14.0
Table Of Contents
- Norton Ghost™
- Technical Support
- Contents
- 1. Introducing Norton Ghost™
- 2. Installing Norton Ghost
- 3. Ensuring the recovery of your computer
- 4. Getting Started
- Key product components
- How you use Norton Ghost
- Starting Norton Ghost
- Configuring Norton Ghost default options
- Selecting a default backup destination
- Adjusting the effects of a backup on computer performance
- Adjusting default tray icon settings
- Managing file types
- Using aliases for external drives
- Configuring FTP settings for use with Offsite Copy
- Logging Norton Ghost messages
- Enabling email notifications for product (event) messages
- 5. Best practices for backing up your data
- 6. Backing up entire drives
- 7. Backing up files and folders
- 8. Running and managing backup jobs
- Running an existing backup job immediately
- Adjusting the speed of a backup
- Stopping a backup or recovery task
- Verifying that a backup is successful
- Editing backup settings
- Enabling event-triggered backups
- Editing a backup schedule
- Turning off a backup job
- Deleting backup jobs
- Adding users who can back up your computer
- 9. Backing up remote computers from your computer
- 10. Monitoring the status of your backups
- About monitoring backups
- Monitoring backup protection from the Home page
- Monitoring backup protection from the Status page
- Configuring Norton Ghost to send SNMP traps
- Customize status reporting
- Viewing drive details
- Improving the protection level of a drive
- Using event log information to troubleshoot problems
- 11. Exploring the contents of a recovery point
- 12. Managing backup destinations
- 13. Recovering files, folders, or entire drives
- 14. Recovering a computer
- About recovering a computer
- Starting a computer by using the recovery environment
- Preparing to recover a computer
- Recovering a computer
- Restoring multiple drives by using a system index file
- Recovering files and folders from the recovery environment
- Using the networking tools in the recovery environment
- Viewing properties of recovery points and drives
- About the Support Utilities
- 15. Copying a drive
- A. Using a search engine to search recovery points
- Index
About network credentials
If you connect to a computer on a network, you must provide the user name and
password for network access, even if you previously authenticated to the network.
The Norton Ghost service runs on the local system account.
When you enter network credentials, the following rules apply:
■ If the computer you want to connect to is on a domain, provide the domain
name, user name, and password. For example:
domain\username
■ If you connect to a computer in a workgroup, provide the remote computer
name and user name. For example:
remote_computer_name\username
■ If you have mapped a drive, you might be required to supply the user name
and password again because the service runs in a different context and cannot
recognize the mapped drive.
By going to the Tasks menu and selecting Options, you can set a default location,
including network credentials. Then when you create future backup jobs, the
dialog will default to the location you specified. Another option would be to create
a specific "backup" user account. Then configure the Norton Ghost service to use
this account.
Run command files during a backup
You can use command files (.exe, .cmd, .bat) during a backup. You can use command
files to integrate Norton Ghost with other backup routines that you might be
running on the computer. You can also use command files to integrate with other
applications that use a drive on the computer.
Note: You cannot run command files that include a graphical user interface, such
as notepad.exe. Running such command files will cause the backup job to fail.
You can run a command file during any of the following stages during the creation
of a recovery point:
■ Before data capture
■ After data capture
■ After recovery point creation
You can also specify the amount of time that a command file should be allowed
to run.
Backing up entire drives
Defining a drive-based backup
66










