background image

If the drivers are available on the recovery disk, you receive a validation message.
If any drivers are missing from the recovery disk, the Driver Validation Results
dialog appears.

Without access to the correct drivers, a device cannot be used while running the
SRD. Therefore, if the recovery points required for recovering your computer are
stored on a network or a local hard drive, you might not have access to them.

You can find the drivers and copy them to a CD or a floppy disk, or you can create
a custom Symantec Recovery Disk CD.

See

“Creating a custom Symantec Recovery Disk CD”

on page 29.

Creating a custom Symantec Recovery Disk CD

Even if driver validation succeeds and your Symantec Recovery Disk CD appears
to work, you should create a custom Symantec Recovery Disk CD. A custom CD
will contain your computer's current network and storage device drivers, helping
to ensure that in an emergency you can get to the recovery points required to
restore your computer.

Note:

You must have a writeable DVD/CD-RW drive to create a custom Symantec

Recovery Disk.

To create a custom Symantec Recovery Disk CD

1

Start Norton Ghost.

2

Attach and turn on all storage devices and network devices that you want to
make available.

3

Insert the Symantec Recovery Disk CD into your CD-ROM drive.

4

From the main Norton Ghost window, click Tasks > Create Recovery Disk,
and then click Next.

5

If prompted, click Browse, select the drive that contains the Symantec
Recovery Disk CD, click OK, and then click Next.

6

Do one of the following:

Click Automatic (Recommended), and then click Next.

Click Custom, and then click Next.

29

Ensuring the recovery of your computer

Creating a custom Symantec Recovery Disk CD

Summary of Contents for GHOST 14

Page 1: ...Norton Ghost ...

Page 2: ...ogle Desktop are trademarks of Google Inc Maxtor OneTouch is a trademark of Maxtor Corporation The product described in this document is distributed under licenses restricting its use copying distribution and decompilation reverse engineering No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors if any THED...

Page 3: ...hat delivers automatic software upgrade protection Global support that is available 24 hours a day 7 days a week worldwide Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program Advanced features including Technical Account Management For information about Symantec s Maintenance Programs you can visit our Web site at the following URL ww...

Page 4: ...upport Web page at the following URL www symantec com techsupp Select your region or language under Global Support and then select the Licensing and Registration page Customer service Customer service information is available at the following URL www symantec com techsupp Select your country or language under Global Support Customer Service is available to assist with the following types of issues...

Page 5: ...ly Enterprise services that are available include the following These solutions provide early warning of cyber attacks comprehensive threat analysis and countermeasures to prevent attacks before they occur Symantec Early Warning Solutions These services remove the burden of managing and monitoring security devices and events ensuring rapid response to real threats Managed Security Services Symante...

Page 6: ...To access more information about Enterprise services please visit our Web site at the following URL www symantec com Select your country or language from the site index ...

Page 7: ... 21 Installing Norton Ghost 22 Completing the installation 24 Activating Norton Ghost later 25 Setting up your first backup 25 Updating Norton Ghost 25 Uninstalling the product 26 Chapter 3 Ensuring the recovery of your computer 27 About ensuring the recovery of your computer 27 Testing Symantec Recovery Disk 28 If driver validation fails 28 Creating a custom Symantec Recovery Disk CD 29 Chapter 4...

Page 8: ...e properties of a backup job 53 About selecting a backup destination 54 About backing up dual boot computers 56 Chapter 6 Backing up entire drives 57 Defining a drive based backup 57 Running a One Time Backup 63 Files excluded from drive based backups 65 About network credentials 66 Run command files during a backup 66 Setting advanced options for drive based backups 68 Editing advanced backup opt...

Page 9: ...ur computer 93 About backing up other computers from your computer 93 Adding computers to the Computer List 94 Deploying the agent 95 Using the Norton Ghost Agent 97 Managing the agent through Windows Services 98 Best practices for using services 99 Opening Services 100 Starting or stopping the agent service 100 Setting up recovery actions when the agent does not start 101 Viewing Norton Ghost Age...

Page 10: ...27 Cleaning up old recovery points 127 Deleting a recovery point set 128 Deleting recovery points within a set 128 Making copies of recovery points 129 Converting a recovery point to a virtual disk format 130 Managing file and folder backup data 133 Viewing how much file and folder backup data is being stored 133 Limiting the number of file versions to keep 134 Manually deleting files from your fi...

Page 11: ...rking services 163 Using the pcAnywhere thin host for a remote recovery 163 Mapping a network drive in the recovery environment 166 Configuring network connection settings 166 Viewing properties of recovery points and drives 167 Viewing properties of a recovery point 168 Viewing the properties of a drive within a recovery point 168 About the Support Utilities 169 Chapter 15 Copying a drive 171 Abo...

Page 12: ...Contents 12 ...

Page 13: ...les and folders that mean the most to you You can schedule backups to capture your changes automatically as you work from day to day Or start a backup manually at any time You can also easily configure Norton Ghost to run a backup in response to specific events For example a backup can be started when a particular application is started or when a specified amount of new data has been added to the ...

Page 14: ... accidentally deleted or overwritten Accidental deletion of files is common but often costly Corrupted files Individual files and folders can become corrupted by viruses or when a program used to modify them encounters an error What s new in Norton Ghost 14 0 Norton Ghost includes many enhancements and new features Refer to the following table for information about the latest features and enhancem...

Page 15: ...on page 88 Symantec ThreatCon integration We want to hear what you think From the Home page you can now share your opinion with us We look at every comment we receive and consider how we can make our product better Tell us what you think Send Feedback tool To help you help yourself a new Help and Support dialog provides direct links to available resources for helping you to get the most out of Nor...

Page 16: ... disk format Restore a computer from a remote location regardless of the state of the computer provided that its file system is intact LightsOut Restore You can now easily edit your existing backup schedules without having to click through multiple dialogs or complete the entire backup wizard again Simplified schedule editor Because recovery points and file and folder backup data require storage s...

Page 17: ...reate a modified Symantec Recovery Disk that includes the exact drivers needed to successfully boot your computer into the recovery enironment Note If you purchased Norton Ghost pre installed on a new computer some features in the recovery environment may or may not be included depending on how the computer manufacturer chose to install it The recovery environment has likely been pre installed on ...

Page 18: ...and language of the product you have installed the Help and Support page includes one click access to more information including the product help system the product User s Guide and access to the Symantec Knowledge Base where you can find troubleshooting information To access Help and Support 1 Start Norton Ghost 2 On the Home page click Help Help and Support Introducing Norton Ghost Where to find...

Page 19: ...r computer meets the system requirements System requirements Table 2 1 lists the system requirements for Norton Ghost Table 2 1 Minimum system requirements Minimum Requirements Component The following Windows 32 or 64 bit operating systems are supported Windows Vista Home Basic Windows Vista Home Premium Windows Vista Ultimate Windows Vista Business Windows XP Professional Home SP2 or later Window...

