NGH 14 User Guide
NGH 14 User Guide
NGH 14 User Guide
Legal Notice
Copyright © 2008 Symantec Corporation.
Symantec, the Symantec Logo, LiveUpdate, Symantec pcAnywhere, Symantec Backup Exec,
Norton, Symantec NetBackup, and Symantec Backup Exec Restore Anyware are trademarks
or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, .NET, and the Windows logo
are registered trademarks or trademarks of Microsoft Corporation in the United States and
other countries. VeriSign® is a registered trademark of Verisign, Inc.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE,
OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be "commercial computer software"
and "commercial computer software documentation" as defined in FAR Sections 12.212 and
DFARS Section 227.7202.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014 USA
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product feature and
function, installation, and configuration. The Technical Support group also authors
content for our online Knowledge Base. The Technical Support group works
collaboratively with the other functional areas within Symantec to answer your
questions in a timely fashion. For example, the Technical Support group works
with Product Engineering and Symantec Security Response to provide alerting
services and virus definition updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ A telephone and web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade insurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week worldwide.
Support is provided in a variety of languages for those customers that are
enrolled in the Platinum Support program
■ Advanced features, including Technical Account Management
For information about Symantec’s Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support. The specific features that
are available may vary based on the level of maintenance that was purchased and
the specific product that you are using.
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support.
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade insurance and maintenance contracts
■ Information about the Symantec Value License Program
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
Managed Security Services These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.
Consulting Services Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring and management capabilities, each focused on
establishing and maintaining the integrity and availability of your IT resources.
Educational Services Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Contents
■ Getting started
Getting started
Norton Ghost provides advanced backup and recovery for your computer. Protect
your documents, financial records, presentations, photos, music, videos, historical
documents, or any other kinds of data you keep on your computer by making a
backup of your computer's entire hard disk. Or, limit your backup to include only
those files and folders that mean the most to you.
You can schedule backups to capture your changes automatically as you work
from day to day. Or start a backup manually at any time. You can also easily
configure Norton Ghost to run a backup in response to specific events. For example,
a backup can be started when a particular application is started, or when a specified
amount of new data has been added to the drive.
When you experience a problem with your computer, you can restore a file, folder,
or an entire drive, to return your computer to a previous, working state with the
operating system, applications, and data files intact. Or if you accidently delete
a personal file, get it back with a few simple steps.
14 Introducing Norton Ghost™
What's new in Norton Ghost 14.0
Using easy-to-follow wizards, set up fast and reliable backups that run while you
continue to work. Or schedule your backups to run after hours when you are no
longer using your computer.
When disaster strikes, Norton Ghost helps you recover your computer from the
effects of many common problems, including
■ Virus attacks: Damage might be done before a virus is quarantined.
■ Faulty software installations: Some software can negatively affect your
computer's performance, slowing it down to the point that opening programs
or documents can require too much time. But once installed, uninstalling a
product might not recover unintentional damage done during an install.
■ Hard drive failure: Data can become corrupted on your system drive (typically
C), making it impossible to start your operating system
■ Files accidentally deleted or overwritten: Accidental deletion of files is common,
but often costly.
■ Corrupted files: Individual files and folders can become corrupted by viruses,
or when a program used to modify them encounters an error.
Note: Not all features listed are available in all versions of this product.
Feature Description
Support for NTFS partitions Norton Ghost now supports NTFS partitions
up to 16TB (formatted with 4k clusters).
Feature Description
Create and manage aliases for your external To help you more easily identify external
drives drives for use as backup destinations, Norton
Ghost lets you assign an alias to each
external drive. Doing so does not change the
drive label, but is for use only when you are
accessing those drives from within Norton
Ghost.
Send Feedback tool We want to hear what you think. From the
Home page, you can now share your opinion
with us. We look at every comment we
receive and consider how we can make our
product better. Tell us what you think.
Help and Support center To help you help yourself, a new Help and
Support dialog provides direct links to
available resources for helping you to get
the most out of Norton Ghost.
Feature Description
Enhanced ease-of-use An improved user interface simplifies what you need to know and do to successfully
back up or recover files, folders, or your entire computer. And for Norton Ghost experts,
the Advanced page gives you a single view to most product features.
16 Introducing Norton Ghost™
What's new in Norton Ghost 14.0
Feature Description
Windows Vista support Norton Ghost has been designed and tested to run in the new Windows Vista operating
system, and still supports previous versions of Windows.
Improved Easy Setup Now setting up your first backup is even easier with the enhanced Easy Setup, which
appears either during install (unless you choose to skip it), or automatically the first
time you run Norton Ghost. Specify a few preferences, and Norton Ghost can start
backing up your computer on a regular basis.
File and folder backup Limit your backup to include a select set of files or folders. File and folder backups are
especially useful if your backup storage space is limited and you make frequent changes
to important documents that you want to back up.
One Time backups Need to back up your data quickly? The new One Time Backup feature lets you define
and run a backup at any time without saving the backup job for later use.
Desktop search engine Search for and recover files stored in recovery points using Google Desktop™.
support
Convert a recovery point Convert recovery points to one of two virtual disk formats for use in a virtual
to virtual disk format environment.
LightsOut Restore Restore a computer from a remote location, regardless of the state of the computer,
provided that its file system is intact.
Simplified schedule editor You can now easily edit your existing backup schedules without having to click through
multiple dialogs or complete the entire backup wizard again.
Manage backup data Because recovery points and file and folder backup data require storage space, Norton
Ghost gives you the freedom of where and how to handle the amount of disk space used
for storing backup data. Norton Ghost offers simple tools for managing your backup
data, and can even manage it for you automatically.
Improved backup and The home page offers the backup protection status in a single view. But you can also
recovery status use the new Backups Calendar to view past and upcoming scheduled backups to see how
protected your data really is.
Automatic backup Norton Ghost automatically detects when a new storage device is connected to your
destination detection computer, and can prompt you to change your default backup destination to the new
drive.
Browse lost or damaged Enhanced browsing of files and folders inside recovery points makes recovery quick and
files and folders easy; the new file and folder backup feature also lets you quickly search for and recover
files or folders.
Introducing Norton Ghost™ 17
About the Advanced page
Feature Description
Event-triggered backups In addition to scheduled and manual backups, Norton Ghost can detect certain events
and run a backup automatically whenever they occur, providing an added level of
protection for your computer.
Performance throttling Manually adjust the effect of a running backup on the performance of your computer
to better match your needs at the moment. This feature is especially useful if you are
working on your computer and don't want the backup process to slow you down.
And if you know the demographics of your network traffic, you can now set network
throttling to prevent network overload.
Maxtor OneTouch™ If you have a Maxtor OneTouch™ external hard drive, you can back up your computer
integration with the push of a button. No need to start Norton Ghost.
Modifiable Symantec When you cannot start Windows, the newly enhanced Symantec Recovery Disk (SRD)
Recovery Disk makes recovery easier than ever.
If the Symantec Recovery Disk is missing specific drivers, use the Create Recovery Disk
feature to create a modified Symantec Recovery Disk that includes the exact drivers
needed to successfully boot your computer into the recovery enironment.
Note: If you purchased Norton Ghost pre-installed on a new computer, some features
in the recovery environment may or may not be included, depending on how the computer
manufacturer chose to install it. The recovery environment has likely been pre-installed
on a special partition on your computer.
Note: When refering to the documentation while using the Advanced page, the
first one or two steps do not apply because they indicate where to access each
feature from the other pages of the product interface. From that point on, follow
the remaining steps of each procedure.
The Advanced page can be hidden from view if you do not plan to use it.
To hide the Advanced page
1 Start Norton Ghost.
2 On the View menu, click Show Advanced Page.
18 Introducing Norton Ghost™
Where to find more information
System requirements
Table 2-1 lists the system requirements for Norton Ghost.
Operating system The following Windows 32- or 64-bit operating systems are supported:
Available hard ■ When installing the entire product: Approximately 250 to 300 MB, depending on the language
disk space of the product you are installing
■ Microsoft .NET Framework 2.0: 280 MB of hard disk space is required for 32-bit computers,
and 610 MB is required for 64-bit computers
■ Recovery points: Sufficient hard disk space on a local hard disk or network server for storing
recovery points.
The size of recovery points depends on the amount of data you have backed up and the type
of recovery point being stored.
See “Best practices for backing up ” on page 48.
■ Norton Ghost LightsOut Restore feature: 2 GB
CD-ROM or The drive can be any speed, but it must be capable of using as the startup drive from the BIOS.
DVD-ROM drive
Norton Ghost uses Gear Software technology. To verify that your CD writer or DVD writer is
compatible, visit http://www.gearsoftware.com/support/recorders/index.cfm. You can look up
information about your writer if you know the name of the manufacturer and model number
of your writer.
Software The Microsoft .NET Framework 2.0 is required to run Norton Ghost.
If the .NET Framework is not already installed, then you will be prompted to install it after
Norton Ghost is installed and your computer is rebooted.
Supported file Norton Ghost supports FAT16, FAT16X, FAT32, FAT32X, NTFS, GUID Partition Table (GPT),
systems dynamic disks, Linux Ext2, Linux Ext3, and Linux swap partitions.
Note: You must decrypt encrypted NTFS drives before you attempt to restore them. You cannot
view the files that are in a recovery point for an encrypted NTFS drive.
Removable media You can save recovery points locally (that is, on the same computer where Norton Ghost is
installed) or to most CD-R, CD-RW, DVD-R(W), and DVD+RW recorders. You can find an updated
list of supported drives on the Symantec Web site.
Norton Ghost also lets you save recovery points to most USB devices, 1394 FireWire devices,
REV, Jaz, Zip drives, and magneto-optical devices.
Unavailable features
Norton Ghost is packaged to meet various markets. Some features might not be
available, depending on the product you have purchased. However, all features
are documented. You should be aware of which features are included with the
version of the product you have purchased. If a feature is not accessible in the
product user interface, it is likely not included with your version of the product.
Refer to the Symantec Web site for information about features included with your
version of Norton Ghost.
Note: If this product came pre-installed from a computer manufacturer, your trial
period could be as long as 90 days. The product licensing or activation page during
install will indicate the duration of your trial period.
