14.0
Table Of Contents
- Norton Ghost™
- Technical Support
- Contents
- 1. Introducing Norton Ghost™
- 2. Installing Norton Ghost
- 3. Ensuring the recovery of your computer
- 4. Getting Started
- Key product components
- How you use Norton Ghost
- Starting Norton Ghost
- Configuring Norton Ghost default options
- Selecting a default backup destination
- Adjusting the effects of a backup on computer performance
- Adjusting default tray icon settings
- Managing file types
- Using aliases for external drives
- Configuring FTP settings for use with Offsite Copy
- Logging Norton Ghost messages
- Enabling email notifications for product (event) messages
- 5. Best practices for backing up your data
- 6. Backing up entire drives
- 7. Backing up files and folders
- 8. Running and managing backup jobs
- Running an existing backup job immediately
- Adjusting the speed of a backup
- Stopping a backup or recovery task
- Verifying that a backup is successful
- Editing backup settings
- Enabling event-triggered backups
- Editing a backup schedule
- Turning off a backup job
- Deleting backup jobs
- Adding users who can back up your computer
- 9. Backing up remote computers from your computer
- 10. Monitoring the status of your backups
- About monitoring backups
- Monitoring backup protection from the Home page
- Monitoring backup protection from the Status page
- Configuring Norton Ghost to send SNMP traps
- Customize status reporting
- Viewing drive details
- Improving the protection level of a drive
- Using event log information to troubleshoot problems
- 11. Exploring the contents of a recovery point
- 12. Managing backup destinations
- 13. Recovering files, folders, or entire drives
- 14. Recovering a computer
- About recovering a computer
- Starting a computer by using the recovery environment
- Preparing to recover a computer
- Recovering a computer
- Restoring multiple drives by using a system index file
- Recovering files and folders from the recovery environment
- Using the networking tools in the recovery environment
- Viewing properties of recovery points and drives
- About the Support Utilities
- 15. Copying a drive
- A. Using a search engine to search recovery points
- Index
■ The Maxtor OneTouch™ external hard drive button is pushed
Note: This feature only appears if you have a Maxtor OneTouch drive installed,
and you are running a Windows XP 32-bit platform.
To enable event-triggered backups
1
On the Home or Tasks page, click Run or Manage Backups.
2
Select the backup you want to edit, and then click Change Schedule.
3
Click General under Event Triggers.
4
Select the events you want detected, and then click OK.
Enabling Symantec ThreatCon Response
ThreatCon is Symantec's early warning security threat system. When Symantec
identifies various threats, the ThreatCon team adjusts the threat level to give
people and systems adequate warning in order to protect data and systems against
attack.
When you enable the Symantec ThreatCon Response trigger for a particular
backup job, Norton Ghost detects changes in the threat level, assuming your
computer is online at the time. When Norton Ghost detects that the ThreatCon
level you chose is either reached or exceeded, the backup job in which you enabled
Symantec ThreatCon Response is started automatically. You then have a recovery
point to use to recover your data should your computer become affected by the
latest threat.
Note: If your computer is not online, then it is not susceptible to online threats.
But if you connect your computer to the Internet at any time, it becomes
vulnerable. You do not have to enable or disable Symantec ThreatCon Response
when you go on or off line. It simply works if you are online, but does nothing if
you are off line.
Table 8-1
Norton Ghost ThreatCon levels
DescriptionThreat
Level
No discernable security threats exist.Level 1
Security threats could occur, although no specific threats have been known
to occur.
Level 2
Running and managing backup jobs
Enabling event-triggered backups
88