Page 20: ...for backing up on page 48 Norton Ghost LightsOut Restore feature 2 GB Available hard disk space The drive can be any speed but it must be capable of using as the startup drive from the BIOS Norton Ghost uses Gear Software technology To verify that your CD writer or DVD writer is compatible visit http www gearsoftware com support recorders index cfm You can look up information about your writer if ...

Page 21: ...s are documented You should be aware of which features are included with the version of the product you have purchased If a feature is not accessible in the product user interface it is likely not included with your version of the product Refer to the Symantec Web site for information about features included with your version of Norton Ghost When you delay licensing If you choose to delay installa...

Page 22: ...s you receive a driver validation message If you receive this message you should test the Symantec Recovery Disk SRD Testing the SRD verifies whether the drivers are required or if the devices on your system have compatible drivers that are available on the SRD The driver validation process should not interfere with your ability to install the product See About ensuring the recovery of your comput...

Page 23: ...red for backing up directly to CD DVD and for creating a customized Symantec Recovery Disk CD A CD DVD burner is required to use this feature CD DVD Support Enables you to browse mount copy verify and restore files and folders using recovery points Recovery Point Browser Keeps your Symantec software up to date with the latest product updates LiveUpdate Click this button if you want to install Nort...

Page 24: ... In the Welcome panel click Next If the product was installed by your computer manufacturer the Welcome page might appear the first time that you run Norton Ghost 2 Do one of the following Click I ve already purchased the product and have a product key Note You can find the product key on the back of your product CD jacket Do not lose the product key You must use it when you install Norton Ghost C...

Page 25: ...host at any time after installation 1 On the Help menu click Unlock Trial Product 2 Refer to step 2 in the To complete the installation procedure Setting up your first backup Unless you unchecked the Run Easy Setup check box during the setup wizard the Easy Setup window appears If you don t run Easy Setup during the setup wizard it appears the first time you open the Run or Manage Backups window W...

Page 26: ...ons 3 When the installation is complete click Close Some program updates might require that you restart your computer before the changes take effect Uninstalling the product When you upgrade Norton Ghost from a previous version of the product the install program automatically uninstalls the previous versions If needed you can manually uninstall the product Follow your operating system s instructio...

Page 27: ...r computer s network cards and hard disks To help ensure that you have the drivers that you need to recover your computer the installation process runs a driver validation test The driver validation tool compares hardware drivers that are contained on the recovery disk with the drivers that are required to run your computer s network cards and hard disks The installation process automatically runs...

Page 28: ...er You need information about your system to help you run the recovery environment To test the SRD 1 Run the driver validation tool to test whether the SRD works with the network cards and storage devices on the computer 2 Boot your computer using the SRD See Starting a computer by using the recovery environment on page 152 3 When you have booted into the recovery environment do one of the followi...

Page 29: ...e a custom Symantec Recovery Disk CD A custom CD will contain your computer s current network and storage device drivers helping to ensure that in an emergency you can get to the recovery points required to restore your computer Note You must have a writeable DVD CD RW drive to create a custom Symantec Recovery Disk To create a custom Symantec Recovery Disk CD 1 Start Norton Ghost 2 Attach and tur...

Page 30: ...rd Warning Be certain to test your new customized Symantec Recovery Disk CD to make sure that it can start your computer and that you can access the drive containing your recovery points See Testing Symantec Recovery Disk on page 28 Ensuring the recovery of your computer Creating a custom Symantec Recovery Disk CD 30 ...

Page 31: ...uct components Description Key Component The Norton Ghost program lets you define schedule and run backups of your computer When you run a backup recovery points of your computer are created which you can then use to recover your entire computer or individual drives files and folders You can also manage recovery point storage backup destination and monitor the backup status of your computer to mak...

Page 32: ... the CD containing the SRD in a safe place Should you lose the CD you can create a new one if you have have a CD burner See About recovering a computer on page 151 Symantec Recovery Disk How you use Norton Ghost While Norton Ghost does the work of backing up your files folders or entire drives you need to tell Norton Ghost what to backup when to back it up and where to put the backed up data Using...

Page 33: ...ing installation a program icon is installed in the Windows system tray from which you can open Norton Ghost You can also open Norton Ghost from the Windows Start menu Note To use the full version of Norton Ghost you must activate the software See Activating Norton Ghost later on page 25 33 Getting Started Starting Norton Ghost ...

Page 34: ... is on a network you can enter your user authentication information See Selecting a default backup destination on page 36 General Lets you specify a default speed for backup or recovery processes Moving the slider closer to Fast increases the speed at which the program backs up or recovers your computer However choosing a slower speed could improve the performance of your computer especially if yo...

Page 35: ...alled on your computer when you install Norton Ghost you have the option of clicking a link to the Web site where you can download and install Google Desktop for free See About using a search engine to search recovery points on page 175 Google Desktop Delete or rename the unique names you have given to external drives used as backup and Offsite Copy destinations See Using aliases for external driv...

Page 36: ...ssary changes and then click OK Selecting a default backup destination You can specify the default destination for storing recovery points and file and folder backup data created when you run a backup This default location is used if you do not specify a different location when you define a new backup To set a default backup destination 1 On the menu bar click Tasks Options 2 Click General 3 Check...

Page 37: ...fects of a backup on computer performance If you are working on your computer when a backup is running especially one that is creating an independent recovery point your computer might slow down This is because Norton Ghost is using your computer s hard disk and memory resources to perform the backup However you can actually modify the speed of the backup as a way of minimizing the impact of Norto...

Page 38: ...e only when you know what your network can handle If you schedule your backups at staggered intervals and if you schedule them when network traffic is low you will likley not need to use this feature Gather the required information about your network s performance and then schedule backups accordingly Then if necessary enable this feature and set the Maximum network throughput to a setting that ma...

Page 39: ...ages when errors occur so that you can resolve any issues that might hinder data protection Show error messages 3 Click OK Managing file types When you define a file and folder backup file types are a quick way to include files you use the most For example if you keep music files on your computer you can configure a file and folder backup to include all music files for example mp3 wav The most com...

Page 40: ...me of the selected file type Select an extension in the Extensions for column and click the Rename an extension button at the right of the button to edit the name of the extension Click either the Restore default file types list or the Restore default extension list button to restore all default file types or extensions Caution Any file types and extensions you have set up are removed Once removed...

Page 41: ...me However by associating unique aliases to each drive then as you use the drive with Norton Ghost the aliases you assigned appear in various locations in Norton Ghost Note It is also a good idea to place physical labels on each external drive to help you manage the task of swapping the drives For example if you assigned the alias Drive A Monday to one drive and Drive B Wednesday to a second drive...

Page 42: ... in passive mode or when you receive data socket errors When an FTP client connects using active mode the server opens a connection to an IP Address and port that the FTP client supplies Connection mode Active Specify the number of times Norton Ghost tries to connect to an FTP server before giving up Norton Ghost can attempt a maximum of 100 times Limit connection attempts to Specify the number of...

Page 43: ...priority messages only Do not send any messages regardless of priority levels No messages 4 Select one or more of the following options Errors Warnings Information 5 In the Log file location field enter a path to where the log file should be created and stored If you don t know the path click Browse and select a location 6 In the Maximum file size field specify a maximum size in kilobytes that the...