Note: During the installation process, you might be required to restart the
computer. To ensure proper functionality after the computer restarts, log on again
using the same user credentials that you used to log on when you installed Norton
Ghost.
The installation program scans your hardware for the required drivers. If the
program does not find the required drivers, you receive a driver validation message.
If you receive this message, you should test the Symantec Recovery Disk (SRD).
Testing the SRD verifies whether the drivers are required or if the devices on your
system have compatible drivers that are available on the SRD. The driver validation
process should not interfere with your ability to install the product.
See “About ensuring the recovery of your computer” on page 27..
Warning: The SRD provides the tools that you need to recover your computer. It
is included with your product either on a separate CD, or on your product CD,
depending on the version of the product that you purchased. You should store
the CD in a safe place.
3 If the installation program does not run, type the following command at a
command prompt:.
<drive>:\autorun.exe
User Interface Installs the product user interface that is required for
interacting with the Norton Ghost Service.
CD/DVD Support Required for backing up directly to CD/DVD, and for creating
a customized Symantec Recovery Disk CD. A CD/DVD burner
is required to use this feature.
Recovery Point Enables you to browse, mount, copy, verify, and restore files
Browser and folders using recovery points.
Note: If this product came pre-installed from a computer manufacturer, your trial
period could be as long as 90 days. Refer to the Activate later label.
Note: You can find the product key on the back of your product CD jacket.
Do not lose the product key. You must use it when you install Norton
Ghost.
■ Click Activate later to delay the activation of your license. After the trial
period ends, the product will no longer work.
■ If this product is a trial version of Norton Ghost and you want to purchase
a product key, click Symantec Global Store to connect to the Symantec
Web site.
3 Click Next.
4 Click Run LiveUpdate to check for any product updates since the product
shipped.
5 Click Launch Easy Setup to open the Easy Setup box when you complete the
install process.
Installing Norton Ghost 25
Updating Norton Ghost
6 Click Enable Google Desktop File and Folder Recovery if you want use Google
Desktop to search your recovery points for the files and folders that you want
to recover.
If you select this option, Norton Ghost automatically catalogs each file as it
creates a recovery point. Google Desktop can then use this catalog to search
for files by name. It does not index the content of the files.
7 Click Finish.
You run LiveUpdate as soon as you install the product. You should continue to
run LiveUpdate periodically to obtain program updates.
To update Norton Ghost
1 On the Help menu, click LiveUpdate.
2 In the LiveUpdate window, click Start to select the updates.
Follow the on-screen instructions.
3 When the installation is complete, click Close.
Some program updates might require that you restart your computer before
the changes take effect.
Note: Wireless network adapter drivers are not supported by the driver validation
tool or by the SRD.
Note: Depending on which version of the product you have purchased, the SRD
is either included on your product CD, or as a separate CD. You should place the
CD containing the SRD in a safe place. Should you lose the CD, you can create a
new one if you have have a CD burner.
Testing the SRD allows you to identify and solve the following types of problems:
■ You cannot boot into the recovery environment.
See “To configure your computer to boot from a CD” on page 153.
■ You do not have the necessary storage drivers to access recovery points on
the computer.
■ You need information about your system to help you run the recovery
environment.
To test the SRD
1 Run the driver validation tool to test whether the SRD works with the network
cards and storage devices on the computer.
2 Boot your computer using the SRD.
See “Starting a computer by using the recovery environment ” on page 152.
3 When you have booted into the recovery environment, do one of the following:
■ If you want to store recovery points on a network, run a mock restore of
a recovery point that is stored on a network to test the network connection.
■ If you want to store recovery points on the computer, run a mock restore
of a recovery point that is stored locally to test the local hard-drive
connection.
If the drivers are available on the recovery disk, you receive a validation message.
If any drivers are missing from the recovery disk, the Driver Validation Results
dialog appears.
Without access to the correct drivers, a device cannot be used while running the
SRD. Therefore, if the recovery points required for recovering your computer are
stored on a network or a local hard drive, you might not have access to them.
You can find the drivers and copy them to a CD or a floppy disk, or you can create
a custom Symantec Recovery Disk CD.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
Note: You must have a writeable DVD/CD-RW drive to create a custom Symantec
Recovery Disk.
Norton Ghost program (user interface) The Norton Ghost program lets you define, schedule, and run backups of
your computer. When you run a backup, recovery points of your computer
are created, which you can then use to recover your entire computer, or
individual drives, files, and folders. You can also manage recovery point
storage (backup destination), and monitor the backup status of your
computer to make sure your valuable data is backed up on a regular basis.
32 Getting Started
How you use Norton Ghost
Symantec Recovery Disk The Symantec Recovery Disk (SRD) is used to boot your computer into the
recovery environment. If your computer's operating system fails, use the
SRD to recover your system drive (the drive where your operating system
is installed).
Note: Depending on which version of the product you have purchased, the
SRD is either included on your product CD, or as a separate CD. You should
place the CD containing the SRD in a safe place. Should you lose the CD,
you can create a new one if you have have a CD burner.
Note: To use the full version of Norton Ghost, you must activate the software.
See “Activating Norton Ghost later” on page 25.
34 Getting Started
Configuring Norton Ghost default options
Options Description
General Specify a default location where a backup will create and store
recovery points and file and folder backup data. If the location
you choose is on a network, you can enter your user
authentication information.
Options Description
Tray Icon You can turn the system tray icon on or off and specify
whether to show only error messages when they occur, or to
show both error messages and other information, such as the
completion of a backup.
File Types Lets you manage file types and file type categories, which are
used as a method for selecting the types of files you want
included in a file and folder backup.
External Drives Delete or rename the unique names you have given to external
drives used as backup and Offsite Copy destinations.
Configure FTP Specify default FTP settings to be used with Offsite Copy.
Log File Lets you specify the types of product messages to log (errors,
warnings, and information), where to store the log file, and
set a maximum file size for the log file.
Event Log Lets you specify the types of product messages to log (errors,
warnings, and information) in the Windows event log.
Options Description
4 Check Save backup files to a unique subfolder if you want Norton Ghost to
create a new subfolder that will serve as your backup destination.
Note: The new subfolder is given the same name as your computer. For
example, if your computer name is "MyLaptop", the new subfolder would be
named \MyLaptop.
5 Enter a path to a folder where you want to store recovery points and file and
folder backup data, or click Browse to look for a location.
You cannot use an encrypted folder as your backup destination. If you want
to encrypt your backup data to prevent another user from accessing it, refer
to the Advanced options when you define or edit a backup.
6 If you entered the path to a location on a network, enter the user name and
password required to authenticate to the network.
7 Click OK.
Note: During a backup or recovery, you'll have the option of overriding this default
setting to fit your needs at that moment.
Show system tray icon Displays the Norton Ghost icon in the system
tray.
3 Click OK.
Caution: Any file types and extensions you have set up are removed. Once
removed, you will have to add them again manually.
4 Click OK.
To delete a file type (and all of its extensions)
1 On the main menu bar, click Tasks > Options.
2 Select a file type in the File types column.
You cannot delete a default file type. You can delete all but one extension of
a default file type, and you can add additional extensions to a default file type.
3 Click the Remove a file type (-) button , and then click OK.
Use this same procedure to remove file extensions from the Extensions for
list.
Getting Started 41
Configuring Norton Ghost default options
Note: It is also a good idea to place physical labels on each external drive to help
you manage the task of swapping the drives.
For example, if you assigned the alias, "Drive A: Monday" to one drive, and "Drive
B: Wednesday" to a second drive, their aliases appear in Norton Ghost whenever
the drives are plugged in to your computer.
See “About Offsite Copy” on page 73.
To make it even easier, the Options dialog box lets you see all of your alias drive
names in one view. From this view, you can remove or edit existing names.
To remove or edit external drive aliases
1 On the main menu bar, click Tasks > Options.
2 Under Destinations, click External Drives.
3 Select an external drive from the list and then do one of the following:
■ Click Remove to remove the alias associated with the external drive.
■ Click Rename to modify the alias.
42 Getting Started
Configuring Norton Ghost default options
Connection mode: Passive (sometimes written "PASV") mode helps avoid conflicts
Passive with security systems. This mode is necessary for some firewalls
(Recommended) and routers because when using passive mode, the FTP client
opens the connection to an IP Address and port that the FTP
server supplies.
Connection mode: Use active mode when connections or transfer attempts fail in
Active passive mode, or when you receive data socket errors. When
an FTP client connects using active mode, the server opens a
connection to an IP Address and port that the FTP client
supplies.
Limit connection Specify the number of times Norton Ghost tries to connect to
attempts to an FTP server before giving up. Norton Ghost can attempt a
maximum of 100 times.
Stop trying to Specify the number of seconds Norton Ghost tries to connect
connect after to an FTP server before giving up. You can specify up to 600
seconds (10 minutes).
Default port Specify the port of the FTP server that is listening for a
connection.
Two logging methods are available: Norton Ghost logging, and the Windows
application log.
From the Options page, you can configure both methods.
To configure a Norton Ghost log file
1 On the main menu bar, click Tasks > Options.
2 Under Notifications, click Log File.
3 Click the Select the priority and type of messages drop-down list and select
the priority level at which a message should be logged.
Medium and high priority messages Send only medium and high priority
messages.
5 In the Log file location field, enter a path to where the log file should be
created and stored.
If you don't know the path, click Browse and select a location.
6 In the Maximum file size field, specify a maximum size (in kilobytes) that the
log file is allowed to grow.
The file is kept within the limit you set by replacing the oldest logged items
in the file with new items as they occur.
7 Click OK.
To configure which product events are written to a Windows event log
1 On the main menu bar, click Tasks > Options.
2 Under Notifications, click Event Log.
44 Getting Started
Configuring Norton Ghost default options
3 Click the Select the priority and type of messages drop-down list and select
the priority level at which a message should be logged.
Medium and high priority messages Send only medium and high priority
messages.
5 Click OK.
Note: If you do not have an SMTP server, this feature is unavailable to you.
Notifications can also be sent to the system event log and a custom log file located
in the Agent folder of the product installation.
If notifications are not being delivered, check the setup of your SMTP server to
ensure that it is functioning properly.
