background image

Norton Ghost 15.0 User's
Guide

Summary of Contents for 20097684 - Norton Ghost 15.0

Page 1: ...Norton Ghost 15 0 User s Guide ...

Page 2: ... decompilation reverse engineering No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors if any THEDOCUMENTATIONISPROVIDED ASIS ANDALLEXPRESSORIMPLIEDCONDITIONS REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT ARE DISCLAIME...

Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com ...

Page 4: ...hat provides rapid response and up to the minute information Upgrade assurance that delivers automatic software upgrade protection Global support that is available 24 hours a day 7 days a week Advanced features including Account Management Services For information about Symantec s Maintenance Programs you can visit our Web site at the following URL www symantec com techsupp Contacting Technical Su...

Page 5: ...e Customer service information is available at the following URL www symantec com techsupp Customer Service is available to assist with the following types of issues Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information features language availability local dealers Latest information about product updates and ...

Page 6: ...and countermeasures to prevent attacks before they occur Symantec Early Warning Solutions These services remove the burden of managing and monitoring security devices and events ensuring rapid response to real threats Managed Security Services Symantec Consulting Services provide on site technical expertise from Symantec and its trusted partners Symantec Consulting Services offer a variety of prep...

Page 7: ...e installation 23 Activating Norton Ghost later 24 About setting up your first backup 24 Updating Norton Ghost 25 About uninstalling Norton Ghost 25 Chapter 3 Ensuring the recovery of your computer 27 About ensuring the recovery of your computer 27 Testing Symantec Recovery Disk 28 If driver validation fails 28 Creating a custom Symantec Recovery Disk CD 29 Chapter 4 Getting Started 33 About key p...

Page 8: ...up destination 56 About backing up dual boot computers 58 Chapter 6 Backing up entire drives 59 About defining a drive based backup 59 Defining a drive based backup 60 Related Drives options 62 Recovery point type options 63 Backup destination options 64 Recovery point options 64 Advanced scheduling options 66 About files that are excluded from drive based backups 67 About network credentials 68 A...

Page 9: ...antec ThreatCon 96 Editing a backup schedule 97 Turning off a backup job 97 Deleting backup jobs 97 Adding users who can back up your computer 98 Chapter 9 Backing up remote computers from your computer 101 About backing up other computers from your computer 101 Adding computers to the Computer List 102 Deploying the Norton Ghost Agent 103 Using the Norton Ghost Agent 105 About managing the Norton...

Page 10: ...ithin a recovery point 131 About using a search engine 132 Dismounting a recovery point drive 133 Viewing the drive properties of a recovery point 133 Chapter 12 Managing backup destinations 135 About backup destinations 135 About how backup data works 135 About drive based backups 136 About file and folder backups 136 Managing recovery point storage 137 Cleaning up old recovery points 138 Deletin...

Page 11: ...ering a computer 173 Starting a computer by using Symantec Recovery Disk 174 Configuring a computer to boot from a CD 175 How to prepare to recover a computer 176 Scanning for viruses 176 Checking a hard disk for errors 178 Recovering a computer 178 Edit target drive and options 181 Recovering a computer from a virtual disk file 183 Virtual disk recovery options 185 Recovering files and folders us...

Page 12: ...ery points 201 About using a search engine to search recovery points 201 Enabling search engine support 201 Recovering files using Google Desktop s Search Desktop feature 203 About finding a file using Google Desktop 203 Appendix B About backing up Microsoft virtual environments 205 About backing up Microsoft virtual hard disks 205 About backing up and restoring Microsoft Hyper V virtual machines ...

Page 13: ...e Norton Ghost to run a backup in response to specific events For example a backup can run when a particular application is started Or a backup can run when a specified amount of new data is added to the drive When you experience a problem with your computer you can restore a file folder or an entire drive This recovery process returns your computer to a previous functional state with the operatin...

Page 14: ...les and folders can become corrupted by viruses or when a program used to modify them encounters an error What is new in Norton Ghost Norton Ghost includes many enhancements and new features Refer to the following table for information about the latest features and enhancements Note Not all listed features are available in all versions of this product Table 1 1 What is new Norton Ghost Description...

Page 15: ...oints to virtual disks using a schedule You can now convert recovery points to Hyper V format and also import recovery points to a Hyper V server Support for Microsoft Hyper V Back up your computer directly to Blu ray DVD or CD Or you can copy recovery points to Blu ray DVD or CD Support for Blu ray disc media If you choose to delay installation of the product license all features still remain ena...

Page 16: ...dvancedPage to hide or show the Advanced page Getting more information about Norton Ghost To learn more about Norton Ghost visit the Help and Support page Depending on which version and language of the product you have installed the Help and Support page includes one click access to more information The page also includes access to the product help system the product User s Guide It also includes ...

Page 17: ...n your work environment and which installation options you choose This chapter focuses on installing the full version of Norton Ghost from the installation CD Before you install Norton Ghost ensure that your computer meets the system requirements Review the Readme file on the installation CD for any known issues System requirements The following table lists the system requirements for Norton Ghost...

Page 18: ...M The following are hard disk space requirements for Norton Ghost and other areas When you install the entire product Up to 430 MB is required for a full install depending on the language of the product you select Microsoft NET Framework 2 0 280 MB of hard disk space is required for 32 bit computers and 610 MB is required for 64 bit computers Recovery points Sufficient hard disk space on a local h...

Page 19: ...OM drive The Microsoft NET Framework 2 0 or later is required to run Norton Ghost If NET Framework is not already installed you are prompted to install it after Norton Ghost is installed and your computer is restarted Software The following virtual platforms are supported VMware Workstation 4 5 and 6 VMware ESX 3 0 3 5 and 4 0 VMware ESXi 3 5 and 4 0 VMware Server 1 VMware GSX Server 3 x replaced ...

Page 20: ...ces Removable media About disabled features Norton Ghost is packaged to meet various markets Some features might not be available depending on the product you have purchased However all features are documented You should be aware of which features are included with the version of the product you have purchased If a feature is not accessible in the product user interface it is likely not included w...

Page 21: ...or uninstall it You can purchase a license at any time even after the evaluation period expires without reinstalling the software Note If this product came pre installed from a computer manufacturer your trial period could be as long as 90 days The product licensing or activation page during install indicates the duration of your trial period See Activating Norton Ghost later on page 24 Installing...

Page 22: ...4 In the CD browser panel click Install Norton Ghost 5 In the License Agreement panel read the license agreement and then click I accept the terms in the license agreement 6 Do one of the following In the LicenseAgreement panel click InstallNow to begin the installation In the License Agreement panel click Custom Install select or deselect the options you want installed and then click Install Now ...

Page 23: ...ote If this product came pre installed from a computer manufacturer your trial period could be as long as 90 days Refer to the Activate later label To complete the installation 1 In the Welcome panel click Next If your computer manufacturer installed the product the Welcome page might appear the first time that you run Norton Ghost 2 Do one of the following Click I ve already purchased the product...

Page 24: ...ll Google Desktop you can enable search engine support later 5 Click Finish Activating Norton Ghost later If you do not activate Norton Ghost before the trial period ends the software stops working However you can activate the product at any time after the trial period expires To activate Norton Ghost later 1 On the Help menu click Enter License Key 2 Follow the on screen prompts About setting up ...

Page 25: ... On the Help menu click LiveUpdate 2 In the LiveUpdate window click Start to select the updates Follow the on screen instructions 3 When the installation is complete click Close Some program updates might require that you restart your computer before the changes take effect About uninstalling Norton Ghost When you upgrade Norton Ghost from a previous version of the product the install program auto...

Page 26: ...Installing Norton Ghost About uninstalling Norton Ghost 26 ...

Page 27: ...red to run your computer s network cards and hard disks To help ensure that you have the drivers that you need to recover your computer you can use the Run Driver Validation tool available on the Symantec Recovery Disk The driver validation tool compares hardware drivers on the Symantec Recovery Disk CD with the drivers that are required to run your computer s network cards and hard disks You shou...