Page 44: ... Enabling email notifications for product event messages Email notifications can be sent to a specified email address if there are any errors or warnings that occurred when a backup is run Note If you do not have an SMTP server this feature is unavailable to you Notifications can also be sent to the system event log and a custom log file located in the Agent folder of the product installation If n...

Page 45: ...ox type the email address for example admin domain com where notifications are to be sent 6 If desired type the email address of the sender in the From address text field If you do not specify a From address the name of the product will be used 7 In the SMTP server text box type the path to the SMTP server that will send the email notification for example smtpserver domain com 8 From the SMTP Auth...

Page 46: ...Getting Started Configuring Norton Ghost default options 46 ...

Page 47: ...ut backing up dual boot computers About backing up your data To back up your computer or your individual files and folders you do the following steps Define a backup Run the backup See How you use Norton Ghost on page 32 When you define a backup you make the following decisions What to back up files and folders or an entire drive Where to store the backup data backup destination Whether or not to ...

Page 48: ...drive which includes your operating system Back up and recover a specific hard drive such as a secondary drive which is a drive other than the system drive on which your operating system is installed Recover lost or damaged files or folders from a specific point in time Drive based backup Use this backup type to do the following Back up and recover specific files and folders for example personal f...

Page 49: ...iles and folders such as personal files stored in the My Documents folder Back up and recover files of a specific type such as music mp3 wav or photographs jpg bmp File and folder backup Before you back up Consider these best practices before defining and running your first backup Your computer must be turned on and Windows must be running at the time a backup occurs If not any scheduled backups a...

Page 50: ...ticks with the drive so that if you plug the drive into a second computer running another copy of Norton Ghost the nickname appears Note You might also consider placing a sticky label on each drive that matches the nickname you ve assigned See Using aliases for external drives on page 41 Give nicknames to your external drives to help you easily identify them Use Offsite Copy to copy your latest re...

Page 51: ...is running consider the following best practices If you are working at your computer and a backup starts to run you might notice that the performance of your computer slows down Norton Ghost requires significant system resources to run a backup If slowing occurs you can reduce the speed of the backup to improve computer performance until you are finished working See Adjusting the speed of a backup...

Page 52: ...gfileandfolderbackupdata onpage133 Manage storage space by eliminating old backup data Check the Status page on a regular basis to ensure that each drive has a defined backup Review the level of protection that is provided for each of your computer s drives Store backup copies of your recovery points in a safe place For example you can store them elsewhere on a network or you can store them on CDs...

Page 53: ...hibernation mode after a period of inactivity You should consider turning off the power management features during a scheduled backup If a backup is interrupted consider running it again If you experience problems while creating a backup you may need to reboot the computer After defining your backup job All backup jobs you define are automatically saved so that you can edit or run them later After...

Page 54: ...ended backups Inexpensive because drive space can be overwritten repeatedly Off site storage is possible Reserves hard drive space for other uses Although you can save the recovery point to the same drive that you are backing up it is not recommended for the following reasons As the number or size of recovery points grows you will have less disk space available for regular use The recovery point i...

Page 55: ...more than one media If more than one drive is being backed up the recovery points for each drive are stored independently on the media even if there is space to store recovery points from multiple drives on the same media The scheduling of backups is not available when this option is used Note Using CD RWs or DVD RWs as your recovery point storage location is not the best option because you will b...

Page 56: ...omputers You can back up dual boot computers even if you have drives partitions that are hidden in the operating system from which you run Norton Ghost When you run a drive backup the entire contents of each drive is captured in a recovery point When you restore a drive the recovered drive is bootable Note In order for your computer to boot the same from a restored system as it did from the origin...

Page 57: ...n then use that recovery point to restore individual files or folders or your entire computer For optimum protection you should define a drive based backup and run it on a regular basis By default scheduled independent recovery points or recovery point set names are appended with 001 v2i 002 v2i and so forth Recovery point set names are appended with _i001 iv2i _i002 iv2i and so forth For example ...

Page 58: ... that contain only incremental changes that were made to your computer since the previous recovery point Incremental recovery points are created faster than the base recovery point They also use less storage space than an independent recovery point Note You can only have one recovery point set defined for each drive The Recovery Point Set option is not available if you have already assigned a sele...

Page 59: ...opies your latest recovery points each time a backup completes to either a portable storage device such as an external drive or to a remote server either through a local area network connection or to a remote FTP server See About Offsite Copy on page 73 Add 9 If you want to make copies of your recovery points to store at a remote location for added backup protection do the following Click Add and ...

Page 60: ... set of files is valid or corrupt Verify recovery point after creation Select this option to limit the number of recovery point sets that can be saved for this backup You can limit the number of recovery point sets to reduce the risk of filling up the hard drive with recovery points Each new recovery point set replaces the oldest set on your backup destination drive Limit the number of recovery po...

Page 61: ...e drop down lists select the command file exe cmd bat that you want to run during a particular stage in the recovery point creation process and then specify the amount of time in seconds that you want the command to run before it is stopped If you added the command file to the CommandFiles folder you may need to click Back and then Next to see the files in each stage s drop down list See Run comma...

Page 62: ...to run automatically according to a schedule If you only want to run the backup when you start it manually uncheck Schedule and skip to the next step 17 Enter a start time and select the days of the week when the backup should run 18 Click the Start a new recovery point set drop down list and then select how frequently a new recovery point set should be started For example if you select Monthly a ...

Page 63: ...e 87 Event Triggers General 20 Click OK and then click Next 21 If you want to run the new backup immediately click Run backup now This option is not available if you configured an independent recovery point with the option to run it only once 22 Click Finish Running a One Time Backup The One Time Backup feature lets you quickly define and run a backup that creates an independent recovery point You...

Page 64: ...lt file names include the name of the computer followed by the drive letter Rename button If you want to save the recovery point on a network share type the user name and password for network access See About network credentials on page 66 Network Credentials 6 Click Next 7 On the Options page select from the following options Select one of the following compression levels for the recovery point N...

Page 65: ...rocess and then specify the amount of time in seconds that you want the command to run before it is stopped If you added the command file to the CommandFiles folder you may need to click Back and then Next to see the files in each stage s drop down list See Run command files during a backup on page 66 10 Click Next 11 Click Finish to run the backup Files excluded from drive based backups The follo...

Page 66: ...cluding network credentials Then when you create future backup jobs the dialog will default to the location you specified Another option would be to create a specific backup user account Then configure the Norton Ghost service to use this account Run command files during a backup You can use command files exe cmd bat during a backup You can use command files to integrate Norton Ghost with other ba...

Page 67: ... a batch file called STOP BAT that contains the following syntax Cscript script_filename vbs Make sure that Cscript precedes the file name of the Visual Basic script Warning The command files cannot depend on any user interaction or have a visible user interface You should test all command files independently of Norton Ghost before you use them during a backup When the backup begins the command fi...

