Norton Ghost™
Norton Ghost User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 8.0 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions.
Technical Support Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product feature and function, installation, and configuration. The Technical Support group also authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion.
When you contact Technical Support, please have the following information available: ■ Product release level ■ Hardware information ■ Available memory, disk space, and NIC information ■ Operating system ■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and regis
■ Advice about Symantec's technical support options ■ Nontechnical presales questions ■ Issues that are related to CD-ROMs or manuals Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: ■ Asia-Pacific and Japan: contractsadmin@symantec.com ■ Europe, Middle-East, and Africa: semea@symantec.com ■ North America and Latin America: supportsolutions@symantec.
To access more information about Enterprise services, please visit our Web site at the following URL: www.symantec.com Select your country or language from the site index.
Contents Technical Support ............................................................................................... 3 Chapter 1 Introducing Norton Ghost™ ............................................... 13 Getting started ............................................................................ What's new in Norton Ghost 14.0 .................................................... New features and enhancements added in the previous release ............................................................
Contents Adjusting the effects of a backup on computer performance ........... Adjusting default tray icon settings ........................................... Managing file types ............................................................... Using aliases for external drives ................................................ Configuring FTP settings for use with Offsite Copy ....................... Logging Norton Ghost messages ...............................................
Contents Chapter 7 Backing up files and folders .............................................. 79 Defining a file and folder backup .................................................... 79 Folders excluded by default from file and folder backups ..................... 82 Chapter 8 Running and managing backup jobs ............................... 83 Running an existing backup job immediately .................................... Run a backup with options ......................................................
Contents Customize status reporting ........................................................... Viewing drive details ................................................................... Improving the protection level of a drive ......................................... Using event log information to troubleshoot problems ...................... Chapter 11 Exploring the contents of a recovery point .................. 119 About exploring recovery points ..................................................
Contents About LightsOut Restore .............................................................. 147 Setting up and using LightsOut Restore .................................... 147 Configuring LightsOut Restore ................................................ 148 Chapter 14 Recovering a computer ..................................................... 151 About recovering a computer ....................................................... Starting a computer by using the recovery environment .................
Contents
Chapter 1 Introducing Norton Ghost™ This chapter includes the following topics: ■ Getting started ■ What's new in Norton Ghost 14.0 ■ About the Advanced page ■ Where to find more information Getting started Norton Ghost provides advanced backup and recovery for your computer. Protect your documents, financial records, presentations, photos, music, videos, historical documents, or any other kinds of data you keep on your computer by making a backup of your computer's entire hard disk.
Introducing Norton Ghost™ What's new in Norton Ghost 14.0 Using easy-to-follow wizards, set up fast and reliable backups that run while you continue to work. Or schedule your backups to run after hours when you are no longer using your computer. When disaster strikes, Norton Ghost helps you recover your computer from the effects of many common problems, including ■ Virus attacks: Damage might be done before a virus is quarantined.
Introducing Norton Ghost™ What's new in Norton Ghost 14.0 Feature Description Create and manage aliases for your external To help you more easily identify external drives drives for use as backup destinations, Norton Ghost lets you assign an alias to each external drive. Doing so does not change the drive label, but is for use only when you are accessing those drives from within Norton Ghost. See “Using aliases for external drives” on page 41.
Introducing Norton Ghost™ What's new in Norton Ghost 14.0 Feature Description Windows Vista support Norton Ghost has been designed and tested to run in the new Windows Vista operating system, and still supports previous versions of Windows. See “System requirements” on page 19. Improved Easy Setup Now setting up your first backup is even easier with the enhanced Easy Setup, which appears either during install (unless you choose to skip it), or automatically the first time you run Norton Ghost.
Introducing Norton Ghost™ About the Advanced page Feature Description Event-triggered backups In addition to scheduled and manual backups, Norton Ghost can detect certain events and run a backup automatically whenever they occur, providing an added level of protection for your computer. Performance throttling Manually adjust the effect of a running backup on the performance of your computer to better match your needs at the moment.
Introducing Norton Ghost™ Where to find more information To show the Advanced page 1 Start Norton Ghost. 2 On the View menu, click Show Advanced Page. Where to find more information To learn more about Norton Ghost, visit the new Help and Support page.
Chapter 2 Installing Norton Ghost This chapter includes the following topics: ■ Preparing for installation ■ Installing Norton Ghost ■ Updating Norton Ghost ■ Uninstalling the product Preparing for installation Before you install Norton Ghost, make sure that your computer meets the system requirements. System requirements Table 2-1 lists the system requirements for Norton Ghost.
Installing Norton Ghost Preparing for installation Table 2-1 Minimum system requirements (continued) Component Minimum Requirements RAM The following memory requirements are grouped by key components: ■ Norton Ghost Agent: 256 MB ■ Norton Ghost user interface and Recovery Point Browser: 256 MB ■ Symantec Recovery Disk: 512 MB minimum Note: If you are installing a multilingual or double-byte version of the product, you must have a minimum of 768 MB of RAM to run the Symantec Recovery Disk.
Installing Norton Ghost Preparing for installation Supported file systems Norton Ghost supports FAT16, FAT16X, FAT32, FAT32X, NTFS, GUID Partition Table (GPT), dynamic disks, Linux Ext2, Linux Ext3, and Linux swap partitions. Note: You must decrypt encrypted NTFS drives before you attempt to restore them. You cannot view the files that are in a recovery point for an encrypted NTFS drive.
Installing Norton Ghost Installing Norton Ghost Note: If this product came pre-installed from a computer manufacturer, your trial period could be as long as 90 days. The product licensing or activation page during install will indicate the duration of your trial period. See “Activating Norton Ghost later” on page 25. Installing Norton Ghost Before you begin, you should review the requirements and scenarios for installing Norton Ghost. See “System requirements” on page 19.
Installing Norton Ghost Installing Norton Ghost 3 If the installation program does not run, type the following command at a command prompt:. :\autorun.exe where is the drive letter of your media drive. 4 In the CD browser panel, click Install Norton Ghost. 5 Read the license agreement, and then click I accept the terms in the license agreement. 6 Do one of the following: ■ Click Install Now to begin the installation.
Installing Norton Ghost Installing Norton Ghost 8 Click Finish to complete the installation. 9 Remove the product CD from the media drive, and then click Yes to exit the installation wizard and restart the computer. If you click No because you plan to restart your computer yourself at a later time, note that you cannot run Norton Ghost until after you restart your computer. Completing the installation After you install the product, you are prompted to license or activate your product.
Installing Norton Ghost Updating Norton Ghost 6 Click Enable Google Desktop File and Folder Recovery if you want use Google Desktop to search your recovery points for the files and folders that you want to recover. If you select this option, Norton Ghost automatically catalogs each file as it creates a recovery point. Google Desktop can then use this catalog to search for files by name. It does not index the content of the files.
Installing Norton Ghost Uninstalling the product You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates. To update Norton Ghost 1 On the Help menu, click LiveUpdate. 2 In the LiveUpdate window, click Start to select the updates. Follow the on-screen instructions. 3 When the installation is complete, click Close. Some program updates might require that you restart your computer before the changes take effect.
Chapter 3 Ensuring the recovery of your computer This chapter includes the following topics: ■ About ensuring the recovery of your computer ■ Testing Symantec Recovery Disk ■ If driver validation fails ■ Creating a custom Symantec Recovery Disk CD About ensuring the recovery of your computer If Windows fails to start or it does not run normally, you can recover your computer by using the Symantec Recovery Disk (SRD).
Ensuring the recovery of your computer Testing Symantec Recovery Disk Note: Wireless network adapter drivers are not supported by the driver validation tool or by the SRD. Testing Symantec Recovery Disk You should test the SRD to ensure that the recovery environment runs properly on your computer. Note: Depending on which version of the product you have purchased, the SRD is either included on your product CD, or as a separate CD. You should place the CD containing the SRD in a safe place.
Ensuring the recovery of your computer Creating a custom Symantec Recovery Disk CD If the drivers are available on the recovery disk, you receive a validation message. If any drivers are missing from the recovery disk, the Driver Validation Results dialog appears. Without access to the correct drivers, a device cannot be used while running the SRD. Therefore, if the recovery points required for recovering your computer are stored on a network or a local hard drive, you might not have access to them.
Ensuring the recovery of your computer Creating a custom Symantec Recovery Disk CD Select this option only if you know which drivers to select. 7 Follow the on-screen instructions to complete the wizard. Warning: Be certain to test your new, customized Symantec Recovery Disk CD to make sure that it can start your computer and that you can access the drive containing your recovery points. See “Testing Symantec Recovery Disk” on page 28.
Chapter 4 Getting Started This chapter includes the following topics: ■ Key product components ■ How you use Norton Ghost ■ Starting Norton Ghost ■ Configuring Norton Ghost default options Key product components Norton Ghost includes two key components: the program itself, and the Symantec Recovery Disk. Table 4-1 Key Component Key product components Description Norton Ghost program (user interface) The Norton Ghost program lets you define, schedule, and run backups of your computer.
Getting Started How you use Norton Ghost Table 4-1 Key product components (continued) Key Component Description Symantec Recovery Disk The Symantec Recovery Disk (SRD) is used to boot your computer into the recovery environment. If your computer's operating system fails, use the SRD to recover your system drive (the drive where your operating system is installed).
Getting Started Starting Norton Ghost Figure 4-1 Using Norton Ghost Starting Norton Ghost Norton Ghost is installed in the Windows Program Files folder by default. During installation, a program icon is installed in the Windows system tray from which you can open Norton Ghost. You can also open Norton Ghost from the Windows Start menu. Note: To use the full version of Norton Ghost, you must activate the software. See “Activating Norton Ghost later” on page 25.
Getting Started Configuring Norton Ghost default options To start Norton Ghost ◆ Do one of the following: ■ On the classic Windows taskbar, click Start > Programs > Norton Ghost. ■ On the Windows XP or Windows Vista taskbar, click Start > All Programs > Norton Ghost. ■ In the Windows system tray, double-click the Norton Ghost tray icon. ■ In the Windows system tray, right-click the Norton Ghost tray icon, and then click Open Norton Ghost.
Getting Started Configuring Norton Ghost default options Options Description Tray Icon You can turn the system tray icon on or off and specify whether to show only error messages when they occur, or to show both error messages and other information, such as the completion of a backup. See “Adjusting default tray icon settings ” on page 38.
Getting Started Configuring Norton Ghost default options Options Description SMTP E-mail If you want a history of actions taken by Norton Ghost, or of error messages and warnings, you can choose to save them in a log file on your computer, or to have them emailed to an address you specify. See “Enabling email notifications for product (event) messages ” on page 44.
Getting Started Configuring Norton Ghost default options 4 Check Save backup files to a unique subfolder if you want Norton Ghost to create a new subfolder that will serve as your backup destination. Note: The new subfolder is given the same name as your computer. For example, if your computer name is "MyLaptop", the new subfolder would be named \MyLaptop. 5 Enter a path to a folder where you want to store recovery points and file and folder backup data, or click Browse to look for a location.
Getting Started Configuring Norton Ghost default options Enabling network throttling Similar to computer performance adjustments, you can also limit the impact of a backup on network performance.
Getting Started Configuring Norton Ghost default options To adjust default tray icon settings 1 On the main menu bar, click Tasks > Options. 2 Click Tray Icon and select one of the following: Show system tray icon Displays the Norton Ghost icon in the system tray. You must select this option to enable or disable any of the remaining options. Show missed backups Notifies you when a backup was scheduled but did not run.
Getting Started Configuring Norton Ghost default options To create a new file type and extensions 1 On the main menu bar, click Tasks > Options. 2 Click File Types. 3 At the bottom of the File types list, click the Add a file type (+) button to add a file type category. 4 Type a descriptive name of the new file type category, and then press Enter.
Getting Started Configuring Norton Ghost default options Using aliases for external drives When you choose an external drive for use with Norton Ghost as either a backup destination or an Offsite Copy destination, it can become confusing if you are using more than one drive, especially when the assigned drive letter changes each time you plug in the drive. To help you manage these destinations, Norton Ghost lets you assign an alias to each external drive.
Getting Started Configuring Norton Ghost default options Configuring FTP settings for use with Offsite Copy File Transfer Protocol, or FTP, is the simplest and most secure way to copy files over the Internet. Norton Ghost serves as an FTP client to copy your recovery points to a remote FTP server as a secondary backup of your critical data. The Options dialog box lets you configure basic FTP settings to help ensure that your recovery points are copied to your FTP server.
Getting Started Configuring Norton Ghost default options Two logging methods are available: Norton Ghost logging, and the Windows application log. From the Options page, you can configure both methods. To configure a Norton Ghost log file 1 On the main menu bar, click Tasks > Options. 2 Under Notifications, click Log File. 3 Click the Select the priority and type of messages drop-down list and select the priority level at which a message should be logged.
Getting Started Configuring Norton Ghost default options 3 4 5 Click the Select the priority and type of messages drop-down list and select the priority level at which a message should be logged. All messages Send all messages, regardless of priority levels. Medium and high priority messages Send only medium and high priority messages. High priority messages only Send only high priority messages. No messages Do not send any messages, regardless of priority levels.
Getting Started Configuring Norton Ghost default options 3 4 Click the Select the priority and type of messages drop-down list and select the priority level at which an email should be sent. All messages Send all messages, regardless of priority levels. Medium and high priority messages Send only medium and high priority messages. High priority messages only Send only high priority messages. No messages Do not send any messages, regardless of priority levels.
Getting Started Configuring Norton Ghost default options
Chapter 5 Best practices for backing up your data This chapter includes the following topics: ■ About backing up your data ■ Choosing a backup type ■ Best practices for backing up ■ Additional tips about backups ■ After defining your backup job ■ About selecting a backup destination ■ About backing up dual-boot computers About backing up your data To back up your computer or your individual files and folders, you do the following steps: ■ Define a backup ■ Run the backup See “How you use
Best practices for backing up your data Choosing a backup type ■ When to run the backup (automatically or manually) ■ What compression levels to specify for recovery points, and whether to enable security settings (encryption and password protection). ■ Which of the many other options you want to use. You can customize each backup according to your backup needs.
Best practices for backing up your data Best practices for backing up ■ When the backup is complete About backups When you back up your computer, you choose from two types of backups: ■ drive-based backup: backs up an entire hard drive ■ file and folder backup: backs up only the files and folders you select Which backup type you choose depends on what you are trying to protect and how much storage space you have to store backup data (recovery points, and file and folder backup data).
Best practices for backing up your data Best practices for backing up Consider using external drives as your backup destination. Using an external drive makes your backup data more portable. Should you need to remove your critical data from a particular location, you can quickly grab an external drive on your way out the door. See “About Offsite Copy” on page 73.