Page 28: ...test whether Symantec Recovery Disk works with the network cards and storage devices on the computer 2 Start your computer using the Symantec Recovery Disk CD See Starting a computer by using Symantec Recovery Disk on page 174 3 When you have started Symantec Recovery Disk do one of the following If you want to store recovery points on a network run a mock restore of a recovery point that is store...

Page 29: ...ymantec Recovery Disk CD A custom CD contains your computer s current network and storage device drivers It helps to ensure that in an emergency you can get to the recovery points that are required to restore your computer Note You must have a writeable Blu ray DVD CD RW drive to create a custom Symantec Recovery Disk CD To create a custom Symantec Recovery Disk CD 1 Attach and turn on all storage...

Page 30: ...ot need 9 On the Startup Options pane select the default keyboard layout display language and time zone from the respective lists 10 Click Next 11 On the Options pane do the following Select this option if you want networking to start automatically when you recover the computer through LightsOut Restore Automatically start network services Click this option to connect to a network without the need...

Page 31: ... the host and remote computer in the Encryption level list select one of the following None No encryption of the data stream occurs between the host and remote computer pcAnywhere Scrambles data using a mathematical algorithm so that a third party cannot easily interpret it This option is available on any operating system that pcAnywhere supports Symmetric Encodes and decodes data using a cryptogr...

Page 32: ...ack Up My Computer 14 Click Finish Warning Be certain to test your new custom Symantec Recovery Disk CD It ensures that you can use the CD to start your computer and that you can access the drive that contains your recovery points See Testing Symantec Recovery Disk on page 28 Ensuring the recovery of your computer Creating a custom Symantec Recovery Disk CD 32 ...

Page 33: ...Key product components Description Key Component The Norton Ghost program lets you define schedule and run backups of your computer When you run a backup recovery points of your computer are created which you can then use to recover your entire computer or individual drives files and folders You can also manage recovery point storage backup destination and monitor the backup status of your compute...

Page 34: ...ct CD or as a separate CD You should place the CD that contains Symantec Recovery Disk in a safe place See About recovering a computer on page 173 Symantec Recovery Disk CD How you use Norton Ghost While Norton Ghost does the work of backing up your files folders or entire drives you need to tell Norton Ghost what to backup when to back it up and where to put the backed up data Using Norton Ghost ...

Page 35: ...fault During installation a program icon is installed in the Windows system tray from which you can open Norton Ghost You can also open Norton Ghost from the Windows Start menu To start Norton Ghost Depending on the Windows version you are running use one of the following methods 35 Getting Started Starting Norton Ghost ...

Page 36: ...ou specify a default speed for backup or recovery processes When you move the slider closer to Fast it increases the speed at which the program backs up or recovers your computer If you choose a slower speed it could improve the performance of your computer especially if you work on your computer during a backup or recovery Note During a backup or recovery you have the option to override this defa...

Page 37: ...ique names you have given to external drives used as backup and Offsite Copy destinations See Using nicknames for external drives on page 43 External Drives Specify default FTP settings to be used with Offsite Copy See Configuring default FTP settings for use with Offsite Copy on page 44 Configure FTP Lets you specify the types of product messages to log errors warnings and information where to st...

Page 38: ...To select a default backup destination 1 In Norton Ghost on the menu bar click Tasks Options 2 Click General 3 Select Prepend computer name to backup data file names This is especially useful if you back up more than one computer to the same drive For example you might back up a laptop and a desktop computer to the same USB or network drive By prepending the computer name to each backup data file ...

Page 39: ... resources to perform the backup However you can actually change the speed of the backup as a way of minimizing the impact of Norton Ghost on your computer while you work To adjust the effect of a backup on computer performance 1 In Norton Ghost on the menu bar click Tasks Options 2 Click Performance 3 If you want to improve your computer s speed performance move the slider bar closer to Slow 4 If...

Page 40: ...void backing up multiple computers at the same time and to the same network destination Gather the required information about your network s performance and then schedule backups accordingly Then if necessary enable this feature and set the Maximum network throughput to a setting that matches the circumstances To enable network throttling 1 In Norton Ghost on the menu bar click Tasks Options 2 Cli...

Page 41: ...r messages when errors occur so that you can resolve any issues that might hinder data protection Show error messages 3 Click OK Managing file types When you define a file and folder backup file types are a quick way to include files you use the most For example if you keep music files on your computer you can configure a file and folder backup to include all music files for example mp3 wav The mo...

Page 42: ...n to edit the name of the selected file type Select an extension in the Extensions for column and click the Rename an extension button at the right of the button to edit the name of the extension Click either the Restore default file types list or the Restore default extension list button to restore all default file types or extensions Caution Any file types and extensions you have set up are remo...

Page 43: ...wever by associating unique nicknames to each drive then as you use the drive with Norton Ghost the nicknames you assigned appear in various locations in Norton Ghost Note It is also a good idea to place physical labels on each external drive to help you manage the task of swapping the drives For example if you assigned the nickname Cathy Read to one drive and Thomas Read to a second drive their n...

Page 44: ...ransfer attempts fail in passive mode or when you receive data socket errors When an FTP client connects using active mode the server opens a connection to an IP Address and port that the FTP client supplies Connection mode Active Specify the number of times Norton Ghost tries to connect to an FTP server before giving up Norton Ghost can attempt a maximum of 100 times Limit connection attempts to ...

Page 45: ...messages only Do not send any messages regardless of priority levels No messages 4 Select one or more of the following options Errors Warnings Information 5 In the Log file location field enter a path to where the log file should be created and stored If you don t know the path click Browse and select a location 6 In the Maximum file size field specify a maximum size in kilobytes that the log file...

Page 46: ...ifications for product event messages Email notifications can be sent to a specified email address if there are any errors or warnings that occurred when a backup is run Note If you do not have an SMTP server this feature is unavailable to you Notifications can also be sent to the system event log and a custom log file located in the Agent folder of the product installation If notifications are no...

Page 47: ... box type the email address for example admin domain com where notifications are to be sent 6 Optionally type the email address of the sender in the From address text field If you do not specify a From address the name of the product is used 7 In the SMTP server text box type the path to the SMTP server that sends the email notification for example smtpserver domain com 8 From the SMTP Authenticat...

Page 48: ...Getting Started Configuring Norton Ghost default options 48 ...

Page 49: ...al boot computers About backing up your data To back up your computer or your individual files and folders you do the following Define a backup Run the backup See How you use Norton Ghost on page 34 When you define a backup you decide on the following What to back up files and folders or an entire drive Where to store the backup data backup destination Whether or not to use Offsite Copy to copy ba...

Page 50: ...tem Back up and recover a specific hard drive such as a secondary drive which is a drive other than the system drive on which your operating system is installed Recover lost or damaged files or folders from a specific point in time Drive based backup Use this backup type to do the following Back up and recover specific files and folders for example personal files that are stored in the My Document...

Page 51: ...ers such as personal files stored in the My Documents folder Back up and recover files of a specific type such as music mp3 wav or photographs jpg bmp File and folder backup Before you back up Consider these best practices before you define and run your first back up Your computer must be turned on and Windows must be running at the time a back up occurs If not any scheduled back ups are skipped u...

Page 52: ...with the drive so that if you plug the drive into a second computer running another copy of Norton Ghost the nickname appears Note You might also consider placing a sticky label on each drive that matches the nickname that you have assigned See Using nicknames for external drives on page 43 Give nicknames to your external drives to help you easily identify them Use Offsite Copy to copy your latest...

Page 53: ...sure that it is stable During a back up If you are working at your computer and a back up starts to run you might notice that the performance of your computer slows down Norton Ghost requires significant system resources to run a back up If slowing occurs you can reduce the speed of the back up to improve computer performance until you are finished working See Adjusting the speed of a backup on pa...