Page 68: ...ry point creation process to stop immediately No other command files will run See How you use Norton Ghost on page 32 Before data capture This stage occurs after a snapshot is created Running a command during this stage is typically a safe point for allowing services to resume normal activity on the drive while continuing the recovery point creation Because the snapshot takes only a few seconds to...

Page 69: ... increases during the lifetime of the hard disk Ignore bad sectors during copy This option sets a password on the recovery point when it is created Passwords can include standard characters not extended characters or symbols Use characters with an ASCII value of 128 or lower A user must type this password before restoring a backup or viewing the contents of the recovery point Use password You can ...

Page 70: ...it While higher bit strengths require longer passwords the result is greater security for your data Table 6 2 explains the bit strength and required password length Table 6 2 Password length Password length Bit strength 8 characters or longer 128 Standard 16 characters or longer 192 Medium 32 characters or longer 256 High You must provide the correct password before you can access or restore an en...

Page 71: ...t of data if you selected a compression level at the time of creation Note The time required to create a recovery point is doubled when you use the Verify recover point after creation option To verify the integrity of a recovery point 1 On the Tools page click Run Recovery Point Browser 2 Select a recovery point and then click Open 3 In the tree panel of the Recovery Point Browser select the recov...

Page 72: ...aster than no compression because there is less data to write across the network None This option uses low compression for a 40 percent average data compression ratio on recovery points This setting is the default Standard recommended This option uses medium compression for a 45 precent average data compression ratio on recovery points Medium This option uses high compression for a 50 percent aver...

Page 73: ...very points to the destination that was added first If an Offsite Copy destination is unavailable Offsite Copy tries to copy recovery points to the second destination if it is available If neither destination is available then Offsite Copy copies the recovery points the next time an Offsite Copy destination becomes available For example suppose you have configured a backup job to run at 6 p m and ...

Page 74: ...s your backup job type You set up an external drive A as the first Offsite Copy destination and another external drive B as the second Offsite Copy destination You schedule the backup job to run every midnight except on the weekends You also enable recovery point encryption to protect the data that you take with you from unauthorized access See About recovery point encryption on page 70 Before you...

Page 75: ...rive A or B the latest recovery points are added to the drive This method gives you multiple points in time for recovering your computer in the event that the original backup destination drives fail or become unrecoverable Using external drives as your Offsite Copy destination ensures that you have a copy of your backup data stored at two separate physical locations Using a network server as your ...

Page 76: ... is configured correctly it copies recovery points to the directory that you specified on the FTP server If the server becomes unavailable for a period of time Offsite Copy copies all recovery points created since the last connection If there is no room to hold all of the recovery points available Offsite Copy removes the oldest recovery points from the FTP server making room for the newest recove...

Page 77: ...77 Backing up entire drives How Offsite Copy works ...

Page 78: ...Backing up entire drives How Offsite Copy works 78 ...

Page 79: ...t you have chosen to back up They are converted into a compressed format and then stored in a sub folder at the location you specify which by default is the same backup destination that is used for storing recovery points To define a file and folder backup 1 On the Home page click Run or Manage Backups 2 In the Run or Manage Backups window click Define New If you have not yet defined a backup the ...

Page 80: ...y Documents 5 In the Name box type a name for your new backup 6 In the Description optional box type a description for the new backup 7 Click Browse to locate a folder for storing your backup data or accept the default location Note You cannot use an encrypted folder as your backup destination If you want to encrypt your backup data to prevent another user from accessing it refer to the next step ...

Page 81: ... if you frequently modify data that you want to protect Also specify the maximum time that should occur between backups and the number of times per day that the backup should run Schedule Backup Time Select the type of events that should automatically start the backup See Enabling event triggered backups on page 87 Event Triggers General 13 Click Next to review the backup options you have selected...

Page 82: ...ary Internet Files folder These folders are typically not used for storing personal files or folders However they are backed up when you define and run a drive based backup of your system drive typically C See Defining a file and folder backup on page 79 You can include these folders when you define a file and folder backup Backing up files and folders Folders excluded by default from file and fol...

Page 83: ... job Deleting backup jobs Adding users who can back up your computer Running an existing backup job immediately This is particularly useful when you are about to install a new product and want to make sure you have a current recovery point in the event that something goes wrong with the installation It can also help you to ensure that you have a backup of your work after you have modified a large ...

Page 84: ...lick a backup job to start the backup If the menus displays No Jobs you must start Norton Ghost and define a backup To run an existing backup immediately from within Norton Ghost 1 On the Home page click Run or Manage Backups 2 Select a backup from the list and then click Run Now Run a backup with options If you want to quickly run an existing drive based backup but you want the backup to create a...

Page 85: ... recent changes Select this option if you want to start a completely new recovery point set When you select this option a base recovery point is created New recovery point set Select this option to create an independent recovery point which is a complete snap shot of your entire drive To specify an alternate backup location click Browse Independent recovery point 5 Click OK to run the backup job a...

Page 86: ...ht click the Norton Ghost tray icon and then click Cancel Current Operation Verifying that a backup is successful After a backup completes you can validate the success of the backup from the Status page to ensure you have a way to recover lost or damaged data The Status page contains a scrolling calendar that is aligned with each drive on your computer The calendar lets you quickly identify when a...

Page 87: ...the backup See Defining a drive based backup on page 57 See Defining a file and folder backup on page 79 Enabling event triggered backups Norton Ghost can detect certain events and run a backup when they occur For example to protect your computer when you install new software Norton Ghost can run a backup when it detects that new software is being installed If a problem occurs that harms your comp...

Page 88: ...p job Norton Ghost detects changes in the threat level assuming your computer is online at the time When Norton Ghost detects that the ThreatCon level you chose is either reached or exceeded the backup job in which you enabled Symantec ThreatCon Response is started automatically You then have a recovery point to use to recover your data should your computer become affected by the latest threat Not...

Page 89: ...reatCon indicates that there are no threats Because level 1 suggests no threats it is not an option in the drop down list However you can disable Symantec ThreatCon Reponse by choosing the first option See To disable Symantec ThreatCon Response on page 89 To disable Symantec ThreatCon Response 1 On the Home or Tasks page click Run or Manage Backups 2 Select the backup you want to edit and then cli...

Page 90: ...ckup menu item changes to Enable Backup when you disable the selected backup Deleting backup jobs You can delete backup jobs when they are no longer needed Deleting a backup job does not delete the recovery points or file and folder backup data from the storage location Only the backup job is deleted If you want to delete backup data recovery points and file and folder backup data refer to the fol...

Page 91: ...Programs Symantec Norton Ghost Security Configuration Tool On Windows Vista click Start All Programs Symantec Security Configuration Tool 2 Click Add 3 In the Enter the object names to select box type the names of the users or groups you want to add 4 Click OK 5 To delete users or groups select a user or group and then click Remove 6 Click OK to apply your changes and close the Security Configurat...

Page 92: ... gives users the right to create edit and delete backup jobs including existing jobs Full Control When you deny Status Only the user or group cannot access any of the features of Norton Ghost Select to deny the user or group administrative access to the features of Norton Ghost They can run existing backup jobs but they cannot create edit or delete them Status Only 4 Click OK to apply your changes...