To enable email notifications
1 On the main menu bar, click Tasks > Options.
2 Under Notifications, click SMTP E-mail.
Getting Started 45
Configuring Norton Ghost default options
3 Click the Select the priority and type of messages drop-down list and select
the priority level at which an email should be sent.
Medium and high priority messages Send only medium and high priority
messages.
5 In the To address text box, type the email address (for example,
[email protected]) where notifications are to be sent.
6 If desired, type the email address of the sender in the From address text field.
If you do not specify a From address, the name of the product will be used.
7 In the SMTP server text box, type the path to the SMTP server that will send
the email notification (for example, smtpserver.domain.com).
8 From the SMTP Authentication drop-down box, select the method to use to
authenticate to the SMTP server specified above.
9 Enter your SMTP username and password.
If you are not sure what your username and password are, contact a system
administrator.
10 Click OK.
46 Getting Started
Configuring Norton Ghost default options
Chapter 5
Best practices for backing
up your data
This chapter includes the following topics:
File and folder backup Use this backup type to do the following:
About backups
When you back up your computer, you choose from two types of backups:
■ drive-based backup: backs up an entire hard drive
■ file and folder backup: backs up only the files and folders you select
Which backup type you choose depends on what you are trying to protect and
how much storage space you have to store backup data (recovery points, and file
and folder backup data).
The following table highlights the key uses of each backup type:
Drive-based backup ■ Back up and recover your computer (system drive, typically
drive C)
■ Back up and recover a specific hard drive (any secondary
drive, drives other than your system drive)
■ Recover lost or damaged files or folders using recovery
points
File and folder backup ■ Back up and recover specific files and folders, such as
personal files stored in the My Documents folder
■ Back up and recover files of a specific type, such as music
(.mp3, .wav) or photographs (.jpg, .bmp)
Schedule backups when you know Your computer must be turned on and Windows must
your computer will be turned on. be running at the time a backup occurs. If not, any
scheduled backups are skipped until the computer is
turned on again. You then are prompted to run the
missed backup.
Use a secondary hard disk as your You should store recovery points on a hard disk other
backup destination. than your primary hard disk C. This practice helps
ensure that you can recover your system in the event
that your primary hard disk fails.
Consider using external drives as Using an external drive makes your backup data more
your backup destination. portable. Should you need to remove your critical data
from a particular location, you can quickly grab an
external drive on your way out the door.
Give nicknames to your external You can assign a nickname to each external drive to
drives to help you easily identify help keep track of where your backup data is stored
them for each computer you back up. Because drive letters
can change each time you unplug and plug an external
drive into your computer, a nickname ensures that
you can always know which drive you are using when
you are running Norton Ghost.
Use Offsite Copy Use Offsite Copy to copy your latest recovery points
to either a portable storage device or a remote server.
By copying recovery points to a portable hard disk,
you can then take a copy of your data with you when
you leave the office.
Run backups on a regular and When you define your backups, schedule them to run
frequent basis. frequently so that you have recovery points that span
at least the last two months.
Keep personal data on a separate You should keep your operating system and software
drive than the drive on which programs separate from your own data. This practice
Windows and your software helps to speed the creation of recovery points and
programs are installed. reduce the amount of information that needs to be
restored. For example, use the C drive to run Windows
and to install and run software programs. Use the D
drive to create, edit, and store personal files and
folders.
Verify the recovery point after you When you define a backup, you should select the
create it to ensure that it is stable. option to verify the recovery point to ensure that the
recovery point can be used to recover lost data.
During a backup
While a backup is running, consider the following best practices:
Improve your computer's If you are working at your computer and a backup starts to
performance during a backup run, you might notice that the performance of your
computer slows down. Norton Ghost requires significant
system resources to run a backup. If slowing occurs, you
can reduce the speed of the backup to improve computer
performance until you are finished working.
Review the contents of recovery Periodically review the contents of your recovery
points and file and folder backup points to ensure that you back up only your essential
data. data.
Review the Status page to verify Periodically review the Status page. You can also
that backups have happened and review the events log on the Advanced page.
to identify any potential problems.
The event log records events when they occur,
backups and any errors that might have occurred
during or after a backup.
If you do not see the Advanced page tab, click View >
Show Advanced Page.
Note: Backup status and other messages are also
conveyed in the system tray. So you do not even need
to start the product to identify the status of your
backups.
Manage storage space by Delete outdated recovery points to make more hard
eliminating old backup data. disk space available.
Review the level of protection that Check the Status page on a regular basis to ensure
is provided for each of your that each drive has a defined backup.
computer's drives.
Maintain backup copies of your Store backup copies of your recovery points in a safe
recovery points. place. For example you can store them elsewhere on
a network, or you can store them on CDs, DVDs, or
tapes for long-term, off-site storage.
Note: If you choose to use CDs or DVDs as your backup destination (not
recommended), you cannot back up to a sub-folder on the disk. Backup data must
be created at the root of CDs and DVDs.
Table 5-1 contains information that you need to consider when selecting a backup
destination.
Local hard drive, USB drive, The benefits of this option are as follows:
or FireWire drive
■ Fast backup and recovery
(recommended) ■ Can schedule unattended backups
■ Inexpensive because drive space can be overwritten
repeatedly
■ Off-site storage is possible
■ Reserves hard drive space for other uses
Although you can save the recovery point to the same drive
that you are backing up, it is not recommended for the
following reasons:
Table 5-2 describes the advantages and disadvantages of different types of backup
destinations.
Hard drive ■ Fast backup and recovery ■ Uses valuable drive space
Network drive ■ Fast backup and recovery ■ Must have supported NIC
■ Can schedule unattended drivers to restore from
(recommended)
backups the recovery environment
■ Inexpensive because ■ Must understand and
drive space can be assign the appropriate
overwritten repeatedly rights for users who will
■ Protection from local run backups and restore
hard drive failure data
■ Off-site storage (through
existing network backup
strategies)
Note: In order for your computer to boot the same from a restored system as it
did from the original configuration, you must back up, and then restore, every
drive that includes operating system boot information.
You should not create incremental backups of shared data drives if Norton Ghost
is installed on both operating systems and they are both set to manage the shared
drive.
You might encounter issues if you try to use the Norton Ghost LightsOut Restore
feature on dual-boot systems. It is not supported.
Chapter 6
Backing up entire drives
This chapter includes the following topics:
6 Select the type of recovery point that you want the backup to create.
Recovery point set Schedule a base recovery point with additional recovery
(recommended) points that contain only incremental changes that were made
to your computer since the previous recovery point.
Independent recovery Creates a complete, independent copy of the drives that you
point select. This backup type typically requires more storage
space, especially if you run the backup multiple times.
7 Click Next.
Backing up entire drives 59
Defining a drive-based backup
Customize recovery point file names If you want to rename the recovery point,
click Rename, and then type a new file name.
9 If you want to make copies of your recovery points to store at a remote location
for added backup protection, do the following:
■ Click Add and then check Enable Offsite Copy.
■ Check the Prompt me to start a copy when I attach an external Offsite
Copy destination drive option if you want recovery points automatically
copied to external Offsite Copy destination drives whenever you plug one
in to your computer.
■ Click Browse to locate an Offsite Copy destination.
■ Click Add an additional Offsite Copy destination if you want to add a
second destination, and then specify the path (a local folder, network path,
or FTP address) to that destination.
■ Click OK.
60 Backing up entire drives
Defining a drive-based backup
10 Click Next.
Note: You cannot use an encrypted folder as your backup destination. You
can choose to encrypt your backup data to prevent another user from
accessing it.
■ None
■ Standard
■ Medium
■ High
Verify recovery point after creation Select this option to automatically test
whether a recovery point or set of files is
valid or corrupt.
Limit the number of recovery point sets Select this option to limit the number of
saved for this backup recovery point sets that can be saved for this
backup. You can limit the number of recovery
point sets to reduce the risk of filling up the
hard drive with recovery points. Each new
recovery point set replaces the oldest set on
your backup destination drive.
Enable search engine support Select this option to let a search engine, such
as Google Desktop, index all of the file names
that are contained in each recovery point.
By indexing the file names, you can then use
your search engine to locate files you want
to restore.
Include system and temporary files Check this option to include indexing support
for operating system and temporary files
when a recovery point is created on the client
computer.
12 Click Next.
13 If appropriate, in the drop-down lists, select the command file (.exe, .cmd,
.bat) that you want to run during a particular stage in the recovery point
creation process, and then specify the amount of time (in seconds) that you
want the command to run before it is stopped.
If you added the command file to the CommandFiles folder, you may need to
click Back, and then Next to see the files in each stage’s drop-down list.
See “Run command files during a backup ” on page 66.
14 Click Next.
15 Do one of the following:
■ If you chose a recovery point set as your recovery point type in step 6,
skip to the next step.
■ If you chose an independent recovery point as your recovery point type,
click the Automatically create a recovery point drop-down list, and then
select one of the following options:
Only run once Runs the backup one time on the date and at
the time you specify.
■ Check Run more than once per day if you frequently modify data
that you want to protect.
Also, specify the maximum time that should occur between
backups and the number of times per day that the backup should
run.
■ Click the Automatically optimize drop-down list, and then select
how often optimization should occur to help manage the disk
space that is used by your backup destination.
■ Click the Start a new recovery point set drop-down list and select
how frequently a new recovery point set should be started.
Click Custom to customize the option you select.
Event Triggers Select the type of events that should automatically start the backup.
(General)
See “Enabling event-triggered backups ” on page 87.
4 Click Next.
5 In the Backup Destination dialog box, select from the following options:
6 Click Next.
7 On the Options page, select from the following options:
■ None
■ Standard
■ Medium
■ High
Verify recovery point after creation Select this option to automatically test
whether a recovery point or set of files is
valid or corrupt.
Backing up entire drives 65
Defining a drive-based backup
■ Use password
■ Use Encryption
■ Divide into smaller files to simplify
archiving
■ Ignore bad sectors during copy
■ Disable SmartSector Copying
8 Click Next.
9 If appropriate, in the drop-down lists, select the command file (.exe, .cmd,
.bat) that you want to run during a particular stage in the recovery point
creation process, and then specify the amount of time (in seconds) that you
want the command to run before it is stopped.