Page 54: ...ging file and folder backup data on page 154 Manage storage space by eliminating old backup data Check the Status page on a regular basis to ensure that each drive has a defined backup Review the level of protection that is provided for each of your computer s drives Store backup copies of your recovery points in a safe place For example you can store them elsewhere on a network or you can store t...

Page 55: ...hibernation mode after a period of inactivity You should consider turning off the power management features during a scheduled backup If a backup is interrupted consider running it again If you experience problems while creating a backup you may need to reboot the computer After defining your backup job All backup jobs you define are automatically saved so that you can edit or run them later After...

Page 56: ...unattended backups Inexpensive because drive space can be overwritten repeatedly Off site storage is possible Reserves hard drive space for other uses Although you can save the recovery point to the same drive that you are backing up it is not recommended for the following reasons As the number or size of recovery points grows you will have less disk space available for regular use The recovery po...

Page 57: ...than one media If more than one drive is being backed up the recovery points for each drive are stored independently on the media even if there is space to store recovery points from multiple drives on the same media The scheduling of backups is not available when this option is used Note Using CD RWs or DVD RWs as your recovery point storage location is not the best option because you will be req...

Page 58: ...al boot computers You can back up dual boot computers even if you have drives partitions that are hidden in the operating system from which you run Norton Ghost When you run a drive backup the entire contents of each drive is captured in a recovery point When you restore a drive the recovered drive is bootable Note In order for your computer to boot the same from a restored system as it did from t...

Page 59: ...All of your files folders desktop settings programs and your operating system are captured into a recovery point You can then use that recovery point to restore individual files or folders or your entire computer For optimum protection you should define a drive based backup and run it on a regular basis By default scheduled independent recovery points or recovery point set names are appended with ...

Page 60: ...type options on page 63 7 Click Next 8 On the Backup Destination panel select the desired options See Backup destination options on page 64 You cannot use an encrypted folder as your backup destination You can choose to encrypt your backup data to prevent another user from accessing it 9 Optional If you want to make copies of your recovery points to store at a remote location for added backup prot...

Page 61: ... the command to run before it is stopped See About running command files during a backup on page 68 14 Click Next 15 Do one of the following If you chose a recovery point set as your recovery point type earlier in step 6 above skip to the next step If you chose an independent recovery point as your recovery point type select one of the following options in the Automaticallycreatearecovery pointlis...

Page 62: ...19 Click OK and then click Next 20 Optional If you want to run the new backup immediately click Runbackup now This option is not available if you configured an independent recovery point with the option to run it only once 21 Review the options you have selected then click Finish Related Drives options The RelatedDrives wizard panel appears only if you initially selected a drive with applications ...

Page 63: ...the table below Table 6 1 Recovery point type options Description Option Schedules a base recovery point with additional recovery points that contain only incremental changes that were made to your computer since the previous recovery point Incremental recovery points are created faster than the base recovery point They also use less storage space than an independent recovery point Note You can on...

Page 64: ...cess This also applies if you want to save the recovery point on a network share See About network credentials on page 68 Edit Allows you to rename the recovery point To rename a recovery point click Rename and then type a new file name Default file names include the name of the computer followed by the drive letter Customize recovery point file names Allows you to add up to two Offsite Copy desti...

Page 65: ...ther a recovery point or set of files is valid or corrupt Verify recovery point after creation Select this option to limit the number of recovery point sets that can be saved for this backup You can limit the number of recovery point sets to reduce the risk of filling up the hard drive with recovery points Each new recovery point set replaces the oldest set on your backup destination drive This op...

Page 66: ... support Select this option to include indexing support for operating system and temporary files when a recovery point is created on the client computer Note This option does not appear if you create a recovery point using the Back Up MyComputer feature in Symantec Recovery Disk Include system and temporary files See Advanced options for drive based backups on page 70 Advanced See About running co...

Page 67: ...and select how frequently a new recovery point set should be started Click Custom to customize the option you select Schedule Backup Time Select the type of events that should automatically start the backup See Enabling event triggered backups on page 96 Event Triggers General ThreatCon Response About files that are excluded from drive based backups The following files are intentionally excluded f...

Page 68: ...tion including network credentials Then when you create future jobs the dialog will default to the location you specified Another option would be to create a specific backup user account for the enterprise and configure the Norton Ghost 15 0 service to use this account About running command files during a backup You can use command files exe cmd bat during a backup You can use command files to int...

Page 69: ...OP BAT that contains the following syntax Cscript script_filename vbs Make sure that Cscript precedes the file name of the Visual Basic script Warning The command files cannot depend on any user interaction or have a visible user interface You should test all command files independently of Norton Ghost before you use them during a backup When the backup begins the command file is run during the sp...

Page 70: ...ry point creation process to stop immediately No other command files will run See How you use Norton Ghost on page 34 Run before snapshot creation This stage occurs after a snapshot is created Running a command during this stage is typically a safe point for allowing services to resume normal activity on the drive while continuing the recovery point creation Because the snapshot takes only a few s...

Page 71: ...results in a larger recovery point Disable SmartSector Copying Lets you run a backup even if there are bad sectors on the hard disk Although most drives do not have bad sectors the potential for problems increases during the lifetime of the hard disk Ignore bad sectors during copy Sets a password on the recovery point when it is created Passwords can include standard characters Passwords cannot in...

Page 72: ...network and want to protect them from unauthorized access and use You can also encrypt recovery points that were created with earlier versions of Symantec LiveState Recovery or Norton Ghost However encrypting those files makes them readable with the current product only You can view the encryption strength of a recovery point at any time by viewing the properties of the file from the Recovery Poin...

Page 73: ...me Verifying the integrity of a recovery point If you selected the Verify recovery point after creation option on the Options page of the Define Backup wizard the following occurs Norton Ghost verifies that all of the files that make up the recovery point are available for you to open Internal data structures in the recovery point are matched with the data that is available Also the recovery point...

Page 74: ...drive based backups During the creation of a recovery point compression results may vary depending on the types of files saved to the drive you are backing up The following table describes the available compression levels Table 6 8 Compression levels Description Compression level Use this option if storage space is not an issue However if the backup is being saved to a busy network drive high comp...

Page 75: ...kup definition is not saved for future use You can use the independent recovery point later This feature is useful when you need to back up your computer or a particular drive quickly before a significant event For example you can run a one time backup before you install new software Or you can run it when you learn about a new computer security threat You can also use Symantec Recovery Disk to cr...

Page 76: ...s of a partition without the need to install Norton Ghost or its agent With a cold backup all files are closed when the backup occurs You do not copy any data that may be in the middle of being updated or accessed on the desktop or server Cold backups are particularly useful for databases They ensure that no files are written to or accessed at anytime during the backup so you have a complete recov...

Page 77: ... time you create the customized Symantec Recovery Disk CD Running a one time backup from Symantec Recovery Disk Using a valid license key you can create independent recovery points using the Back UpMyComputer feature in Symantec Recovery Disk Sometimes known as a cold backup or offline backup you can create recovery points of a partition without the need to install Norton Ghost or its agent To run...

Page 78: ...drive by using the UNC path of the computer on which you want to store the recovery point For example computer_name share_name or IP_address share_name Map a network drive Lets you edit the recovery point file name To do this select a drive click Rename type a new file name and then click OK Recovery point file names field Backing up entire drives About running a one time backup from Symantec Reco...

Page 79: ...age data compression ratio on recovery points This setting is usually the slowest method When a high compression recovery point is created CPU usage might be higher than normal Other processes on the computer might also be slower To compensate you can adjust the operation speed of Norton Ghost This might improve the performance of other resource intensive applications that you are running at the s...

Page 80: ...tor copying Lets you run a backup even if there are bad sectors on the hard disk Although most drives do not have bad sectors the potential for problems increases during the lifetime of the hard disk Ignore bad sectors during copy Sets a password on the recovery point when it is created Passwords can include standard characters Passwords cannot include extended characters or symbols Use characters...

Page 81: ... works You enable and configure Offsite Copy when you define a new drive based backup job Or you can edit an existing backup job to enable Offsite Copy When you enable Offsite Copy you specify up to two Offsite Copy destinations After the backup job finishes creating recovery points Offsite Copy verifies that at least one of the Offsite Copy destinations are available Offsite Copy then begins copy...

Page 82: ...nation on page 84 See About using an FTP server as your Offsite Copy destination on page 85 See To define a drive based backup on page 60 See Editing backup settings on page 95 About using external drives as your Offsite Copy destination Use an external drive as your Offsite Copy destination This method lets you take a copy of your data with you when you leave the office By using two external hard...

Page 83: ...overy points stored at two separate physical locations your original recovery points stored on your backup destinations at the office and copies of those same recovery points stored on your Offsite Copy destination drives Your Offsite Copy destination drives are stored in a safe place at your home The next morning Thursday you take drive A to the office and plug it in Tuesday and Wednesday night s...

Page 84: ...ther map a local drive to the server or provide a valid UNC path For example suppose that you set up a local external drive as your first Offsite Copy destination Then you identify a server that is located at a second physical location from your own office You add the remote server as a second Offsite Copy destination As backups occur recovery points are copied first to the external hard drive and...

Page 85: ...ctly it copies recovery points to the directory that you specified on the FTP server If the server becomes unavailable for a period of time Offsite Copy copies all recovery points that were created since the last connection If there is no room to hold all of the recovery points available Offsite Copy removes the oldest recovery points or recovery point sets from the FTP server In turn it makes roo...

Page 86: ...Backing up entire drives How Offsite Copy works 86 ...

Page 87: ...ders that you have chosen to back up They are converted into a compressed format and then stored in a sub folder at the location you specify which by default is the same backup destination that is used for storing recovery points To define a file and folder backup 1 On the Home page click Run or Manage Backups 2 In the Run or Manage Backups window click Define New If you have not yet defined a bac...

Page 88: ...ype a name for your new backup 6 In the Description optional box type a description for the new backup 7 Click Browse to locate a folder for storing your backup data or accept the default location Note You cannot use an encrypted folder as your backup destination If you want to encrypt your backup data to prevent another user from accessing it refer to the next step 8 To add or edit advanced optio...

Page 89: ... the total number and size of files to be included in the backup click Preview Note Depending on the amount of data you have identified for file and folder backup the preview process could take several minutes 15 If you want to run the new backup immediately click Run backup now then click Finish About folders that are excluded by default from file and folder backups The following folders and thei...

Page 90: ...g a file and folder backup on page 87 You can include these folders when you define a file and folder backup Backing up files and folders About folders that are excluded by default from file and folder backups 90 ...

Page 91: ...hedule Turning off a backup job Deleting backup jobs Adding users who can back up your computer Running an existing backup job immediately This is particularly useful when you are about to install a new product and want to make sure you have a current recovery point in the event that something goes wrong with the installation It can also help you to ensure that you have a backup of your work after...

Page 92: ...ediately from the system tray 1 On the Windows desktop right click the Norton Ghost system tray icon 2 Click Run Backup Now 3 Click a backup job to start the backup If the menus displays No Jobs you must start Norton Ghost and define a backup To run an existing backup immediately from within Norton Ghost 1 On the Home page click Run or Manage Backups 2 Select a backup from the list and then click ...

Page 93: ... recovery point of recent changes because the base recovery point has not yet been created See Backup options on page 93 5 Click OK to run the backup job and create the recovery point type you selected Backup options Incremental recovery point of recent changes New recovery point set and Independent recovery point are the three options that are available Each option type is described in the table ...

Page 94: ...up process to slow you down To adjust the speed of a backup 1 While a backup is running on the View menu click Progress and Performance 2 Do one of the following If you want to increase the speed of your computer by reducing the speed of the backup drag the slider toward Slow If you want the backup to complete as quickly as possible and you are not doing extensive work on your computer drag the sl...

Page 95: ...rease the time it takes to complete the backup However it can ensure that you have a valid recovery point when the backup finishes See Verifying the integrity of a recovery point on page 73 To verify that a backup is successful 1 On the Status page review the Backups calendar and verify that the backup appears on the date that you ran it 2 Move your mouse over a backup icon to review the status of...

Page 96: ...e or Tasks page click Run or Manage Backups 2 Select the backup you want to edit and then click Change Schedule 3 Click General under Event Triggers 4 Select the events you want detected and then click OK About Symantec ThreatCon ThreatCon is Symantec s early warning security threat system When Symantec identifies various threats the ThreatCon team adjusts the threat level This adjustment gives pe...

Page 97: ...changes to the schedule and then click OK Turning off a backup job You can turn off a backup and re enable it later When you turn off a backup it will not run according to its defined schedule if it has one When a backup is turned off triggered events will not run it nor can you run it manually You can also delete a defined backup not recovery points See Deleting backup jobs on page 97 To turn off...

Page 98: ...ation Tool you can grant administrative privileges to a Limited user account When you do that user has full access to Norton Ghost and can create edit delete and run backup jobs Note By default all users can run existing backup jobs But only users with administrative accounts can create edit or delete backup jobs To add users who can back up a computer 1 On the Windows taskbar click Start Programs...

Page 99: ...up jobs but they cannot create edit or delete them Select to give the user or group full access to all of the features of Norton Ghost Full control gives users the right to create edit and delete backup jobs including existing jobs Full Control When you deny Status Only the user or group cannot access any of the features of Norton Ghost Select to deny the user or group administrative access to the...

Page 100: ...Running and managing backup jobs Adding users who can back up your computer 100 ...

Page 101: ...sing the Norton Ghost Agent About managing the Norton Ghost Agent through Windows Services About best practices for using services Controlling access to Norton Ghost About backing up other computers from your computer Norton Ghost lets you connect to and back up a second computer on your home or your office network You can manage as many computers as needed but you can only manage one computer at ...

Page 102: ...mputer Adding computers to the Computer List Before you can back up drives on a remote computer you must first add the computer to the Computer List You can then quickly switch between your local computer and any other computer on the list To add computers to the Computer List 1 On the Norton Ghost menu bar click Computers Add 2 Do one of the following Type the name of the computer Type the IP add...

Page 103: ...y the agent from Windows Vista to another computer You can manually install the agent on the target computer using the product CD Note If you deselected the Agent Deployment option during installation this feature is not available You can run the installation again and select the Modify option to add this feature back in Your computer must meet the minimum memory requirement to run the Recover My ...

Page 104: ...user name or a user name that has administrator rights and the password In a workgroup environment you must specify the remote computer name You cannot use an IP address even if you have successfully connected to the computer by using an IP address For example type RemoteComputerName UserName 4 If you want to restart the computer when the agent installation is finished click Reboot when finished N...

Page 105: ...o This feature will not be installed 11 Click Next and then click Install Using the Norton Ghost Agent The Norton Ghost Agent is the unseen engine that does the actual backing up and restoring of data on a remote computer Because the Norton Ghost Agent functions as a service it does not have a graphical interface See About managing the Norton Ghost Agent through Windows Services on page 106 See Co...

Page 106: ...he background It provides the following Locally running scheduled backup jobs even when there are no users or an unprivileged user logged on to the computer Allows administrators to remotely back up computers throughout an enterprise from Norton Ghost running on another computer See Using the Norton Ghost Agent on page 105 To use the features of Norton Ghost the Norton Ghost Agent must be started ...

Page 107: ...ically when Norton Ghost starts You can view the status information to verify that the Norton Ghost Agent has started The Status area in the Task pane displays a Ready status message when the agent starts You can also test that the Norton Ghost Agent is starting automatically by looking in Services You can check the status and restart the service if necessary If the Startup type is set to automati...

Page 108: ...to start stop or restart the Norton Ghost Agent service for the following reasons You should start or restart the agent if Norton Ghost is unable to connect to the Norton Ghost Agent on a computer or you cannot reconnect from Norton Ghost Start or Restart You should restart the agent after you change the user name or password that you use to log on to the Norton Ghost Agent service or you used the...

Page 109: ... OK 4 In the Services window in the Name column click Norton Ghost 5 On the Action menu select one of the following Start Stop Restart Setting up recovery actions when the Norton Ghost Agent does not start You can specify the computer s response if the Norton Ghost Agent fails to start To set up recovery actions when the Norton Ghost Agent does not start 1 On the Windows taskbar click Start Run 2 ...

Page 110: ...recovery attempt 7 Click OK Viewing Norton Ghost Agent dependencies The Norton Ghost Agent depends on other required services to run properly If a system component is stopped or is not running properly the dependent services can be affected If the Norton Ghost Agent fails to start check the dependencies to ensure that they are installed and that their Startup type is not set to Disabled Note To vi...

Page 111: ... When you use the Security Configuration Tool any permission that you grant to the Users group applies to the members within that group Note The agent service can only be run as LocalSystem or by a user who belongs to the Adminstrator s group The following table describes the permissions that can be allowed or denied for user and groups who use the Norton Ghost Agent Table 9 3 Permission options D...

Page 112: ...ation Tool 2 Click Add 3 In the Select Users or Groups dialog box click Advanced 4 If necessary click Object Types to select the types of objects that you want 5 If necessary click Locations to select the location that you want to search 6 Click Find Now select users and groups you want and then click OK 7 Click OK when you are finished To change permissions for a user or a group 1 On the Windows ...

Page 113: ...the account To perform Run As from Windows Depending on the version of Windows you are running do one of the following On the Windows taskbar click Start Program Files Norton Ghost Right click Norton Ghost and then click Run As In the RunAs dialog box click Thefollowinguser to log onto with another account In the User Name and Password boxes type the account name and password that you want to use ...

Page 114: ...Backing up remote computers from your computer Controlling access to Norton Ghost 114 ...

Page 115: ...ction level of a drive About using event log information to troubleshoot problems About monitoring backups You should monitor your backups to ensure that you can effectively recover lost data when you need it The Home page provides a general status of your backup protection The Status page provides details about which drives are protected as well as a calendar view of past and future backups Note ...

Page 116: ... the scanning is taking place Monitoring backup protection from the Home page On the Home page the Backup Status pane provides a summary of the backup protection status of your computer For example if one or more drives are not included in a defined backup the background color and status icon changes to reflect the level of backup protection The Status Details pane provides recommendations on whic...

Page 117: ...o recovery points are available from which to recover the drive An unprotected drive cannot be recovered and is at risk At risk The status is being calculated or you have not yet licensed your product Either wait a few seconds for the status to display or make sure that you have licensed your copy of the product Status unknown The drive that displays this icon is not monitored for backup status or...

Page 118: ... meaning of each icon that is displayed in the Backups calendar Table 10 2 Backups calendar icons States Description Icon This icon can appear in the following states Indicates that the backup ran and that an independent recovery point was created Indicates that the backup is unavailable Indicates that the backup did not run as scheduled This problem could occur if an error prevents the backup fro...

Page 119: ...led This problem could occur if an error prevents the backup from running or if you manually cancel a backup before it completes Indicates that the backup is scheduled to run at a future time Represents a drive based backup that is configured to create incremental recovery points It indicates that a drive based backup is scheduled to occur on the day that it appears in the backup timeline 119 Moni...

Page 120: ...e backup did not run as scheduled This problem could occur if an error prevents the backup from running or if you manually canceled a backup before it completed Indicates that the backup is scheduled to run at a future time Represents a file and folder backup It indicates that a file and folder backup is scheduled to occur on the day that it appears in the backup timeline Monitoring the status of ...

Page 121: ...esents two or more backups are scheduled to run on the day on which this icon appears To monitor backup protection from the Status page 1 On the Status page review the Backups calendar and verify that the backup appears on the date that you ran it 2 In the Drives column select the drive that you want to view The status information appears in the bottom half of the Status page 3 Move your mouse ove...

Page 122: ...en click OK Norton Ghost 15 0 will now send SNMP traps to all of the destinations set in the Windows SNMP agent About the Norton Ghost management information base The Norton Ghost management information base MIB is an enterprise MIB and contains the Norton Ghost 15 0 SNMP trap definitions All NMS applications have options to load a MIB and the Norton Ghost 15 0 MIB can be loaded using any of those...

Page 123: ... file and folder backups 1 On the Status page click a drive or File and folders to select it You can also click Customize status reporting from the Home page 2 Click Customize status reporting 3 Select one of the following options Shows the current status of the selected drive or file and folder backups on the Home and Status pages Select this option if the data is critical Full status reporting S...

Page 124: ... scheduled backup Next Run To view drive details 1 On the Advanced page on the Content Bar click the Drives tab If the Advanced page is not visible on the Primary Navigation Bar click View Show Advanced Page 2 In the Drive column select a drive 3 Review the Details section below the Drives table Improving the protection level of a drive When the status of a drive based backup indicates that it nee...

Page 125: ...mprove the protection level of a drive 1 On the Status page select a drive that requires attention from the Drives column 125 Monitoring the status of your backups Improving the protection level of a drive ...

Page 126: ...he backup definition is deleted The backup data is not deleted for example the recovery points or the file and folder backup data Remove Backup Job Turns on or turns off the backup that you have selected Disable Enable Backup Opens the Define Backup Wizard where you can select between backing up your computer or backing up selected files and folders This option is useful if a drive in the Drives c...

Page 127: ...ions that were taken by Norton Ghost or by a user It offers a single view of all of the information and program error messages The following information is included in the event log Indicates if the event is an error message or other information such as the successful completion of a backup job Type Identifies if the message was generated by Norton Ghost or another program Source Displays the exac...

Page 128: ...Monitoring the status of your backups About using event log information to troubleshoot problems 128 ...

Page 129: ...rties of a recovery point About exploring recovery points You can use Norton Ghost to explore files in a recovery point by assigning it a drive letter that is visible from Windows Explorer You can perform the following tasks on the assigned drive Run ScanDisk or CHKDSK Perform a virus check Copy folders or files to an alternate location View disk information about the drive such as used space and ...

Page 130: ... point through Windows Explorer on page 130 See Dismounting a recovery point drive on page 133 See Viewing the drive properties of a recovery point on page 133 Exploring a recovery point through Windows Explorer When you explore a recovery point Norton Ghost mounts the recovery point as a drive letter and opens it in Windows Explorer For each drive that is included in the recovery point a new moun...

Page 131: ...to associate with the drive 5 Click OK 6 To mount additional drives repeat steps 1 5 above Opening and restoring files within a recovery point Using the Recovery Point Browser you can open files within a recovery point The file opens in the program that is associated with that file type You can also restore files either by saving them using the application associated with them or by using the Reco...

Page 132: ...ew option is dimmed unavailable if you selected a program file that has a exe dll or com file extension Select one or more files click Recover Files and then click Recover to restore them to their original location If prompted click Yes or Yes to All to overwrite the existing original files About using a search engine If you have a desktop search engine such as Google Desktop you can configure you...

Page 133: ...ry point A user assigned comment that is associated with the recovery point Description The original drive letter that was assigned to the drive Original drive letter The cluster size in bytes of the FAT FAT32 or NTFS drive Cluster size The file system type used within the drive For example FAT FAT32 or NTFS File system The selected drive s status as either a primary partition or a logical partiti...

Page 134: ...click the recovery point that contains the drive that you want to view 2 Select a drive 3 Do one of the following On the File menu click Properties Right click the recovery point and then click Properties Exploring the contents of a recovery point Viewing the drive properties of a recovery point 134 ...

Page 135: ...managing file and folder backup data Automating management of backup data Moving your backup destination About backup destinations A backup destination is the location in which your backup data is stored Norton Ghost includes features for managing the size of your backup destinations so that you can use your computer s valuable disk space for other purposes About how backup data works Norton Ghost...

Page 136: ...point A base recovery point is a complete copy of your entire drive and is similar to an independent recovery point The recovery point set also includes recovery points that capture only the changes that are made to your computer since the creation of the base recovery point Recovery point set iv2i Although you can recover files and folders from a drive based backup you cannot select a specific se...

Page 137: ...sk space on your computer And to also provide adequate backup protection in the event that you need to recover your computer files or folders See Defining a virtual conversion job on page 147 See Running a one time virtual conversion on page 141 To manage recovery point storage manually 1 On the Tools page click Manage Backup Destination 2 From the Manage Backup Destination window you can do any o...

Page 138: ...page 131 See About exploring recovery points on page 129 To clean up old recovery points 1 On the Tools page click Manage Backup Destination 2 Click Clean Up The recovery point sets that can be safely removed without eliminating your latest recovery point are selected automatically You can select or deselect the recovery point sets to specify which ones to remove 3 Click Delete 4 Click Yes to conf...

Page 139: ...very point before you delete it See Opening and restoring files within a recovery point on page 131 You can manually select which recovery points to remove if you know which recovery points that you want to keep within a set To delete recovery points within a set 1 On the Tools page click Manage Backup Destination 2 Select the recovery point set that you want to delete and then click Delete 3 Do o...

Page 140: ...nts to display all incremental recovery points that are included within the recovery point sets 6 Click Next 7 Do one of the following In the Folder box type the path to which you want to copy the recovery point Click Browse to locate the folder to which you want to copy the recovery point and then click OK 8 Select a level of compression for the copies of the recovery points See Compression level...

Page 141: ...n click Finish After the recovery points are safely copied you can delete them from your computer See Deleting a recovery point set on page 138 Running a one time virtual conversion You can use Norton Ghost to convert recovery points of a physical computer to VMware Virtual Disk Microsoft Virtual Disk or a VMware ESX Server Virtual disks are excellent for testing and evaluation purposes The follow...

Page 142: ...ey were created If no recovery points are discovered the table is empty In such cases you can select an alternate date by using the drop down calendar Select a recovery point from the list Date Lets you browse to another recovery point location For example you can browse an external USB drive network location or removable media to select a recovery point v2i or incremental recovery point iv2i file...

Page 143: ...very point Select this option and then do one of the following Click Use latest recovery points for this computer The list of drives source files v2i and iv2i files and dates comes from the most current system index file sv2i that is located in the recovery point storage location on your computer Click Use alternate system index sv2i file Click Browse locate and select an alternate system index fi...

Page 144: ...er volume If you do not select this option each drive is matched to its respective hard drive letter assignment during the conversion Therefore it results in multiple drives within one virtual disk file This option is not available if the volumes are on separate disks Rename To edit the name of the resulting virtual disk file select the file name in the list near the bottom of the pane Click Renam...

Page 145: ...e file name in the list near the bottom of the pane Click Rename and then type the new file name Click Next Temporary location for conversion Type the name of the server or the server s IP address that you can use as a temporary location for files Temporary Location Credentials If you selected a temporary location for files on a network type a valid administrator user name that has sufficient righ...

Page 146: ...pecific information including accepting the End User License Agreement enteringtheProductKey user name and company name are automatically applied by Mini Setup which uses the answer file Deselect this option if you want any of the following to occur at the time of recovery instead Run Windows Welcome instead Mini Setup You do not want to change any of the configurable options for which the Mini Se...

Page 147: ...points to a VMware Virtual Disk or a Microsoft Virtual Disk You can also convert recovery points directly to VMware ESX Server Virtual disks are excellent for testing and evaluation purposes The following platforms support virtual disks created from recovery points VMware Workstation 4 5 and 6 VMware ESX 3 0 3 5 and 4 0 VMware ESXi 3 5 and 4 0 VMware Server 1 VMware GSX Server 3 x replaced by VMwa...

Page 148: ...to create and then click Next 4 Do one of the following Click Use latest recovery points for this computer The list of drives source files v2i and iv2i files and dates comes from the most current system index file sv2i that is located in the recovery point storage location on your computer Click Use alternate system index sv2i file Click Browse locate and select an alternate system index file sv2i...

Page 149: ...ls If you selected a virtual disk folder location on a network type your network credentials Rename To edit the name of the resulting virtual disk file select the file name in the list near the bottom of the pane Click Rename and then type the new file name If you selected VMware Virtual Disk or Microsoft Virtual Disk as the conversion format 149 Managing backup destinations Defining a virtual con...

Page 150: ... bottom of the pane Click Rename and then type the new file name Click Next Temporary location for conversion Type the name of the server or the server s IP address that you can use as a temporary location for files Temporary Location Credentials If you selected a temporary location for files on a network type a valid administrator user name that has sufficient rights Type a valid password If you ...

Page 151: ... Specific information including accepting the End User License Agreement enteringtheProductKey user name and company name are automatically applied by Mini Setup which uses the answer file Deselect this option if you want any of the following to occur at the time of recovery instead Run Windows Welcome instead Mini Setup You do not want to change any of the configurable options for which the Mini ...

Page 152: ...chedule Select this option to run the conversion at the specified start time and on the days of the week that you select Run more than once per day Select this option if you want to convert recovery points multiple times throughout a day and then specify the following options Time between conversions Select the amount of time to elapse before the next conversion Number of times Specify the number ...

Page 153: ...erties of a virtual conversion job 1 On the Tasks page click Run or Manage Virtual Conversions 2 Select the name of a conversion job whose properties you want to view 3 On the Tasks menu click Properties 4 Click OK Viewing the progress of a virtual conversion job You can view the progress of a virtual conversion while it runs to determine how much time remains until the conversion completes To vie...

Page 154: ...virtual conversion job 1 On the Tasks page click Run or Manage Virtual Conversions 2 Select the names of one or more conversion jobs that you want to delete 3 On the toolbar click Remove 4 Click Yes to confirm the deletion About managing file and folder backup data Because drive based backups capture your entire hard drive the size of a recovery point is typically much larger than the data that is...

Page 155: ...les are large as is often the case with audio and video files To limit the number of file versions to keep 1 On the Tools page click Manage Backup Destination 2 Click Settings 3 Select Limitfileversionsforfileandfolderbackups and then type a number between 1 and 99 4 You can also select Monitor disk space usage for backup storage and then specify a limit to the total amount of disk space that can ...

Page 156: ...to a file that you know is included in a file and folder backup 3 Right click the file and then click Show Versions Automating management of backup data Norton Ghost can monitor your backup storage space and notify you when it gets full It can also automatically delete old recovery points and older versions of files from file and folder backups that exceed the threshold If you do not specify a thr...

Page 157: ...ackup data You can then change the backup destination for one or more backups to the new drive When you select a new location you can also choose to move the existing recovery points to the new destination All future recovery points for the backups that you select are created at the new location Note If you want to move your backup destination to a new internal or external hard drive make sure the...

Page 158: ...he new backup destination select Move recovery points and then do one of the following Select Move the latest recovery points for each backup and delete the rest Select Move all recovery points to the new destination 9 If you have file and folder backup data that you want to move to the new backup destination click Move file backup data The Move File Backup Data option is not available if no file ...

Page 159: ...y using recovery points or file and folder backup data You must have either a recovery point or file and folder backup data to recover lost files and folders You must have a recovery point to recover an entire drive To recover recent changes that were made to a lost file or folder your backup data must be at least as current as the changes that were made to the lost file or folder Recovering files...

Page 160: ...you want to restore by using one of the following methods Click the file once To select a single file Press Ctrl A To select all files Click the top file press and hold Shift and then click the last file in the group To select a group of files that are next to each other Press and hold Ctrl while you select the files that you want To select a group of files that are not next to each other 5 Click ...

Page 161: ...es and folders using a recovery point 1 On the Home or Tasks page click Recover My Files 2 In the left pane of the Recover My Files window select Recovery Point as the search method 3 If you want to use a different recovery point than the one selected for you in the Recovery Point box click Change Note If Norton Ghost cannot locate any recovery points the Select Recovery Point dialog box opens aut...

Page 162: ...nt to recover If necessary add change or remove recovery points from the list Click Finish System 4 In the Find files to recover box type the whole name or partial name of a file or folder that you want to restore and then click Search For example type recipe to return any file or folder that includes the word recipe in its name such as Chocolate Cheesecake Recipes doc Cathy Read Recipes xls Recip...

Page 163: ...ted to replace the existing file click Yes if you are certain that the file that you are recovering is the file that you want 10 Click OK About opening files and folders stored in a recovery point If you are not sure which files you want to restore you can locate open and view their contents using the Recovery Point Browser From there you can also restore files and folders using the Recovery Point...

Page 164: ...ge 118 Note Before you proceed close any applications and files that are open on the drive that you want to restore Warning When you recover a drive all of the data on the drive to which you are restoring the recovery point is replaced by the data in the recovery point Any changes that you made to the data on a drive after the date of the recovery point you use to recover it are lost For example i...

Page 165: ...and review your selections 10 Click Finish then click Yes If the wizard cannot lock the drive to perform the recovery in Windows typically because the drive is in use by a program make sure the drive is not in use by closing any files or applications that might be using it and then click Retry If the Retry option fails click Ignore to tell Windows to attempt to force a lock on the drive If Ignore ...

Page 166: ...e Your computer s drive letters are atypical for example assigned letters other than C D E and so forth You are restoring a recovery point to a new empty hard disk Restore original disk signature Sets the partition type as follows Primary partition Because hard disks are limited to four primary partitions select this type if the drive will have four or less partitions Logical partition Select this...

Page 167: ...ver this boot menu option is selected the system will boot directly to the Symantec recovery environment using the files installed on the system partition Note The LightsOut feature requires at least 1 gigabyte of memory to run Once LightsOut Restore has been set up and the boot menu option has been added you can use a hardware device to remotely connect to the system When you are connected you ca...

Page 168: ...use the recovery environment to restore individual files or entire partitions Starting the LightsOut Restore Wizard If you have not already licensed Norton Ghost the first time you run the LightsOut Restore wizard you will be prompted to install a license file or a product license key Starting the LightsOut Restore Wizard 1 From Windows click Start All Programs Symantec Norton Ghost 15 0 LightsOut...

Page 169: ...rivers should point to a path that contains the fully extracted installation package for the desired driver If you have more than one missing storage driver you must rerun the LightsOut Restore wizard for each missing driver Also the drivers you select should be compatible with Windows Server 2003 9 Click Next 10 The summary screen with the options you selected is displayed Click Back if you need ...

Page 170: ... In the Host name box type the name that you want to use for the host You can leave this box blank to configure the host name to be the same as the computer name Encryption level To encrypt the data stream between the host and remote computer in the Encryption level list select one of the following None No encryption of the data stream occurs between the host and remote computer pcAnywhere Scrambl...

Page 171: ...n Ghost 15 0 LightsOut Restore Setup 2 Make your desired changes in the wizard screens and then click Finish 3 Click Yes if you want to recopy all of the files or click No to only make the changes necessary for updating your system 171 Recovering files folders or entire drives Restoring using LightsOut Restore ...

Page 172: ...Recovering files folders or entire drives Restoring using LightsOut Restore 172 ...

Page 173: ...tilities About recovering a computer If Windows fails to start or does not run normally you can recover your computer using the Symantec Recovery Disk CD and an available recovery point or a virtual disk that you created from a recovery point Note If you can start Windows and the drive that you want to restore is a secondary drive which is any drive other than your system drive or the drive where ...

Page 174: ...luded with Norton Ghost When you boot your computer using the Symantec Recovery Disk CD a simplified version of Windows starts that runs a recovery environment In the recovery environment you can access the recovery features of Norton Ghost Note Depending on which version of the product you have purchased Symantec Recovery Disk is either included on your product CD or as a separate CD You should p...

Page 175: ...tup settings on your computer See Configuring a computer to boot from a CD on page 175 4 As soon as you see the prompt Press any key to boot from CD press a key to start Symantec Recovery Disk Note You must watch for this prompt It can come and go quickly If you miss the prompt you must restart your computer again 5 Read the license agreement and then click Accept If you decline you cannot start S...

Page 176: ... the Symantec Recovery Disk CD in the drive you will see a prompt telling you to Press any key to boot from CD If you do not press a key within five seconds your computer will attempt to start from the next bootable device listed in the BIOS Note Watch carefully as the computer starts If you miss the prompt the computer will need to be restarted again How to prepare to recover a computer You shoul...

Page 177: ...the virus definitions to a disk and then use them on the troubled computer Note Depending on which version of the product you have purchased Symantec Recovery Disk is either included on your product CD or as a separate CD You should place the CD containing Symantec Recovery Disk in a safe place Should you lose the CD you can create a new one if you have a CD burner See If driver validation fails i...

Page 178: ...folder on your computer s desktop and copy it to the blank disk Checking a hard disk for errors If you suspect that your hard disk is damaged you can examine it for errors To check a hard disk for errors 1 In the Analyze panel click Check Hard Disks for Errors 2 Select the drive that you want to check 3 Select any of the following options Fixes errors on the selected disk When this option is not s...

Page 179: ... step 5 In the View recovery points by list select one of the following options Displays all of the discovered recovery points in the order in which they were created If no recovery points were discovered the table is empty If such cases you can search all local drives on the computer or browse to find a recovery point In the Select source folder list do one of the following Click All local drives...

Page 180: ... is the C drive In the recovery environment the drive letters and labels might not match what appears in Windows You might need to identify the correct drive based on its label the name assigned to it or by browsing the files and folders in the recovery point 8 Do the following Optionally select a drive that you want to recover and then click Edit Select the options that you want to perform during...

Page 181: ...e to return the drive to the list Undo Delete Select a disk or volume label that you want to resize after the recovery point is restored Then select this option and specify the new size in megabytes The size must be greater than the identified size of the disk that you selected in the list Resize drive after recover unallocated space only Sets the partition type as follows Primary partition Becaus...

Page 182: ...sical disk signature of the hard drive Disk signatures are part of all Windows operating systems that Norton Ghost supports Disk signatures are required to use the hard drive Select this option if either of the following situations are true Your computer s drive letters are atypical for example assigned letters other than C D E and so forth You are restoring a recovery point to a new empty hard di...

Page 183: ...a recovery point to a new empty hard disk You are restoring a recovery point to the original drive but the drive s partitions were modified since the recovery point was created You suspect that a virus or some other problem has corrupted your drive s master boot record Restore master boot record Recovering a computer from a virtual disk file Using the recovery environment you can recover your comp...

Page 184: ...of the following Click Delete Drive Delete a selected drive in the list to make space available to restore your virtual disk When you click Delete Drive the drive is only marked for deletion The actual deletion of the drive takes place after you click Finish in the wizard Click Undo Delete If you delete a drive and then change your mind click Undo Delete to return the drive to the list 8 Click Nex...

Page 185: ...fy the new drive size in megabytes Resize drive after recover unallocated space only Sets the partition type as follows Primary partition Because hard disks are limited to four primary partitions select this type if the drive has four or less partitions Logical partition Select this type if you need more than four partitions You can have up to three primary partitions plus any number of logical pa...

Page 186: ...program and a partition table that describes the disk partitions The master boot program analyzes the partition table of the first physical hard disk to see which primary partition is active It then starts the boot program from the boot sector of the active partition This option is recommended only for advanced users and is available only if you restore a whole drive in the recovery environment Se...

Page 187: ...ouble finding the recovery points in a network location in the File name box type the name of the computer and share that holds your recovery points For example computer_name share_name If you are still having problems try entering the computer s IP address See AboutusingthenetworkingtoolsinSymantecRecoveryDisk onpage188 4 In the tree view pane of the Recovery Point Browser double click the drive ...