Page 93: ... agent Using the Norton Ghost Agent Managing the agent through Windows Services Best practices for using services Controlling access to Norton Ghost About backing up other computers from your computer Norton Ghost lets you connect to and back up a second computer on your home or office network You can manage as many computers as needed but you can only manage one computer at a time 9 Chapter ...

Page 94: ...ding computers to the Computer List Before you can back up drives on a remote computer you must first add the computer to the Computer List You can then quickly switch between your local computer and any other computer on the list To add computers to the Computer List 1 On the Norton Ghost menu bar click Computers Add 2 Do one of the following Type the name of the computer Type the IP address of t...

Page 95: ...loy the agent from Windows Vista to another computer You can manually install the agent on the target computer using the product CD Note If you deselected the Agent Deployment option during installation this feature is not available You can run the installation again and select the Modify option to add this feature back in You can install the agent to a computer that has less than 256 MB of RAM Ho...

Page 96: ...t 1 On the Norton Ghost menu bar click Computers select a computer from the menu You must have administrator rights on the computer to which you are installing the agent 2 Click Deploy Agent 3 In the Deploy Norton Ghost Agent dialog box specify the administrator user name or a user name that has administrator rights and the password In a workgroup environment you must specify the remote computer n...

Page 97: ...helicenseagreement and then click Next 6 If you want to change the default location for the program files click Change locate the folder in which you want to install the agent and then click OK 7 Click Next 8 Click Custom and then click Next 9 Click Norton GhostService and then click This feature will be installed on local hard drive This feature is the agent 10 Set all other features to This feat...

Page 98: ...t tray icon to start the program If only the agent is installed double clicking the tray icon only displays an About dialog box If the computer has Norton Ghost installed right click the Norton Ghost tray icon to display a menu of common Norton Ghost Agent tasks Managing the agent through Windows Services The Norton Ghost Agent is a Windows service that runs in the background It provides the follo...

Page 99: ...f a problem particularly when it is associated with the Norton Ghost Agent You should view the most recent log entries in the Events tab for more information about the potential causes of the problem Check the Events tab first before using Services The Norton Ghost Agent is configured to start automatically when Norton Ghost starts You can view the status information to verify that the Norton Ghos...

Page 100: ...skbar click Start Settings Control Panel Administrative Tools Services On the Windows XP taskbar click Start Control Panel Performance andMaintenance AdministrativeTools and then double click Services On the Windows taskbar click Start Run In the Open text field type services msc and then click OK 2 Under the Name column scroll through the list of services until you see Norton Ghost the name of th...

Page 101: ... Norton Ghost the agent restarts automatically The Status changes to Ready If you stop the Norton Ghost Agent service while Norton Ghost is running you receive an error message and Norton Ghost is disconnected from the agent In most cases you can click Reconnect from the Task pane or from the Tray icon to restart the Norton Ghost Agent To start or stop the Norton Ghost Agent service 1 On the Windo...

Page 102: ...ilure triggers the action set for the first recovery attempt 7 Click OK Viewing Norton Ghost Agent dependencies The Norton Ghost Agent depends on other required services to run properly If a system component is stopped or is not running properly the dependent services can be affected If the Norton Ghost Agent fails to start check the dependencies to ensure that they are installed and that their St...

Page 103: ...e When you use the Security Configuration Tool any permission that you grant to the Users group applies to the members within that group Note The agent service can only be run as LocalSystem or by a user who belongs to the Adminstrator s group Table 9 3 describes the permissions that can be allowed or denied for user and groups who use the Norton Ghost Agent Table 9 3 Permission options Descriptio...

Page 104: ...ation Tool 2 Click Add 3 In the Select Users or Groups dialog box click Advanced 4 If necessary click Object Types to select the types of objects that you want 5 If necessary click Locations to select the location that you want to search 6 Click Find Now select users and groups you want and then click OK 7 Click OK when you are finished To change permissions for a user or a group 1 On the Windows ...

Page 105: ...lick 3 Click The following user to log onto with another account 4 In the User Name and Password boxes type the account name and password that you want to use 5 Click OK To perform Run As from Windows 2000 Professional 1 On the Windows taskbar click Start Program Files Symantec Norton Ghost 2 Press Shift and right click 3 Click Run As 4 Click Run the program as the following user to log on with an...

Page 106: ...r click Start AllPrograms NortonGhost Norton Ghost 2 Click Yes when prompted to add the required privileges 3 Enter the password for an administrator account and then click OK Backing up remote computers from your computer Controlling access to Norton Ghost 106 ...

Page 107: ... level of a drive Using event log information to troubleshoot problems About monitoring backups You should monitor your backups to ensure that you can effectively recover lost data when you need it The Home page provides a general status of your backup protection The Status page provides details about which drives are protected as well as a calendar view of past and future backups Note In addition...

Page 108: ...uter For example if one or more drives are not included in a defined backup the background color and status icon changes to reflect the level of backup protection The Status Details pane provides recommendations on which actions you should take Table 10 1 describes each of the levels of backup protection that the Home page displays Table 10 1 Backup protection levels At least one drive based backu...

Page 109: ... status report setting No backup protection assigned Monitoring backup protection from the Status page The Status page lets you monitor the status of your backups The Status page lists each drive on your computer and includes a calendar that contains your backup histories The calendar lets you quickly identify when a backup ran and what type of backup it was It identifies your upcoming scheduled b...

Page 110: ...pears in the Backup timeline it indicates that a drive based backup is scheduled to occur This icon can appear in the following states Indicates that the backup ran and that an incremental recovery point was created Indicates that the backup is unavailable Indicates that the backup did not run as scheduled This problem could occur if an error prevents the backup from running or if you manually can...

Page 111: ...kup It indicates that a file and folder backup is scheduled to occur on the day that it appears in the backup timeline This icon can appear in the following states Indicates that two or more backups have run and the last backup was created successfully Indicates that two or more backups are scheduled and that at least one is unavailable Indicates that two or more backups have and adn the last one ...

Page 112: ...Norton Ghost to send SNMP traps for different priority and notification types By default Norton Ghost is not enabled to send SNMP traps You must enable this functionality in Norton Ghost and you must install and configure the Windows SNMP service on your computer if it is not already To configure Norton Ghost to send SNMP traps 1 On the Tasks menu click Options 2 Under Notifications click SNMP Tra...

Page 113: ... or all file and folder backups For example if drive D contains unimportant data and you have chosen not to include it in a drive based backup the status on the Home page continues to report that your computer is at risk You can configure Norton Ghost to ignore drive D so that it does not calculate the status of drive D in the Backup Status panel on the Home page Or you can specify that only error...

Page 114: ...ver they occur Errors only status reporting Does not show any status for the selected drive or file and folder backups Select this option if the data is unimportant and missed or failed backups do not need to be reported No status reporting 4 Click OK Viewing drive details The Advanced page lets you view details about your hard drives You can view the following drive details Displays the name that...