If you added the command file to the CommandFiles folder, you may need to
click Back, and then Next to see the files in each stage’s drop-down list.
See “Run command files during a backup ” on page 66.
10 Click Next.
11 Click Finish to run the backup.
Note: You cannot run command files that include a graphical user interface, such
as notepad.exe. Running such command files will cause the backup job to fail.
You can run a command file during any of the following stages during the creation
of a recovery point:
■ Before data capture
■ After data capture
■ After recovery point creation
You can also specify the amount of time that a command file should be allowed
to run.
Backing up entire drives 67
Defining a drive-based backup
You can specify the location of command files if you want them to be located in
a place other than the default location. You can also specify a location on a per-job
basis, as well as specify a location that can be shared among several computers.
If you specify a network location, you must provide network credentials.
See “About network credentials” on page 66.
The most common use for running command files is to stop and restart
non-VSS-aware databases that you want to back up.
To use a Visual Basic script file (.VBS) during a backup, you can create a batch file
(.BAT) to run the script. For example, you can create a batch file called STOP.BAT
that contains the following syntax:
Cscript script_filename.vbs
Make sure that Cscript precedes the file name of the Visual Basic script.
Warning: The command files cannot depend on any user interaction or have a
visible user interface. You should test all command files independently of Norton
Ghost before you use them during a backup.
When the backup begins, the command file is run during the specified stage. If
an error occurs while a command file is running or the command file does not
finish in the time you specified (regardless of the stage), the backup is stopped,
the command file is terminated (if necessary), and the error information is logged
and displayed.
Table 6-1 describes the stages of recovery point creation.
68 Backing up entire drives
Setting advanced options for drive-based backups
Stage Description
Before data capture This stage occurs after a backup has started and
before a recovery point is created. You can run a
command during this stage to prepare for the
recovery point creation process. For example, you
can close any open applications that are using the
drive.
Note: If you use this option, be sure the command
file has an error recovery mechanism built into
it. If the computer has one or more services that
must be stopped at this stage (such as stopping a
non-VSS aware database or a resource intensive
application), and the command file does not
contain any form of error recovery, one or more
of the stopped services may not be restarted. An
error in the command file can cause the recovery
point creation process to stop immediately. No
other command files will run.
After recovery point creation This stage occurs after the recovery point is
created. You can run a command during this stage
to act on the recovery point itself. For example,
you can copy it to an offline location.
Divide into smaller files to You can split the recovery point into smaller files and
simplify archiving specify the maximum size (in MB) for each file.
This option lets you copy used and unused hard-disk sectors.
This option increases processing time and usually results
in a larger recovery point.
Ignore bad sectors during This option lets you run a backup even if there are bad
copy sectors on the hard disk. Although most drives do not have
bad sectors, the potential for problems increases during the
lifetime of the hard disk.
Use password This option sets a password on the recovery point when it
is created. Passwords can include standard characters, not
extended characters or symbols. (Use characters with an
ASCII value of 128 or lower.)
Use AES encryption You can encrypt your recovery point data to add another
level of protection to your recovery points.
You can choose from the following encryption levels:
4 In the Advanced Options dialog box, make your changes, and then click OK.
5 Click Next three times, and then click Finish.
You must provide the correct password before you can access or restore an
encrypted recovery point.
Warning: Store the password in a secure place. Passwords are case-sensitive. When
you access or restore a password encrypted recovery point, Norton Ghost prompts
you for the case-sensitive password. If you do not type the correct password or
you forget the password, you cannot open the recovery point.
Symantec Technical Support has no method for opening an encrypted recovery
point.
Besides bit strength, the make-up of the password can improve the security of
your data.
For better security, passwords should use the following general rules:
Backing up entire drives 71
Setting advanced options for drive-based backups
Note: The time required to create a recovery point is doubled when you use the
Verify recover point after creation option.
Standard (recommended) This option uses low compression for a 40 percent average
data compression ratio on recovery points. This setting is
the default.
On Tuesday morning, you find that Monday's base recovery point has been
successfully copied to drive A. At the end of the day, you unplug drive A and take
it home for safe keeping.
Backing up entire drives 75
How Offsite Copy works
On Wednesday morning, you bring drive B to the office. You plug in drive B and
Norton Ghost detects that drive B is an Offsite Copy destination. Norton Ghost
then automatically begins copying Monday night's base recovery point and Tuesday
night's incremental recovery point. At the end of the day Wednesday, you take
drive B home and place it in a safe place with drive A.
You now have multiple copies of recovery points stored at two separate, physical
locations: your original recovery points stored on your backup destinations at the
office, and copies of those same recovery points stored on your Offsite Copy
destination drives. Your Offsite Copy destination drives are stored in a safe place
at your home.
The next morning, Thursday, you take drive A to the office and plug it in. Tuesday
and Wednesday night's recovery points are then automatically copied to drive A.
Note: Consider using the external drive naming feature that lets you provide a
unique name, or alias, to each drive. Then place matching physical labels on each
external drive to help you manage the task of swapping the drives.
4 Select the files and folders you want to include in your backup, and then click
Next.
Selecting file types lets Norton Ghost find and include files that match the
files you want backed up. If a file type is not included in the predefined list,
click Add File Type. You can also manually select folders or individual files.
Note: You cannot use an encrypted folder as your backup destination. If you
want to encrypt your backup data to prevent another user from accessing it,
refer to the next step.
Note: Depending on the amount of data you have identified for file and folder
backup, the preview process could take several minutes.
15 If you want to run the new backup immediately, click Run backup now, and
then click Finish.
82 Backing up files and folders
Folders excluded by default from file and folder backups
Note: If necessary, you can run a quick backup of a particular drive without using
a defined backup.
See “Running a One Time Backup” on page 63..
Norton Ghost can be configured to run a backup automatically when an event
occurs on your computer, such as installing a new software program.
See “Enabling event-triggered backups ” on page 87.
When you run a backup, you should close any partitioning software that is running,
such as Norton PartitionMagic. Also, you should not run any disk defragmenting
software during a backup.
You can also schedule backups to run automatically, according to a schedule.
See “Editing a backup schedule ” on page 89.
Note: Using this option does not change the settings of the defined backup. To do
that, you must open the backup and modify its settings manually.
Note: Depending on the current state of the backup, one or more options
might be disabled. For example, if you have not yet run the backup, you cannot
select the first option, Incremental recovery point of recent changes, because
the base recovery point has not yet been created.
Incremental recovery point of recent Select this option if the backup already
changes has a base recovery point created and you
want to simply capture changes made to
the drive since the last backup.
New recovery point set Select this option if you want to start a
completely new recovery point set. When
you select this option, a base recovery
point is created.
5 Click OK to run the backup job and create the recovery point type you selected.
3 When you are finished, click Hide to dismiss the Progress and Performance
dialog box.
Note: When you define a drive-based backup, you should select the option to verify
the recovery point after it is created.
Depending on the amount of data being backed up, this can significantly increase
the time it takes to complete the backup. However, it can ensure that you have a
valid recovery point when the backup finishes.
Running and managing backup jobs 87
Editing backup settings
Note: This feature only appears if you have a Maxtor OneTouch drive installed,
and you are running a Windows XP 32-bit platform.
Note: If your computer is not online, then it is not susceptible to online threats.
But if you connect your computer to the Internet at any time, it becomes
vulnerable. You do not have to enable or disable Symantec ThreatCon Response
when you go on or off line. It simply works if you are online, but does nothing if
you are off line.
Threat Description
Level
Level 2 Security threats could occur, although no specific threats have been known
to occur.
Running and managing backup jobs 89
Editing a backup schedule
Threat Description
Level
For example, all users with Limited Windows accounts can run existing backup
jobs, but they cannot create new jobs or modify existing jobs. However, using the
Security Configuration Tool, you can grant administrative privileges to a Limited
user account. When you do, that user has full access to Norton Ghost and can
create, modify, delete, and run backup jobs.
Note: By default, all users can run existing backup jobs. But only users with
administrative accounts can create, edit, or delete backup jobs.
Full Control Select to give the user or Select to deny the user or
group full access to all of group administrative
the features of Norton access to the features of
Ghost. Full control gives Norton Ghost. They can
users the right to create, run existing backup jobs,
edit, and delete backup but they cannot create,
jobs, including existing edit, or delete them.
jobs.
Status Only Select to deny the user or When you deny Status
group administrative Only, the user or group
access to the features of cannot access any of the
Norton Ghost. They can features of Norton Ghost.
run existing backup jobs,
but they cannot create,
edit, or delete them.
4 Click OK to apply your changes and close the Security Configuration Tool.
Chapter 9
Backing up remote
computers from your
computer
This chapter includes the following topics:
Note: You must purchase a separate license for each computer you want to manage.
You can deploy the agent without a license for a 30-day evaluation. After that
time, you must purchase and install the license to continue managing the remote
computer. You can purchase additional licenses at the Symantec Global Store.
Visit:
http://shop.symantecstore.com
First, you add a computer's name or IP address to the Computer List. Then, you
deploy the Norton Ghost Agent to the remote computer. Once the agent is installed,
the computer automatically restarts. After the computer restarts, you can then
connect to the computer. When you do, the Norton Ghost product interface changes
to reflect the status of the remote computer. At any time, you can switch back to
manage your own, local computer.
3 If you don't know the name of the computer, or its IP address, click Browse
and search for the computer you want to add, and then click OK.
4 Click OK to add the computer to the Computer List.
To add a local computer
1 On the Norton Ghost menu bar, click Computers > Add Local Computer.
2 Click OK.
Backing up remote computers from your computer 95
Deploying the agent
Note: Removing a computer from the Computer List does not uninstall the
agent from the computer. You must run your operating system's uninstall
program.
Note: Because of increased security with Windows Vista, you cannot deploy the
Norton Ghost Agent to Windows Vista without making security configuration
changes. The same issue occurs when you attempt to deploy the agent from
Windows Vista to another computer. You can manually install the agent on the
target computer using the product CD.
Note: If you deselected the Agent Deployment option during installation, this
feature is not available. You can run the installation again, and select the Modify
option to add this feature back in.
