………………. |
154 |
|
Scanning for viruses ……………………………………………………. |
154 |
|
Checking your hard disk for errors ……………………………………. |
156 |
|
Recovering a computer ……………………………………………………… |
156 |
|
Restoring multiple drives by using a system index file ………………….. |
160 |
|
Recovering files and folders from the recovery environment ………….. |
161 |
|
Exploring your computer ………………………………………………. |
163 |
|
Using the networking tools in the recovery environment ………………. |
163 |
|
Starting networking services ………………………………………….. |
163 |
|
Using the pcAnywhere thin host for a remote recovery …………… |
163 |
|
Mapping a network drive in the recovery environment ……………. |
166 |
|
Configuring network connection settings …………………………… |
166 |
|
Viewing properties of recovery points and drives ………………………… |
167 |
|
Viewing properties of a recovery point ………………………………. |
168 |
|
Viewing the properties of a drive within a recovery point …………. |
168 |
|
About the Support Utilities …………………………………………………. |
169 |
|
Chapter 15 |
Copying a drive ………………………………………………………… |
171 |
About copying a drive ………………………………………………………… |
171 |
|
Preparing to copy drives …………………………………………………….. |
171 |
|
Copying one hard drive to another hard drive ……………………………. |
172 |
|
Drive-to-drive copying options ………………………………………… |
173 |
|
Appendix A |
Using a search engine to search recovery points ……. |
175 |
About using a search engine to search recovery points ………………….. |
175 |
|
Enabling search engine support ……………………………………………. |
175 |
|
Recovering files using Google Desktop’s Search Desktop feature ………. |
177 |
|
If a file cannot be found using Google Desktop ……………………… |
178 |
|
Index ……………………………………………………………………………………………………. |
179 |
12 Contents
Chapter 1
Introducing Norton Ghost™
This chapter includes the following topics:
■Getting started
■What’s new in Norton Ghost 14.0
■About the Advanced page
■Where to find more information
Getting started
Norton Ghost provides advanced backup and recovery for your computer. Protect yourdocuments,financialrecords,presentations,photos,music,videos,historical documents, or any other kinds of data you keep on your computer by making a backup of your computer’s entire hard disk. Or, limit your backup to include only those files and folders that mean the most to you.
You can schedule backups to capture your changes automatically as you work from day to day. Or start a backup manually at any time. You can also easily configureNortonGhosttorunabackupinresponsetospecificevents.Forexample, abackupcanbestartedwhenaparticularapplicationisstarted,orwhenaspecified amount of new data has been added to the drive.
When you experience a problem with your computer, you can restore a file, folder, or an entire drive, to return your computer to a previous, working state with the operating system, applications, and data files intact. Or if you accidently delete a personal file, get it back with a few simple steps.
14Introducing Norton Ghost™
What’s new in Norton Ghost 14.0
Using easy-to-follow wizards, set up fast and reliable backups that run while you continue to work. Or schedule your backups to run after hours when you are no longer using your computer.
When disaster strikes, Norton Ghost helps you recover your computer from the effects of many common problems, including
■Virus attacks: Damage might be done before a virus is quarantined.
■Faulty software installations: Some software can negatively affect your computer’s performance, slowing it down to the point that opening programs or documents can require too much time. But once installed, uninstalling a product might not recover unintentional damage done during an install.
■Hard drive failure: Data can become corrupted on your system drive (typically C), making it impossible to start your operating system
■Filesaccidentallydeletedoroverwritten:Accidentaldeletionoffilesiscommon, but often costly.
■Corrupted files: Individual files and folders can become corrupted by viruses, or when a program used to modify them encounters an error.
What’s new in Norton Ghost 14.0
Norton Ghost includes many enhancements and new features. Refer to the following table for information about the latest features and enhancements:
Note: Not all features listed are available in all versions of this product.
Feature |
Description |
Support for NTFS partitions |
NortonGhostnowsupportsNTFSpartitions |
up to 16TB (formatted with 4k clusters). |
|
Offsite Copy |
The new Offsite Copy feature adds an |
additional level of protection to your data |
|
by copying recovery points to a second hard |
|
disk drive. You can use an external USB or |
|
FireWire drive, or copy them over the |
|
networktoaremotelocationthroughalocal |
|
area connection, or using FTP. |
|
See “About Offsite Copy” on page 73. |
Introducing Norton Ghost™ 15
What’s new in Norton Ghost 14.0
Create and manage aliases for your external drives
Symantec ThreatCon integration
Send Feedback tool
To help you more easily identify external drivesforuseasbackupdestinations,Norton Ghost lets you assign an alias to each externaldrive. Doingsodoesnotchangethe drive label, but is for use only when you are accessing those drives from within Norton Ghost.
See “Using aliases for external drives” on page 41.
Symantec ThreatCon is Symantec’s early threat warning system. You can now configure Norton Ghost to detect a change in the threat level whenever your computer isconnectedtotheInternet.Whenthethreat level meets or exceeds the level you specify, Norton Ghost automatically starts a backup job. You can specify a different ThreatCon level for each backup.
See “Enabling Symantec ThreatCon Response” on page 88.
We want to hear what you think. From the Homepage,youcannowshareyouropinion with us. We look at every comment we receive and consider how we can make our product better. Tell us what you think.
Help and Support center |
To help you help yourself, a new Help and |
Support dialog provides direct links to |
|
available resources for helping you to get |
|
the most out of Norton Ghost. |
New features and enhancements added in the previous release
If you are upgrading from an earlier release, you might be interested to know of the following enhancements added in previous releases of Norton Ghost.
Feature Description
Enhanced ease-of-use |
An improved user interface simplifies what you need to know and do to successfully |
back up or recover files, folders, or your entire computer. And for Norton Ghost experts, |
|
the Advanced page gives you a single view to most product features. |
16Introducing Norton Ghost™
What’s new in Norton Ghost 14.0
Feature |
Description |
Windows Vista support |
Norton Ghost has been designed and tested to run in the new Windows Vista operating |
system, and still supports previous versions of Windows. |
|
See “System requirements” on page 19. |
|
Improved Easy Setup |
Now setting up your first backup is even easier with the enhanced Easy Setup, which |
appears either during install (unless you choose to skip it), or automatically the first |
|
time you run Norton Ghost. Specify a few preferences, and Norton Ghost can start |
|
backing up your computer on a regular basis. |
|
File and folder backup |
Limit your backup to include a select set of files or folders. File and folder backups are |
especially useful if your backup storage space is limited and you make frequent changes |
|
to important documents that you want to back up. |
|
One Time backups |
Need to back up your data quickly? The new One Time Backup feature lets you define |
and run a backup at any time without saving the backup job for later use. |
|
Desktop search engine |
Search for and recover files stored in recovery points using Google Desktop™. |
support |
|
Convert a recovery point |
Convert recovery points to one of two virtual disk formats for use in a virtual |
to virtual disk format |
environment. |
LightsOut Restore |
Restore a computer from a remote location, regardless of the state of the computer, |
provided that its file system is intact. |
|
Simplifiedscheduleeditor |
You can now easily edit your existing backup schedules without having to click through |
multiple dialogs or complete the entire backup wizard again. |
|
Manage backup data |
Because recovery points and file and folder backup data require storage space, Norton |
Ghost gives you the freedom of where and how to handle the amount of disk space used |
|
for storing backup data. Norton Ghost offers simple tools for managing your backup |
|
data, and can even manage it for you automatically. |
|
Improved backup and |
The home page offers the backup protection status in a single view. But you can also |
recovery status |
usethenewBackupsCalendartoviewpastandupcomingscheduledbackupstoseehow |
protected your data really is. |
|
Automatic backup |
Norton Ghost automatically detects when a new storage device is connected to your |
destination detection |
computer, and can prompt you to change your default backup destination to the new |
drive. |
|
Browse lost or damaged |
Enhancedbrowsingoffilesandfoldersinsiderecoverypointsmakesrecoveryquickand |
files and folders |
easy; the new file and folder backup feature also lets you quickly search for and recover |
files or folders. |
Introducing Norton Ghost™ 17 |
|
About the Advanced page |
|
Feature |
Description |
Event-triggered backups |
In addition to scheduled and manual backups, Norton Ghost can detect certain events |
and run a backup automatically whenever they occur, providing an added level of |
|
protection for your computer. |
|
Performance throttling |
Manually adjust the effect of a running backup on the performance of your computer |
to better match your needs at the moment. This feature is especially useful if you are |
|
working on your computer and don’t want the backup process to slow you down. |
|
And if you know the demographics of your network traffic, you can now set network |
|
throttling to prevent network overload. |
|
Maxtor OneTouch™ |
If you have a Maxtor OneTouch™ external hard drive, you can back up your computer |
integration |
with the push of a button. No need to start Norton Ghost. |
Modifiable Symantec |
When you cannot start Windows, the newly enhanced Symantec Recovery Disk (SRD) |
Recovery Disk |
makes recovery easier than ever. |
If the Symantec Recovery Disk is missing specific drivers, use the Create Recovery Disk |
|
feature to create a modified Symantec Recovery Disk that includes the exact drivers |
|
needed to successfully boot your computer into the recovery enironment. |
|
Note: If you purchased Norton Ghost pre-installed on a new computer, some features |
|
intherecoveryenvironmentmayormaynotbeincluded,dependingonhowthecomputer |
|
manufacturerchosetoinstallit. Therecoveryenvironmenthaslikelybeenpre-installed |
|
on a special partition on your computer. |
About the Advanced page
The Advanced page offers experienced Norton Ghost users a single view of the mostcommonproductfeatures.IfyouhaveagoodunderstandingofNortonGhost, you might prefer to perform most tasks from the Advanced view.
Note: When refering to the documentation while using the Advanced page, the first one or two steps do not apply because they indicate where to access each feature from the other pages of the product interface. From that point on, follow the remaining steps of each procedure.
The Advanced page can be hidden from view if you do not plan to use it.
To hide the Advanced page
1Start Norton Ghost.
2On the View menu, click ShowAdvancedPage.
18Introducing Norton Ghost™
Where to find more information
To show the Advanced page
1Start Norton Ghost.
2On the View menu, click ShowAdvancedPage.
Where to find more information
TolearnmoreaboutNortonGhost,visitthenewHelpandSupportpage.Depending on which version and language of the product you have installed, the Help and Supportpageincludesone-clickaccesstomoreinformation,includingtheproduct help system, the product User’s Guide, and access to the Symantec Knowledge Base where you can find troubleshooting information.
To access Help and Support
1Start Norton Ghost.
2On the Home page, click Help>HelpandSupport.
Chapter 2
Installing Norton Ghost
This chapter includes the following topics:
■Preparing for installation
■Installing Norton Ghost
■Updating Norton Ghost
■Uninstalling the product
Preparing for installation
Before you install Norton Ghost, make sure that your computer meets the system requirements.
System requirements
Table 2-1 lists the system requirements for Norton Ghost. |
|||
Table 2-1 |
Minimum system requirements |
||
Component |
Minimum Requirements |
||
Operating system |
The following Windows 32or 64-bit operating systems are supported: |
||
■ Windows Vista Home Basic |
|||
■ Windows Vista Home Premium |
|||
■ |
Windows Vista Ultimate |
||
■ |
Windows Vista Business |
■ Windows XP Professional/Home (SP2 or later)
■ Windows XP Media Center
20Installing Norton Ghost
Preparing for installation
Table 2-1 |
Minimum system requirements (continued) |
||
Component |
Minimum Requirements |
||
RAM |
The following memory requirements are grouped by key components: |
||
■ Norton Ghost Agent: 256 MB |
|||
■ Norton Ghost user interface and Recovery Point Browser: 256 MB |
|||
■ Symantec Recovery Disk: 512 MB minimum |
|||
Note: If you are installing a multilingual or double-byte version of the product, you must |
|||
have a minimum of 768 MB of RAM to run the Symantec Recovery Disk. |
|||
■ Norton Ghost LightsOut Restore feature: 1 GB |
|||
Available hard |
■ |
Wheninstallingtheentireproduct:Approximately250to300MB,dependingonthelanguage |
|
disk space |
of the product you are installing |
||
■ Microsoft .NET Framework 2.0: 280 MB of hard disk space is required for 32-bit computers, |
|||
and 610 MB is required for 64-bit computers |
|||
■ |
Recoverypoints:Sufficientharddiskspaceonalocalharddiskornetworkserverforstoring |
||
recovery points. |
|||
The size of recovery points depends on the amount of data you have backed up and the type |
|||
of recovery point being stored. |
|||
See “Best practices for backing up ” on page 48. |
|||
■ Norton Ghost LightsOut Restore feature: 2 GB |
|||
CD-ROM or |
The drive can be any speed, but it must be capable of using as the startup drive from the BIOS. |
||
DVD-ROM drive |
Norton Ghost uses Gear Software technology. To verify that your CD writer or DVD writer is |
||
compatible, visit http://www.gearsoftware.com/support/recorders/index.cfm. You can look up |
|||
information about your writer if you know the name of the manufacturer and model number |
|||
of your writer. |
|||
Software |
The Microsoft .NET Framework 2.0 is required to run Norton Ghost. |
||
If the .NET Framework is not already installed, then you will be prompted to install it after |
|||
Norton Ghost is installed and your computer is rebooted. |
|||
Virtual platforms |
The following virtual platforms are supported: |
(for converted
■ VMware GSX Server 3.1 and 3.2
recovery points)
■ VMware Server 1.0 (replacement/rename for GSX Server)
■ VMware ESX Server 2.5 and 3.0
■ VMware Infrastructure 3 (replacement/rename for ESX Server)
■ Microsoft Virtual Server 2005 R2
Supported file systems and removable media
Norton Ghost supports the following file systems and removable media:
Installing Norton Ghost 21 |
|
Preparing for installation |
|
Supported file |
Norton Ghost supports FAT16, FAT16X, FAT32, FAT32X, NTFS, GUID Partition Table (GPT), |
systems |
dynamic disks, Linux Ext2, Linux Ext3, and Linux swap partitions. |
Note: YoumustdecryptencryptedNTFSdrivesbeforeyouattempttorestorethem. Youcannot |
|
view the files that are in a recovery point for an encrypted NTFS drive. |
|
Removable media |
You can save recovery points locally (that is, on the same computer where Norton Ghost is |
installed)ortomostCD-R,CD-RW,DVD-R(W),andDVD+RWrecorders.Youcanfindanupdated |
|
list of supported drives on the Symantec Web site. |
|
Norton Ghost also lets you save recovery points to most USB devices, 1394 FireWire devices, |
|
REV, Jaz, Zip drives, and magneto-optical devices. |
Unavailable features
Norton Ghost is packaged to meet various markets. Some features might not be available, depending on the product you have purchased. However, all features are documented. You should be aware of which features are included with the version of the product you have purchased. If a feature is not accessible in the product user interface, it is likely not included with your version of the product.
RefertotheSymantecWebsiteforinformationaboutfeaturesincludedwithyour version of Norton Ghost.
When you delay licensing
If you choose to delay installation of the product license (for a maximum of 30 days from the date of installation), the following features are unavailable until you install a valid license:
■Copy Drive
■Create Recovery Disk
■LightsOut Restore
■Convert to Virtual Disk
All other features are enabled during the 30 day grace period.
If you are using an Evaluation copy of the product, it also expires after 30 days. However, all features are enabled until the end of the evaluation period, at which time you must purchase the product or uninstall it. You can purchase a license at any time (even after the evaluation period expires) without reinstalling the software.
22Installing Norton Ghost
Installing Norton Ghost
Note: Ifthisproductcamepre-installedfromacomputermanufacturer,yourtrial periodcouldbeaslongas90days.Theproductlicensingoractivationpageduring install will indicate the duration of your trial period.
See “Activating Norton Ghost later” on page 25.
Installing Norton Ghost
Beforeyoubegin,youshouldreviewtherequirementsandscenariosforinstalling
Norton Ghost.
See “System requirements” on page 19.
Note: During the installation process, you might be required to restart the computer.Toensureproperfunctionalityafterthecomputerrestarts,logonagain usingthesameusercredentialsthatyouusedtologonwhenyouinstalledNorton Ghost.
The installation program scans your hardware for the required drivers. If the programdoesnotfindtherequireddrivers,youreceiveadrivervalidationmessage. If you receive this message, you should test the Symantec Recovery Disk (SRD). TestingtheSRDverifieswhetherthedriversarerequiredorifthedevicesonyour systemhavecompatibledriversthatareavailableontheSRD.Thedrivervalidation process should not interfere with your ability to install the product.
See “About ensuring the recovery of your computer” on page 27..
Warning: The SRD provides the tools that you need to recover your computer. It is included with your product either on a separate CD, or on your product CD, depending on the version of the product that you purchased. You should store the CD in a safe place.
To install Norton Ghost
1LogontoyourcomputerusingeithertheAdministratoraccountoranaccount that has administrator privileges.
2Insert the Norton Ghost product CD into the media drive of the computer.
The installation program should start automatically.
Installing Norton Ghost |
23 |
Installing Norton Ghost |
3If the installation program does not run, type the following command at a command prompt:.
<drive>:autorun.exe
where <drive> is the drive letter of your media drive.
4In the CD browser panel, click InstallNortonGhost.
5Read the license agreement, and then click Iacceptthetermsinthelicense agreement.
6Do one of the following:
■Click InstallNow to begin the installation.
■If you want to customize your settings, click CustomInstall, select or deselect the options you want installed, and then click InstallNow. Installation options include:
User Interface |
Installs the product user interface that is required for |
interacting with the Norton Ghost Service. |
|
Backup and |
The primary service that is required to back up or recover |
Recovery Service |
your computer. |
CD/DVD Support |
Required for backing up directly to CD/DVD, and for creating |
a customized Symantec Recovery Disk CD. A CD/DVD burner |
|
is required to use this feature. |
|
Recovery Point |
Enables you to browse, mount, copy, verify, and restore files |
Browser |
and folders using recovery points. |
LiveUpdate |
Keeps your Symantec software up-to-date with the latest |
product updates. |
|
Change |
Click this button if you want to install Norton Ghostto an |
alternate location. |
7If a driver that is used on your computer is not available on the Symantec Recovery Disk, you receive a notification message that includes the name of thedriver.Writedownthenameofthedriverfile,andthenclickOKtodismiss the message.
Drivers are critical in the event that you need to use the Symantec Recovery Disk CD to recover your system drive (the drive where your operating system is installed).
See “About ensuring the recovery of your computer” on page 27.
24Installing Norton Ghost
Installing Norton Ghost
8Click Finish to complete the installation.
9Remove the product CD from the media drive, and then click Yes to exit the installation wizard and restart the computer.
If you click No because you plan to restart your computer yourself at a later time, note that you cannot run Norton Ghost until after you restart your computer.
Completing the installation
Afteryouinstalltheproduct,youarepromptedtolicenseoractivateyourproduct. You can then run LiveUpdate to check for product updates, and then configure your first backup.
Note: Ifthisproductcamepre-installedfromacomputermanufacturer,yourtrial period could be as long as 90 days. Refer to the Activate later label.
To complete the installation
1In the Welcome panel, click Next.
If the product was installed by your computer manufacturer, the Welcome page might appear the first time that you run Norton Ghost.
2Do one of the following:
■Click I’vealreadypurchasedtheproductandhaveaproductkey.
Note: You can find the product key on the back of your product CD jacket. Do not lose the product key. You must use it when you install Norton Ghost.
■Click Activatelater to delay the activation of your license. After the trial period ends, the product will no longer work.
■IfthisproductisatrialversionofNortonGhostandyouwanttopurchase a product key, click SymantecGlobalStore to connect to the Symantec Web site.
3Click Next.
4Click RunLiveUpdate to check for any product updates since the product shipped.
5Click LaunchEasySetup to open the Easy Setup box when you complete the install process.
Installing Norton Ghost |
25 |
Updating Norton Ghost |
6ClickEnableGoogleDesktopFileandFolderRecoveryifyouwantuseGoogle Desktoptosearchyourrecoverypointsforthefilesandfoldersthatyouwant to recover.
If you select this option, Norton Ghost automatically catalogs each file as it creates a recovery point. Google Desktop can then use this catalog to search for files by name. It does not index the content of the files.
Note: This option is available only if Google Desktop already is installed on your computer. If you plan to install Google Desktop, you can enable search engine support later.
7Click Finish.
Activating Norton Ghost later
IfyoudonotactivateNortonGhostbeforethetrialperiodends,thesoftwarestops working. However, you can activate the product at any time after the trial period expires.
To activate Norton Ghost at any time after installation
1On the Help menu, click UnlockTrialProduct.
2Refer to step 2 in the Tocompletetheinstallation procedure.
Setting up your first backup
Unless you unchecked the Run Easy Setup check box during the setup wizard, the Easy Setup window appears. If you don’t run Easy Setup during the setup wizard, it appears the first time you open the Run or Manage Backups window.
When the Easy Setup window opens, you can either accept the default drive and file and folder backup settings, or you can click on any of the settings to modify them.
If you want the new backup to run immediately, be sure to select Run backup now, and then click OK.
Updating Norton Ghost
You can receive software updates that are associated with your version of the product over your Internet connection. LiveUpdate connects to the Symantec LiveUpdate server and automatically downloads and installs updates for each Symantec product that you own.
26Installing Norton Ghost
Uninstalling the product
You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates.
To update Norton Ghost
1On the Help menu, click LiveUpdate.
2In the LiveUpdate window, click Start to select the updates. Follow the on-screen instructions.
3When the installation is complete, click Close.
Some program updates might require that you restart your computer before the changes take effect.
Uninstalling the product
When you upgrade Norton Ghost from a previous version of the product, the installprogramautomaticallyuninstallsthepreviousversions. Ifneeded,youcan manually uninstall the product.
Follow your operating system’s instructions on how to uninstall software.
Chapter 3
Ensuring the recovery of your computer
This chapter includes the following topics:
■About ensuring the recovery of your computer
■Testing Symantec Recovery Disk
■If driver validation fails
■Creating a custom Symantec Recovery Disk CD
About ensuring the recovery of your computer
IfWindowsfailstostartoritdoesnotrunnormally,youcanrecoveryourcomputer by using the Symantec Recovery Disk (SRD). The drivers that are included on the recovery disk must match the drivers required to run your computer’s network cards and hard disks.
To help ensure that you have the drivers that you need to recover your computer, the installation process runs a driver validation test. The driver validation tool compares hardware drivers that are contained on the recovery disk with the drivers that are required to run your computer’s network cards and hard disks.
The installation process automatically runs the driver validation test. You can also run a validation test at anytime by running the Symantec Recovery Disk Wizard.
You should run the driver validation test any time you make changes to the NIC cards or storage controllers on a computer.
See “If driver validation fails” on page 28.
28Ensuring the recovery of your computer
Testing Symantec Recovery Disk
Note: Wirelessnetworkadapterdriversarenotsupportedbythedrivervalidation tool or by the SRD.
Testing Symantec Recovery Disk
You should test the SRD to ensure that the recovery environment runs properly on your computer.
Note: Depending on which version of the product you have purchased, the SRD is either included on your product CD, or as a separate CD. You should place the CD containing the SRD in a safe place. Should you lose the CD, you can create a new one if you have have a CD burner.
Testing the SRD allows you to identify and solve the following types of problems:
■You cannot boot into the recovery environment.
See “To configure your computer to boot from a CD” on page 153.
■You do not have the necessary storage drivers to access recovery points on the computer.
■You need information about your system to help you run the recovery environment.
To test the SRD
1RunthedrivervalidationtooltotestwhethertheSRDworkswiththenetwork cards and storage devices on the computer.
2Boot your computer using the SRD.
See “Starting a computer by using the recovery environment ” on page 152.
3Whenyouhavebootedintotherecoveryenvironment,dooneofthefollowing:
■If you want to store recovery points on a network, run a mock restore of arecoverypointthatisstoredonanetworktotestthenetworkconnection.
■If you want to store recovery points on the computer, run a mock restore of a recovery point that is stored locally to test the local hard-drive connection.
If driver validation fails
The driver validation test verifies whether the drivers for all storage devices and network cards in use by the computer are available in the recovery environment.
Ensuring the recovery of your computer 29
Creating a custom Symantec Recovery Disk CD
If the drivers are available on the recovery disk, you receive a validation message. If any drivers are missing from the recovery disk, the Driver Validation Results dialog appears.
Without access to the correct drivers, a device cannot be used while running the SRD. Therefore, if the recovery points required for recovering your computer are stored on a network or a local hard drive, you might not have access to them.
You can find the drivers and copy them to a CD or a floppy disk, or you can create a custom Symantec Recovery Disk CD.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
Creating a custom Symantec Recovery Disk CD
Even if driver validation succeeds and your Symantec Recovery Disk CD appears to work, you should create a custom Symantec Recovery Disk CD. A custom CD will contain your computer’s current network and storage device drivers, helping to ensure that in an emergency you can get to the recovery points required to restore your computer.
Note: You must have a writeable DVD/CD-RW drive to create a custom Symantec Recovery Disk.
To create a custom Symantec Recovery Disk CD
1Start Norton Ghost.
2Attach and turn on all storage devices and network devices that you want to make available.
3Insert the Symantec Recovery Disk CD into your CD-ROM drive.
4From the main Norton Ghost window, click Tasks>CreateRecoveryDisk, and then click Next.
5If prompted, click Browse, select the drive that contains the Symantec Recovery Disk CD, click OK, and then click Next.
6Do one of the following:
■Click Automatic(Recommended), and then click Next.
■Click Custom, and then click Next.
30Ensuring the recovery of your computer
Creating a custom Symantec Recovery Disk CD
Select this option only if you know which drivers to select.
7Follow the on-screen instructions to complete the wizard.
Warning: Be certain to test your new, customized Symantec Recovery Disk CD to make sure that it can start your computer and that you can access the drive containing your recovery points.
See “Testing Symantec Recovery Disk” on page 28.
Chapter 4
Getting Started
This chapter includes the following topics:
■Key product components
■How you use Norton Ghost
■Starting Norton Ghost
■Configuring Norton Ghost default options
Key product components
NortonGhostincludestwokeycomponents:theprogramitself,andtheSymantec
Recovery Disk.
Table 4-1 |
Key product components |
Key Component |
Description |
Norton Ghost program (user interface) |
The Norton Ghost program lets you define, schedule, and run backups of |
your computer. When you run a backup, recovery points of your computer |
|
are created, which you can then use to recover your entire computer, or |
|
individual drives, files, and folders. You can also manage recovery point |
|
storage (backup destination), and monitor the backup status of your |
|
computer to make sure your valuable data is backed up on a regular basis. |
32 Getting Started
How you use Norton Ghost
Table 4-1 |
Key product components (continued) |
Key Component |
Description |
Symantec Recovery Disk |
The Symantec Recovery Disk (SRD) is used to boot your computer into the |
recovery environment. If your computer’s operating system fails, use the |
|
SRD to recover your systemdrive (the drive where your operating system |
|
is installed). |
|
Note: Dependingonwhichversionoftheproductyouhavepurchased,the |
|
SRD is either included on your product CD, or as a separate CD. You should |
|
place the CD containing the SRD in a safe place. Should you lose the CD, |
|
you can create a new one if you have have a CD burner. |
|
See “About recovering a computer ” on page 151. |
How you use Norton Ghost
While Norton Ghost does the work of backing up your files, folders, or entire drives, you need to tell Norton Ghost what to backup, when to back it up, and where to put the backed up data.
Using Norton Ghost includes the following key tasks:
■Defining a backup
■Running a backup
■Recovering files, folders, or entire drives
Refer to the following figure to understand the relationship of these tasks.
Getting Started 33
Starting Norton Ghost
Figure 4-1 |
Using Norton Ghost |
Starting Norton Ghost
Norton Ghost is installed in the Windows Program Files folder by default. During installation, a program icon is installed in the Windows system tray from which you can open Norton Ghost. You can also open Norton Ghost from the Windows Start menu.
Note: To use the full version of Norton Ghost, you must activate the software.
See “Activating Norton Ghost later” on page 25.
34Getting Started
Configuring Norton Ghost default options
To start Norton Ghost
Do one of the following:
■On the classic Windows taskbar, click Start>Programs>NortonGhost.
■On the Windows XP or Windows Vista taskbar, click Start>AllPrograms >NortonGhost.
■In the Windows system tray, double-click the Norton Ghost tray icon.
■In the Windows system tray, right-click the Norton Ghost tray icon, and then click OpenNortonGhost.
Configuring Norton Ghost default options
TheOptionsdialogboxincludesseveralviewsthatletyouconfigurethefollowing
default settings: |
|
Options |
Description |
General |
Specifyadefaultlocationwhereabackupwillcreateandstore |
recoverypointsandfileandfolderbackupdata.Ifthelocation |
|
you choose is on a network, you can enter your user |
|
authentication information. |
|
See “Selecting a default backup destination ” on page 36. |
|
Performance |
Lets you specify a default speed for backup or recovery |
processes.MovingthesliderclosertoFastincreasesthespeed |
|
at which the program backs up or recovers your computer. |
|
However, choosing a slower speed could improve the |
|
performance of your computer, especially if you are working |
|
on your computer during a backup or recovery. |
|
Note: During a backup or recovery, you have the option to |
|
override this default setting to fit your needs at the time. |
|
You can also configure network throttling to limit the effects |
|
of backups on network performance. |
|
See “Adjusting the effects of a backup on computer |
|
performance” on page 37. |
|
See “Enabling network throttling ” on page 38. |
Getting Started 35 |
|
Configuring Norton Ghost default options |
|
Options |
Description |
Tray Icon |
You can turn the system tray icon on or off and specify |
whether to show only error messages when they occur, or to |
|
show both error messages and other information, such as the |
|
completion of a backup. |
|
See “Adjusting default tray icon settings ” on page 38. |
|
File Types |
Lets you manage file types and file type categories, which are |
used as a method for selecting the types of files you want |
|
included in a file and folder backup. |
|
See “Managing file types ” on page 39. |
|
Google Desktop |
If Google Desktop is installed on your computer when you |
install Norton Ghost, you have the option of enabling Google |
|
Desktopfileandfolderrecovery.Whenyouenablethisfeature, |
|
you can search for files (by file name) inside a recovery point |
|
that was created with search engine support enabled. |
|
IfGoogleDesktopisnotinstalledonyourcomputerwhenyou |
|
install Norton Ghost, you have the option of clicking a link to |
|
the Web site where you can download and install Google |
|
Desktop for free. |
|
See “About using a search engine to search recovery points” |
|
on page 175. |
|
External Drives |
Deleteorrenametheuniquenamesyouhavegiventoexternal |
drives used as backup and Offsite Copy destinations. |
|
See “Using aliases for external drives” on page 41. |
|
Configure FTP |
Specify default FTP settings to be used with Offsite Copy. |
See “Configuring FTP settings for use with Offsite Copy” |
|
on page 42. |
|
Log File |
Lets you specify the types of product messages to log (errors, |
warnings, and information), where to store the log file, and |
|
set a maximum file size for the log file. |
|
See “Logging Norton Ghost messages” on page 42. |
|
Event Log |
Lets you specify the types of product messages to log (errors, |
warnings, and information) in the Windows event log. |
|
See “Logging Norton Ghost messages” on page 42. |
36Getting Started
Configuring Norton Ghost default options
Options |
Description |
SMTP E-mail |
If you want a history of actions taken by Norton Ghost, or of |
error messages and warnings, you can choose to save them |
|
in a log file on your computer, or to have them emailed to an |
|
address you specify. |
|
See“Enablingemailnotificationsforproduct(event)messages |
|
” on page 44. |
|
SNMP Trap |
IfyouhaveaNetworkManagementSystem(NMS)application, |
you can enable SNMP Traps support to send notifications to |
|
you NMS application. |
|
See“ConfiguringNortonGhosttosendSNMPtraps”onpage112. |
To configure default options
1Start Norton Ghost and click Tasks>Options.
2Select an option you want to modify, make any necessary changes, and then click OK.
Selecting a default backup destination
You can specify the default destination for storing recovery points and file and folder backup data created when you run a backup. This default location is used if you do not specify a different location when you define a new backup.
To set a default backup destination
1On the menu bar, click Tasks>Options.
2Click General.
3Check Prependcomputernametobackupdatafilenames.
This is especially useful if you back up more than one computer to the same drive. For example, you might back up a laptop and a desktop computer to the same USB or network drive. By prepending the computer name to each backup data file name, you can more easily identify which backup data files belong to which computer.
Getting Started 37
Configuring Norton Ghost default options
4Check Savebackupfilestoauniquesubfolder if you want Norton Ghost to create a new subfolder that will serve as your backup destination.
Note: The new subfolder is given the same name as your computer. For example, if your computer name is «MyLaptop», the new subfolder would be named MyLaptop.
5Enter a path to a folder where you want to store recovery points and file and folder backup data, or click Browse to look for a location.
You cannot use an encrypted folder as your backup destination. If you want to encrypt your backup data to prevent another user from accessing it, refer to the Advanced options when you define or edit a backup.
6If you entered the path to a location on a network, enter the user name and password required to authenticate to the network.
7Click OK.
Adjusting the effects of a backup on computer performance
If you are working on your computer when a backup is running—especially one that is creating an independent recovery point—your computer might slow down. This is because Norton Ghost is using your computer’s hard disk and memory resources to perform the backup.
However, you can actually modify the speed of the backup as a way of minimizing the impact of Norton Ghost on your computer while you work.
To adjust the default effect of a backup on my computer’s performance
1On the main menu bar, click Tasks>Options.
2Click Performance.
3If you want to improve your computer’s speed performance, move the slider bar closer to Slow.
4If you want the backup to complete more quickly, move the slider bar closer to Fast.
5Click OK.
Note:Duringabackuporrecovery,you’llhavetheoptionofoverridingthisdefault setting to fit your needs at that moment.
See “Adjusting the speed of a backup ” on page 85.
38Getting Started
Configuring Norton Ghost default options
Enabling network throttling
Similar to computer performance adjustments, you can also limit the impact of a backup on network performance.
However,becausenetworkperformanceisaffectedbymanyvariables,youshould consider the following issues before enabling this feature:
■Networkcards:Isyournetworkwiredorwireless?Whatarethespeedsofyour network cards?
■Network backbone: What is the size of your network pipeline? Does it support 10 MB transfer rates, or 1 GB transfer rates?
■Networkserver:Howrobustisyourserverhardware?Howfastisitsprocessor? How much RAM does it have? Is it fast or slow?
■Backing up: How many computers are scheduled to back up at the same time?
■Network traffic: Are backups scheduled to run when network traffic is heavy or light?
Consider using this feature only when you know what your network can handle. If you schedule your backups at staggered intervals, and if you schedule them when network traffic is low, you will likley not need to use this feature.
Gather the required information about your network’s performance and then schedule backups accordingly. Then, if necessary, enable this feature and set the Maximum network throughput to a setting that matches the circumstances.
To enable network throttling
1On the main menu bar, click Tasks>Options.
2Click Performance.
3Check Enablenetworkthrottling.
4In the Maximum network throttling field, enter the maximum amount (in KB) of network throughput that Norton Ghost can send per second.
5Click OK.
Adjusting default tray icon settings
You can turn the system tray icon on or off and specify whether to show only error messages when they occur, or to show both error messages and other information, such as the completion of a backup.
Getting Started 39
Configuring Norton Ghost default options
To adjust default tray icon settings
1On the main menu bar, click Tasks>Options.
2Click TrayIcon and select one of the following:
Show system tray icon |
DisplaystheNortonGhosticoninthesystem |
tray. |
|
You must select this option to enable or |
|
disable any of the remaining options. |
|
Show missed backups |
Notifies you when a backup was scheduled |
but did not run. |
|
This can happen when your computer was |
|
turned off at the time a backup was |
|
scheduled to run. |
|
Show system tray questions |
Offers helpful prompts in the form of |
questions that can help you keep your data |
|
backed up. |
|
Show status messages |
Displays messages about the status of |
backup operations, such as notifying that a |
|
backup has started, or that your backup |
|
destination is getting full. |
|
Show error messages |
Displays error messages when errors occur |
sothatyoucanresolveanyissuesthatmight |
|
hinder data protection. |
3Click OK.
Managing file types
When you define a file and folder backup, file types are a quick way to include files you use the most. For example, if you keep music files on your computer, you canconfigureafileandfolderbackuptoincludeallmusicfiles(forexample,.mp3,
.wav).
The most common file types and extensions are already defined for you. But you can define additional file type categories as needed, and then edit them at any time. For example, if you install a new program that requires the use of two new file extensions (.pft and .ptp, for example), you can define a new file type and define the two file extensions for that category. Then when you define a file and folder backup, you can select the new category. When the backup is run, all files ending with .pft and .ptp are backed up.
40Getting Started
Configuring Norton Ghost default options
To create a new file type and extensions
1On the main menu bar, click Tasks>Options.
2Click FileTypes.
3At the bottom of the File types list, click the Addafiletype (+) button to add a file type category.
4Type a descriptive name of the new file type category, and then press Enter.
5AtthebottomoftheExtensionsforlist,clicktheAddanextension(+)button, and then type an asterisk (*) and a period, followed by the extension of the file type you want to define, and then press Enter.
6Click OK.
To edit a file type and extensions
1On the main menu bar, click Tasks>Options.
2Click FileTypes.
3Select a file type from the File types list, and then do one of the following:
■Click the Renameafiletype button (at the right of the — button) to edit the name of the selected file type.
■Select an extension in the Extensions for column and click the Rename anextension button (at the right of the — button) to edit the name of the extension.
■Click either the Restoredefaultfiletypeslist or the Restoredefault extensionlist button to restore all default file types or extensions.
Caution: Any file types and extensions you have set up are removed. Once removed, you will have to add them again manually.
4Click OK.
To delete a file type (and all of its extensions)
1On the main menu bar, click Tasks>Options.
2Select a file type in the File types column.
You cannot delete a default file type. You can delete all but one extension of adefaultfiletype,andyoucanaddadditionalextensionstoadefaultfiletype.
3Click the Removeafiletype (—) button , and then click OK.
Use this same procedure to remove file extensions from the Extensions for list.
Getting Started 41
Configuring Norton Ghost default options
Using aliases for external drives
When you choose an external drive for use with Norton Ghost as either a backup destination or an Offsite Copy destination, it can become confusing if you are usingmorethanonedrive,especiallywhentheassigneddriveletterchangeseach time you plug in the drive.
To help you manage these destinations, Norton Ghost lets you assign an alias to each external drive. Doing so does not change the drive label, but is for use only when you are accessing those drives from within Norton Ghost.
For example, you might be swapping out two different external drives used as Offsite Copy destinations during any given week. Depending on the drive labels assigned to each drive and whether or not the drive letter previously assigned has changed, it could become confusing as to which drive you are using at any given time.
However, by associating unique aliases to each drive, then as you use the drive withNortonGhost,thealiasesyouassignedappearinvariouslocationsinNorton Ghost.
Note: It is also a good idea to place physical labels on each external drive to help you manage the task of swapping the drives.
For example, if you assigned the alias, «Drive A: Monday» to one drive, and «Drive B: Wednesday» to a second drive, their aliases appear in Norton Ghost whenever the drives are plugged in to your computer.
See “About Offsite Copy” on page 73.
To make it even easier, the Options dialog box lets you see all of your alias drive names in one view. From this view, you can remove or edit existing names.
To remove or edit external drive aliases
1On the main menu bar, click Tasks>Options.
2Under Destinations, click ExternalDrives.
3Select an external drive from the list and then do one of the following:
■Click Remove to remove the alias associated with the external drive.
■Click Rename to modify the alias.
42Getting Started
Configuring Norton Ghost default options
Configuring FTP settings for use with Offsite Copy
File Transfer Protocol, or FTP, is the simplest and most secure way to copy files over the Internet. Norton Ghost serves as an FTP client to copy your recovery points to a remote FTP server as a secondary backup of your critical data.
The Options dialog box lets you configure basic FTP settings to help ensure that your recovery points are copied to your FTP server.
To configure default FTP settings
1On the main menu bar, click Tasks>Options.
2Under Destinations, click ConfigureFTP.
3Refer to the following table when making changes:
Connection mode: |
Passive(sometimeswritten»PASV»)modehelpsavoidconflicts |
Passive |
withsecuritysystems.Thismodeisnecessaryforsomefirewalls |
(Recommended) |
and routers because when using passive mode, the FTP client |
opens the connection to an IP Address and port that the FTP |
|
server supplies. |
|
Connection mode: |
Use active mode when connections or transfer attempts fail in |
Active |
passive mode, or when you receive data socket errors. When |
an FTP client connects using active mode, the server opens a |
|
connection to an IP Address and port that the FTP client |
|
supplies. |
|
Limit connection |
Specify the number of times Norton Ghost tries to connect to |
attempts to |
an FTP server before giving up. Norton Ghost can attempt a |
maximum of 100 times. |
|
Stop trying to |
Specify the number of seconds Norton Ghost tries to connect |
connect after |
to an FTP server before giving up. You can specify up to 600 |
seconds (10 minutes). |
|
Default port |
Specify the port of the FTP server that is listening for a |
connection. |
|
YoushouldconsulttheFTPserveradministratortobesurethat |
|
the port you specify is configured to recieve incoming data. |
Logging Norton Ghost messages
You can specify which product messages (errors, warnings, and information) are loggedastheyoccur,andwherethelogfileisstored.Productmessagescanprovide useful information about the status of backups or related events, and can also provide helpful information when you are troubleshooting.
Getting Started 43
Configuring Norton Ghost default options
Two logging methods are available: Norton Ghost logging, and the Windows application log.
From the Options page, you can configure both methods.
To configure a Norton Ghost log file
1On the main menu bar, click Tasks>Options.
2Under Notifications, click LogFile.
3Click the Selectthepriorityandtypeofmessages drop-down list and select the priority level at which a message should be logged.
All messages |
Send all messages, regardless of priority |
levels. |
|
Medium and high priority messages |
Send only medium and high priority |
messages. |
|
High priority messages only |
Send only high priority messages. |
No messages |
Do not send any messages, regardless of |
priority levels. |
4Select one or more of the following options:
■Errors
■Warnings
■Information
5In the Log file location field, enter a path to where the log file should be created and stored.
If you don’t know the path, click Browse and select a location.
6IntheMaximumfilesizefield,specifyamaximumsize(inkilobytes)thatthe log file is allowed to grow.
The file is kept within the limit you set by replacing the oldest logged items in the file with new items as they occur.
7Click OK.
To configure which product events are written to a Windows event log
1On the main menu bar, click Tasks>Options.
2Under Notifications, click EventLog.
44Getting Started
Configuring Norton Ghost default options
3Click the Selectthepriorityandtypeofmessages drop-down list and select the priority level at which a message should be logged.
All messages |
Send all messages, regardless of priority |
levels. |
|
Medium and high priority messages |
Send only medium and high priority |
messages. |
|
High priority messages only |
Send only high priority messages. |
No messages |
Do not send any messages, regardless of |
priority levels. |
4Select one or more of the following options:
■Errors
■Warnings
■Information
5Click OK.
Enabling email notifications for product (event) messages
Email notifications can be sent to a specified email address if there are any errors or warnings that occurred when a backup is run.
Note: If you do not have an SMTP server, this feature is unavailable to you.
Notificationscanalsobesenttothesystemeventlogandacustomlogfilelocated in the Agent folder of the product installation.
If notifications are not being delivered, check the setup of your SMTP server to ensure that it is functioning properly.
To enable email notifications
1On the main menu bar, click Tasks>Options.
2Under Notifications, click SMTPE-mail.
Getting Started 45
Configuring Norton Ghost default options
3Click the Selectthepriorityandtypeofmessages drop-down list and select the priority level at which an email should be sent.
All messages |
Send all messages, regardless of priority |
levels. |
|
Medium and high priority messages |
Send only medium and high priority |
messages. |
|
High priority messages only |
Send only high priority messages. |
No messages |
Do not send any messages, regardless of |
priority levels. |
4Select one or more of the following options:
■Errors
■Warnings
■Information
5In the To address text box, type the email address (for example, admin@domain.com) where notifications are to be sent.
6Ifdesired,typetheemailaddressofthesenderintheFromaddresstextfield. If you do not specify a From address, the name of the product will be used.
7In the SMTP server text box, type the path to the SMTP server that will send the email notification (for example, smtpserver.domain.com).
8From the SMTP Authentication drop-down box, select the method to use to authenticate to the SMTP server specified above.
9Enter your SMTP username and password.
If you are not sure what your username and password are, contact a system administrator.
10 Click OK.
46Getting Started
Configuring Norton Ghost default options
Chapter 5
Best practices for backing up your data
This chapter includes the following topics:
■About backing up your data
■Choosing a backup type
■Best practices for backing up
■Additional tips about backups
■After defining your backup job
■About selecting a backup destination
■About backing up dual-boot computers
About backing up your data
Tobackupyourcomputeroryourindividualfilesandfolders,youdothefollowing
steps:
■Define a backup
■Run the backup
See “How you use Norton Ghost” on page 32.
When you define a backup, you make the following decisions:
■What to back up (files and folders, or an entire drive)
■Where to store the backup data (backup destination)
■Whether or not to use Offsite Copy to copy backup data to remote locations
48Best practices for backing up your data
Choosing a backup type
■When to run the backup (automatically or manually)
■Whatcompressionlevelstospecifyforrecoverypoints,andwhethertoenable security settings (encryption and password protection).
■Which of the many other options you want to use. You can customize each backup according to your backup needs.
Choosing a backup type
There are two types of backups available:
■Drive-based backup: Backs up an entire hard drive
■File and folder backup: Backs up only the files and folders that you select Youcanusethefollowingguidelinestodeterminewhichtypeofbackuptochoose:
Drive-based backup |
Use this backup type to do the following: |
■ Back up and recover your computer’s system drive |
|
(typically, the C drive, which includes your operating |
|
system). |
|
■ Back up and recover a specific hard drive, such as a |
|
secondary drive (which is a drive other than the system |
|
drive on which your operating system is installed). |
|
■ Recover lost or damaged files or folders from a specific |
|
point in time. |
|
File and folder backup |
Use this backup type to do the following: |
■ Back up and recover specific files and folders, for |
|
example personal files that are stored in the My |
|
Documents folder. |
|
■ Back up and recover files of a specific type, for example |
|
music (.mp3 or .wav) or photographs (.jpg or .bmp). |
|
■ Recover a specific version of a file from a specific point |
|
in time. |
See “Before you back up” on page 49.
Best practices for backing up
As you prepare to back up your computer, review this information:
■Before you back up
■During a backup
Best practices for backing up your data |
49 |
Best practices for backing up |
■ When the backup is complete
About backups
When you back up your computer, you choose from two types of backups:
■drive-basedbackup: backs up an entire hard drive
■fileandfolderbackup: backs up only the files and folders you select
Which backup type you choose depends on what you are trying to protect and how much storage space you have to store backup data (recovery points, and file and folder backup data).
The following table highlights the key uses of each backup type:
Backup type |
Use to |
Drive-based backup |
■ Backupandrecoveryourcomputer(systemdrive,typically |
drive C) |
|
■ Back up and recover a specific hard drive (any secondary |
|
drive, drives other than your system drive) |
|
■ Recover lost or damaged files or folders using recovery |
|
points |
|
File and folder backup |
■ Back up and recover specific files and folders, such as |
personal files stored in the My Documents folder |
|
■ Back up and recover files of a specific type, such as music |
|
(.mp3, .wav) or photographs (.jpg, .bmp) |
Before you back up
Consider these best practices before defining and running your first backup:
Schedule backups when you know your computer will be turned on.
Use a secondary hard disk as your backup destination.
YourcomputermustbeturnedonandWindowsmust be running at the time a backup occurs. If not, any scheduled backups are skipped until the computer is turned on again. You then are prompted to run the missed backup.
See “Choosing a backup type” on page 48.
You should store recovery points on a hard disk other than your primary hard disk C. This practice helps ensure that you can recover your system in the event that your primary hard disk fails.
See“Aboutselectingabackupdestination”onpage54.
50Best practices for backing up your data
Best practices for backing up
Consider using external drives as your backup destination.
Give nicknames to your external drives to help you easily identify them
Use Offsite Copy
Run backups on a regular and frequent basis.
Usinganexternaldrivemakesyourbackupdatamore portable.Shouldyouneedtoremoveyourcriticaldata from a particular location, you can quickly grab an external drive on your way out the door.
See “About Offsite Copy” on page 73.
You can assign a nickname to each external drive to help keep track of where your backup data is stored for each computer you back up. Because drive letters canchangeeachtimeyouunplugandpluganexternal drive into your computer, a nickname ensures that you can always know which drive you are using when you are running Norton Ghost.
Using a nickname does not change the volume label of a drive. A nickname simply helps you identify the drive when using Norton Ghost.
Andthenicknamestickswiththedrive,sothatifyou plug the drive into a second computer running anothercopyofNortonGhost,thenicknameappears.
Note: You might also consider placing a sticky label on each drive that matches the nickname you’ve assigned.
See “Using aliases for external drives” on page 41.
Use Offsite Copy to copy your latest recovery points to either a portable storage device or a remote server. By copying recovery points to a portable hard disk, you can then take a copy of your data with you when you leave the office.
See “About Offsite Copy” on page 73.
Whenyoudefineyourbackups,schedulethemtorun frequentlysothatyouhaverecoverypointsthatspan at least the last two months.
See “Editing a backup schedule ” on page 89.
See “Defining a drive-based backup ” on page 57.
Loading…