Page 115: ...below the Drives table Improving the protection level of a drive When the status of a drive based backup indicates that it needs attention you should take steps to improve the status You might need to add a drive to an existing backup modify the schedule of a backup edit the settings of a backup or define a new backup See Best practices for backing up on page 48 115 Monitoring the status of your b...

Page 116: ...ve that is assigned to an existing backup you have access to this short cut method for starting the Define Backup Wizard from the Status page Define New Backup Deletes the backup that you have selected When you delete a backup only the backup definition is deleted The backup data is not deleted for example the recovery points or the file and folder backup data Remove Backup Job Turns on or turns o...

Page 117: ...f the event is an error message or other information such as the successful completion of a backup job Type Identifies if the message was generated by Norton Ghost or another program Source Displays the exact date and time that a selected event occurred Date Offers additional details about an event that can help you troubleshoot problems that might have occurred Description 117 Monitoring the stat...

Page 118: ...Monitoring the status of your backups Using event log information to troubleshoot problems 118 ...

Page 119: ...recovery point About exploring recovery points You can use Norton Ghost to explore files in a recovery point by assigning it a drive letter that is visible from Windows Explorer You can perform the following tasks on the assigned drive Run ScanDisk or CHKDSK Perform a virus check Copy folders or files to an alternate location View disk information about the drive such as used space and free space ...

Page 120: ...ploring a recovery point through Windows Explorer Unmounting a recovery point drive Viewing the drive properties of a recovery point Exploring a recovery point through Windows Explorer When you explore a recovery point Norton Ghost mounts the recovery point as a drive letter and opens it in Windows Explorer For each drive that is included in the recovery point a new mounted drive letter is created...

Page 121: ...that you want to associate with the drive 5 Click OK 6 To mount additional drives repeat steps 1 5 Opening files within a recovery point Using the Recovery Point Browser you can open files within a recovery point The file opens in the program that is associated with that file type You can also restore files either by saving them using the application associated with them or by using the Recover Fi...

Page 122: ...iew option is dimmed unavailable if you selected a program file that has a exe dll or com file extension Select one or more files click Recover Files and then click Recover to restore them to their original location If prompted click Yes or Yes to All to overwrite the existing original files Using a search engine If you have a desktop search engine such as Google Desktop you can configure your bac...

Page 123: ... following drive properties of a recovery point A user assigned comment that is associated with the recovery point Description The original drive letter that was assigned to the drive Original drive letter The cluster size in bytes of the FAT FAT32 or NTFS drive Cluster size The file system type used within the drive For example FAT FAT32 or NTFS File system The selected drive s status as either a...

Page 124: ...click the recovery point that contains the drive that you want to view 2 Select a drive 3 Do one of the following On the File menu click Properties Right click the recovery point and then click Properties Exploring the contents of a recovery point Viewing the drive properties of a recovery point 124 ...

Page 125: ...ion About backup destinations A backup destination is the location in which your backup data is stored Norton Ghost includes features for managing the size of your backup destinations so that you can use your computer s valuable disk space for other purposes How backup data works Norton Ghost offers two backup methods Use this option to back up an entire drive for example your system drive which i...

Page 126: ...very point set iv2i Although you can recover files and folders from a drive based backup you cannot select a specific set of files or folders to back up Your entire hard drive is backed up About file and folder backups If you want to modify or create a select set of personal documents and folders and you don t want to use hard disk resources to back up your entire computer you can define a file an...

Page 127: ...ge 128 Delete See About exploring recovery points on page 119 Explore See Making copies of recovery points on page 129 Copy See Moving your backup destination on page 136 Move See Automating management of backup data on page 135 Settings Cleaning up old recovery points Over time you might end up with recovery points that you no longer need For example you might have several recovery points created...

Page 128: ...articular recovery point set you can delete it at any time Note Once you delete a recovery point you no longer have access to file or system recovery for that point in time To delete a recovery point set 1 On the Tools page click Manage Backup Destination 2 Select the recovery point set that you want to delete and then click Delete 3 Click Yes to confirm the deletion 4 Click OK Deleting recovery p...

Page 129: ... first and last recovery point in the set click Automatic To manually select which recovery points in the set to delete click Manual and then select the recovery points you want to delete To delete all the recovery points in the set you selected click Delete all recovery points in the set 4 Click OK Making copies of recovery points You can copy recovery points to another location for added securit...

Page 130: ...to verify whether a recovery point is valid once the copy is complete check Verify recovery point after creation 10 Click Advanced and then select from the following options Divide into smaller files to simplify archiving Use password See Setting advanced options for drive based backups on page 68 11 Click OK 12 Click Next review the options that you selected and then click Finish Once the recover...

Page 131: ...hen do the following Click Browse locate and select a recovery point v2i file and then click Open If you select a network location type your network credentials See About network credentials on page 66 Click Next Filename Displays a list of all of the drives on your computer and shows any associated recovery points You can also select a system index file sv2i Select this option and then do the fol...

Page 132: ... files to a DVD but the size is larger than the DVD allows Check Store on ESX Server if you want to store the virtual disk file on a VMware ESX Server and then provide the following information Type the name of the server or the server s IP address Server name or address Type a valid administrator name that has sufficient rights Note The virtual disk files are transferred to an ESX Server through ...

Page 133: ...ce if it is not managed For example audio files video files and photographs are typically large files You must decide how many versions of backup files that you want to keep This decision can depend on how frequently you change the content of your files and how frequently you run the backups Viewing how much file and folder backup data is being stored Start by viewing the total amount of file and ...

Page 134: ...5 5 Click OK Manually deleting files from your file and folder backup You can manually delete files that are stored in your backup destination To manually delete files from your file and folder backup 1 On the Home or Tasks page click Recover My Files 2 Do one of the following In the Find files to recover box type the file name of the file that you want to delete and then click Search If you don t...

Page 135: ...1 On the Tools page click Manage Backup Destination 2 Check Limitfileversionsforfileandfolderbackups and then type a number between 1 and 99 3 Check Monitordiskspaceusageforbackupstorage and then drag the slider to limit the total amount of disk space that can be used for your recovery points and your file and folder backup data 4 Do one of the following Check Warnmewhenbackupstorageexceedsthresho...

Page 136: ...e Backup Destination window in the Drives drop down list select the drive that contains the backup destination that you want to move 3 Click Move 4 In the Move Backup Destination dialog box do one of the following In the New backup destination box type the path to the new backup destination Click Browse to locate and select a new backup destination and then click OK 5 Select the defined backups th...

Page 137: ...ove to the new backup destination click Move file backup data The Move File Backup Data option is not available no file and folder backup data is found at the original backup destination 10 Click OK 137 Managing backup destinations Moving your backup destination ...

Page 138: ...Managing backup destinations Moving your backup destination 138 ...

Page 139: ...ing recovery points or file and folder backup data You must have either a recovery point or file and folder backup data to recover lost files and folders You must have a recovery point to recover an entire drive To recover recent changes that were made to a lost file or folder your backup data must be at least as current as the changes that were made to the lost file or folder Recovering files and...