You can install the agent to a computer that has less than 256 MB of RAM.
However, Symantec Recovery Disk requires at least 512 MB of RAM for restoring
the computer. Your computer must meet the minimum memory requirement to
run the Recover My Computer wizard or the Recovery Point Browser from the
recovery environment.
Note: If you are installing a multilingual version of the product, you must have a
minimum of 768 MB of RAM to run the Symantec Recovery Disk.
Note: You should close any open applications before you continue with the agent
installation. If the Reboot check box is selected, the computer will automatically
restart at the end of the installation wizard.
5 Click OK.
Backing up remote computers from your computer 97
Using the Norton Ghost Agent
The Norton Ghost Agent does, however, have a tray icon available from the
Windows system tray to provide feedback of current conditions and to perform
common tasks. For example, you can view backup jobs created for the computer,
reconnect the Norton Ghost Agent, or cancel a task that is currently running.
You can install the agent manually by visiting each computer you want to protect
and install the agent from the product CD. A more efficient method, however, is
to use the Norton Ghost Deploy Agent feature to remotely install the agent on a
computer in the domain whose data you want to protect.
To use the Norton Ghost Agent
◆ On the Windows system tray, do one of the following:
■ Right-click the Norton Ghost tray icon, and then click Reconnect to restart
the service automatically.
You cannot run a backup until the service is running.
■ If Norton Ghost is installed on the computer, double-click the Norton
Ghost tray icon to start the program.
If only the agent is installed, double-clicking the tray icon only displays
an About dialog box.
■ If the computer has Norton Ghost installed, right-click the Norton Ghost
tray icon to display a menu of common Norton Ghost Agent tasks.
Note: To manage the Norton Ghost Agent, you must be logged on as a local
administrator.
You can manage the Norton Ghost Agent in the following ways:
Backing up remote computers from your computer 99
Best practices for using services
■ Start, stop, or disable the Norton Ghost Agent on local and remote computers.
See “Starting or stopping the agent service” on page 100.
■ Configure the user name and password that is used by the Norton Ghost Agent.
See “Controlling access to Norton Ghost ” on page 103.
■ Set up recovery actions to take place if the Norton Ghost Agent fails to start.
For example, you can restart the Norton Ghost Agent automatically or restart
the computer.
See “Setting up recovery actions when the agent does not start” on page 101.
Check the Events tab first before using The Events tab in the Advanced view can help you
Services. to track down the source of a problem,
particularly when it is associated with the Norton
Ghost Agent. You should view the most recent log
entries in the Events tab for more information
about the potential causes of the problem.
Verify that the Norton Ghost Agent The Norton Ghost Agent is configured to start
starts without user intervention. automatically when Norton Ghost starts. You can
view the status information to verify that the
Norton Ghost Agent has started. The Status area
in the Task pane displays a Ready status message
when the agent starts.
Use caution when changing default Changing the default Norton Ghost Agent
settings for the Norton Ghost Agent. properties can prevent Norton Ghost from
running correctly. You should use caution when
changing the default Startup type and Log On
settings of the Norton Ghost Agent. It is
configured to start and log on automatically when
you start Norton Ghost .
Opening Services
There are several methods you can use to open Services to manage the Norton
Ghost Agent.
To open Services
1 Do one of the following:
■ On the Windows Vista taskbar, click Start > Control Panel > Classic View
> Administrative Tools, and then double-click Services.
■ On the Windows taskbar, click Start > Settings > Control Panel >
Administrative Tools > Services.
■ On the Windows XP taskbar, click Start > Control Panel > Performance
and Maintenance > Administrative Tools, and then double-click Services.
■ On the Windows taskbar, click Start > Run.
In the Open text field, type services.msc, and then click OK.
2 Under the Name column, scroll through the list of services until you see
Norton Ghost (the name of the agent).
Its status should be Started.
See “Starting or stopping the agent service” on page 100.
Start or Restart You should start or restart the agent if Norton Ghost is
unable to connect to the Norton Ghost Agent on a computer,
or you cannot reconnect from Norton Ghost.
Restart You should restart the agent after you change the user name
or password that you use to log on to the Norton Ghost
Agent service, or you used the Security Configuration Tool
to give additional users the ability to back up computers.
Stop You can stop the agent if you believe it is causing a problem
on the computer, or you want to temporarily free memory
resources.
If you stop the agent, you also prevent all of your drive-based
backups and file and folder backups from running.
If you stop the Norton Ghost Agent service and then start Norton Ghost, the agent
restarts automatically. The Status changes to Ready.
If you stop the Norton Ghost Agent service while Norton Ghost is running, you
receive an error message, and Norton Ghost is disconnected from the agent. In
most cases, you can click Reconnect from the Task pane or from the Tray icon to
restart the Norton Ghost Agent.
To start or stop the Norton Ghost Agent service
1 On the Windows taskbar, click Start > Run.
2 In the Run window, type services.msc
3 Click OK.
4 In the Services window, in the Name column, click Norton Ghost.
5 On the Action menu, select one of the following:
■ Start
■ Stop
■ Restart
3 Click OK.
4 In the Services window, on the Action menu, click Properties.
5 On the Recovery tab, in the First failure, Second failure, and Subsequent
failures lists, select the action that you want:
6 In the Reset fail count after box, specify the number of days that the Norton
Ghost Agent must run successfully before the fail count is reset to zero.
When the fail count is reset to zero, the next failure triggers the action set
for the first recovery attempt.
7 Click OK.
Note: To view the Startup type setting for each of the interdependent services,
you must select one service at a time and then click Action > Properties > General.
The top list box on the Dependencies tab displays services that are required by
the Norton Ghost Agent to run properly. The bottom list box does not have any
services that need the Norton Ghost Agent to run properly.
Table 9-2 lists the services that are required by the Norton Ghost Agent to run
properly, along with their default startup setting.
Backing up remote computers from your computer 103
Controlling access to Norton Ghost
Note: The agent service can only be run as LocalSystem or by a user who belongs
to the Adminstrator's group.
Table 9-3 describes the permissions that can be allowed or denied for user and
groups who use the Norton Ghost Agent.
Option Description
Option Description
A deny setting takes precedence over an inherited allow setting. For example, a
user who is a member of two groups is denied permissions if the settings for one
of the groups denies permissions. User-denied permissions override group-allow
permissions.
To add users and groups
1 On the Windows taskbar, click Start > Programs > Symantec > Norton Ghost
> Security Configuration Tool.
2 Click Add.
3 In the Select Users or Groups dialog box, click Advanced.
4 If necessary, click Object Types to select the types of objects that you want.
5 If necessary, click Locations to select the location that you want to search.
6 Click Find Now, select users and groups you want, and then click OK.
7 Click OK when you are finished.
To change permissions for a user or a group
1 On the Windows taskbar, click Start > Programs > Symantec > Norton Ghost
> Security Configuration Tool.
2 In the Permissions for Norton Ghost dialog box, select the user or group whose
permissions you want to change, and then do one of the following:
■ To set Full Control permissions, click Allow or Deny for the selected user
or group.
■ To set Status Only permissions, click Allow or Deny for the selected user
or group.
6 Click OK.
106 Backing up remote computers from your computer
Controlling access to Norton Ghost
Note: In addition to ensuring that you back up each drive, carefully review and
follow best practices for backing up your computer.
108 Monitoring the status of your backups
Monitoring backup protection from the Home page
No backup protection The drive that displays this icon is not being
assigned monitored for backup status; or it is being
monitored for errors only, but there are no
errors to report.
Note: You can right-click on any of the calendar icons to access a context-sensitive
menu. These menus offer quick access to related tasks.
Refer to the following table for the meaning of each icon displayed in the Backups
calendar.
110 Monitoring the status of your backups
Monitoring backup protection from the Status page
Represents a drive-based backup that This icon can appear in the following states:
is configured to create a single,
independent recovery point. When this
icon appears in the Backup timeline, it Indicates that the backup ran and that an
indicates that a drive-based backup is independent recovery point was created.
scheduled to occur.
Represents a drive-based backup that This icon can appear in the following states:
is configured to create incremental
recovery points. It indicates that a
drive-based backup is scheduled to Indicates that the backup ran and that an
occur on the day that it appears in the incremental recovery point was created.
backup timeline.
Represents a file and folder backup. It This icon can appear in the following states:
indicates that a file and folder backup
is scheduled to occur on the day that it
appears in the backup timeline. Indicates that the backup ran and that file and folder
backup data was created successfully.
Represents two or more backups are This icon can appear in the following states:
scheduled to run on the day on which
this icon appears.
Indicates that two or more backups have run and the
last backup was created successfully.
Medium and high priority messages Send only medium and high priority
messages.
■ Errors
■ Warnings
■ Information
5 Select the version of SNMP traps to be sent (Version 1 or Version 2), and then
click OK.
Note: The backup status of each drive is reported throughout the product, wherever
the drive is listed. When you customize status reporting for a drive, the status is
reflected anywhere that the drive is listed in Norton Ghost.
You should first determine how important the data is on a particular drive (or the
data you have included in a file and folder backup) before deciding on the level of
status reporting to assign to it.
114 Monitoring the status of your backups
Viewing drive details
To customize the status reporting of a drive (or file and folder backups)
1 On the Status page, click a drive (or File and folders) to select it.
You can also click Customize status reporting from the Home page.
2 Click Customize status reporting.
3 Select one of the following options:
Errors only status reporting Shows the current status of the selected
drive or file and folder backups only when
errors occur.
No status reporting Does not show any status for the selected
drive or file and folder backups.
4 Click OK.
Name Displays the name that you assigned to the backup when you defined
it.
Type Identifies the type of recovery point the backup creates when it runs.
Destination Identifies the storage location of the recovery point, or the location
in which the drive should be backed up.
Last Run Displays the day and time when the backup was last run.
Next Run Displays the day and time of the next scheduled backup.
Monitoring the status of your backups 115
Improving the protection level of a drive
Change Schedule Opens the Run When dialog so that you can edit the
backup schedule.
Edit Settings Opens the Define Backup Wizard, which lets you
modify the backup definition.
Define New Backup Opens the Define Backup Wizard from the beginning,
which lets you define a new backup.
Remove Backup Job Deletes the backup that you have selected.
Disable (Enable) Backup Turns on or turns off the backup that you have
selected.
Log entries provide information about the success or failure of numerous actions
that were taken by Norton Ghost or by a user. It offers a single view of all of the
information and program error messages.
The following information is included in the event log:
Date Displays the exact date and time that a selected event occurred.
Description Offers additional details about an event that can help you troubleshoot
problems that might have occurred.
118 Monitoring the status of your backups
Using event log information to troubleshoot problems
Chapter 11
Exploring the contents of a
recovery point
This chapter includes the following topics:
You can only run programs from within a mapped recovery point that do not
rely on registry values, COM interfaces, dynamic link libraries (DLLs), or other
similar dependencies.
You can set up a mounted drive as a shared drive. Users on a network can connect
to the shared drive and restore files and folders from the recovery point.
You can mount one or more recovery points at a time. The drives remain mounted
until you unmount them, or you restart the computer. Mounted drives do not take
up extra hard-disk space.
All security on the NTFS volumes remains intact when they are mounted.
You do not need to mount a drive to restore the files or folders within a recovery
point.
Note: Any data that is written to a mounted recovery point is lost when the
recovery point is unmounted. This data includes any data that is being created,
edited, or deleted at the time.
Note: You cannot view encrypting file system (EFS) NTFS volumes.
4 In the right content panel, double-click the folder that contains the file that
you want to view.
5 Right-click the file that you want to view, and then click View File.
The View option is unavailable if you select a program file that has a .exe,
.dll, or .com file extension.
To restore one or more files
1 On the Tools page, click Run Recovery Point Browser.
2 Navigate to your backup destination folder, select the recovery point file you
want to browse, and then click Open.
3 In the Recovery Point Browser, select a drive in the tree panel (on the left).
4 In the content panel (on the right), double-click a folder that contains the file
you want to view.
5 Do one of the following:
■ Right-click the file you want to view and click View File.
The View option is dimmed (unavailable) if you selected a program file
that has a .exe, .dll, or .com file extension.
■ Select one or more files, click Recover Files, and then click Recover to
restore them to their original location.
If prompted, click Yes or Yes to All to overwrite the existing (original)
files.
Note: If your organization uses Symantec Backup Exec Web Retrieve, it is likely
that your network administrator has already enabled this feature.
You can configure your backups to support one of these search engines. Be sure
to check the Enable search engine support at the time you define the backup.
See “To define a drive-based backup” on page 57.
See “About using a search engine to search recovery points” on page 175.
Exploring the contents of a recovery point 123
Unmounting a recovery point drive
Original drive letter The original drive letter that was assigned to the drive.
Cluster size The cluster size (in bytes) of the FAT, FAT32, or NTFS drive.
File system The file system type used within the drive. For example, FAT,
FAT32, or NTFS.
Size The total size (in megabytes) of the drive. This total includes used
space and unused space.
Used space The amount of used space (in megabytes) within the drive.
Unused space The amount of unused space (in megabytes) within the drive.
Contains bad sectors Indicates if there are any bad sectors on the drive.
124 Exploring the contents of a recovery point
Viewing the drive properties of a recovery point
Drive-based Use this option to back up an entire drive (for example, your system
backup drive, which is typically C). You can then restore any file, folder, or
your entire drive.
126 Managing backup destinations
How backup data works
File and folder Use this option to back up only the files and folders that you select.
backup You can then restore any file or all of them at any time.
This option typically requires less disk space than drive-based backups.
Independent Creates a complete, independent copy of the drives that you select.
recovery point This backup type typically requires more storage space.
(.v2i)
Recovery point set Includes a base recovery point. A base recovery point is a complete
(.iv2i) copy of your entire drive, and is similar to an independent recovery
point. The recovery point set also includes recovery points that capture
only the changes that are made to your computer since the creation
of the base recovery point.
Although you can recover files and folders from a drive-based backup, you cannot
select a specific set of files or folders to back up. Your entire hard drive is backed
up.
can even set a limit to the number of versions kept so that you can control the
use of disk space.
Note: After a recovery point is deleted, you no longer have access to the files or
system recovery from that point in time. You should explore the contents of the
recovery point before you delete it.
128 Managing backup destinations
Managing recovery points
Note: Once you delete a recovery point, you no longer have access to file or system
recovery for that point in time.
Warning: Be careful about which recovery points you choose to delete. You could
inadvertently lose data. For example, you create a new document, which is captured
in the third recovery point in a recovery point set. You then accidentally delete
the file, which is captured by the fourth recovery point. If you delete the third
recovery point, you permanently lose the version of the file that was backed up.
If you are unsure, you should explore the contents of a recovery point before you
delete it.
4 Click OK.
System Displays a list of all of the drives on your computer and shows
any associated recovery points. You can also select a system
index file (.sv2i).
■ Click Browse to locate the folder in which you want to place the virtual
disk image.
10 Click Next, and then review the summary of the choices you made.
If you need to make any changes, click Back.
11 Click Finish.
Viewing how much file and folder backup data is being stored
Start by viewing the total amount of file and folder backup data you are currently
storing.
To view how much file and folder backup data is being stored
1 On the Tools page, click Manage Backup Destination.
2 To select an alternate backup destination, in the Drives drop-down list, select
another drive to use as a backup destination.
3 Near the bottom of the Manage Backup Destination window, view the Space
used for file and folder storage box to see how much storage space is currently
used.
134 Managing backup destinations
Managing file and folder backup data
3 Click View All Versions to display all versions of each file that exist in the
file and folder backup data.
4 Select one or more files that you want to delete.
5 Right-click, and then click Delete.
You can specify a limit to the number of versions of each file or folder stored in
file and folder backup data.
See “Limiting the number of file versions to keep” on page 134.
To find versions of a file or folder
1 Open Windows Explorer.
2 Navigate to a file that you know is included in a file and folder backup.
3 Right-click the file, and then click Show Versions.
5 Check Delay changes until next backup if you do not want your changes
applied until the next backup runs.
6 Click OK.
136 Managing backup destinations
Moving your backup destination
Note: If you want to move your backup destination to a new internal or external
hard drive, make sure the drive is properly installed or connected before you
proceed.
5 Select the defined backups that should use the new backup destination.
Deselect the defined backups that you do not want to move.
6 Check Save as default backup destination if you want to use this destination
as the default backup destination for any new backups that you define in the
future.
7 Click OK.
8 To move existing recovery points to the new backup destination, check Move
recovery points, and then do one of the following:
■ Check Move the latest recovery points for each backup and delete the
rest.
■ Check Move all recovery points to the new destination.
Managing backup destinations 137
Moving your backup destination
9 If you have file and folder backup data that you want to move to the new
backup destination, click Move file backup data.
The Move File Backup Data option is not available no file and folder backup
data is found at the original backup destination.
10 Click OK.
138 Managing backup destinations
Moving your backup destination
Chapter 13
Recovering files, folders, or
entire drives
This chapter includes the following topics:
■ Recovering files and folders by using file and folder backup data
Norton Ghost includes a search tool to help you locate the files that you want to
recover.
To recover files and folders by using file and folder backup data
1 On the Home or Tasks page, click Recover My Files.
2 In the left pane of the Recover My Files window, select File and Folder as the
search method.
3 Do one of the following:
■ In the Find files to recover search box, type the whole name or partial
name of a file or folder that you want to restore, and then click Search.
For example, type recipe to return any file or folder that includes the word
recipe in its name, for example My Recipes.doc, Recipes.xls, Recipes for
Success.mp3, and so forth.
■ Click Advanced Search, type your search criteria, and then click Search.
To return to the standard search text box, click Basic search.
4 In the search results list box, select the files that you want to restore by using
one of the following methods:
To select a group of files that are next to Click the top file, press and hold Shift, and
each other then click the last file in the group.
To select a group of files that are not next Press and hold Ctrl while you select the
to each other files that you want.
Caution: The Overwrite existing files option replaces your original files
(or the files of the same names that are currently stored at that location)
with the files that you are restoring.
Recovering files, folders, or entire drives 141
Recovering files and folders by using a recovery point
7 Click Recover.
8 If you are prompted to replace the existing file, click Yes if you are certain
that the file that you are recovering is the file that you want.
9 Click OK.
Note: If Norton Ghost cannot locate any recovery points, the Select Recovery
Point dialog box opens automatically.
In the Select Recovery Point dialog box, click View by and select one of the
following options:
■ Click Browse, locate and select a recovery point (.v2i file), and
then click Open.
■ If you select a network location, type your network
credentials.
See “About network credentials” on page 66.
■ Click Finish.
System Displays a list of all of the drives on your computer and shows
any associated recovery points. You can also select a system index
file (.sv2i).
4 In the Find files to recover box, type the whole name or partial name of a file
or folder that you want to restore, and then click Search.
For example, type recipe to return any file or folder that includes the word
recipe in its name, such as My Recipes.doc, Recipes.xls, Recipes for
Success.mp3, and so forth.
5 In the Files to restore list, select the files that you want to restore by using
one of the following methods:
To select a group of files that are next to Click the top file, press and hold Shift, and
each other then click the last file in the group.
To select a group of files that are not next Press and hold Ctrl while you select the
to each other files that you want.
Recovering files, folders, or entire drives 143
Recovering files and folders by using a recovery point
Caution: Checking Overwrite existing files replaces your original files (or
the files of the same names that are currently stored at that location) with
the files you are restoring.
■ Click Recovered Files folder on the desktop to have your files restored
to a new folder that is created on your Windows desktop called Recovered
Files.
■ Click Alternate folder and specify the path to an alternate location where
you want your files restored.
8 Click Recover.
9 If you are prompted to replace the existing file, click Yes if you are certain
that the file that you are recovering is the file that you want.
10 Click OK.
Note: You can recover your system drive (typically, drive C).
For example, if your computer has a D drive and the data has been lost, you can
restore the D drive back to an earlier date and time.
See “About recovering a computer ” on page 151.
To recover a drive, you must have a recovery point that includes the drive that
you want to recover. If you are not sure, review the Status page to determine what
recovery points are available.
See “Monitoring backup protection from the Status page ” on page 109.
Note: Before you proceed, close any applications and files that are open on the
drive that you want to restore.
Warning: When you recover a drive, all of the data on the drive to which you are
restoring the recovery point is replaced by the data in the recovery point. Any
changes that you made to the data on a drive after the date of the recovery point
you use to recover it are lost. For example, if you created a new file on the drive
after you created the recovery point, the new file is not recovered.
To recover a drive
1 On the Tasks page, click Recover My Computer.
2 Select a recovery point, and then click Recover Now.
3 Click OK.
4 Click Yes.
To customize the recovery of a drive
1 On the Tasks page, click Recover My Computer.
2 Select a recovery point, and then click Recover Now.
3 Click Custom to start the Recover Drive Wizard.
4 Click Next.
Recovering files, folders, or entire drives 145
Recovering a secondary drive
6 Select the drive that you want to restore, and then click Next.
If the drive does not have enough space available to restore a recovery point,
press Shift and then select multiple, contiguous destinations that exist on
the same hard disk.
7 If the recovery point is password-protected, in the Password box, type the
password and then click OK.
8 Select from the following restore options:
Verify recovery point before Verifies whether a recovery point is valid or corrupt it
restore is restored.
Check for file system errors Checks the restored drive for errors after the recovery
point is restored.
Resize restored drive Automatically expands the drive to occupy the target
drive's remaining unallocated space.
Set drive active (for booting Makes the restored drive the active partition (for
OS) example, the drive from which the computer starts).
Restore original disk Restores the original, physical disk signature of the
signature hard drive.
The options that are available depend on the restore destination that you
have selected.
9 Click Next to review your selections.
10 Click Finish.
11 Click Yes.
If the wizard cannot lock the drive to perform the recovery in Windows
(typically, because the drive is in use by a program), make sure the drive is
not in use by closing any files or applications that might be using it, and then
click Retry.
If the Retry option fails, click Ignore to tell Windows to attempt to force a
lock on the drive. If Ignore failes, you might be prompted to insert the
Symantec Recovery Disk and manually start the recovery environment so
that you can complete the recovery. When the recovery is finished, the
computer restarts automatically.
Recovering files, folders, or entire drives 147
About LightsOut Restore
Note: You must install a fully licensed version of Norton Ghost before you use the
LightsOut feature to perform a restore operation. LightsOut Restore is not included
in the evaluation version.
■ Install Norton Ghost on the servers that you want to protect, and then define
and run backups to create recovery points.
■ Run the LightsOut Restore Wizard to install the Symantec recovery
environment to the local file system.
The wizard also creates an entry in the Windows boot menu that can be used
to boot to the recovery environment.
Note: LightsOut Restore works only on the primary operating system. It does
not work on multiple-boot computers (for example, computer that boot multiple
operating systems from the same partition). LightsOut Restore is accessible
only from the boot menu. If the file system becomes corrupt and you cannot
access the boot menu, you must boot the computer from the CD.
■ When you need to recover and file or system from a remote location, use the
RILO or DRAC device to connect to the remote server, and power on the system
or restart it.
■ As the remote server starts, open the boot menu, and then select the Symantec
recovery environment.
The remote server boots into the Symantec recovery environment and the
connection through RILO or DRAC is lost. A pcAnywhere thin host
automatically starts.
■ Use Symantec pcAnywhere to connect to the pcAnywhere thin host that is
waiting on the remote server.
■ Through pcAnywhere, use the recovery environment to restore individual
files, or entire drives.
6 If you are shown a list of network and storage drivers that are not supported
in the Symantec recovery environment, do the following:
■ Select the box next to the network driver that you would like to copy from
your current Windows installation to the Symantec recovery environment.
■ Review the list of missing storage drivers, and then click Next.
■ Browse to the locations of your missing storage and network driver files.
Note: The location that you specify should contain the fully extracted
installation package for the driver. If you have more than one missing
storage driver, you must rerun the LightsOut Restore Wizard for each
missing driver. The drivers that you select should be compatible with
Windows Vista.
150 Recovering files, folders, or entire drives
About LightsOut Restore
The files are copied from the Symantec Recovery Disk. After the files are
copied, you receive a message that indicates that LightsOut Restore
successfully installed.
7 If you want to ensure that you can use the LightsOut feature when you need
it, check the Test installed LightsOut Restore check box.
While doing so requires a reboot of your computer, it could be worth the extra
effort in the event that you need to utilize LightOut Restore from a remote
location.
8 Click Finish.
■ Recovering a computer
Note: If you can start Windows and the drive that you want to restore is a secondary
drive (which is any drive other than your system drive, or the drive where your
operating system is installed), you can restore the drive within Windows.
The Symantec Recovery Disk lets you run a recovery environment that provides
temporary access to Norton Ghost recovery features. For example, you can access
the Recover My Computer Wizard to restart the computer into its previous, usable
state.
152 Recovering a computer
Starting a computer by using the recovery environment
Note: If you purchased Norton Ghost from your computer manufacturer, some
features in the recovery environment might not be available. For example, if the
manufacturer installed the recovery environment on your computer's hard disk.
Your manufacturer might also assign a keyboard key for the purpose of starting
the recovery environment.
When you restart your computer, watch for instructions on your computer monitor,
or refer to your manufacturer's instructions.
Note: Depending on which version of the product you have purchased, the SRD
is either included on your product CD, or as a separate CD. You should place the
CD containing the SRD in a safe place. Should you lose the CD, you can create a
new one if you have a CD burner. See If driver validation fails in the Norton Ghost™
User's Guide.
Note: You should attach the device before you restart the computer. Otherwise,
the recovery environment might not detect it.
2 Insert the Norton Ghost CD into the media drive of the computer.
If Norton Ghost was installed by your computer manufacturer, the recovery
environment already could be installed on your computer's hard drive. Either
watch your computer monitor after the computer restarts for on-screen
instructions, or refer to your manufacturer's documentation.
3 Restart the computer.
If you cannot start the computer from the CD, you might need to change the
startup settings on your computer.
See “Configuring your computer to boot from a CD” on page 153.
4 As soon as you see the prompt “Press any key to boot from CD”, press a key
to start the recovery environment.
Note: You must watch for this prompt. It can come and go quickly. If you miss
the prompt, you must restart your computer again.
3 In the BIOS setup window, select Boot Sequence, and then press Enter.
4 Follow the on-screen instructions to make the CD or DVD device be the first
bootable device in the list.
5 Put your SRD CD into the CD drive, and then restart your computer.
Note: Depending on which version of the product you have purchased, the
SRD is either included on your product CD, or as a separate CD. You should
place the CD containing the SRD in a safe place. Should you lose the CD, you
can create a new one if you have have a CD burner.
6 Save the changes and exit the BIOS setup to restart the computer with the
new settings.
7 Press any key to start the recovery environment (Symantec Recovery Disk).
When you start your computer with the SRD CD in the drive, you will see a
prompt telling you to “Press any key to boot from CD”. If you do not press a
key within five seconds, your computer will attempt to start from the next
bootable device listed in the BIOS.
Note: Watch carefully as the computer starts. If you miss the prompt, the
computer will need to be restarted again.
Use the virus definitions currently Select this option to use the definitions
available that are included on the Symantec
Recovery Disk CD.
Use Update Locator virus definitions Select this option if you downloaded the
folder latest virus definitions to a disk.
Note: Depending on which version of the product you have purchased, the SRD
is either included on your product CD, or as a separate CD. You should place the
CD containing the SRD in a safe place. Should you lose the CD, you can create a
new one if you have a CD burner. See If driver validation fails in the Norton Ghost™
User's Guide.
7 Locate the newly created Update Locator Virus Definitions folder on your
computer's desktop and copy it to the blank disk.
Automatically fix file system errors Fixes errors on the selected disk. When
this option is not selected, errors are
displayed but are not fixed.
Find and correct bad sectors Locates bad sectors and recovers readable
information.
4 Click Start.
Recovering a computer
You can restore your computer within the recovery environment. If you have a
recovery point for the hard drives that you want to recover, you can fully recover
Recovering a computer 157
Recovering a computer
your computer or other hard drive back to the state it was in when the recovery
point was created.
To recover your computer
1 Start the computer by using the Symantec Recovery Disk.
See “Starting a computer by using the recovery environment ” on page 152.
2 On the Home panel, click Recover My Computer.
Note: If your recovery points are stored on a CD or DVD and you only have
one CD/DVD drive, you can eject the Symantec Recovery Disk CD now. Insert
the CD or DVD that contains your recovery points.
■ Click Browse, locate and select a recovery point (.v2i file), and
then click Open.
■ If you select a network location, type your network
credentials.
■ Click Finish.
158 Recovering a computer
Recovering a computer
System Displays a list of all of the drives on your computer and shows
any associated recovery points. You can also select a system index
file (.sv2i).
Verify recovery point before Verifies whether a recovery point is valid or corrupt it
restore is restored.
Check for file system errors Checks the restored drive for errors after the recovery
after recovery point is restored.
Resize restored drive Automatically expands the drive to occupy the target
drive's remaining unallocated space.
Recovering a computer 159
Recovering a computer
Set drive active (for booting Makes the restored drive the active partition (for
OS) example, the drive from which the computer starts).
Restore original disk Restores the original, physical disk signature of the
signature hard drive.
Restore Master Boot Record Restores the master boot record. The master boot
(MBR) record is contained in the first sector of a physical hard
disk. The MBR consists of a master boot program and
a partition table that describes the disk partitions. The
master boot program looks at the partition table of the
first physical hard disk to see which primary partition
is active. It then starts the boot program from the boot
sector of the active partition.
Preserve domain trust token Preserves the token that is used to authenticate a user
on destination or a computer on a domain. This option helps ensure
that a recovered computer is recognized by a network
domain after it is recovered.
The options that are available depend on the restore destination that you
selected.
7 Click Next to review the restore options that you selected.
8 Check Reboot when finished if you want the computer to restart automatically
after the recovery process finishes.
9 Click Finish.
10 Click Yes to restore the drive.
The system index file contains a list of the most recent recovery points, which
includes the original drive location of each recovery point.
If you have suffered a catastrophic hard drive failure, you can also use Symantec
Recovery Disk to perform a bare metal recovery of a computer.
To restore multiple drives using a system index file
1 Start the computer by using the Symantec Recovery Disk.
See “Starting a computer by using the recovery environment ” on page 152.
Drive letters in the recovery environment might not match those in the
Windows environment.
2 On the Home panel, click Recover My Computer.
3 Click Next.
4 Click View by, and then select System.
5 Click Browse, locate and select a system file (.sv2i), and then click Open.
The system index file is in the same location as the recovery point location.
6 If you select a network location, type your network credentials.
7 Check each recovery point that you want to recover.
If necessary, add, change, or remove recovery points from the list.
8 Click Finish.
■ If the Symantec Recovery Disk cannot locate any recovery points, you are
prompted to locate one. In the Open dialog box, navigate to a recovery
point, select one, and then click Open.
■ If the Symantec Recovery Disk finds recovery points, select a recovery
point from the list, and then click OK.
Note: If you have trouble finding the recovery points in a network location,
in the File name box, type the name of the computer and share that holds
your recovery points. For example, \\computer_name\share_name.
If you are still having problems, try entering the computer's IP address.
Using the networking tools in the recovery environment .
4 In the tree view pane of the Recovery Point Browser, double-click the drive
that contains the files or folders that you want to restore to expand it.
5 In the content pane of the Recovery Point Browser, do one of the following
to select the files or folders that you want to restore.
To select a group of files that are next to Select the top file, press Shift, and then
each other select the last file in the list.
To select a group of files that are not next Press Ctrl as you select the files.
to each other
Note: While in the recovery environment, drive letters and labels might not
match what appears in Windows. You might have to identify the correct drive
based on its label, which is the name assigned to it.
7 If the original path is unknown or you want to restore the selected files to a
different location, click Browse to locate the destination.
Recovering a computer 163
Using the networking tools in the recovery environment
Note: You cannot deploy a thin host to the recovery environment. The thin host
can only be started from Symantec Recovery Disk to host a remote control session
in the recovery environment. The thin host in Symantec Recovery Disk does not
support file transfers and cannot be used to add drivers for network or storage
devices.
Note: The client computer cannot transfer files or add additional drivers for
network or storage devices on the computer that is running the thin host.
Created The date and time that the recovery point file was created
Encryption The encryption strength that is used with the recovery point
Computer name The name of the computer on which the recovery point was
created
Catalogued If you enabled search engine support for the recovery point,
this property is displayed.
Original drive letter The original drive letter that was assigned to the drive.
Cluster size The cluster size (in bytes) that is used in a FAT, FAT32, or
NTFS drive.
File system The file system type that is used within the drive.
Used space The amount of used space (in megabytes) within the drive.
Unused space The amount of unused space (in megabytes) within the drive.
Contains bad sectors Indicates if there are any bad sectors on the drive.
Note: You should only use these tools as directed by Symantec Technical Support.
170 Recovering a computer
About the Support Utilities
Chapter 15
Copying a drive
This chapter includes the following topics:
Note: You must install a fully licensed version of Norton Ghost before you can use
the Copy Drive feature. This feature is not available in the evaluation version.
2 Change the jumper settings on the hard drive to make the new hard drive the
slave drive, or connect it as the slave drive if you are using cable select instead
of jumper settings to determine the master and slave drives.
3 Do the following to attach the new hard drive:
■ Connect the cable so that the colored stripe on the edge lines up with the
I/O pins on the motherboard.
The motherboard is marked Pin1 or 1 where the colored stripe should go.
■ Connect the other end of the cable to the back of the hard drive, and match
the striped edge with the I/O pin position on the drive itself.
The I/O pin is usually on the side closest to the power supply.
If the power or the hardware fails while you copy the data, no data is lost from
the source drive. However, you must restart the copying process.
Note: This feature is not available in the evaluation version of the product.
Option Description
Check source for file system Check the source drive for errors before you copy it. The
errors source drive is the original drive.
Check destination for file Check the destination drive for errors after you copy the
system errors drive. The destination drive is the new drive.
Resize drive to fill This option automatically expands the drive to occupy the
unallocated space. destination drive's remaining unallocated space.
Set drive active (for booting Make the destination drive the active partition (the drive
OS) from which the computer starts). Only one drive can be
active at a time. To boot the computer, it must be on the
first physical hard disk, and it must contain an operating
system. When the computer boots, it reads the partition
table of the first physical hard disk to find out which drive
is active. It then boots from that location. If the drive is not
bootable or you are not certain if it is, have a boot disk ready.
You can use the Symantec Recovery Disk.
The Set drive active option is valid for basic disks only (not
dynamic disks).
174 Copying a drive
Copying one hard drive to another hard drive
Option Description
Disable SmartSector copying The SmartSector technology from Symantec speeds up the
copying process by only copying the clusters and sectors
that contain data. However, in a high-security environments,
you might want to copy all clusters and sectors in their
original layout, regardless of whether they contain data.
Ignore bad sectors during This option copies the drive even if there are errors on the
copy disk.
Copy MBR This option copies the master boot record from the source
drive to the destination drive. Select this option if you are
copying the C:\ drive to a new, empty hard drive. You should
not select this option if you want to copy a drive to another
space on the same hard drive as a backup. You should also
not select this option if you want to copy the drive to a hard
drive that has existing partitions that you do not want to
replace.
Destination partition type Click Primary partition to make the destination (new) drive
a primary partition.
Drive letter Select the drive letter you want assigned to the partition
from the Drive letter drop-down list
Appendix A
Using a search engine to
search recovery points
This appendix includes the following topics:
Install a search engine You can download and install Google Desktop for free
from the Internet. Visit desktop.google.com.
Enable Google Desktop support A Google plug-in for Norton Ghost is required before
you can use Google Search to locate and recover files.
Enable search engine support when When you define a backup job, or edit an existing
defining or editing a backup job backup job, enable search engine support.
Note: Recovery points that already exist when you enable this feature cannot be
indexed. This restriction is because the generated list of files that are required by
search engines for generating searchable indexes are appended to recovery points
as they are created. After you enable this feature, run each of your backups in
order to create a new recovery point that contains the required information for
indexing.
Note: If your backup destination is on a network drive, be sure to add the location
to the Google Desktop preferences.
A backups (continued)
access define first 25
allow or deny users or groups 103 defining and running 47
activate the product 25 defining drive-based 57
Advanced page defining file and folder 79
about 17 deleting 90
showing or hiding 17 disabling 90
agent dual-boot computers 56
dependencies, viewing 100, 102 edit advanced options 69
Microsoft Services 98 edit schedule 89
set security for 103 edit settings 87
setting up recovery actions for 101 event-triggered 87
starting, stopping, or restarting 100 file and folder 126
troubleshooting in Services 98 folders excluded during file and folder
Agent Deployment backups 82
using 95 ignoring bad sectors during drive-based 69
Windows Vista 95 managing storage of 125
agents monitoring 107
setting security for 90 one time 63
archive other computers from your computer 93
recovery points 129 run immediately 83
run with options 84
running command files during 66
B selecting a backup destination 54
backing up dual-boot computers 56 setting advanced options for drive-based 61, 65
backup data setting advanced options for file and folder 80
automating management of 135 slowing down to improve PC performance 85
password protecting 69 speeding up 85
storing on removable media 56 status 109
using for recovering files and folders 139 status of 86
backup destination storage location 36
how it works 125 things to do after 51
moving 136 things to do before 49
backup jobs things to do during 51
edit advanced options 69 tips 52
backup status 86 tips for a better backup 48
backup storage types of 48
about 125 verifying success 86, 109
backups viewing progress 72
allowing other users to define 90 benefits of using Norton Ghost
best practices 48–49 best practices, services 99
cancelling 86
180 Index
N R
network RAM drives
enabling throttling 38 not supported 21
network credentials recover computer
rules when supplying 66 remotely 163
network services tasks to try first 154
configure connection settings 166 recovery
get static IP address 166 about 139
starting in recovery environment (SRD) 163 cancelling 86
using in recovery environment (SRD) 163 computer (C drive) 151
Norton Ghost customize 144
configuring default options 34 files and folders 139
how to use 32 options for drives 145
more information about 18 original disk signature 159
new features 14 restoring files and folders 139
running with different user rights 105 recovery actions
Norton Ghost Agent setting up when agent does not start 101
automatic start 99 recovery environment
deploy over a network 95 boot into 152
manually install from product CD 95 configure network connection settings 166
setting up recovery actions for 101 exploring computer while using 163
Norton Ghost Agent, changing default settings get static IP address 166
for 100 mapping drive from 166
networking tools 163
O recovering computer 156
recovering files and folders 161
Offsite Copy
recovery options 158
about 73
scanning for viruses 154
assigning aliases to external drives for use
scanning hard disk 156
with 41
starting 152
copy recovery points 73
Support Utilities 169
One Time Backup 63
troubleshooting 153
operating system
viewing drive properties 168
backing up computers with multiple 56
viewing recovery point and drive properties 167
Options
viewing recovery point properties 168
configuring defaults 34
recovery point
original disk signature
archiving 129
recovering 159
checking integrity of 60, 64
choosing options for 64
P cleaning up old 127
pagefile.sys 65 copy to CD or DVD 129
pcAnywhere Thin Host create a specific type 84
using to recover remotely 163 default storage location 36
permissions defined 58
allowing other users to back up 90 deleting sets 128
protection encrypting 70
hard disks 108 free up hard disk space 129
protection status 86 independent 58
push install of agent 95 limiting number of sets 60
Index 183
T
tabs
Events and log file 99
ThreatCon Response
enable 88
throttling
enabling network 38
time, elapsed time in Events tab 99
tips for running backups 52
trial version
installing or upgrading 21
troubleshooting
agent 98
U
unmounting recovery point drives 123
updating
automatically with LiveUpdate 25
upgrading
trial version of Norton Ghost 21
users
rights to run Norton Ghost 103
V
verifying recovery point after creation 109
virtual disk format
convert recovery points to 130
viruses
checking recovery points for 119
VMWare Virtual Disk (.vmdk) 130
W
Windows Explorer
mount recovery points from 121
viewing file and folder version information
in 134