Best practices for backing up your data Best practices for backing up Keep personal data on a separate drive than the drive on which Windows and your software programs are installed. You should keep your operating system and software programs separate from your own data. This practice helps to speed the creation of recovery points and reduce the amount of information that needs to be restored. For example, use the C drive to run Windows and to install and run software programs.
Best practices for backing up your data Additional tips about backups Review the Status page to verify Periodically review the Status page. You can also that backups have happened and review the events log on the Advanced page. to identify any potential problems. The event log records events when they occur, backups and any errors that might have occurred during or after a backup. If you do not see the Advanced page tab, click View > Show Advanced Page.
Best practices for backing up your data After defining your backup job ■ Do not run a disk defragmentation program during a backup. Doing so will significantly increase the time that it takes to create the recovery point and might cause unexpected system resource issues. ■ If you have two or more drives that are dependent on each other, you should include both drives in the same backup. This provides the safest protection.
Best practices for backing up your data About selecting a backup destination About selecting a backup destination You should review the following information before deciding where to store recovery points and file and folder backup data. Note: If you choose to use CDs or DVDs as your backup destination (not recommended), you cannot back up to a sub-folder on the disk. Backup data must be created at the root of CDs and DVDs.
Best practices for backing up your data About selecting a backup destination Table 5-1 Selecting a backup destination (continued) Backup destination Information to consider Network folder If your computer is connected to a network, you can save your recovery points and file and folder backup data to a network folder. Backing up to a network folder typically requires that you authenticate to the computer that is hosting the folder.
Best practices for backing up your data About backing up dual-boot computers Table 5-2 Advantages and disadvantages of backup destinations (continued) Backup destination Advantages Network drive ■ (recommended) ■ Fast backup and recovery ■ Must have supported NIC drivers to restore from Can schedule unattended the recovery environment backups ■ Must understand and ■ Inexpensive because assign the appropriate drive space can be rights for users who will overwritten repeatedly run backups and res
Chapter 6 Backing up entire drives This chapter includes the following topics: ■ Defining a drive-based backup ■ Setting advanced options for drive-based backups ■ About setting a compression level for drive-based backups ■ About Offsite Copy ■ How Offsite Copy works Defining a drive-based backup A drive-based backup takes a snapshot of your entire hard drive, capturing every bit of information that is stored on it for later retrieval.
Backing up entire drives Defining a drive-based backup 3 Click Back up my computer, and then click Next. 4 Select one or more drives to back up, and then click Next. Press and hold Ctrl to select multiple drives. If you do not see a drive that you expected to see, check Show Hidden Drives. 5 6 Do one of the following: ■ If you selected a drive that has already been included in a defined backup, click Next, and then skip to step 8.
Backing up entire drives Defining a drive-based backup 8 On the Backup Destination page, select from the following options: Folder field Browse to the location in which you want to store the recovery points. If Norton Ghost detects that this location does not have enough available space, it alerts you. You should choose another location that has more space. Network Credentials If you want to save the recovery point on a network share, type the user name and password for network access.
Backing up entire drives Defining a drive-based backup See “About Offsite Copy” on page 73. 10 Click Next. Note: You cannot use an encrypted folder as your backup destination. You can choose to encrypt your backup data to prevent another user from accessing it. 11 On the Options page, select from the following options: Name Type a name for your backup. Compression Select one of the following compression levels for the recovery point.
Backing up entire drives Defining a drive-based backup Include system and temporary files Check this option to include indexing support for operating system and temporary files when a recovery point is created on the client computer. Description text box Type a description for the recovery point. The description can be anything that helps you further identify the recovery point's contents. Advanced In the Advanced Options dialog box, select any of the following options, and then click OK.
Backing up entire drives Defining a drive-based backup Weekly Runs the backup at the time and on the days of the week that you specify. When you select this option, the Select the days of the week to protect box appears. Monthly Runs the backup at the time and on the days of the week that you specify. When you select this option, the Select the days of the month to protect box appears. Only run once Runs the backup one time on the date and at the time you specify.
Backing up entire drives Defining a drive-based backup Schedule Do one or more of the following: (Backup Time) ■ Click Schedule, and then select the days and a start time for when the backup should run. Check Run more than once per day if you frequently modify data that you want to protect. Also, specify the maximum time that should occur between backups and the number of times per day that the backup should run.
Backing up entire drives Defining a drive-based backup 3 Select one or more drives to back up and click Next. Note: Press and hold Ctrl to select multiple drives. 4 Click Next. 5 In the Backup Destination dialog box, select from the following options: Folder field Browse to the location in which you want to store the recovery points. If Norton Ghost detects that this location does not have enough available space, it alerts you. You should choose another location that has more space.
Backing up entire drives Defining a drive-based backup Description text box Type a description for the recovery point. The description can be anything that helps you further identify the recovery point's contents. Advanced In the Advanced Options dialog box, select any of the following options, and then click OK.
Backing up entire drives Defining a drive-based backup About network credentials If you connect to a computer on a network, you must provide the user name and password for network access, even if you previously authenticated to the network. The Norton Ghost service runs on the local system account. When you enter network credentials, the following rules apply: ■ If the computer you want to connect to is on a domain, provide the domain name, user name, and password. For example: domain\username ■ If
Backing up entire drives Defining a drive-based backup You can specify the location of command files if you want them to be located in a place other than the default location. You can also specify a location on a per-job basis, as well as specify a location that can be shared among several computers. If you specify a network location, you must provide network credentials. See “About network credentials” on page 66.
Backing up entire drives Setting advanced options for drive-based backups Table 6-1 Recovery point creation stages Stage Description Before data capture This stage occurs after a backup has started and before a recovery point is created. You can run a command during this stage to prepare for the recovery point creation process. For example, you can close any open applications that are using the drive.
Backing up entire drives Setting advanced options for drive-based backups Divide into smaller files to simplify archiving You can split the recovery point into smaller files and specify the maximum size (in MB) for each file. For example, if you plan to copy a recovery point to ZIP disks from your backup destination, specify a file size of 100 MB or less, according to the size of each ZIP disk.
Backing up entire drives Setting advanced options for drive-based backups 4 In the Advanced Options dialog box, make your changes, and then click OK. 5 Click Next three times, and then click Finish. About recovery point encryption You can enhance the security of your data by using the Advanced Encryption Standard (AES) to encrypt recovery points that you create or archive. You should use encryption if you store recovery points on a network and want to protect them from unauthorized access and use.
Backing up entire drives Setting advanced options for drive-based backups ■ Avoid using consecutive, repeating characters (for example, BBB or 88). ■ Avoid using common words that you would find in a dictionary. ■ Use at least one number. ■ Use both uppercase and lowercase alpha characters. ■ Use at least one special character such as ({}[],.<>;:’"?/|\`~!@#$%^&*()_-+=). ■ Change the password after a set period of time.
Backing up entire drives About setting a compression level for drive-based backups Viewing the progress of a backup You can view the progress of a backup while it runs to determine how much time remains until the backup completes. To view the progress of a backup ◆ While a backup is running, on the View menu, click Progress and Performance.
Backing up entire drives About Offsite Copy About Offsite Copy Backing up your data to a secondary hard disk is a critical first step to protect your information assets. But to make certain your data is safe, use Offsite Copy to copy your latest recovery points to either a portable storage device, remote server in your network, or to a remote FTP server.
Backing up entire drives How Offsite Copy works See “To define a drive-based backup” on page 57. See “Editing backup settings” on page 87. Using external drives as your Offsite Copy destination Use an external drive as your Offsite Copy destination. This method lets you take a copy of your data with you when you leave the office. By using two external hard disks, you can be certain that you have a recent copy of your data both on and off site.
Backing up entire drives How Offsite Copy works On Wednesday morning, you bring drive B to the office. You plug in drive B and Norton Ghost detects that drive B is an Offsite Copy destination. Norton Ghost then automatically begins copying Monday night's base recovery point and Tuesday night's incremental recovery point. At the end of the day Wednesday, you take drive B home and place it in a safe place with drive A.
Backing up entire drives How Offsite Copy works Using an FTP server as your Offsite Copy destination Using an FTP server as your Offsite Copy destination is similar to using a server. You must provide a valid FTP path to the FTP server. You must also provide the correct FTP connection information to Norton Ghost in order for this method to work correctly. When Offsite Copy is configured correctly, it copies recovery points to the directory that you specified on the FTP server.
Backing up entire drives How Offsite Copy works 77
Backing up entire drives How Offsite Copy works
Chapter 7 Backing up files and folders This chapter includes the following topics: ■ Defining a file and folder backup ■ Folders excluded by default from file and folder backups Defining a file and folder backup When you define and run a file and folder backup, copies are made of each of the files and folders that you have chosen to back up.
Backing up files and folders Defining a file and folder backup 4 Select the files and folders you want to include in your backup, and then click Next. Selecting file types lets Norton Ghost find and include files that match the files you want backed up. If a file type is not included in the predefined list, click Add File Type. You can also manually select folders or individual files.
Backing up files and folders Defining a file and folder backup 10 Click Schedule if you want the backup to run automatically, according to a schedule. If you want to run the backup only when you start it manually, uncheck Schedule. 11 Enter a start time and select the days of the week when the backup should run.
Backing up files and folders Folders excluded by default from file and folder backups Folders excluded by default from file and folder backups The following folders and their contents are excluded automatically from file and folder backups: ■ Windows folder ■ Program Files folder ■ Temporary folder ■ Temporary Internet Files folder These folders are typically not used for storing personal files or folders.
Chapter 8 Running and managing backup jobs This chapter includes the following topics: ■ Running an existing backup job immediately ■ Adjusting the speed of a backup ■ Stopping a backup or recovery task ■ Verifying that a backup is successful ■ Editing backup settings ■ Enabling event-triggered backups ■ Editing a backup schedule ■ Turning off a backup job ■ Deleting backup jobs ■ Adding users who can back up your computer Running an existing backup job immediately This is particularly
Running and managing backup jobs Running an existing backup job immediately Note: If necessary, you can run a quick backup of a particular drive without using a defined backup. See “Running a One Time Backup” on page 63.. Norton Ghost can be configured to run a backup automatically when an event occurs on your computer, such as installing a new software program. See “Enabling event-triggered backups ” on page 87.
Running and managing backup jobs Adjusting the speed of a backup See “Editing backup settings” on page 87. To run a backup with options 1 On the Home page, click Run or Manage Backups. 2 In the Run or Manage Backups window, select the drive-based backup job that you want to run. 3 Click Tasks > Run Backup With Options. 4 Select one of the following options: Note: Depending on the current state of the backup, one or more options might be disabled.
Running and managing backup jobs Stopping a backup or recovery task To adjust the performance of a backup 1 While a backup is running, on the View menu, click Progress and Performance. 2 Do one of the following: 3 ■ If you want to increase the speed of your computer by reducing the speed of the backup, drag the slider toward Slow. ■ If you want the backup to complete as quickly as possible and you are not doing extensive work on your computer, drag the slider toward Fast.
Running and managing backup jobs Editing backup settings See “Verifying a recovery point after creation ” on page 71. To verify the success of a backup 1 On the Status page, review the Backups calendar, and verify that the backup appears on the date that you ran it. 2 Move your mouse over a backup icon to review the status of the backup. Editing backup settings You can modify the settings of an existing backup.
Running and managing backup jobs Enabling event-triggered backups ■ The Maxtor OneTouch™ external hard drive button is pushed Note: This feature only appears if you have a Maxtor OneTouch drive installed, and you are running a Windows XP 32-bit platform. To enable event-triggered backups 1 On the Home or Tasks page, click Run or Manage Backups. 2 Select the backup you want to edit, and then click Change Schedule. 3 Click General under Event Triggers.
Running and managing backup jobs Editing a backup schedule Table 8-1 Norton Ghost ThreatCon levels (continued) Threat Level Description Level 3 An isolated security threat is in progress. Level 4 Extreme global security threats are in progress. For more information about Symantec ThreatCon, visit http://www.symantec.com. To configure Symantec ThreatCon Response 1 On the Home or Tasks page, click Run or Manage Backups. 2 Select the backup you want to edit, and then click Change Schedule.
Running and managing backup jobs Turning off a backup job 3 Click Change Schedule. 4 Make changes to the schedule, and then click OK. Turning off a backup job You can turn off a backup and re-enable it later. When you turn off a backup, it will not run according to its defined schedule, if it has one. When a backup is turned off, triggered events will not run it, nor can you run it manually. You can also delete a defined backup (not recovery points). See “Deleting backup jobs ” on page 90.
Running and managing backup jobs Adding users who can back up your computer For example, all users with Limited Windows accounts can run existing backup jobs, but they cannot create new jobs or modify existing jobs. However, using the Security Configuration Tool, you can grant administrative privileges to a Limited user account. When you do, that user has full access to Norton Ghost and can create, modify, delete, and run backup jobs. Note: By default, all users can run existing backup jobs.
Running and managing backup jobs Adding users who can back up your computer 3 4 Choose from the following options: Permissions Allow Deny Full Control Select to give the user or group full access to all of the features of Norton Ghost. Full control gives users the right to create, edit, and delete backup jobs, including existing jobs. Select to deny the user or group administrative access to the features of Norton Ghost.
Chapter 9 Backing up remote computers from your computer This chapter includes the following topics: ■ About backing up other computers from your computer ■ Adding computers to the Computer List ■ Deploying the agent ■ Using the Norton Ghost Agent ■ Managing the agent through Windows Services ■ Best practices for using services ■ Controlling access to Norton Ghost About backing up other computers from your computer Norton Ghost lets you connect to, and back up a second computer on your home
Backing up remote computers from your computer Adding computers to the Computer List Note: You must purchase a separate license for each computer you want to manage. You can deploy the agent without a license for a 30-day evaluation. After that time, you must purchase and install the license to continue managing the remote computer. You can purchase additional licenses at the Symantec Global Store. Visit: http://shop.symantecstore.com First, you add a computer's name or IP address to the Computer List.
Backing up remote computers from your computer Deploying the agent To remove a computer from the Computer List 1 On the Norton Ghost menu bar, click Computers > Edit List. 2 Select the remote computer that you want to remove, click the minus sign (-), and then click OK. Note: Removing a computer from the Computer List does not uninstall the agent from the computer. You must run your operating system's uninstall program.
Backing up remote computers from your computer Deploying the agent To prepare a computer in a workgroup environment to deploy the agent 1 On the Windows taskbar, right-click Start, and then click Explore . 2 On the Tools menu, click Folder Options > View. 3 On the View tab, scroll to the end of the list and verify that the Use simple file sharing check box is unchecked, and then click OK. 4 On the Windows taskbar, click Start > Settings > Control Panel > Windows Firewall.
Backing up remote computers from your computer Using the Norton Ghost Agent To manually install the agent 1 Insert the Norton Ghost product CD into the media drive of the computer. The installation program should start automatically. 2 If the installation program does not start, on the Windows taskbar, click Start > Run, type the following command, then click OK. :\autorun.exe where is the drive letter of your media drive.
Backing up remote computers from your computer Managing the agent through Windows Services The Norton Ghost Agent does, however, have a tray icon available from the Windows system tray to provide feedback of current conditions and to perform common tasks. For example, you can view backup jobs created for the computer, reconnect the Norton Ghost Agent, or cancel a task that is currently running.
Backing up remote computers from your computer Best practices for using services ■ Start, stop, or disable the Norton Ghost Agent on local and remote computers. See “Starting or stopping the agent service” on page 100. ■ Configure the user name and password that is used by the Norton Ghost Agent. See “Controlling access to Norton Ghost ” on page 103. ■ Set up recovery actions to take place if the Norton Ghost Agent fails to start.
Backing up remote computers from your computer Best practices for using services Table 9-1 Best practices for using services (continued) Best practice Description Use caution when changing default settings for the Norton Ghost Agent. Changing the default Norton Ghost Agent properties can prevent Norton Ghost from running correctly. You should use caution when changing the default Startup type and Log On settings of the Norton Ghost Agent.
Backing up remote computers from your computer Best practices for using services Start or Restart You should start or restart the agent if Norton Ghost is unable to connect to the Norton Ghost Agent on a computer, or you cannot reconnect from Norton Ghost. Restart You should restart the agent after you change the user name or password that you use to log on to the Norton Ghost Agent service, or you used the Security Configuration Tool to give additional users the ability to back up computers.
Backing up remote computers from your computer Best practices for using services 3 Click OK. 4 In the Services window, on the Action menu, click Properties. 5 On the Recovery tab, in the First failure, Second failure, and Subsequent failures lists, select the action that you want: 6 Restart the Service Specify the number of minutes before an attempt to restart the service is made. Run a Program Specify a program to run. You should not specify any programs or scripts that require user input.
Backing up remote computers from your computer Controlling access to Norton Ghost Table 9-2 Required services Service Startup type Event Log Automatic Plug and Play Automatic Remote Procedure Call (RPC) Automatic To view Norton Ghost Agent dependencies 1 In the Services window, under Name, click Norton Ghost. See “Opening Services ” on page 100. 2 On the Action menu, click Properties. 3 Click the Dependencies tab.
Backing up remote computers from your computer Controlling access to Norton Ghost Table 9-3 Permission options (continued) Option Description Status Only Users or groups can get status information, and can run a backup job. But they cannot define, change, or delete any backup jobs, or use any other function of the product. Deny Users cannot perform any function, or see any information. They are blocked from any access to Norton Ghost.
Backing up remote computers from your computer Controlling access to Norton Ghost To remove a user or group 1 On the Windows Start menu, click Programs > Symantec > Norton Ghost > Security Configuration Tool. 2 Select the user or group that you want to remove, and then click Remove. 3 Click OK when you are finished.
Backing up remote computers from your computer Controlling access to Norton Ghost To perform Run As from Windows Vista 1 On the Windows taskbar, click Start > All Programs > Norton Ghost > Norton Ghost. 2 Click Yes when prompted to add the required privileges. 3 Enter the password for an administrator account, and then click OK.
Chapter 10 Monitoring the status of your backups This chapter includes the following topics: ■ About monitoring backups ■ Monitoring backup protection from the Home page ■ Monitoring backup protection from the Status page ■ Configuring Norton Ghost to send SNMP traps ■ Customize status reporting ■ Viewing drive details ■ Improving the protection level of a drive ■ Using event log information to troubleshoot problems About monitoring backups You should monitor your backups to ensure that yo
Monitoring the status of your backups Monitoring backup protection from the Home page Rescanning a computer’s hard disk Use Refresh to update the drive information that is displayed in various views of the product. This feature is useful when hard disk configurations have changed but the changes do not immediately appear in Norton Ghost. For example, adding hard disk space or creating a partition. When you use Refresh, Norton Ghost scans all attached hard disks for any configuration changes.
Monitoring the status of your backups Monitoring backup protection from the Status page Table 10-1 Backup protection levels (continued) At risk No defined backup exists and no recovery points are available from which to recover the drive. An unprotected drive cannot be recovered and is at risk. Status unknown The status is being calculated, or you have not yet licensed your product. Either wait a few seconds for the status to display, or make sure that you have licensed your copy of the product.
Monitoring the status of your backups Monitoring backup protection from the Status page Table 10-2 Icon Description Backups calendar icons Icon states Represents a drive-based backup that This icon can appear in the following states: is configured to create a single, independent recovery point. When this icon appears in the Backup timeline, it Indicates that the backup ran and that an indicates that a drive-based backup is independent recovery point was created. scheduled to occur.
Monitoring the status of your backups Monitoring backup protection from the Status page Table 10-2 Icon Backups calendar icons (continued) Description Icon states Represents a file and folder backup. It This icon can appear in the following states: indicates that a file and folder backup is scheduled to occur on the day that it Indicates that the backup ran and that file and folder appears in the backup timeline. backup data was created successfully. Indicates that the backup is not available.
Monitoring the status of your backups Configuring Norton Ghost to send SNMP traps To monitor backup protection from the Status page 1 On the Status page, review the Backups calendar and verify that the backup appears on the date that you ran it. 2 In the Drives column, select the drive that you want to view. The status information appears in the bottom half of the Status page. 3 Move your mouse over a backup icon in the calendar to review the status of the backup.
Monitoring the status of your backups Customize status reporting 5 ■ Errors ■ Warnings ■ Information Select the version of SNMP traps to be sent (Version 1 or Version 2), and then click OK. About the Norton Ghost management information base The Norton Ghost management information base (MIB) is an enterprise MIB. It contains the Norton Ghost SNMP trap definitions. All Network Management System (NMS) applications have options to load a MIB.
Monitoring the status of your backups Viewing drive details To customize the status reporting of a drive (or file and folder backups) 1 On the Status page, click a drive (or File and folders) to select it. You can also click Customize status reporting from the Home page. 2 Click Customize status reporting. 3 Select one of the following options: Full status reporting Shows the current status of the selected drive or file and folder backups on the Home and Status pages.
Monitoring the status of your backups Improving the protection level of a drive To view drive details 1 On the Advanced page, on the Content Bar, click the Drives tab. If the Advanced page is not visible on the Primary Navigation Bar, click View > Show Advanced Page. 2 In the Drive column, select a drive. 3 Review the Details section below the Drives table.
Monitoring the status of your backups Using event log information to troubleshoot problems To improve the protection level of a drive 1 On the Status page, select a drive that requires attention from the Drives column. 2 In the Status section at the bottom of the page, right-click the backup you want to modify, and then select one of the following menu items: Run Backup Now Runs the selected backup job immediately.
Monitoring the status of your backups Using event log information to troubleshoot problems Log entries provide information about the success or failure of numerous actions that were taken by Norton Ghost or by a user. It offers a single view of all of the information and program error messages. The following information is included in the event log: Type Indicates if the event is an error message or other information, such as the successful completion of a backup job.
Monitoring the status of your backups Using event log information to troubleshoot problems
Chapter 11 Exploring the contents of a recovery point This chapter includes the following topics: ■ About exploring recovery points ■ Exploring a recovery point through Windows Explorer ■ Opening files within a recovery point ■ Using a search engine ■ Unmounting a recovery point drive ■ Viewing the drive properties of a recovery point About exploring recovery points You can use Norton Ghost to explore files in a recovery point by assigning it a drive letter that is visible from Windows Explore
Exploring the contents of a recovery point Exploring a recovery point through Windows Explorer You can only run programs from within a mapped recovery point that do not rely on registry values, COM interfaces, dynamic link libraries (DLLs), or other similar dependencies. You can set up a mounted drive as a shared drive. Users on a network can connect to the shared drive and restore files and folders from the recovery point. You can mount one or more recovery points at a time.
Exploring the contents of a recovery point Opening files within a recovery point Mounting a recovery point from Windows Explorer You can also manually mount a recovery point as a drive by opening your backup destination folder in Windows Explorer. You can use Windows Explorer to search the contents of the recovery point.
Exploring the contents of a recovery point Using a search engine 4 In the right content panel, double-click the folder that contains the file that you want to view. 5 Right-click the file that you want to view, and then click View File. The View option is unavailable if you select a program file that has a .exe, .dll, or .com file extension. To restore one or more files 1 On the Tools page, click Run Recovery Point Browser.
Exploring the contents of a recovery point Unmounting a recovery point drive Unmounting a recovery point drive All of your mounted recovery point drives are unmounted when you restart the computer. You can also unmount the drives without restarting the computer. To dismount a recovery point in Windows Explorer 1 In Windows Explorer, navigate to the mounted recovery point. 2 Right-click the drive, and then click Dismount Recovery Point.
Exploring the contents of a recovery point Viewing the drive properties of a recovery point To view the drive properties of a recovery point 1 In the Recovery Point Browser, in the tree panel, click the recovery point that contains the drive that you want to view. 2 Select a drive. 3 Do one of the following: ■ On the File menu, click Properties. ■ Right-click the recovery point, and then click Properties.
Chapter 12 Managing backup destinations This chapter includes the following topics: ■ About backup destinations ■ How backup data works ■ Managing recovery points ■ Converting a recovery point to a virtual disk format ■ Managing file and folder backup data ■ Automating management of backup data ■ Moving your backup destination About backup destinations A backup destination is the location in which your backup data is stored.
Managing backup destinations How backup data works File and folder backup Use this option to back up only the files and folders that you select. You can then restore any file or all of them at any time. This option typically requires less disk space than drive-based backups. About drive-based backups When you run a drive-based backup, a snapshot is taken of everything that is stored on your computer's hard disk. Each snapshot is stored on your computer as a recovery point.
Managing backup destinations Managing recovery points can even set a limit to the number of versions kept so that you can control the use of disk space. Managing recovery points Norton Ghost includes several features that help you manage your backup data. The key is to prevent backup data from taking up too much hard disk space on your computer while providing adequate backup protection in the event that you need to recover your computer, files, or folders.
Managing backup destinations Managing recovery points See “Opening files within a recovery point” on page 121. See “About exploring recovery points ” on page 119. To clean up old recovery points 1 On the Tools page, click Manage Backup Destination. 2 Click Clean Up. The recovery point sets that can be safely removed without eliminating your latest recovery point are selected automatically. You can check or uncheck the recovery point sets to specify which ones to remove. 3 Click Delete.
Managing backup destinations Managing recovery points Warning: Be careful about which recovery points you choose to delete. You could inadvertently lose data. For example, you create a new document, which is captured in the third recovery point in a recovery point set. You then accidentally delete the file, which is captured by the fourth recovery point. If you delete the third recovery point, you permanently lose the version of the file that was backed up.
Managing backup destinations Converting a recovery point to a virtual disk format 3 Select which recovery point to copy, and then click OK. 4 On the Welcome page of the Copy Recovery Point Wizard, click Next. 5 Select the recovery point that you want to copy. Recovery point sets appear as single recovery points. Check View all recovery points to display all incremental recovery points that are included within the recovery point sets. 6 Click Next.
Managing backup destinations Converting a recovery point to a virtual disk format ■ VMware ESX Server 2.5 and 3.0 ■ VMware Infrastructure 3 ■ Microsoft Virtual Server 2005 R2 To convert a recovery point to virtual disk format 1 On the Tools page, click Convert to Virtual Disk, and then click Next. 2 Select the recovery point that you want to convert, and then click Next.
Managing backup destinations Converting a recovery point to a virtual disk format ■ 6 Click Browse to locate the folder in which you want to place the virtual disk image. If you select a network location, type your network credentials. See “About network credentials” on page 66. 7 Click Next. 8 If you select Microsoft Virtual Disk (.vhd) as your virtual disk format, skip the next step. 9 If you select VMware Virtual Disk (.
Managing backup destinations Managing file and folder backup data Import location Type the path to the folder to which you want to import the virtual disk files. Note: The folder that you select must be different than the upload location folder. Remove intermediate files Check this option if you want the temporary files to be removed once the virtual disk is created. 10 Click Next, and then review the summary of the choices you made. If you need to make any changes, click Back. 11 Click Finish.
Managing backup destinations Managing file and folder backup data Limiting the number of file versions to keep You can manage your file and folder backup data by limiting the number of versions of backup files that you keep. This can significantly reduce the amount of disk space required, especially if the files are large, as is often the case with audio and video files. To limit the number of file versions to keep 1 On the Tools page, click Manage Backup Destination. 2 Click Settings.
Managing backup destinations Automating management of backup data You can specify a limit to the number of versions of each file or folder stored in file and folder backup data. See “Limiting the number of file versions to keep” on page 134. To find versions of a file or folder 1 Open Windows Explorer. 2 Navigate to a file that you know is included in a file and folder backup. 3 Right-click the file, and then click Show Versions.
Managing backup destinations Moving your backup destination Moving your backup destination You can change the backup destination for your recovery points and move your existing recovery points to a new location. For example, suppose you install a new external hard drive for storing your backup data. You could then change the backup destination for one or more backups to the new drive. When you select a new location, you can also choose to move the existing recovery points to the new destination.
Managing backup destinations Moving your backup destination 9 If you have file and folder backup data that you want to move to the new backup destination, click Move file backup data. The Move File Backup Data option is not available no file and folder backup data is found at the original backup destination. 10 Click OK.
Managing backup destinations Moving your backup destination
Chapter 13 Recovering files, folders, or entire drives This chapter includes the following topics: ■ About recovering lost data ■ Recovering files and folders by using file and folder backup data ■ Recovering files and folders by using a recovery point ■ Recovering a secondary drive ■ About LightsOut Restore About recovering lost data Norton Ghost can restore lost files, folders, or entire drives by using recovery points or file and folder backup data.
Recovering files, folders, or entire drives Recovering files and folders by using file and folder backup data Norton Ghost includes a search tool to help you locate the files that you want to recover. To recover files and folders by using file and folder backup data 1 On the Home or Tasks page, click Recover My Files. 2 In the left pane of the Recover My Files window, select File and Folder as the search method.
Recovering files, folders, or entire drives Recovering files and folders by using a recovery point ■ Click Recovered Files folder on the desktop to restore your files to a Recovered Files folder on your Windows desktop. Norton Ghost creates this folder during the restore. ■ Click Alternate folder and type the path to the location in which you want to restore your files. 7 Click Recover.
Recovering files, folders, or entire drives Recovering files and folders by using a recovery point Filename Lets you browse to another location, for example, an external (USB) drive or removable media to select a recovery point (.v2i) file. Select this option, and then do the following: Click Browse, locate and select a recovery point (.v2i file), and then click Open. ■ If you select a network location, type your network credentials. See “About network credentials” on page 66. ■ Click Finish.
Recovering files, folders, or entire drives Recovering files and folders by using a recovery point 6 Click Recover Files. 7 In the Recover My Files dialog box, do one of the following: ■ Click Original folders to have your files restored in the original folder where they existed when they were backed up. If you want to replace the original files, check Overwrite existing files. If you do not check this option, a number is added to the filename, leaving the original file untouched.
Recovering files, folders, or entire drives Recovering a secondary drive Recovering a secondary drive If you lose data on a secondary drive, you can use an existing recovery point for that drive to restore the data. A secondary drive is a drive other than the drive on which your operating system is installed. Note: You can recover your system drive (typically, drive C). For example, if your computer has a D drive and the data has been lost, you can restore the D drive back to an earlier date and time.
Recovering files, folders, or entire drives Recovering a secondary drive 5 6 Do one of the following: ■ To use the recovery point that is selected, click Next. ■ Click Browse to select a different recovery point, and then click Next. If you need to access recovery points on a network that requires user authentication, enter your user name and password, and then click Next. Select the drive that you want to restore, and then click Next.
Recovering files, folders, or entire drives Recovering a secondary drive Restore original disk signature Restores the original, physical disk signature of the hard drive. Disk signatures are included in Windows Server 2003, Windows 2000 Advanced Server, and Windows NT Server 4.0 Enterprise Edition (SP3 and later). Disk signatures are required to use the hard drive.
Recovering files, folders, or entire drives About LightsOut Restore About LightsOut Restore Norton Ghost LightsOut Restore lets administrators restore a computer from a remote location. It works regardless of the state of the computer provided that its file system is intact. For example, suppose you are on vacation in the Bahamas and a computer on your network in Los Angeles goes down. You can connect to the computer from your remote location by using your server's remote connection capabilities.
Recovering files, folders, or entire drives About LightsOut Restore ■ Install Norton Ghost on the servers that you want to protect, and then define and run backups to create recovery points. ■ Run the LightsOut Restore Wizard to install the Symantec recovery environment to the local file system. The wizard also creates an entry in the Windows boot menu that can be used to boot to the recovery environment. Note: LightsOut Restore works only on the primary operating system.
Recovering files, folders, or entire drives About LightsOut Restore To configure LightsOut Restore 1 Start Norton Ghost, and then click Tasks > Set Up LightsOut Restore. If the product is not licensed, the LightsOut Setup menu item is not available. You must install a license file. See “Activating Norton Ghost later” on page 25. 2 Insert your Symantec Recovery Disk CD into your CD-ROM drive, and then click Next.
Recovering files, folders, or entire drives About LightsOut Restore The files are copied from the Symantec Recovery Disk. After the files are copied, you receive a message that indicates that LightsOut Restore successfully installed. 7 If you want to ensure that you can use the LightsOut feature when you need it, check the Test installed LightsOut Restore check box.
Chapter 14 Recovering a computer This chapter includes the following topics: ■ About recovering a computer ■ Starting a computer by using the recovery environment ■ Preparing to recover a computer ■ Recovering a computer ■ Restoring multiple drives by using a system index file ■ Recovering files and folders from the recovery environment ■ Using the networking tools in the recovery environment ■ Viewing properties of recovery points and drives ■ About the Support Utilities About recoverin
Recovering a computer Starting a computer by using the recovery environment Note: If you purchased Norton Ghost from your computer manufacturer, some features in the recovery environment might not be available. For example, if the manufacturer installed the recovery environment on your computer's hard disk. Your manufacturer might also assign a keyboard key for the purpose of starting the recovery environment.
Recovering a computer Starting a computer by using the recovery environment To start your computer by using the Symantec Recovery Disk 1 If you store your recovery points on a USB device, attach the device now (for example, and external hard drive). Note: You should attach the device before you restart the computer. Otherwise, the recovery environment might not detect it. 2 Insert the Norton Ghost CD into the media drive of the computer.
Recovering a computer Preparing to recover a computer 3 In the BIOS setup window, select Boot Sequence, and then press Enter. 4 Follow the on-screen instructions to make the CD or DVD device be the first bootable device in the list. 5 Put your SRD CD into the CD drive, and then restart your computer. Note: Depending on which version of the product you have purchased, the SRD is either included on your product CD, or as a separate CD. You should place the CD containing the SRD in a safe place.
Recovering a computer Preparing to recover a computer To scan for viruses 1 On the Analyze panel, click Scan for Viruses. 2 Select one of the following: Use the virus definitions currently available Select this option to use the definitions that are included on the Symantec Recovery Disk CD. Use Update Locator virus definitions folder Select this option if you downloaded the latest virus definitions to a disk. See “Locating the latest virus definitions” on page 155.
Recovering a computer Recovering a computer ■ Scroll down and check Run command. ■ Click OK. 3 Click Run Update Locator. 4 Click Find and retrieve virus definitions. If more recent virus definitions are not found, you can still scan for viruses on your damaged computer by using the virus definitions that are on the Symantec Recovery Disk CD. However, the computer might not be protected from new viruses or threats. 5 When prompted, click OK.
Recovering a computer Recovering a computer your computer or other hard drive back to the state it was in when the recovery point was created. To recover your computer 1 Start the computer by using the Symantec Recovery Disk. See “Starting a computer by using the recovery environment ” on page 152. 2 On the Home panel, click Recover My Computer. Note: If your recovery points are stored on a CD or DVD and you only have one CD/DVD drive, you can eject the Symantec Recovery Disk CD now.
Recovering a computer Recovering a computer System Displays a list of all of the drives on your computer and shows any associated recovery points. You can also select a system index file (.sv2i). Select this option, and then do the following: Click Browse, locate and select a recovery point (.sv2i), and then click Open. ■ If you select a network location, type your network credentials. ■ Check each recovery point that you want to recover.
Recovering a computer Recovering a computer Partition type Sets the partition type as follows: Primary partition: Because hard disks are limited to four primary partitions, select this type if the drive will have four or less partitions. ■ Logical partition: Select this type if you need more than four partitions. You can have up to three primary partitions, plus any number of logical partitions, up to the maximum size of your hard disk.
Recovering a computer Restoring multiple drives by using a system index file Restore Master Boot Record (MBR) Restores the master boot record. The master boot record is contained in the first sector of a physical hard disk. The MBR consists of a master boot program and a partition table that describes the disk partitions. The master boot program looks at the partition table of the first physical hard disk to see which primary partition is active.
Recovering a computer Recovering files and folders from the recovery environment The system index file contains a list of the most recent recovery points, which includes the original drive location of each recovery point. If you have suffered a catastrophic hard drive failure, you can also use Symantec Recovery Disk to perform a bare metal recovery of a computer. To restore multiple drives using a system index file 1 Start the computer by using the Symantec Recovery Disk.
Recovering a computer Recovering files and folders from the recovery environment ■ If the Symantec Recovery Disk cannot locate any recovery points, you are prompted to locate one. In the Open dialog box, navigate to a recovery point, select one, and then click Open. ■ If the Symantec Recovery Disk finds recovery points, select a recovery point from the list, and then click OK.
Recovering a computer Using the networking tools in the recovery environment 8 Click Recover to restore the files. 9 Click OK to finish. Exploring your computer You can explore the files and folders on your computer from the recovery environment by using the Explore My Computer feature. This feature uses the Recovery Point Browser and functions similarly to Windows Explorer. You can browse the file structure of any drive that is attached to your computer from the recovery environment.
Recovering a computer Using the networking tools in the recovery environment Note: You cannot deploy a thin host to the recovery environment. The thin host can only be started from Symantec Recovery Disk to host a remote control session in the recovery environment. The thin host in Symantec Recovery Disk does not support file transfers and cannot be used to add drivers for network or storage devices.
Recovering a computer Using the networking tools in the recovery environment 3 On the client computer, in Symantec pcAnywhere, configure a remote connection item. For more information, see the Symantec pcAnywhere User's Guide. Note: You do not need to choose to automatically login to the host on connection. 4 When you configure the connection in pcAnywhere, do the following: ■ Select TCP/IP as the connection type. ■ Specify the IP address of the host computer.
Recovering a computer Using the networking tools in the recovery environment Mapping a network drive in the recovery environment If you started the networking services after you started the recovery environment, you must map a network drive. This lets you browse to that drive and select the recovery point that you want to restore.
Recovering a computer Viewing properties of recovery points and drives To get a static IP address 1 In the Network Adapter Configuration box, click Use the following IP address. 2 Specify a unique IP address and subnet mask for the computer that you want to restore. Be sure that the subnet mask matches the subnet mask of the network segment. 3 Click OK. 4 Click Close to return to the recovery environment's main menu. 5 In the Network pane, click Ping a Remote Computer.
Recovering a computer Viewing properties of recovery points and drives ■ Viewing the properties of a drive within a recovery point Viewing properties of a recovery point You can view various properties of a recovery point by using the Recovery Point Browser.
Recovering a computer About the Support Utilities Description A user-assigned comment associated with the recovery point. Original drive letter The original drive letter that was assigned to the drive. Cluster size The cluster size (in bytes) that is used in a FAT, FAT32, or NTFS drive. File system The file system type that is used within the drive. Primary/Logical The selected drive's drive status as either the primary partition or the logical partition.
Recovering a computer About the Support Utilities
Chapter 15 Copying a drive This chapter includes the following topics: ■ About copying a drive ■ Preparing to copy drives ■ Copying one hard drive to another hard drive About copying a drive You can use the Copy Drive feature to copy your operating system, applications, and data from one hard drive to another hard drive. You can even copy a larger hard drive to a smaller hard drive if the data on the drive being copied is at least 1/16th smaller in size than the total size of the new drive.
Copying a drive Copying one hard drive to another hard drive To prepare to copy drives 1 Do all of the following: ■ Prepare the computer. ■ Get the manufacturer's directions for installing the drive. ■ Shut down the computer, and then disconnect the power cord. ■ Discharge electricity by touching a grounded metal object. ■ Remove the computer cover.
Copying a drive Copying one hard drive to another hard drive If the power or the hardware fails while you copy the data, no data is lost from the source drive. However, you must restart the copying process. Note: This feature is not available in the evaluation version of the product. To copy one hard drive to another hard drive 1 On the Tools page, click Copy My Hard Drive. 2 Complete the steps in the wizard to copy the drive.
Copying a drive Copying one hard drive to another hard drive Table 15-1 Drive-to-drive copying options (continued) Option Description Disable SmartSector copying The SmartSector technology from Symantec speeds up the copying process by only copying the clusters and sectors that contain data. However, in a high-security environments, you might want to copy all clusters and sectors in their original layout, regardless of whether they contain data.
Appendix A Using a search engine to search recovery points This appendix includes the following topics: ■ About using a search engine to search recovery points ■ Enabling search engine support ■ Recovering files using Google Desktop's Search Desktop feature About using a search engine to search recovery points Norton Ghost supports the use of Google Desktop for searching for file names that are contained in recovery points.
Using a search engine to search recovery points Enabling search engine support Install a search engine You can download and install Google Desktop for free from the Internet. Visit desktop.google.com. See “To install Google Desktop” on page 176. Enable Google Desktop support A Google plug-in for Norton Ghost is required before you can use Google Search to locate and recover files. The plug-in is installed for you automatically when you enable this feature.
Using a search engine to search recovery points Recovering files using Google Desktop's Search Desktop feature To enable Google Desktop support 1 Start Norton Ghost. 2 Click Tasks > Options > Google Desktop. 3 Check Enable Google Desktop File and Folder Recovery. 4 Click OK. This option is not available if you do not have Google Desktop installed. Install Google Desktop, and then repeat this procedure. 5 Click OK to install the Google Plugin.
Using a search engine to search recovery points Recovering files using Google Desktop's Search Desktop feature If a file cannot be found using Google Desktop If you are certain that your file is included in a recovery point that has search engine support enabled, but the file is not found, do the following: ■ Right-click the Google Desktop icon in the system tray and click Indexing > Re-Index. Re-indexing can take a significant amount of time.
Index A access allow or deny users or groups 103 activate the product 25 Advanced page about 17 showing or hiding 17 agent dependencies, viewing 100, 102 Microsoft Services 98 set security for 103 setting up recovery actions for 101 starting, stopping, or restarting 100 troubleshooting in Services 98 Agent Deployment using 95 Windows Vista 95 agents setting security for 90 archive recovery points 129 B backing up dual-boot computers 56 backup data automating management of 135 password protecting 69 storin
Index C cancelling the current operation 86 categories managing file types 39 checking computer agent services 97 command files running during a backup 66 computer backing up 47 configuring for CD booting 153 recover 151, 156 recovering 27–28 computer agent services, checking 97 tour 97 Computer List adding computers to 94 computers adding to the Computer List 94 configuring agent security 103 copying a drive 171 creating recovery points options 60, 64 credentials, changing for agent 105 D default op
Index file and folder backup about 126 deleting files from 134 recovering using backup data from 139 file and folder backup data backup destination 54 default storage location 36 managing 133 recommended storage location 56 viewing amount of data stored 133 file and folder backups about 48 defining 79 folders excluded from 82 file systems supported 20 file types create new 40 delete 40 edit 40 managing 39 file versions limiting number kept 134 files locating versions of 134 manually deleting from file and
Index N R network enabling throttling 38 network credentials rules when supplying 66 network services configure connection settings 166 get static IP address 166 starting in recovery environment (SRD) 163 using in recovery environment (SRD) 163 Norton Ghost configuring default options 34 how to use 32 more information about 18 new features 14 running with different user rights 105 Norton Ghost Agent automatic start 99 deploy over a network 95 manually install from product CD 95 setting up recovery a
Index recovery point (continued) managing 127 opening files and folders stored in 143 recovering files using 141 sets 58 use a search engine to find 175 verifying 60 viewing properties of drive from recovery environment 168 Recovery Point Browser using to open files within recovery points 121 recovery point files locating 54 recovery point set defined 58 recovery points assign a drive letter to 119 checking for viruses 119 checking integrity of 71 choosing options for 60 convert to virtual disk format 130
Index system drive recovering 27–28 system index file using to restore multiple drives 160 system requirements 19 System Restore Wizard 161 system tray icon adjusting default settings 38 show or hide 38 show or hide error messages 38 show or hide status messages 38 T tabs Events and log file 99 ThreatCon Response enable 88 throttling enabling network 38 time, elapsed time in Events tab 99 tips for running backups 52 trial version installing or upgrading 21 troubleshooting agent 98 U unmounting recov