Page 140: ... restore by using one of the following methods Click the file once To select a single file Press Ctrl A To select all files Click the top file press and hold Shift and then click the last file in the group To select a group of files that are next to each other Press and hold Ctrl while you select the files that you want To select a group of files that are not next to each other 5 Click Recover Fil...

Page 141: ...es and folders using a recovery point 1 On the Home or Tasks page click Recover My Files 2 In the left pane of the Recover My Files window select Recovery Point as the search method 3 If you want to use a different recovery point than the one selected for you in the Recovery Point box click Change Note If Norton Ghost cannot locate any recovery points the Select Recovery Point dialog box opens aut...

Page 142: ...t that you want to recover If necessary add change or remove recovery points from the list Click Finish System 4 In the Find files to recover box type the whole name or partial name of a file or folder that you want to restore and then click Search For example type recipe to return any file or folder that includes the word recipe in its name such as My Recipes doc Recipes xls Recipes for Success m...

Page 143: ...prompted to replace the existing file click Yes if you are certain that the file that you are recovering is the file that you want 10 Click OK Opening files and folders stored in a recovery point If you are not sure which files you want to restore you can locate open and view their contents using the Recovery Point Browser From there you can also restore files and folders using the Recovery Point ...

Page 144: ...ge 109 Note Before you proceed close any applications and files that are open on the drive that you want to restore Warning When you recover a drive all of the data on the drive to which you are restoring the recovery point is replaced by the data in the recovery point Any changes that you made to the data on a drive after the date of the recovery point you use to recover it are lost For example i...

Page 145: ...pe the password and then click OK 8 Select from the following restore options Verifies whether a recovery point is valid or corrupt it is restored This option can significantly increase the time required for the recovery to complete Verify recovery point before restore Checks the restored drive for errors after the recovery point is restored Check for file system errors Automatically expands the d...

Page 146: ... up to three primary partitions plus any number of logical partitions up to the maximum size of your hard disk Partition type Lets you assign a drive letter to the partition Drive letter The options that are available depend on the restore destination that you have selected 9 Click Next to review your selections 10 Click Finish 11 Click Yes If the wizard cannot lock the drive to perform the recove...

Page 147: ...ion LightsOut Restore uses Symantec pcAnywhere technology the Windows boot menu and hardware devices such as RILO and DRAC to let an administrator remotely control a system during the boot process By default when the recovery environment boots as part of LightsOut Restore it automatically starts a pcAnywhere thin host You can then use Symantec pcAnywhere from your remote location to connect to the...

Page 148: ...d to recover and file or system from a remote location use the RILO or DRAC device to connect to the remote server and power on the system or restart it As the remote server starts open the boot menu and then select the Symantec recovery environment The remote server boots into the Symantec recovery environment and the connection through RILO or DRAC is lost A pcAnywhere thin host automatically st...

Page 149: ...ightsOut Restore uncheck Enable Networking If you do not want the pcAnywhere thin host to start automatically when restoring the computer through LightsOut Restore uncheck Enable pcAnywhere Select the type of IP address you want to use and then click Next 6 If you are shown a list of network and storage drivers that are not supported in the Symantec recovery environment do the following Select the...

Page 150: ... utilize LightOut Restore from a remote location 8 Click Finish Editing or rerunning the LightsOut Restore setup You can run the LightsOut Restore Wizard again if you need to edit the configuration settings or if you need to rebuild an existing modified Symantec Recovery Disk To edit or rerun the LightsOut Restore setup 1 Start Norton Ghost and then click File LightsOut Setup 2 Step through the wi...

Page 151: ... recovering a computer If Windows fails to start or does not run normally you can recover your computer using the Symantec Recovery Disk and an available recovery point Note If you can start Windows and the drive that you want to restore is a secondary drive which is any drive other than your system drive or the drive where your operating system is installed you can restore the drive within Window...

Page 152: ...using the SRD CD a simplified version of Windows starts that runs a recovery environment In the recovery environment you can access the recovery features of Norton Ghost Note Depending on which version of the product you have purchased the SRD is either included on your product CD or as a separate CD You should place the CD containing the SRD in a safe place Should you lose the CD you can create a...

Page 153: ...tings on your computer See Configuring your computer to boot from a CD on page 153 4 As soon as you see the prompt Press any key to boot from CD press a key to start the recovery environment Note You must watch for this prompt It can come and go quickly If you miss the prompt you must restart your computer again 5 Read the license agreement and then click Accept If you decline you cannot start the...

Page 154: ...with the SRD CD in the drive you will see a prompt telling you to Press any key to boot from CD If you do not press a key within five seconds your computer will attempt to start from the next bootable device listed in the BIOS Note Watch carefully as the computer starts If you miss the prompt the computer will need to be restarted again Preparing to recover a computer You should scan your hard dis...

Page 155: ...ess You can save the virus definitions to a disk and then use them on the troubled computer Note Depending on which version of the product you have purchased the SRD is either included on your product CD or as a separate CD You should place the CD containing the SRD in a safe place Should you lose the CD you can create a new one if you have a CD burner See If driver validation fails in the Norton ...

Page 156: ...r on your computer s desktop and copy it to the blank disk Checking your hard disk for errors If you suspect that your hard disk is damaged you can examine it for errors To check your hard disk for errors 1 In the Analyze panel click Check Hard Disks for Errors 2 Select the drive that you want to check 3 Select any of the following options Fixes errors on the selected disk When this option is not ...

Page 157: ... Symantec Recovery Disk cannot locate any recovery points you are prompted to locate one Click View by and then select one of the following options Displays all of the discovered recovery points in the order in which they were created If no recovery points were discovered the table will appear empty You should then choose one of the remaining View by options Date Lets you browse to another locatio...

Page 158: ...lders in the recovery point See Recovering files and folders from the recovery environment on page 161 5 If you need to delete a drive to make space available to restore your recovery point click Delete Drive When you click Delete Drive the drive is only marked for deletion The actual deletion of the drive takes place after you click Finish in the wizard If you change your mind before you click Fi...

Page 159: ...hould select this option if you are restoring the drive on which your operating system is installed Set drive active for booting OS Restores the original physical disk signature of the hard drive Disk signatures are included in Windows Server 2003 Windows 2000 Advanced Server and Windows NT Server 4 0 Enterprise Edition SP3 and later Disk signatures are required to use the hard drive Select this o...

Page 160: ...pted your drive s master boot record Restore Master Boot Record MBR Preserves the token that is used to authenticate a user or a computer on a domain This option helps ensure that a recovered computer is recognized by a network domain after it is recovered Preserve domain trust token on destination The options that are available depend on the restore destination that you selected 7 Click Next to r...

Page 161: ...ecovery point location 6 If you select a network location type your network credentials 7 Check each recovery point that you want to recover If necessary add change or remove recovery points from the list 8 Click Finish Recovering files and folders from the recovery environment You can use the Symantec Recovery Disk to start your computer and to restore files and folders from within a recovery poi...

Page 162: ...llowing to select the files or folders that you want to restore Press Ctrl A To select all items Select the top file press Shift and then select the last file in the list To select a group of files that are next to each other Press Ctrl as you select the files To select a group of files that are not next to each other 6 Click Recover Files Where possible the Recover Items dialog box automatically ...

Page 163: ...very environment Note Additional computer memory might be required to recover your computer across a network Starting networking services If you need to start networking services you can do so manually To start networking services On the Network panel click Start My Networking Services To verify the connection to the network you can map a network drive See Mapping a network drive in the recovery e...

Page 164: ... The networking services are started if necessary The thin host waits for a connection Remotely connecting to the thin host Symantec pcAnywhere lets you remotely connect to a computer that is running in the recovery environment The computer must be running the pcAnywhere thin host that is included in the Symantec Recovery Disk and it must be waiting for a connection Once connected the client compu...

Page 165: ...uthorized users from tampering with your settings or launching a session without your permission set a password for your remote connection item This option is available in the Remote Properties window on the Protect Item tab The thin host does not support encryption 5 In pcAnywhere start the remote control session If the connection attempt is unsuccessful the thin host must be restarted on the hos...

Page 166: ... in the recovery environment 1 In the recovery environment main window click Network and then click Map a network drive 2 Map a network drive by using the UNC path of the computer on which the recovery point is located For example computer_name share_name or IP_address share_name Configuring network connection settings You can access the Network Configuration window to configure basic network sett...

Page 167: ...pected you can use the Map Network Drive utility to map a drive to the recovery point location Getting a static IP address if the ping is unsuccessful If you ping an address and the address does not respond you can use the ipconfig all command to determine the correct IP address To get an IP address if the ping is unsuccessful 1 On the computer that contains the recovery point that you want to res...

Page 168: ...d The encryption strength that is used with the recovery point Encryption The format of the recovery point Format The name of the computer on which the recovery point was created Computer name If you enabled search engine support for the recovery point this property is displayed Catalogued Identifies the application Norton Ghost that was used to create the recovery point Created by To view the pro...

Page 169: ...any bad sectors on the drive Contains bad sectors To view the properties of a drive within a recovery point 1 In the Recovery Point Browser in the tree panel double click the recovery point that contains the drive that you want to view 2 Select a drive 3 Do one of the following On the menu bar click File Properties Right click the recovery point and then click Properties About the Support Utilitie...

Page 170: ...Recovering a computer About the Support Utilities 170 ...

Page 171: ...to copy contains more than one partition you must copy the partitions one at a time to the new hard drive You can use the Copy Drive feature when you upgrade to a larger hard drive or when you add a second hard drive You should not use the Copy Drive feature to set up a hard drive that will be used in another computer The drivers that are used to run the hardware on one computer will likely not ma...

Page 172: ...ition on the drive itself The I O pin is usually on the side closest to the power supply 4 Attach the power connector to the new hard drive Make sure that the angled edge of the plastic connector lines up with the angled edge of the pin socket 5 Anchor the drive in the bay area according to the manufacturer s instructions 6 Do the following to change the BIOS settings to recognize the new hard dri...

Page 173: ...you copy it The source drive is the original drive Check source for file system errors Check the destination drive for errors after you copy the drive The destination drive is the new drive Check destination for file system errors This option automatically expands the drive to occupy the destination drive s remaining unallocated space Resize drive to fill unallocated space Make the destination dri...

Page 174: ...e destination drive Select this option if you are copying the C drive to a new empty hard drive You should not select this option if you want to copy a drive to another space on the same hard drive as a backup You should also not select this option if you want to copy the drive to a hard drive that has existing partitions that you do not want to replace Copy MBR Click Primary partition to make the...

Page 175: ...es a catalog of all of the files that are included in the recovery point Google Desktop can then use the catalog to generate an index of the files that are contained in each recovery point When you enable search engine support Norton Ghost creates a catalog of all of the files that are contained in a recovery point Search engines like Google Desktop use the catalog file generate an index You can t...

Page 176: ...rt for a backup job on page 177 Enable search engine support when defining or editing a backup job Note Recovery points that already exist when you enable this feature cannot be indexed This restriction is because the generated list of files that are required by search engines for generating searchable indexes are appended to recovery points as they are created After you enable this feature run ea...

Page 177: ...ns page of the wizard Recovering files using Google Desktop s Search Desktop feature If you have correctly set up and enabled support for Google Desktop you can search recovery points to located and recover files using Google Desktop See Enabling search engine support on page 175 To recover files using Google Desktop 1 Start Google Desktop 2 Enter the name or part of the name of a file you want to...

Page 178: ...points backup destination is available For example if your backup destination is on a USB drive be sure that the drive is plugged in and that the power is turned on Or if your backup destination is on a network be sure you are connected and logged in with the correct credentials Adding v2i to the search string to narrow down the number of search results For example if you are searching for My Tune...

Page 179: ... 86 backups continued define first 25 defining and running 47 defining drive based 57 defining file and folder 79 deleting 90 disabling 90 dual boot computers 56 edit advanced options 69 edit schedule 89 edit settings 87 event triggered 87 file and folder 126 folders excluded during file and folder backups 82 ignoring bad sectors during drive based 69 managing storage of 125 monitoring 107 one tim...

Page 180: ... 48 defining 57 files excluded from 65 setting advanced options 68 Driver Validation 27 28 drives backup protection level 108 details about each 114 improving protection levels of 115 protecting 108 recovering 139 restoring multiple using system index file 160 unmounting recovery point 123 viewing properties from within recovery environment 168 viewing within recovery point 123 dual boot computers...

Page 181: ...amaged 139 restoring using a recovery point 141 searching for 143 folders locating versions of 134 recovering lost or damaged 139 G Google Desktop configure backups to support 122 enable support for 24 set up support for using 175 use to search for recovery points 175 H hard disk recovery of 139 hard disks recovering primary 156 rescanning 108 hard drives copying one to another 172 hybernate sys 6...

Page 182: ...s 108 protection status 86 push install of agent 95 R RAM drives not supported 21 recover computer remotely 163 tasks to try first 154 recovery about 139 cancelling 86 computer C drive 151 customize 144 files and folders 139 options for drives 145 original disk signature 159 restoring files and folders 139 recovery actions setting up when agent does not start 101 recovery environment boot into 152...

Page 183: ... across multiple 55 supported 20 reports log file 99 requirements system 19 rescanning disks 108 restarting agent 100 Run as changing logon using 105 Run Backup Now about 83 Run Backup With Options feature 84 S schedule edit backup 89 scripts running during a backup 66 search engine enabling support 176 use for searching recovery points 175 search engines using 122 Secondary drive recovering 144 s...

Page 184: ...nts tab 99 tips for running backups 52 trial version installing or upgrading 21 troubleshooting agent 98 U unmounting recovery point drives 123 updating automatically with LiveUpdate 25 upgrading trial version of Norton Ghost 21 users rights to run Norton Ghost 103 V verifying recovery point after creation 109 virtual disk format convert recovery points to 130 viruses checking recovery points for ...

Reviews: