14.0
Table Of Contents
- Norton Ghost™
- Technical Support
- Contents
- 1. Introducing Norton Ghost™
- 2. Installing Norton Ghost
- 3. Ensuring the recovery of your computer
- 4. Getting Started
- Key product components
- How you use Norton Ghost
- Starting Norton Ghost
- Configuring Norton Ghost default options
- Selecting a default backup destination
- Adjusting the effects of a backup on computer performance
- Adjusting default tray icon settings
- Managing file types
- Using aliases for external drives
- Configuring FTP settings for use with Offsite Copy
- Logging Norton Ghost messages
- Enabling email notifications for product (event) messages
- 5. Best practices for backing up your data
- 6. Backing up entire drives
- 7. Backing up files and folders
- 8. Running and managing backup jobs
- Running an existing backup job immediately
- Adjusting the speed of a backup
- Stopping a backup or recovery task
- Verifying that a backup is successful
- Editing backup settings
- Enabling event-triggered backups
- Editing a backup schedule
- Turning off a backup job
- Deleting backup jobs
- Adding users who can back up your computer
- 9. Backing up remote computers from your computer
- 10. Monitoring the status of your backups
- About monitoring backups
- Monitoring backup protection from the Home page
- Monitoring backup protection from the Status page
- Configuring Norton Ghost to send SNMP traps
- Customize status reporting
- Viewing drive details
- Improving the protection level of a drive
- Using event log information to troubleshoot problems
- 11. Exploring the contents of a recovery point
- 12. Managing backup destinations
- 13. Recovering files, folders, or entire drives
- 14. Recovering a computer
- About recovering a computer
- Starting a computer by using the recovery environment
- Preparing to recover a computer
- Recovering a computer
- Restoring multiple drives by using a system index file
- Recovering files and folders from the recovery environment
- Using the networking tools in the recovery environment
- Viewing properties of recovery points and drives
- About the Support Utilities
- 15. Copying a drive
- A. Using a search engine to search recovery points
- Index
Table 8-1
Norton Ghost ThreatCon levels (continued)
DescriptionThreat
Level
An isolated security threat is in progress.Level 3
Extreme global security threats are in progress.Level 4
For more information about Symantec ThreatCon, visit http://www.symantec.com.
To configure Symantec ThreatCon Response
1
On the Home or Tasks page, click Run or Manage Backups.
2
Select the backup you want to edit, and then click Change Schedule.
3
Click ThreatCon Response under Event Triggers.
4
From the drop-down list, select the threat level that when met or exceeded
should start your backup job, and then click OK.
Note: Level 1 of Symantec ThreatCon indicates that there are no threats.
Because level 1 suggests no threats, it is not an option in the drop-down list.
However, you can disable Symantec ThreatCon Reponse by choosing the first
option.
See “To disable Symantec ThreatCon Response” on page 89.
To disable Symantec ThreatCon Response
1
On the Home or Tasks page, click Run or Manage Backups.
2
Select the backup you want to edit, and then click Change Schedule.
3
Click ThreatCon Response under Event Triggers.
4
From the drop-down list, select Do Not Monitor - Disable, and then click OK.
Editing a backup schedule
You can edit any of the schedule properties for a defined backup to adjust the date
and time.
To edit a backup schedule
1
On the Home page, click Run or Manage Backups.
2
Select a backup to edit.
89Running and managing backup jobs
Editing a backup schedule










