14.0
Table Of Contents
- Norton Ghost™
- Technical Support
- Contents
- 1. Introducing Norton Ghost™
- 2. Installing Norton Ghost
- 3. Ensuring the recovery of your computer
- 4. Getting Started
- Key product components
- How you use Norton Ghost
- Starting Norton Ghost
- Configuring Norton Ghost default options
- Selecting a default backup destination
- Adjusting the effects of a backup on computer performance
- Adjusting default tray icon settings
- Managing file types
- Using aliases for external drives
- Configuring FTP settings for use with Offsite Copy
- Logging Norton Ghost messages
- Enabling email notifications for product (event) messages
- 5. Best practices for backing up your data
- 6. Backing up entire drives
- 7. Backing up files and folders
- 8. Running and managing backup jobs
- Running an existing backup job immediately
- Adjusting the speed of a backup
- Stopping a backup or recovery task
- Verifying that a backup is successful
- Editing backup settings
- Enabling event-triggered backups
- Editing a backup schedule
- Turning off a backup job
- Deleting backup jobs
- Adding users who can back up your computer
- 9. Backing up remote computers from your computer
- 10. Monitoring the status of your backups
- About monitoring backups
- Monitoring backup protection from the Home page
- Monitoring backup protection from the Status page
- Configuring Norton Ghost to send SNMP traps
- Customize status reporting
- Viewing drive details
- Improving the protection level of a drive
- Using event log information to troubleshoot problems
- 11. Exploring the contents of a recovery point
- 12. Managing backup destinations
- 13. Recovering files, folders, or entire drives
- 14. Recovering a computer
- About recovering a computer
- Starting a computer by using the recovery environment
- Preparing to recover a computer
- Recovering a computer
- Restoring multiple drives by using a system index file
- Recovering files and folders from the recovery environment
- Using the networking tools in the recovery environment
- Viewing properties of recovery points and drives
- About the Support Utilities
- 15. Copying a drive
- A. Using a search engine to search recovery points
- Index
■ Avoid using consecutive, repeating characters (for example, BBB or 88).
■ Avoid using common words that you would find in a dictionary.
■ Use at least one number.
■ Use both uppercase and lowercase alpha characters.
■ Use at least one special character such as ({}[],.<>;:’"?/|\`~!@#$%^&*()_-+=).
■ Change the password after a set period of time.
Verifying a recovery point after creation
If you selected the Verify recovery point after creation option on the Options page
of the Define Backup Wizard, the recovery point is checked to see that all of the
files that make up the recovery point are available for you to open. Internal data
structures in the recovery point are matched with the data that is available. Also,
the recovery point can be uncompressed to create the expected amount of data
(if you selected a compression level at the time of creation).
Note: The time required to create a recovery point is doubled when you use the
Verify recover point after creation option.
To verify the integrity of a recovery point
1
On the Tools page, click Run Recovery Point Browser.
2
Select a recovery point, and then click Open.
3
In the tree panel of the Recovery Point Browser, select the recovery point.
For example: C_Drive001.v2i.
4
On the File menu, click Verify Recovery Point.
If the Verify Recovery Point option is unavailable, you must first dismount
the recovery point. Right-click the recovery point and click Dismount
Recovery Point.
5
When the validation is complete, click OK.
If you prefer, you can have recovery points automatically verified for integrity
at the time they are created.
See “Setting advanced options for drive-based backups” on page 68.
71Backing up entire drives
Setting advanced options for drive-based backups










