14.0
Table Of Contents
- Norton Ghost™
- Technical Support
- Contents
- 1. Introducing Norton Ghost™
- 2. Installing Norton Ghost
- 3. Ensuring the recovery of your computer
- 4. Getting Started
- Key product components
- How you use Norton Ghost
- Starting Norton Ghost
- Configuring Norton Ghost default options
- Selecting a default backup destination
- Adjusting the effects of a backup on computer performance
- Adjusting default tray icon settings
- Managing file types
- Using aliases for external drives
- Configuring FTP settings for use with Offsite Copy
- Logging Norton Ghost messages
- Enabling email notifications for product (event) messages
- 5. Best practices for backing up your data
- 6. Backing up entire drives
- 7. Backing up files and folders
- 8. Running and managing backup jobs
- Running an existing backup job immediately
- Adjusting the speed of a backup
- Stopping a backup or recovery task
- Verifying that a backup is successful
- Editing backup settings
- Enabling event-triggered backups
- Editing a backup schedule
- Turning off a backup job
- Deleting backup jobs
- Adding users who can back up your computer
- 9. Backing up remote computers from your computer
- 10. Monitoring the status of your backups
- About monitoring backups
- Monitoring backup protection from the Home page
- Monitoring backup protection from the Status page
- Configuring Norton Ghost to send SNMP traps
- Customize status reporting
- Viewing drive details
- Improving the protection level of a drive
- Using event log information to troubleshoot problems
- 11. Exploring the contents of a recovery point
- 12. Managing backup destinations
- 13. Recovering files, folders, or entire drives
- 14. Recovering a computer
- About recovering a computer
- Starting a computer by using the recovery environment
- Preparing to recover a computer
- Recovering a computer
- Restoring multiple drives by using a system index file
- Recovering files and folders from the recovery environment
- Using the networking tools in the recovery environment
- Viewing properties of recovery points and drives
- About the Support Utilities
- 15. Copying a drive
- A. Using a search engine to search recovery points
- Index
3
On the client computer, in Symantec pcAnywhere, configure a remote
connection item.
For more information, see the Symantec pcAnywhere User's Guide.
Note: You do not need to choose to automatically login to the host on
connection.
4
When you configure the connection in pcAnywhere, do the following:
■ Select TCP/IP as the connection type.
■ Specify the IP address of the host computer.
■ Choose to automatically login to the host on connection.
If you do not include the login information, you are prompted for it when
you connect to the thin host.
■ Type the following login name:
symantec
■ Type the following password:
recover
The thin host shuts down when there is an attempt to connect by using any
incorrect configuration settings.
To prevent unauthorized users from tampering with your settings or
launching a session without your permission, set a password for your remote
connection item.
This option is available in the Remote Properties window on the Protect Item
tab. The thin host does not support encryption.
5
In pcAnywhere, start the remote control session.
If the connection attempt is unsuccessful, the thin host must be restarted on
the host computer before you make another attempt to connect.
6
Remotely perform the necessary tasks on the host computer.
The remote control session ends when the thin host is closed, when the thin
host computer is restarted, or when the remote control session is ended.
After the host computer starts Windows, the client computer can deploy and
connect a thin host on the computer to verify the success of tasks that were
performed in the recovery environment.
165Recovering a computer
Using the networking tools in the recovery environment