Page 188: ...our computer using Symantec Recovery Disk You can explore the files and folders on your computer from the recovery environment by using the Explore My Computer feature This feature uses the Recovery Point Browser and functions similarly to Windows Explorer You can browse the file structure of any drive that is attached to your computer from the recovery environment To explore files and folders on ...

Page 189: ...se remote control session The thin host requires an IP address for hosting a remote control session Note You cannot deploy a thin host to Symantec Recovery Disk The thin host can only be started from the Symantec Recovery Disk CD to host a remote control session in Symantec Recovery Disk The thin host in Symantec Recovery Disk does not support file transfers and cannot be used to add drivers for n...

Page 190: ...ment Also ensure that the pcAnywhere thin host is waiting for a connection 2 Obtain the IP address of the thin host computer 3 On the client computer in Symantec pcAnywhere configure a remote connection item For more information see the Symantec pcAnywhere User s Guide Note You do not need to choose to automatically logon to the host on connection 4 When you configure the connection in pcAnywhere ...

Page 191: ...to that drive and select the recovery point that you want to restore Or if you create backups from the recovery environment you can select a destination that resides on a network location If there is no DHCP server or the DHCP server is unavailable you must provide a static IP address and a subnet mask address for the computer on which you are running Symantec Recovery Disk See Configuring network...

Page 192: ...ngs 2 If you are prompted to start networking services click Yes Getting a static IP address If you want to restore a recovery point that is located on a network drive or share but you are unable to map a drive or browse to the drive share on the network usually caused by the lack of an available DHCP service you can assign a unique static IP address to the computer that is running the recovery en...

Page 193: ...a DOS prompt type the following command and then press Enter ipconfig all 2 Write down the IP address that is displayed 3 Return to the computer that is running the recovery environment and run the utility Ping Remote Computer with this IP address About viewing properties of recovery points and drives You can view the properties of recovery points and the drives that are contained in them For exam...

Page 194: ...this property is displayed Search engine support Identifies the application Norton Ghost that was used to create the recovery point Created by To view the properties of a recovery point 1 In the Recovery Point Browser in the tree panel select the recovery point that you want to view 2 Do one of the following On the File menu click Properties Right click the recovery point and then click Properties...

Page 195: ...n a recovery point 1 In the Recovery Point Browser in the tree panel double click the recovery point that contains the drive that you want to view 2 Select a drive 3 Do one of the following On the File menu click Properties Right click the recovery point and then click Properties About the Support Utilities The recovery environment has several support utilities that Symantec Technical Support migh...

Page 196: ...Recovering a computer About the Support Utilities 196 ...

Page 197: ...size of the new drive If the hard drive that you want to copy contains more than one partition you must copy the partitions one at a time to the new hard drive You can use the Copy Drive feature when you upgrade to a larger hard drive or when you add a second hard drive You should not use the Copy Drive feature to set up a hard drive that will be used in another computer The drivers that are used ...

Page 198: ... the power connector to the new hard drive Make sure that the angled edge of the plastic connector lines up with the angled edge of the pin socket 5 Anchor the drive in the bay area according to the manufacturer s instructions 6 Do the following to change the BIOS settings to recognize the new hard drive Open the BIOS setup As the computer starts watch the computer screen for instructions on how t...

Page 199: ...pands the drive to occupy the destination drive s remaining unallocated space Resize drive to fill unallocated space Make the destination drive the active partition the drive from which the computer starts Only one drive can be active at a time To boot the computer it must be on the first physical hard disk and it must contain an operating system When the computer boots it reads the partition tabl...

Page 200: ... drive to another space on the same hard drive as a backup You should also not select this option if you want to copy the drive to a hard drive that has existing partitions that you do not want to replace Copy MBR Click Primary partition to make the destination new drive a primary partition Click Logical partition to make the destination new drive a logical partition inside an extended partition D...

Page 201: ... enable search engine support Norton Ghost creates a catalog of all of the files that are contained in a recovery point Search engines like Google Desktop use the catalog file generate an index You can then search for files by name Google Desktop does not index the content of files It only indexes the file names Enabling search engine support To use this feature with a search engine such as Google...

Page 202: ...exist when you enable this feature cannot be indexed This restriction is because the generated list of files that search engines require for generating searchable indexes are appended to recovery points as they are created After you enable this feature run each of your backups to create a new recovery point that contains the required information for indexing Note If your backup destination is on a...

Page 203: ...ocated and recover files using Google Desktop See Enabling search engine support on page 201 To recover files using Google Desktop s Search Desktop feature 1 Start Google Desktop 2 Enter the name or part of the name of a file you want to recover and then click Search Desktop 3 Click the search result that contains the file you want to recover 4 When the file opens in the associated application cli...

Page 204: ... be sure that the drive is plugged in and that the power is turned on Or if your backup destination is on a network be sure you are connected and logged in with the correct credentials Adding v2i to the search string to narrow down the number of search results For example if you search for My Tune mp3 add v2i so that the search string is My Tune mp3 v2i Recovery point files use v2i as their file e...

Page 205: ...ithin another VHD If you want to back up a physical disk and a VHD on that disk you must create separate backup jobs for each disk Backing up a physical disk that hosts a VHD is supported as long as you do not include the VHD as another volume in the same backup If you backup a physical disk that hosts a VHD the VHD is treated as another file that is part of the physical disk backup VHDs can be at...

Page 206: ...uration are accessible to each of the clustered Hyper V host computers a given volume cannot be locked for backup However clustered disks can be backed up by Norton Ghost because one host has exclusive access to the disk To create a backup of a running virtual machine the following conditions must be met If you attempt to perform a backup when the conditions above are not met Norton Ghost creates ...

Page 207: ...ions 64 backup jobs edit advanced options 72 backup status 95 backup storage about 135 backups about defining drive based 59 allowing other users to define 98 best practices 50 51 define first 24 defining drive based 60 defining file and folder 87 deleting 97 disabling 97 dual boot computers 58 edit advanced options 72 edit schedule 97 edit settings 95 event triggered 96 file and folder 136 folder...

Page 208: ...leting 154 editing 153 recovery points to virtual disks 147 run now 153 viewing progress 153 viewing properties 153 convert recovery point to virtual disk one time 141 copying a drive 197 creating recovery points options 65 credentials changing for agent 113 D default options configuring 36 default settings changing for the Norton Ghost Agent 107 dependencies viewing agent 108 110 devices supporte...

Page 209: ... excluded from 89 file systems supported 19 file types create new 42 delete 42 edit 42 managing 41 file versions limiting number kept 155 files locating versions of 156 manually deleting from file and folder backup 155 opening from within a recovery point 131 recovering lost or damaged 159 files and folders opening when stored in a recovery point 163 recover using Symantec Recovery Disk 187 recove...

Page 210: ...Agent changing default settings for 107 O Offsite Copy about 81 Offsite Copy continued assigning nicknames to external drives for use with 43 copy recovery points 81 One Time Backup from Windows 75 operating system backing up computers with multiple 58 Options configuring defaults 36 original disk signature recovering 182 186 P P2V one time 141 scheduling 147 virtual conversion job deleting 154 vi...

Page 211: ... a drive letter to 129 checking for viruses 129 checking integrity of 73 choosing options for 65 copying supported media for storing 57 explore 129 mount 129 130 mount from Windows Explorer 131 Offsite Copy 81 recovery points continued on removable media 58 opening files within 131 protecting password protecting 71 recommended storage location 58 setting compression levels 74 unmounting as a drive...

Page 212: ...93 system drive recovering 27 28 system index file using to recover multiple drives 178 system requirements 17 system tray icon adjusting default settings 40 show or hide 40 system tray icon continued show or hide error messages 40 show or hide status messages 40 T tabs Events and log file 107 tasks cancelling 94 ThreatCon Response enable or disable 96 throttling adjust during backup network 39 ti...

Page 213: ...W Windows 7 support for 14 17 Windows Explorer mount recovery points from 131 viewing file and folder version information in 156 213 Index ...

Reviews: