Symantec 10024709 User Manual

Page 1

Norton Ghost™ User’s Guide

Page 2
Norton Ghost™ User’s Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 6.8
PN: 10024709
Copyright ©1998-2002 Symantec Corporation
All Rights Reserved.
Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Trademarks
Symantec, the Symantec logo, Norton Ghost, Ghost Walker, Ghost Explorer, and GDisk are trademarks of Symantec Corporation.
Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. IBM and PC-DOS are registered trademarks of International Business Machines Corporation. 3Com and EtherLink are registered trademarks of 3Com Corporation. Compaq is a registered trademark of Compaq Corporation. SuperDisk is a trademark of Imation Enterprises Corporation. Zip and Jaz are registered trademarks of Iomega Corporation. FireWire is a trademark of Apple Computer, Inc., registered in the U.S. and other countries.
Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.
Printed in the United States of America.
10987654321
Page 3
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE "AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK ON THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED WITHIN SIXTY (60) DAYS OF PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
1. LICENSE:
The software which accompanies this license (collectively the "Software") is the property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, You will have certain rights to use the Software after Your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that Symantec may furnish to You. Except as may be modified by a Symantec license certificate, license coupon, or license key (each a "License Module") which accompanies, precedes, or follows this license, Your rights and obligations with respect to the use of this Software are as follows:
YOU MAY:
A. use one copy of the Software on a single computer. If a License Module accompanies, precedes, or follows this license, You may make that number of copies of the Software licensed to You by Symantec as provided in Your License Module. Your License Module shall constitute proof of Your right to make such copies. B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for archival purposes; C. use the Software on a network, provided that You have a licensed copy of the Software for each computer that can access the Software over that network; D. after written notice to Symantec, transfer the Software on a permanent basis to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this license; and E. use the Software in accordance with any additional permitted uses set forth in Section 9, below.
YOU MAY NOT:
A. copy the printed documentation which accompanies the Software; B. sublicense, rent or lease any portion of the Software; reverse
engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software, or create derivative works from the Software;
C. use a previous version or copy of the Software after You have received a disk replacement set or an upgraded version. Upon upgrading the Software, all copies of the prior version must be destroyed;
D. use a later version of the Software than is provided herewith unless You have purchased upgrade insurance or have otherwise separately acquired the right to use such later version;
E. use, if You received the software distributed on media containing multiple Symantec products, any Symantec software on the media for which You have not received a permission in a License Module; F. use the Software in any manner not authorized by this license; nor G. use the Software in any manner that contradicts any additional restrictions set forth in Section 9, below.
2. CONTENT UPDATES:
Certain Symantec software products utilize content that is updated from time to time (antivirus products utilize updated virus definitions; content filtering products utilize updated URL lists; firewall products utilize updated firewall rules; vulnerability assessment products utilize updated vulnerability data, etc.; collectively, these are referred to as "Content Updates"). You may obtain Content Updates for any period for which You have purchased a subscription for Content Updates for the Software (including any subscription included with Your original purchase of the Software), purchased upgrade insurance for the Software, entered into a maintenance agreement that includes Content Updates, or otherwise separately acquired the right to obtain Content Updates. This license does not otherwise permit You to obtain and use Content Updates.
3. SIXTY (60) DAY MONEY BACK GUARANTEE:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please contact Symantec Customer Service, for a refund of the money You paid for the Software (less shipping, handling, and any applicable taxes) at any time during the sixty (60) day period following the date of purchase.
.4. LIMITED WARRANTY:
Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.
5. DISCLAIMER OF DAMAGES:
SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT
Page 4
OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS' LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
6. U.S. GOVERNMENT RESTRICTED RIGHTS:
RESTRICTED RIGHTS LEGEND. All Symantec products and documentation are commercial in nature. The software and software documentation are "Commercial Items", as that term is defined in 48 C.F.R. section 2.101, consisting of "Commercial Computer Software" and "Commercial Computer Software Documentation", as such terms are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R. section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and 48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R. section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section
227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other relevant sections of the Code of Federal Regulations, as applicable, Symantec's computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users, according to the terms and conditions contained in this license agreement. Manufacturer is Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA
95014.
7. EXPORT REGULATION:
Export, re-export of this Software is governed by the laws and regulations of the United States and import laws and regulations of certain other countries. Export or re-export of Software to any entity on the Denied Parties List and other lists promulgated by various agencies of the United States Federal Government is strictly prohibited.
8. GENERAL:
If You are located in North America or Latin America, this Agreement will be governed by the laws of the State of California, United States of America. Otherwise, this Agreement will be governed by the laws of England. This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment or similar communications between the parties. This Agreement may only be modified by a License Module or by a written document which has been signed by both You and Symantec. This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive termination. Should You have any questions concerning this Agreement, or if You desire to contact Symantec for any reason, please write: (i) Symantec Customer Service, 555 International Way, Springfield, OR 97477, USA, or (ii) Symantec Customer Service Center, PO BOX 5689, Dublin 15, Ireland.
9. ADDITIONAL USES AND RESTRICTIONS:
Notwithstanding any of the terms and conditions contained in the Symantec Corporation Software License Agreement, the following additional terms apply to the product you have purchased. You may:
(i) use the Software on one computer to clone, or apply an image of, a hard drive on that computer, or a portion thereof, to another hard drive on the same computer, a replacement computer, secondary
media, or network drive. If a License Module accompanies, precedes, or follows this license, you may make and use that number of copies of the Software licensed to you by Symantec as provided in your License Module on an equal number of individual computers pursuant to the terms of this license. Your License Module shall constitute proof of your right to make and use such copies;
(ii) use the Software on that same computer to create an image file of a hard drive on that computer and store the image file on removable media for disaster recovery purposes; (iii) use the Software to create a boot disk as described in the documentation for reapplying the hard drive image that was created for disaster recovery purposes to the hard drive on that same computer; and (iv) use the Software to clone a hard drive from that same computer to a replacement computer, in the manner described in the software documentation, and to use the Software on the replacement computer provided that the Software has been removed from the original computer. You may not use the Software commercially or non-commercially for the purpose of creating multiple computers or hard drives not connected to the original computer, with similar or identical configurations to that of the original computer or hard drive.
Page 5
Chapter 1 About Norton Ghost
Introducing Norton Ghost ............................................................................. 14
What’s new in Norton Ghost 2003 ................................................................14
How Norton Ghost works .............................................................................. 15
Virtual Partition ......................................................................................15
Hardware restrictions .............................................................................. 16
Preparing for an emergency .................................................................... 16
Norton Ghost components ............................................................................17
Norton Ghost wizards ............................................................................. 17
Norton Ghost executable ........................................................................ 21
Ghost Boot Wizard .................................................................................. 22
Ghost Explorer ......................................................................................... 22
GDisk ....................................................................................................... 23
Ghost Walker ........................................................................................... 24

Contents

Chapter 2 Installing Norton Ghost
Minimum system requirements ..................................................................... 26
Ghost.exe ................................................................................................. 26
CD and DVD writing .............................................................................. 26
Supported backup media ........................................................................26
File systems supported for backup, restore, and cloning tasks ............. 27
Disaster recovery requirements .............................................................. 27
Installing Norton Ghost .................................................................................27
Installing Norton Ghost if purchased with Norton
SystemWorks Pro ............................................................................. 28
Installing Norton Ghost .......................................................................... 29
If the opening screen does not appear .................................................... 29
Registering Norton Ghost ....................................................................... 29
Updating Norton Ghost .................................................................................31
Uninstalling Norton Ghost ............................................................................ 31
Page 6
Chapter 3 Backing up, restoring, and cloning from Norton Ghost
6 Contents
When to use Norton Ghost in Windows .......................................................34
Starting Norton Ghost in Windows ...............................................................34
Starting Norton Ghost from the tray icon ..............................................35
Creating a backup image file ...........................................................................36
Restoring your computer from an image file ................................................37
Cloning a hard disk or partition .....................................................................39
Launching Ghost.exe peer-to-peer .................................................................40
Identifying a hard disk ....................................................................................43
Chapter 4 Setting options and defaults
Setting Norton Ghost options and defaults ...................................................46
Adding command-line switches to a task ...............................................47
Assigning a drive letter to a CD/DVD drive ...........................................47
Setting the options for a mapped network drive ....................................47
Setting display options .............................................................................48
Setting the DOS version ..........................................................................49
Setting the image integrity check default ................................................51
Setting a compression level .....................................................................51
Assigning a password to an image file ....................................................52
Adding free space to the Virtual Partition ..............................................52
Installing SCSI drivers .............................................................................53
Setting external storage device drivers ....................................................54
Setting TCP/IP drivers .............................................................................54
Setting LPT peer-to-peer drivers .............................................................55
Installing extra drivers .............................................................................56
Installing USB peer-to-peer drivers ........................................................57
Running your computer from the Virtual Partition .....................................57
Restarting your computer from the Virtual Partition ...........................58
Checking the integrity of an image file ..........................................................58
Viewing the task log ........................................................................................59
Starting Ghost.exe ...........................................................................................59
What to do if a task fails ..................................................................................60
Page 7
Chapter 5 Image file options
About Norton Ghost image files .................................................................... 62
Image files and compression .......................................................................... 62
Performance expectations on a network ................................................ 63
Image files and CRC32 ...................................................................................63
Image files and volume spanning ................................................................... 63
Standard image files ................................................................................63
Limitations on the image file size ........................................................... 64
Size-limited image files ........................................................................... 64
Spanned image files ................................................................................. 64
Spanning across multiple volumes and limiting span sizes ..................65
Restoring from a spanned image ............................................................ 65
Image files and tape drives .............................................................................66
GoBack and Norton Ghost ............................................................................. 67
GoBack and Ghost.exe ............................................................................ 67
Dynamic disks in Windows 2000/XP ............................................................68
Hibernation and swap files ............................................................................. 69
Chapter 6 Creating boot disks with the Ghost Boot Wizard
Introducing the Norton Ghost Boot Wizard ................................................ 72
What is a Ghost boot disk .............................................................................. 72
When to create a Ghost boot disk .................................................................. 72
How to use a Ghost boot disk ........................................................................72
Files included on a Ghost boot disk ............................................................... 73
When to include MS-DOS on a boot disk ............................................. 73
Creating a recovery boot disk ......................................................................... 73
Opening the Ghost Boot Wizard ................................................................... 74
Creating boot disks and boot images ............................................................. 75
Standard boot disks ................................................................................. 76
Boot disks with network support ........................................................... 79
Boot disks with CD-ROM and DVD support ....................................... 81
Boot disks with drive mapping network support ..................................82
Selecting a template ........................................................................................84
Multicard templates and the boot disk .......................................................... 85
Adding network drivers to the Ghost Boot Wizard ...................................... 86
Adding packet drivers to the Ghost Boot Wizard ................................. 86
Adding NDIS2 drivers to the Ghost Boot Wizard ................................. 87
Customizing the template ....................................................................... 88
Adding command-line parameters to a boot package .................................. 88
Providing MS-DOS ......................................................................................... 89
7Contents
Page 8
8 Contents
Chapter 7 Backing up, restoring, and cloning from DOS
An overview of using Ghost.exe .....................................................................92
Starting the Norton Ghost executable ............................................................93
Marking your disks ..................................................................................94
Navigating without a mouse ...........................................................................94
Establishing a peer-to-peer connection with Ghost.exe ................................95
Creating a backup image file ...........................................................................97
Backing up a hard disk to an image file ..................................................97
Backing up a partition to an image file ...................................................99
Restoring from an image file .........................................................................101
Restoring a hard disk from an image file ..............................................101
Restoring a partition from an image file ...............................................103
Cloning disks and partitions .........................................................................104
Cloning disk to disk ...............................................................................105
Cloning partition to partition ...............................................................106
Verifying image integrity ..............................................................................107
Adding switches to your Ghost operation ...................................................108
Chapter 8 Backing up and restoring with CD-R/RW and DVD-R/RW
Image files and CD/DVD writers .................................................................112
Saving an image file directly to a CD-R/RW or DVD-R/RW drive ............113
Saving an image file to an unsupported CD-R/RW or
DVD-R/RW drive ..................................................................................114
Splitting an image file during a backup ................................................115
Chapter 9 Using Ghost Explorer to modify image file contents
Understanding Ghost Explorer ....................................................................118
Viewing image files ........................................................................................119
Launching a file .............................................................................................119
Extracting a file or directory from an image file ..........................................120
Modifying image files in Ghost Explorer .....................................................120
Adding, moving, and deleting files .......................................................121
Listing the contents of an image file .............................................................121
Setting span file sizes .....................................................................................121
Splitting an image file ....................................................................................122
Compiling a file .............................................................................................122
Determining Norton Ghost image file version ............................................123
Using Ghost Explorer from the command line ...........................................123
Using Ghost Explorer with long file names ..........................................125
Page 9
Chapter 10 Managing partitions using GDisk
Introducing GDisk ........................................................................................ 128
Running GDisk .............................................................................................128
Overview of main command-line switches ................................................. 129
Online Help for command-line switches ............................................. 130
Switches common to all GDisk commands .........................................130
Creating a partition ....................................................................................... 131
Reinitializing the Master Boot Record ......................................................... 132
Showing information about disks ................................................................ 133
Performing multiple GDisk operations using batch mode ........................134
FAT16 partitions in Windows NT ............................................................... 135
Deleting and wiping your disk .....................................................................135
Activating or deactivating a partition .......................................................... 137
Hiding or unhiding a partition ....................................................................137
Modifying the Windows NT/2000/XP boot menu ..................................... 138
Specifying the boot.ini path and file name .......................................... 138
Displaying the list of current boot entries ............................................ 138
Adding an entry to Boot.ini .................................................................. 138
Removing an entry from Boot.ini ........................................................ 141
Setting the default boot option and timeout .......................................141
Support for Large Hard Disks ......................................................................142
9Contents
Chapter 11 Updating Security Identifiers (SIDs) and computer names
Making SID changes with Ghost Walker on Windows NT-based
clients ..................................................................................................... 144
Norton Ghost Walker capabilities ........................................................ 144
Norton Ghost Walker limitations ........................................................144
SID changing limitations ......................................................................145
Loss of access to external data objects .........................................................145
Identical user names and passwords across workstations ..........................145
Using Ghost Walker ...................................................................................... 146
Running Ghost Walker from the command line ................................. 148
Appendix A Command-line switches
Using Norton Ghost with switches ..............................................................154
Command-line switches ............................................................................... 154
Clone switch usage ........................................................................................ 166
Defining the type of clone command ................................................... 166
Setting a source for the clone switch ....................................................167
Setting a destination for the clone switch ............................................169
Setting a destination size for the clone switch .....................................169
Examples of clone switch usage ............................................................ 170
Page 10
10 Contents
-CRC32 switch usage .....................................................................................172
Examples of -CRC32 usage ...................................................................173
Files not checked with CRC ..................................................................174
Ghost.exe and the Virtual Partition .............................................................175
Appendix B Transfer methods and hardware setup
Transfer and hardware requirements ...........................................................178
Peer-to-peer connections ..............................................................................178
SCSI tape drives .............................................................................................179
Removable media ..........................................................................................179
CD/DVD usage ..............................................................................................179
Internal drives ................................................................................................180
Third-party devices ................................................................................180
Appendix C USB and DirectParallel Cables
Parallel Technologies cables ..........................................................................182
Other USB cables ...........................................................................................182
Appendix D The Wattcp.cfg network configuration file
The Wattcp.cfg configuration file .................................................................184
Wattcp.cfg key words ....................................................................................184
Appendix E Cloning with Linux
Supported configurations .............................................................................188
Position of disk ..............................................................................................188
Boot configuration ........................................................................................188
Norton Ghost utility support ........................................................................189
Appendix F Troubleshooting
Ghost.exe error messages ..............................................................................192
Problems running Norton Ghost .................................................................193
Card not found/Card not installed .......................................................193
Creating an image on an NTFS partition .............................................193
Cannot start from drive A .....................................................................193
Windows NT blue screen ......................................................................194
Missing hibernation file .........................................................................194
Computer fails to restart .......................................................................194
Getting out of the Virtual Partition ......................................................195
Cancelling a Ghost.exe operation .........................................................195
Installing and uninstalling Norton Ghost ............................................195
Connecting using USB peer-to-peer .....................................................196
Page 11
Writing to a recordable CD or DVD ........................................................... 196
Supported CD-R/RW and DVD drives ................................................ 196
Inaccessible CD-ROM drive ................................................................. 197
CD-R/RW disc ....................................................................................... 198
Using the correct boot disk ................................................................... 199
Loading CD-R/RW drivers ................................................................... 199
If the CD-R/RW does not appear in the list of destination drives ...... 199
Loading Ghost.exe from the floppy disk drive .................................... 199
Outdated computer BIOS ..................................................................... 199
Outdated CD-R/RW drive BIOS .......................................................... 200
Using PC-DOS or MS-DOS .................................................................. 200
High compression .................................................................................200
Using third-party software to write to the CD-R/RW disc ................. 200
Appendix G Diagnostics
Hard drive detection and diagnostic information ......................................202
View Log ................................................................................................202
Abort error file (Ghosterr.txt) ..............................................................202
Creating a full diagnostic statistics dump summary ........................... 202
Testing TCP/IP functionality .......................................................................203
11Contents
Appendix H Installing Norton Ghost from the command line
Choosing an interface type for installation ................................................. 206
Choosing an installation mode ....................................................................206
Installing from the command line ...............................................................207
Uninstalling from the command line ..........................................................208
Service and support solutions
Glossary
Index
CD Replacement Form
Page 12
12 Contents
Page 13
Chapter

About Norton Ghost

This chapter includes the following topics:
Introducing Norton Ghost
What’s new in Norton Ghost 2003
How Norton Ghost works
Norton Ghost components
1
Page 14
14 About Norton Ghost

Introducing Norton Ghost

Introducing Norton Ghost
Norton Ghost protects your data from computer disasters. The intuitive Windows interface lets you create backup images of your hard disk or selected partitions. You can clone directly between two computers using a network, USB, or parallel connection. Norton Ghost is based on the robust cloning technology of Symantec Ghost Enterprise.
Norton Ghost includes the following features:
Backup flexibility: Back up directly to a wide range of hard drives and
removable media, including CD-R/RW drives, FireWire and USB hard drives, DVD devices, Iomega, ZIP, and JAZ drives.
Peer-to-peer communication: Fast peer-to-peer communication using high-
speed parallel, USB, or network IP connections.
Operating system support: You can back up, restore, or clone computers
installed with DOS, Windows 2000/XP/NT/9x, OS/2, or Linux.
File system support: You can back up, restore, or clone FAT, FAT32, NTFS,
and Linux Ext2/3 file systems.
Image file editing: Ghost Explorer lets you edit FAT and FAT32 image files.
Restore individual files: Ghost Explorer lets you restore individual files from
an image file.
Disk and partition management: You can run GDisk from DOS or in a
command shell from within Windows to manage partitions and disks.
Tutorials: A set of tutorials is included in Norton Ghost to provide a
demonstration of the most commonly used functions.

What’s new in Norton Ghost 2003

Windows user interface: You can launch Norton Ghost directly from
Windows without having to restart your computer.
Virtual Partition: Eliminates the need for a boot disk in most situations.
Linux support: You can back up, restore, and clone EXT3 file systems.
NTFS support: Norton Ghost now writes to NTFS partitions. You can store
an image file on an NTFS drive and restore from an image file located on an NTFS drive.
Page 15
Mapped network drives: A computer on a network can be mapped to a drive
letter. This lets Norton Ghost see the computer as a local drive and back up to and restore from it.
Ghost Walker: This utility lets you update Security Identifiers (SID) and
computer names. Ghost Walker was previously available only in Symantec Ghost, the corporate version of Norton Ghost.
Support for FireWire, USB 1.1, USB 2.0: You can now use Norton Ghost to
back up, restore, and clone to and from FireWire, USB 1.1, and 2.0 devices, including hard disks and supported CD-R/RW and DVD drives.
DVD support: You can use Norton Ghost to back up to and restore from
supported DVD+ R/RW and DVD-R/RW drives.
Expanded CD-R/RW support: The CD-R/RW drives supported by Norton
Ghost have been increased to include most new drives.
Large drive support: Norton Ghost supports backing up, restoring, and
cloning IDE drives larger than 128 GB.

How Norton Ghost works

How Norton Ghost works
15About Norton Ghost

Virtual Partition

The basis of Norton Ghost is a cloning function that creates an image file that contains all of the information required to recreate a complete disk or partition. Image files contain a backup copy of an entire drive or one or more partitions. The image file can be restored to one or more partitions or disks, replacing existing data.
The Virtual Partition is a partition that is created when you perform a backup, restore, clone, or other operation from Windows. All the files required for the backup, restore, or clone are automatically installed into the Virtual Partition and the task performed. Most of the Virtual Partition operation is not apparent to you. However, there may be some occasions when you must know what the Virtual Partition is and what it does, such as if you want to run Ghost.exe or another application from the Virtual Partition.
One primary partition slot must be available in the MBR for the Virtual Partition.
Page 16
16 About Norton Ghost
How Norton Ghost works

Hardware restrictions

Norton Ghost is designed to restore to and clone identical hardware. When Microsoft Windows is installed, drivers necessary to support your hardware are installed to the hard disk and recorded in the Windows Registry. If you move an installation of Windows to another computer, either by directly moving the hard disk or copying it using a Ghost operation, there is no guarantee that it will boot or function correctly. Although Microsoft provides tools, such as Sysprep, that may alleviate these problems to volume license holders, these tools are usually unavailable to consumer or small business users.
A computer with Windows installed should be copied to a computer with identical hardware. Moving or cloning file systems that do not contain an operating system does not usually present a problem.

Preparing for an emergency

After you have installed Norton Ghost and created a backup image, you must create and test a recovery boot disk for use in an emergency. If you experience a critical failure and cannot start your computer, then you must have a recovery boot disk. This lets you start your computer in DOS and run Norton Ghost to restore your computer.
Note: If you saved your image file directly to CD or DVD, then you do not need a recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to CD or DVD.
Page 17

Norton Ghost components

There are two methods of restoring your computer:
Norton Ghost
If you are able to start in Windows, then you may be able to run Norton Ghost from Windows on your hard disk and restore your computer with the latest backup image file that you have created.
See “Restoring your computer from an image file” on page 37.
Ghost.exe
If you cannot start Windows, then you must start your computer from a recovery boot disk or CD/DVD. This starts your computer and starts Norton Ghost in DOS. From Norton Ghost, you can access your image file and restore your computer to the latest backup image file.
See “Restoring from an image file” on page 101. The Ghost Boot Wizard helps you create a recovery boot disk. See “Creating boot disks and boot images” on page 75.
Warning: Create and test a recovery boot disk before you need it. If your computer crashes and you do not have a recovery boot disk, then you will have to find another computer on which to create a boot disk.
17About Norton Ghost
Norton Ghost components
Norton Ghost includes a number of products and utilities.

Norton Ghost wizards

Norton Ghost includes Windows wizards to guide you through the basic tasks.
Page 18
18 About Norton Ghost
Norton Ghost components
These wizards include:
Backup Wizard
The Backup Wizard lets you select a hard disk or partition to back up to an image file.
Restore Wizard
The Restore Wizard lets you restore a hard disk or partition from an image file.
Page 19
Norton Ghost components
Clone Wizard
The Clone Wizard lets you clone a hard disk or partition directly from another hard disk or partition.
Peer-to-Peer Wizard
The Peer-to-Peer Wizard starts Ghost.exe in the Virtual Partition with the peer­to-peer drivers loaded.
19About Norton Ghost
Page 20
20 About Norton Ghost
Norton Ghost components
Create Virtual Partition Wizard
The Create Virtual Partition Wizard restarts your computer in the Virtual Partition in DOS with files from a selected directory. This enables you to run DOS applications.
Run Ghost Interactively Wizard
The Run Ghost Interactively Wizard restarts your computer in DOS and runs Ghost.exe.
Integrity Check
The image integrity check runs an integrity check on backup image files.
Page 21
View Log
View Log lets you view logs created during Norton Ghost operations.

Norton Ghost executable

Ghost.exe runs in DOS and lets you back up, restore, and clone. Because the executable is small with minimal conventional memory requirements, you can run it easily from a DOS boot disk or hard drive.
Norton Ghost components
21About Norton Ghost
Page 22
22 About Norton Ghost
Norton Ghost components

Ghost Boot Wizard

The Ghost Boot Wizard is a Windows application that creates boot disks that start Norton Ghost when you turn on your computer. You can create boot disks for various cloning tasks. The wizard guides you through adding the drivers that are needed to create a boot disk.

Ghost Explorer

Ghost Explorer is a Windows application that lets you view directories and files in an image file. You can also add, recover, and delete individual directories and files from a FAT16/32 file system image file.
Page 23
Norton Ghost components
Note: You can restore individual files from NTFS images, but you cannot update
NTFS images.
23About Norton Ghost

GDisk

GDisk is a complete replacement for the Microsoft FDISK and FORMAT utilities that allows the following:
FAT file system formatting
Batch mode operation
Hiding and unhiding of partitions
Secure disk wiping to US Department of Defense standards
Extensive partition reporting
Boot.ini manipulation (GDisk32 only)
Two versions of GDisk are supplied:
GDisk: Runs in DOS
GDisk32: Runs from the command prompt in a Windows operating system
Page 24
24 About Norton Ghost
Norton Ghost components

Ghost Walker

Ghost Walker assigns a statistically unique security identifier (SID) and a unique computer name to cloned Microsoft Windows NT/2000/XP workstations. The SID is an important part of the Windows NT/2000/XP security architecture as it provides a unique identifier when these computers are networked. If you are cloning more than one computer using the multiuser pack, you can use Ghost Walker to set up each computer on a network with a unique identification, which is mandatory on a Microsoft network.
Page 25
Chapter

Installing Norton Ghost

This chapter includes the following topics:
Minimum system requirements
Installing Norton Ghost
Updating Norton Ghost
Uninstalling Norton Ghost
2
Page 26
26 Installing Norton Ghost

Minimum system requirements

Minimum system requirements
To install and run Norton Ghost, the minimum requirements are as follows:
IBM computer or 100% compatible
486 processor
VGA monitor (Super VGA recommended)
16 MB RAM (32 MB RAM recommended)
Microsoft-compatible mouse recommended
Microsoft Windows 98/2000/Me/XP or Microsoft Windows NT4 SP6a
Internet Explorer 5

Ghost.exe

Ghost.exe must be installed on a computer with the Norton Ghost minimum requirements. However, you can run Ghost.exe on a computer with the following minimum requirements:
IBM PC computer or 100% compatible
486 processor
16 MB RAM
VGA monitor
Microsoft-compatible mouse recommended

CD and DVD writing

CD or DVD writer supported by Norton Ghost

Supported backup media

In addition to saving a backup to a secondary partition or an internal hard disk, Norton Ghost can also save a backup to the following external media devices:
CD-R/RW
DVD+RW/-RW/+R/-R
USB 1.1/2.0 hard drive and CD/DVD recordable devices
FireWire (iEEE) 1394 hard drive and CD/DVD recordable devices
Page 27

Installing Norton Ghost

Atapi tape (QIC157) devices
SCSI tape
A second computer using a peer-to-peer connection
Mapped network drive
ZIP drive
JAZ drive
To determine whether your device is supported by Norton Ghost, check that your device is listed on the Symantec support Web site.
http:\\www.ghost.com

File systems supported for backup, restore, and cloning tasks

All FAT
All NTFS
EXT2/3
See “Cloning with Linux” on page 187.
27Installing Norton Ghost

Disaster recovery requirements

To restore a backup image in the event of an operating system or hard disk failure, you must have one of the following recovery mechanisms in place before the emergency occurs:
Floppy disk drive and floppy disk with the correct drivers for the selected
backup device
CD or DVD device and a bootable CD-ROM with the backup image created
by Norton Ghost
See “Preparing for an emergency” on page 16.
Installing Norton Ghost
The installation instructions for Norton Ghost differ depending on how you have purchased Norton Ghost:
As a part of Norton SystemWorks Pro
Norton Ghost 2003
Page 28
28 Installing Norton Ghost
Installing Norton Ghost

Installing Norton Ghost if purchased with Norton SystemWorks Pro

If you have purchased Norton Ghost as part of Norton SystemWorks Pro, then Norton Ghost is installed from the Norton SystemWorks Pro CD.
To install Norton Ghost from Norton SystemWorks
1 Insert the Norton SystemWorks 2003 CD into the CD-ROM drive.
2 In the Norton SystemWorks 2003 window, click Install Norton SystemWorks
2003.
3 Click OK to accept the Virus detection message.
4 Click Next.
5 In the License Agreement window, click I accept the license agreement, and
then click Next. If you select I do not accept the license agreement, you cannot continue with
the installation.
6 Confirm the installation location.
To select a different location for the installed files, click Browse.
7 Click Next.
8 Select an installation type:
Typical: The most common programs are installed. This is the best
choice for most users.
Complete: All programs are installed. This is the best choice for users
who want to take advantage of all the product features.
Express: The most common programs are installed with the default
settings and fewer prompts.
9 In the Select Features window, select Norton Ghost 2003 and click one of the
following:
Will be installed on local hard drive
Entire feature will be installed on local hard drive
To install only Norton Ghost, click the other Norton SystemWorks components and select Entire feature will be unavailable.
10 Click Next.
11 Continue with the type of installation you chose. After installation, you may
receive a prompt telling you that your computer needs to be restarted for the updates to take effect.
Page 29

Installing Norton Ghost

If you have purchased Norton Ghost separately from Norton SystemWorks Pro, then Norton Ghost is installed from the Norton Ghost CD.
To install Norton Ghost from the Norton Ghost CD
1 Insert the Norton Ghost CD into the CD-ROM drive.
2 In the Norton Ghost 2003 window, click Install Norton Ghost 2003.
3 In the Norton Ghost 2003 - InstallShield Wizard window, click Next.
4 In the License Agreement window, click I accept the license agreement, and
then click Next. If you select I do not accept the license agreement, you cannot continue with
the installation.
5 In the User name field, type a user name.
6 In the Organization field, type an organization, if you belong to one.
7 Click Next.
8 Confirm the installation location.
To select a different location for the installed files, click Change.
Installing Norton Ghost
29Installing Norton Ghost
9 Click Next.
10 Click Install to start the installation.

If the opening screen does not appear

Sometimes, a computer’s CD-ROM drive does not automatically start a CD.
To start the installation from the Norton Ghost CD
1 On your desktop, double-click My Computer.
2 In the My Computer dialog box, double-click the icon for your CD-ROM
drive.
3 From the list of files, double-click Ncdstart.exe.

Registering Norton Ghost

To stay informed of upcoming Symantec products, please fill out the details for registration of Norton Ghost. If you choose not to register the software using the Information Wizard or if registration fails for some reason, you can register on the Symantec Web site at www.symantec.com or by using the Product
Page 30
30 Installing Norton Ghost
Installing Norton Ghost
Registration option in the Help menu in the Norton Ghost window. On the Web site, go to the Products page for the registration link.
To register Norton Ghost
1 In the first Registration window, select the country from which you are
registering and the country in which you live (if different), and then click Next.
2 If you would like information from Symantec about Norton Ghost, select the
method by which you want to receive that information, and then click Next.
3 Type your name and whether you want Norton Ghost registered to you or
your company, and then click Next.
4 Type your address, and then click Next.
5 Do one of the following:
Answer the survey questions to help Symantec improve its products and
services, and then click Next.
Skip the survey by clicking Next.
6 Select whether you want to register Norton Ghost through the Internet or by
mail.
If you want to register by mail, your computer must be connected to a
printer that the Information Wizard can use to print the registration form.
If you want to register using the Internet, you must be connected to the
Internet.
7 Click Next.
If you submitted your registration through the Internet, the Information Wizard displays the serial number for your product.
8 Write down the serial number or click Print to get a copy of your registration
information for future reference.
9 Click Next.
10 Select whether you want to use your existing profile the next time you
register a Symantec product or type the information as part of registration.
11 Click Finish.
Page 31

Updating Norton Ghost

Symantec may provide updates for Norton Ghost. Symantec does not charge for these updates. However, your normal Internet access fees apply.
To update Norton Ghost using LiveUpdate
1 On the Windows taskbar, click Start > Programs > Norton Ghost 2003 >
Norton Ghost.
2 Click LiveUpdate.
3 Follow the on-screen instructions.

Uninstalling Norton Ghost

Norton Ghost is uninstalled from the Control Panel in Windows.
To uninstall Norton Ghost
1 On the Windows taskbar, click Start > Settings > Control Panel.
2 In the Control Panel window, double-click Add/Remove Programs.
Updating Norton Ghost
31Installing Norton Ghost
3 Click Norton Ghost.
4 Click Remove.
Page 32
32 Installing Norton Ghost
Uninstalling Norton Ghost
Page 33
Chapter

Backing up, restoring, and cloning from Norton Ghost

This chapter includes the following topics:
When to use Norton Ghost in Windows
Starting Norton Ghost in Windows
3
Creating a backup image file
Restoring your computer from an image file
Cloning a hard disk or partition
Launching Ghost.exe peer-to-peer
Identifying a hard disk
Page 34
34 Backing up, restoring, and cloning from Norton Ghost

When to use Norton Ghost in Windows

When to use Norton Ghost in Windows
Use Norton Ghost in Windows to do the following:
Back up your computer
Restore an image file onto your computer
You can use the Restore Wizard to restore an image file if you can still start Windows.
Clone a hard disk or partition directly to another hard disk or partition
Do not use Norton Ghost in Windows for the following tasks. Use Ghost.exe in DOS for any of the following:
If you cannot start Windows on your computer
See “Restoring from an image file” on page 101.
Cloning a computer that does not have Windows installed
See “Cloning disks and partitions” on page 104.
Note: Sometimes the drive letter in Norton Ghost in DOS does not match the drive letter in Windows.
For example:
You back up to a file, F:\test.gho. When you execute a backup task, the backup appears in Ghost.exe as E:\test.gho.

Starting Norton Ghost in Windows

Before starting Norton Ghost, close all open programs.
Page 35
Starting Norton Ghost in Windows
To start Norton Ghost in Windows
Do one of the following:
On the Windows taskbar, click Start > Programs > Norton Ghost 2003
> Norton Ghost.
On the Windows XP taskbar, click Start > All Programs > Norton
Ghost 2003 > Norton Ghost.
35Backing up, restoring, and cloning from Norton Ghost

Starting Norton Ghost from the tray icon

By default, Norton Ghost displays a single Windows tray icon in the system notification area at the end of the Windows 9x/Me/NT/2000/XP taskbar. Use the tray icon as a shortcut to open the Backup, Restore, and Clone Wizards.
Page 36
36 Backing up, restoring, and cloning from Norton Ghost

Creating a backup image file

From the tray icon you can initiate any of the following tasks:
Launch Norton Ghost
Run the Restore Wizard
Run the Backup Wizard
View the task log
To start Norton Ghost from the tray icon
1 Move your mouse cursor over the Norton Ghost tray icon.
2 Right-click the tray icon.
3 On the tray icon menu, click the option that you want.
Creating a backup image file
You can create a backup image file of your hard disk or one or more partitions using the Backup Wizard.
To back up a hard disk or partition
1 In the Ghost Basic window, click Backup, and then click Next.
2 In the Backup Wizard window, in the Source pane, do one of the following:
Select a whole disk to back up.
Select one or more partitions to back up.
The partitions must reside on the same disk.
3 Do one of the following:
Click File to back up to a file.
Click Recordable CD or DVD to back up to a CD or DVD drive.
Norton Ghost selects the CD or DVD drive that contains writable media.
4 Click Next.
5 If you selected to back up to a file, click Browse to select a destination and file
name to which the disk or partition(s) is to be backed up.
6 Click Next.
Page 37

Restoring your computer from an image file

7 If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk. See “Identifying a hard disk” on page 43. If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
8 If you want to set advanced settings for the backup, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
9 Click Next.
10 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
11 In the Disaster Recovery dialog box, click Continue.
This dialog box warns you to ensure that you can run Ghost.exe and access your image file once it has been created. You may need to create a recovery boot disk.
See “Creating a recovery boot disk” on page 73.
12 Select one of the following:
Run Now: Creates the backup image file.
Your computer is restarted and the backup image file is created.
Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk. See “Creating a recovery boot disk” on page 73.
37Backing up, restoring, and cloning from Norton Ghost
Restoring your computer from an image file
You can restore a hard disk or a partition from an image file stored on another hard disk, partition, or external media using the Restore Wizard from within Windows.
If you cannot start Windows, then you must use Ghost.exe to restore your hard disk or partition.
See “Restoring from an image file” on page 101.
Page 38
38 Backing up, restoring, and cloning from Norton Ghost
Restoring your computer from an image file
To restore a disk or partition
1 In the Ghost Basic window, click Restore, and then click Next.
2 In the Restore Wizard window, click Browse, and find the image file from
which to restore.
3 If you want to view the contents of the image file in Ghost Explorer, click
Open image in Ghost Explorer. See “Viewing image files” on page 119.
4 Click Next.
5 In the left pane, select the image file or partition within the image file to
restore.
6 In the right pane, select the destination hard disk or partition that is to be
overwritten.
7 Click Next.
8 The Overwrite partition warning dialog box appears if you are overwriting
any of the following:
The current Windows partition
The Ghost installation
Click Next to continue.
9 If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk. See “Identifying a hard disk” on page 43. If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
10 If you want to set advanced settings for the restore, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
11 Click Next.
12 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
13 Click Run Now to restore the image file to the selected hard disk or partition.
Your computer is rebooted and the restore operation completed.
Warning: The destination disk or partition is completely overwritten with no chance of recovering any data.
Page 39

Cloning a hard disk or partition

You can clone a hard disk directly to another hard disk or a partition directly to another partition.
To create a clone task
1 In the Ghost Advanced window, click Clone, and then click Next.
2 In the Clone Wizard window, in the left pane, do one of the following:
Click a disk to select it as the source for the clone operation.
Click a partition to select it as the source for the clone operation.
3 In the right pane, do one of the following:
Click a disk to select it as the destination for the clone operation.
Click a partition to select it as the destination for the clone operation.
Warning: The destination disk or partition is completely overwritten with no chance of recovering any data.
4 Click Next.
Cloning a hard disk or partition
39Backing up, restoring, and cloning from Norton Ghost
5 The Overwrite partition warning dialog box appears if you are overwriting
any of the following:
The current Windows partition
The Ghost installation
Click Next to continue.
6 If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk. See “Identifying a hard disk” on page 43. If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
7 If you want to set advanced settings for the clone, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
8 Click Next.
Page 40
40 Backing up, restoring, and cloning from Norton Ghost

Launching Ghost.exe peer-to-peer

9 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
10 Click Run Now to start the clone operation.
Ensure that all applications on your computer are closed before you run the clone operation.
Your computer is restarted and the destination hard disk or partition is cloned from the source hard disk or partition.
Launching Ghost.exe peer-to-peer
From Norton Ghost you can launch Ghost.exe over a USB, LPT, or TCP/IP peer­to-peer connection. Once you have established the settings for the connection, Ghost.exe launches ready for you to establish a connection.
Both computers must be running Ghost.exe for you to make the peer-to-peer connection. On your second computer, you can run Norton Ghost as described in this section, or you can restart it from a Peer-to-Peer Network Boot Disk or Standard Boot Disk.
See “Boot disks with network support” on page 79 and “Standard boot disks” on page 76.
To run Ghost.exe peer-to-peer
To run Ghost.exe peer-to-peer using USB
1 In the Ghost Basic window, click Ghost Advanced, and then click Peer-to-
Peer.
2 Click USB peer-to-peer.
3 Click Next.
4 If you want to set advanced settings, then click Advanced Settings.
See “Setting Norton Ghost options and defaults” on page 46.
5 If you want to set advanced USB peer-to-peer settings, then click USB driver
settings.
See “Installing USB peer-to-peer drivers” on page 57.
6 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
Page 41
Launching Ghost.exe peer-to-peer
7 In the Disaster Recovery window, select one of the following:
Launch Tutorials: Opens the tutorial index.
From the tutorials, you can select a tutorial that demonstrates how to create a recovery boot disk.
Continue: Returns to the Create Task dialog box.
This dialog box warns you to ensure that you can run Ghost.exe and access your image file once it has been created. You may need to create a recovery boot disk.
See “Creating a recovery boot disk” on page 73.
8 Select one of the following:
Run Now: Restarts your computer into DOS and starts Ghost.exe.
Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk. See “Creating a recovery boot disk” on page 73.
To run Ghost.exe peer-to-peer using TCP
1 In the Ghost Basic window, click Ghost Advanced, and then click Peer-to-
Peer.
41Backing up, restoring, and cloning from Norton Ghost
2 Click TCP peer-to-peer.
3 Click Next.
4 If you want to set advanced settings, then click Advanced Settings.
See “Setting Norton Ghost options and defaults” on page 46.
5 If you want to set TCP/IP driver settings, then click TCP/IP Driver Settings.
See “Setting TCP/IP drivers” on page 54.
6 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
Page 42
42 Backing up, restoring, and cloning from Norton Ghost
Launching Ghost.exe peer-to-peer
7 In the Disaster Recovery window, select one of the following:
Launch Tutorials: Opens the tutorial index.
From the tutorials, you can select a tutorial that demonstrates how to create a recovery boot disk.
Continue: Returns to the Create Task dialog box.
This dialog box warns you to ensure that you can run Ghost.exe and access your image file once it has been created. You may need to create a recovery boot disk.
See “Creating a recovery boot disk” on page 73.
8 Select one of the following:
Run Now: Restarts your computer into DOS and starts Ghost.exe.
Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk. See “Creating a recovery boot disk” on page 73.
To run Ghost.exe peer-to-peer using LPT
1 In the Ghost Basic window, click Ghost Advanced, and then click Peer-to-
Peer.
2 Click LPT peer-to-peer.
3 Click Next.
4 If you want to set advanced settings, then click Advanced Settings.
See “Setting Norton Ghost options and defaults” on page 46.
5 If you want to set advanced LPT peer-to-peer driver settings, then click LPT
driver settings.
See “Setting LPT peer-to-peer drivers” on page 55.
6 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
Page 43
7 In the Disaster Recovery window, select one of the following:
Launch Tutorials: Opens the tutorial index.
From the tutorials you can select a tutorial that demonstrates how to create a recovery boot disk.
Continue: Returns to the Create Task dialog box.
This dialog box warns you to ensure that you can run Ghost.exe and access your image file once it has been created. You may need to create a recovery boot disk.
See “Creating a recovery boot disk” on page 73.
8 Select one of the following:
Run Now: Restarts your computer into DOS and starts Ghost.exe.
Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk. See “Creating a recovery boot disk” on page 73.

Identifying a hard disk

Before you can use Norton Ghost on a hard disk, Norton Ghost must identify the disk. You can do this during any backup, restore, or clone operation.
Identifying a hard disk
43Backing up, restoring, and cloning from Norton Ghost
This dialog box appears during a backup, restore, or clone operation if you have not previously identified the hard disk.
To identify a disk
In the Add Ghost Disk Identification dialog box, click OK to identify all hard
disks.
Page 44
44 Backing up, restoring, and cloning from Norton Ghost
Identifying a hard disk
Page 45
Chapter

Setting options and defaults

This chapter includes the following topics:
Setting Norton Ghost options and defaults
Running your computer from the Virtual Partition
Checking the integrity of an image file
Viewing the task log
4
Starting Ghost.exe
What to do if a task fails
Page 46
46 Setting options and defaults

Setting Norton Ghost options and defaults

Setting Norton Ghost options and defaults
Norton Ghost lets you set defaults for the tasks that you run from the wizards. You can change many of these defaults in the wizards as you create a task.
Norton Ghost default options
Some options can only be set as you create the task in the wizard.
The options and defaults include the following:
Adding command-line switches to a task
Assigning a drive letter to a CD/DVD drive
Setting the options for a mapped network drive
Setting display options
Setting the DOS version
Setting the image integrity check default
Setting a compression level
Assigning a password to an image file
Adding free space to the Virtual Partition
Installing SCSI drivers
Setting external storage device drivers
Setting TCP/IP drivers
Setting LPT peer-to-peer drivers
Installing extra drivers
Installing USB peer-to-peer drivers
Page 47

Adding command-line switches to a task

You can add command-line switches to a task to alter its operation.
To add command-line switches to a task
1 Do one of the following:
To set this option as a default, in the Ghost Basic window, click Options.
To add command-line switches while running a Windows wizard task,
in the settings window, click Advanced Settings.
2 On the Ghost Command Line tab, type the extra command-line switches.
See “Using Norton Ghost with switches” on page 154.
3 Click OK.
Warning: The syntax of your command line is not checked when the task
runs. Therefore, review these instructions carefully to avoid errors. The consequences of an error could be serious.

Assigning a drive letter to a CD/DVD drive

Setting Norton Ghost options and defaults
47Setting options and defaults
You can assign a drive letter to a CD or DVD drive. This lets you select a drive letter when restoring an image file from a CD/DVD.
Use this option if you are restoring an image file that was written to a CD/DVD using a tool other than Norton Ghost.
To assign a drive letter to a CD/DVD drive
1 Do one of the following:
To set this option as a default, in the Ghost Basic window, click Options.
To assign a drive letter to a CD or DVD drive while running a Windows
wizard task, in the Advanced Settings window, click Advanced Settings.
2 On the CD Driver tab, click Assign drive letters to CD/DVD drives.
3 Click OK.

Setting the options for a mapped network drive

You can set the options for connecting to a mapped network drive.
Page 48
48 Setting options and defaults
Setting Norton Ghost options and defaults
To set the options for a mapped network drive
1 While running a Windows wizard task, in the Advanced Settings window,
2 Click Map network drive.
3 Do one of the following:
4 Select one of the following:
click Advanced Settings.
Select a network card from the drop-down list.
Norton Ghost displays any installed drivers that it detects. Select the network driver for the particular make and model of the network card that is installed on the computer.
See “Selecting a template” on page 84.
Click Browse to open the Ghost Boot Wizard and select a network card.
From the Ghost Boot Wizard, you can add a network card. If your network card is not on the list, you can modify a network card template.
See “Selecting a template” on page 84 and “Adding network drivers to
the Ghost Boot Wizard” on page 86.
Use DHCP: Use this option if your network contains a DHCP server.
Static IP Address: Complete the fields below this option if your network
does not contain a DHCP server.
5 In the Network resource field, type a network resource.
6 In the User name field, type a user name.
7 In the Domain field, type a domain name.
8 Click OK.

Setting display options

You can set some default display options.
To set display options
1 In the Ghost Basic window, click Options.
2 Click Display.
3 Check Show Norton Ghost tray icon on start up to display the Norton Ghost
icon in the taskbar.
4 Check Show disaster recovery warning before running a Norton Ghost task
to display the Disaster Recovery dialog box before running a task.
Page 49
5 Check Show information screen about the DOS version of Ghost to display
the warning that Norton Ghost restarts into DOS while running a task.
6 Click OK.

Setting the DOS version

By default, Norton Ghost includes PC-DOS in the Virtual Partition. However, some computer models may not start from a Virtual Partition that contains PC­DOS. If your computer does not start from the Virtual Partition, set the default option to MS-DOS.
You must provide MS-DOS on a floppy disk formatted on a Windows 95/98 computer before you can run Norton Ghost with MS-DOS.
See “Providing MS-DOS” on page 89.
To set DOS files
To select a DOS version
1 In the Ghost Basic window, click Options.
Setting Norton Ghost options and defaults
49Setting options and defaults
2 On the DOS Type tab, select one of the following:
Use PC-DOS: Includes PC-DOS in the Virtual Partition.
Use MS-DOS: Includes MS-DOS in the Virtual Partition.
3 Click OK.
To install MS-DOS
1 Insert the MS-DOS formatted floppy disk into drive A of the computer on
which Norton Ghost is running.
2 In the DOS Type window, click Get MS-DOS Files.
3 Click OK.
To uninstall MS-DOS
1 In the DOS Type window, click Remove MS-DOS Files.
2 Click OK.
Installing MS-DOS Client files
If you are using the mapped network drive functionality and MS-DOS, you must include the Microsoft DOS Client files. You must install the files on the computer before you can include them in the Virtual Partition.
Page 50
50 Setting options and defaults
Setting Norton Ghost options and defaults
The following files are required:
EMSBFR.EXE
LMHOSTS
NEMM.DOS
NET.EXE
NET.MSG
NETBIND.COM
NETH.MSG
NETWORKS
NMTSR.EXE
PROTMAN.DOS
PROTMAN.EXE
PROTOCOL
TCPDRV.DOS
TCPTSR.EXE
TCPUTILS.INI
TINYRFC.EXE
UMB.COM
IFSHLP.SYS
EMM386.EXE
HIMEM.SYS
WFWSYS.CFG
Page 51
To install the Microsoft DOS Client files
1 In the Ghost Basic window, click Options.
2 In the Norton Ghost 2003 Options dialog box, click DOS Type.
3 Insert a floppy disk containing the MS-DOS LAN Client files into drive A,
and then click Supply MS-DOS LAN Client Files.

Setting the image integrity check default

You can set a default option for Norton Ghost to perform an integrity check of an image file after it has been created and before it is restored.
Some CD-RW drives eject a CD once an image has been saved to it. If this is preventing the integrity check, then ensure that this option is not selected, and perform an integrity check using the Image Integrity Check Wizard.
See “Checking the integrity of an image file” on page 58.
To set Norton Ghost to perform an integrity check on an image file
1 In the Ghost Basic window, click Options.
Setting Norton Ghost options and defaults
51Setting options and defaults
2 In the Norton Ghost 2003 Options dialog box, click Image Integrity check.
3 Check Always perform an image integrity check to set the default.
4 Click OK.

Setting a compression level

A compression level can be set as a default or from a wizard. You can set the compression level to None, Fast, or High. Compression is set to Fast by default.
See “Image files and compression” on page 62.
Page 52
52 Setting options and defaults
Setting Norton Ghost options and defaults
To set the compression level
1 Do one of the following:
To set the default compression level, in the Ghost Basic window, click
Options.
To set the compression level while running a Windows wizard task, in
the Advanced Settings window, click Advanced Settings.
2 On the Compression tab, select one of the following:
None: No compression (high speed)
Fast: Low compression (medium speed)
High: High compression (slower speed)
3 Click OK.

Assigning a password to an image file

You can assign a password to an image file. The password is entered when the image file is created. Then, each time the image file is accessed in Ghost.exe, you are prompted to enter the password.
To assign a password
1 Do one of the following:
To set the default to create an image password, in the Ghost Basic
window, click Options.
To set the option to create an image password while running a Windows
wizard task, in the Advanced Settings window, click Advanced Settings.
2 On the Image password tab, check Prompt for an image password to set the
option to prompt for a password when the image file is created.

Adding free space to the Virtual Partition

You can specify additional space to be added to the Virtual Partition. This is added to the Virtual Partition when it is created.
Page 53
To specify additional free space in the Virtual Partition
1 Do one of the following:
To set the default to specify additional free space, in the Ghost Basic
window, click Options.
To specify additional free space while running a Windows wizard task,
in the Advanced Settings window, click Advanced Settings.
2 In the Norton Ghost 2003 Options window, on the Virtual Partition Free
Space tab, in the Required Free Space field, select an additional amount of free space (in MB) to add to the Virtual Partition.
3 Click OK.

Installing SCSI drivers

Norton Ghost automatically installs Adaptec SCSI drivers in the Virtual Partition if it finds a SCSI hard disk. The SCSI drivers allow Norton Ghost to access any SCSI device. If you want to install SCSI drivers manually, you can set this as a default preference or install the drivers from a wizard. You can scan for Adaptec SCSI cards and let Norton Ghost select the correct drives.
Setting Norton Ghost options and defaults
53Setting options and defaults
If you are using a card other than Adaptec, then you must manually install the correct drivers.
See “Installing extra drivers” on page 56.
To install SCSI drivers
1 Do one of the following:
To set the default installation of SCSI drivers, in the Ghost Basic
window, click Options.
To install the SCSI drivers while running a task, in the Advanced
Settings window, click Advanced Settings.
2 Check the SCSI drivers that you want to install.
3 To let Norton Ghost scan for Adaptec SCSI cards, click Auto-Detect for SCSI
drivers.
4 Click OK.
Page 54
54 Setting options and defaults
Setting Norton Ghost options and defaults

Setting external storage device drivers

Norton Ghost usually installs USB and FireWire drivers in the Virtual Partition if it finds a USB or FireWire external device. You may need to install these drivers manually as a default option or while running a Windows wizard task.
Note: Do not use this option if you want to connect to another computer using peer-to-peer.
See “Installing USB peer-to-peer drivers” on page 57.
To install external device drivers
1 Do one of the following:
To set the default installation of external drivers, in the Ghost Basic
window, click Options.
To install the external device drivers while running a Windows wizard
task, in the Advanced Settings window, click Advanced Settings.
2 On the External Storage tab, select one of the following:
No USB Drivers: Does not install USB drivers
USB 1.1 Drivers: Installs USB 1.1 drivers
Select this option if any of your cards or chipsets are USB 1.1.
USB 2.0 Drivers: Installs USB 2.0 drivers
Do not select this option if any of your cards or chipsets are USB 1.1.
3 If you want to install FireWire drivers to the Virtual Partition, then click
Firewire Support.
4 If you want to assign a drive letter to the external storage device, then click
Assign drive letters. By default, a drive letter is assigned to an external storage device. This option
assigns a drive letter to USB and FireWire devices in DOS.
5 Click OK.

Setting TCP/IP drivers

Norton Ghost automatically searches for and installs the correct TCP/IP drivers for your hardware setup. However, you can set the TCP/IP configuration manually if your task fails or you need settings that are different from the automatic setup. If your computer is running Windows NT 4 and you are using TCP/IP, then you must manually set the network driver.
Page 55
Setting Norton Ghost options and defaults
To install TCP/IP drivers
1 To set the default installation of TCP/IP drivers, in the Ghost Basic window,
click Options.
2 In the Norton Ghost 2003 Options dialog box, click TCP/IP Driver Settings.
3 Do one of the following:
Select a network card from the drop-down list.
Norton Ghost displays any detected installed drivers. Select the network driver for the particular make and model of the network card that is installed on the computer.
See “Selecting a template” on page 84.
Click Browse to open the Ghost Boot Wizard and select a network card.
From the Ghost Boot Wizard you can add a network card. If your network card is not on the list, you can modify a network card template.
See “Selecting a template” on page 84 and “Adding network drivers to
the Ghost Boot Wizard” on page 86.
4 Select one of the following:
Use DHCP: Use this option if your network contains a DHCP server.
Static IP Address: Complete the fields below this option if your network
does not contain a DHCP server.
55Setting options and defaults
5 Click OK.

Setting LPT peer-to-peer drivers

Norton Ghost automatically installs default LPT peer-to-peer drivers for your hardware setup. However, you can set the LPT configuration manually if your task fails or you need settings that are different from the automatic setup.
Page 56
56 Setting options and defaults
Setting Norton Ghost options and defaults
To install LPT peer-to-peer drivers
1 To set the default installation of LPT drivers, in the Ghost Basic window, click
2 In the Norton Ghost 2003 Options dialog box, click LPT Driver Settings.
3 Select a mode.
4 Select a port.
5 Click OK.

Installing extra drivers

You can install drivers that are not included with Norton Ghost. You can also modify Autoexec.bat and Config.sys, which are installed in the Virtual Partition.
Options.
The default mode for an LPT connection is ECP/EPP High Speed. If you are having problems with your LPT connection, set the mode to Bidirectional 8bit or Bidirectional 4bit. The next time that you create a boot disk, the mode is reset to the default, ECP/EPP High Speed.
If you have multiple parallel ports and want to connect using a port other than the default LPT1, use the LPT port option to specify the port into which your cable is plugged.
To install extra drivers
1 Do one of the following:
To set the default installation of extra drivers, in the Ghost Basic
window, click Options.
To install the extra drivers while running a Windows wizard task, in the
Advanced Settings window, click Advanced Settings.
2 On the User files tab, click Add Files to add additional drivers.
3 Click Add Directory to add additional directories.
4 In the AUTOEXEC.BAT Additions field, type any additional Autoexec.bat
entries for the driver.
5 In the CONFIG.SYS Additions field, type any additional Config.sys entries
for the driver.
6 Click OK.
Page 57

Installing USB peer-to-peer drivers

You can select USB peer-to-peer drivers to install into the Virtual Partition. In most cases, you do not need to alter the driver’s default. However, if you have problems connecting using peer-to-peer, then select the other options and retry the task.
To select USB peer-to-peer drivers
1 Do one of the following:
To set the default installation of extra drivers, in the Ghost Basic
window, click Options, and then click USB peer-to-peer settings.
To install the USB drivers while running a Peer-to-Peer Wizard task, in
the Advanced Settings window, click USB peer-to-peer settings.
2 Select one of the following:
All drivers: Installs all USB peer-to-peer drivers into the Virtual
Partition.
UHCI driver: Installs only UHCI drivers into the Virtual Partition.
OHCI driver: Installs only OHCI drivers into the Virtual Partition.

Running your computer from the Virtual Partition

57Setting options and defaults
3 Click OK.
Running your computer from the Virtual Partition
From Norton Ghost you can restart your computer into the Virtual Partition. The Virtual Partition is created in DOS and includes the files that you have saved in a selected folder. Once you have created a Virtual Partition from a folder, you can run any application that you have provided in the selected folder.
The Virtual Partition is created with the following files:
Ghreboot.exe
This executable file lets you restart your computer back into Windows.
Selected driver settings
You can select drivers to include in the Virtual Partition that will let you access external hardware.
DOS applications stored in the selected folder
Any DOS applications that you provided in the selected folder are bundled and included in the Virtual Partition.
If you include Autoexec.bat and Config.sys in the selected folder, then they are modified by Norton Ghost when the Virtual Partition is created.
Page 58
58 Setting options and defaults

Checking the integrity of an image file

Before you create the Virtual Partition, you must create a folder that contains the files that you want included in the Virtual Partition.
To create the Virtual Partition from a folder
1 In the Ghost Basic window, click Ghost Advanced, and then click Create
2 Click Next.
3 Click Browse to select a directory from which to create the Virtual Partition.
4 In the Required Free Space field, set the size in MB of the Virtual Partition.
5 Click Next.
6 If you want to set advanced driver settings, then click Advanced Settings.
7 Click Next.
8 Click Run Now to restart your computer in the Virtual Partition.
Virtual Partition.
See “Setting Norton Ghost options and defaults” on page 46.
The task summary displays the size of the folder that you have selected. The Virtual Partition cannot be smaller than the folder size.

Restarting your computer from the Virtual Partition

To restart your computer back into Windows from the Virtual Partition, you must run the Ghreboot executable.
You may also need to run Ghreboot if a task has failed and your computer is left in the Virtual Partition.
To restart your computer in Windows
1 At the command line, type ghreboot.
2 Press Enter.
Checking the integrity of an image file
You can check the integrity of a Ghost image file. An integrity check ensures that the data read from the image file is the same as the data written to the image file. Norton Ghost performs a dummy restore of the image file. It does not check that the data on the disk is the same as the data in the image file.
Page 59

Viewing the task log

To check the integrity of an image file
1 In the Ghost Basic window, click Ghost Advanced, and then click Image
Integrity Check.
2 Click Next.
3 In the Create Image Integrity Check Wizard window, click Browse and find
the image file that you want to verify.
4 If you want to view the contents of the image file in Ghost Explorer, click
Open image in Ghost Explorer. See “Viewing image files” on page 119.
5 Click Next.
6 If you want to set advanced settings for the verification, then click Advanced
Settings. See “Adding command-line switches to a task” on page 47.
7 Click Next.
8 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
59Setting options and defaults
9 Click Run Now to start the image verification.
Viewing the task log
The task log displays the tasks performed from the Norton Ghost wizards.
To view the task log
1 In the Ghost Basic window, click View Log.
2 In the Task Log Viewer window, select a log entry and click View Log.

Starting Ghost.exe

You can start Ghost.exe from Windows. This option restarts your computer in DOS and opens Ghost.exe, which lets you run Norton Ghost interactively.
Page 60
60 Setting options and defaults

What to do if a task fails

To start Ghost.exe
1 In the Ghost Basic window, click Ghost Advanced, and then click Run Ghost
2 Click Next.
3 If you want to set advanced settings for the backup, then click Advanced
4 Click Next.
5 In the Important Information dialog box, if you do not want to view this
6 In the Disaster Recovery window, select one of the following:
Interactively.
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
warning again, click Don’t show this screen again, and then click Next.
Launch Tutorials: Opens the tutorial index.
From the tutorials, you can select a tutorial that demonstrates how to create a recovery boot disk.
Continue: Returns to the Run Ghost Interactively Wizard.
This dialog box warns you to ensure that you can run Ghost.exe and access your image file once it has been created. You may need to create a recovery boot disk.
See “Creating a recovery boot disk” on page 73.
7 Select one of the following:
Run Now: Restarts your computer into DOS and launches Ghost.exe.
Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk. See “Creating a recovery boot disk” on page 73.
What to do if a task fails
If a Norton Ghost task fails, you are prompted to select one of the following options:
Exit to DOS: Closes Ghost.exe and returns to DOS.
Return to Windows: Restarts your computer into Windows.
Retry the operation: Executes the task again.
Page 61

Image file options

This chapter includes the following topics:
About Norton Ghost image files
Image files and compression
Image files and CRC32
Image files and volume spanning
Image files and tape drives
GoBack and Norton Ghost
Chapter
5
Dynamic disks in Windows 2000/XP
Hibernation and swap files
Page 62
62 Image file options

About Norton Ghost image files

About Norton Ghost image files
The image files created with Norton Ghost have a .gho or .ghs extension by default. They contain the entire disk or partitions of the disk. Image files support the following:
Various levels of compression
CRC32 data integrity checking
Splitting of media files
Spanning across volumes
Norton Ghost images contain only the actual data on a disk. If you have a 9 GB drive with only 600 MB of data, the Norton Ghost image is approximately 600 MB, and is smaller if you use compression.
If you also use the Ghost Explorer application, an image file companion utility, you can recover individual files selectively from these image files without restoring the complete disk or partition.

Image files and compression

Image files created in Norton Ghost support several levels of data compression. When Norton Ghost is in interactive mode, three compression options are available: none, fast, and high. The Norton Ghost command-line switch -z provides access to nine levels of compression.
See “Command-line switches” on page 153.
As a rule, the more compression you use, the slower Norton Ghost operates. However, compression can improve speed when there is a data transfer bottleneck. There is a big difference in speed between high compression and no compression when creating an image file on a local disk. Over a network connection, fast compression is often as fast as, or faster than, no compression. Over a parallel cable, high compression is often faster than no compression because fewer bytes are sent over the cable. Decompression of high-compressed images is much faster than the original compression. The level of compression that you select depends on your individual requirements.
Page 63

Performance expectations on a network

One advantage of Norton Ghost is speed. Many factors affect performance. There are ways to gauge whether Norton Ghost is running optimally.
When you use Norton Ghost across a network, use the fast compression option. If disk space is at a premium, you can use higher compression, but it can affect speed.

Image files and CRC32

Cyclic Redundancy Checking (CRC) is a data error checking technique. CRC ensures that the original data written to the image file is the same as the data on the disk. CRC32 is a CRC technique that uses a 32-bit value to store error checking information.
When an image file is created, CRC32 details are embedded into the file to ensure that image file corruption is detected when the image is restored to disk. CRC32 is currently included on a file-by-file basis with FAT partitions and on a volume basis for NTFS partitions.
In addition to image file error detection, the CRC values are used to verify that image files and partitions or disks are identical. This offers an additional method to detect bad sector writes and other drive anomalies that may be missed during normal imaging checks.
Image files and CRC32
63Image file options
You can generate a text file that contains CRC values and associated file attributes using the -CRC32 command-line switch.
See “Command-line switches” on page 153.

Image files and volume spanning

Images can be contained in a single file or spanned across a number of files.

Standard image files

Standard image files consist of a single file that contains the contents of the complete disk or required partitions. This type of image file is stored on other hard drives, tape, CD, or DVD drives where the volume is large enough to hold the complete image file.
Page 64
64 Image file options
Image files and volume spanning

Limitations on the image file size

The default (and maximum) image file size is 2GB. However, by using size-limited, multisegment image files, you can take an image of a disk or partition that is larger than 2 GB.
Norton Ghost does support IDE drives larger than 128 GB. However, at the time of this printing, no operating system supports these large drives.

Size-limited image files

There are situations in which it is not practical to have a standard image file. Norton Ghost can split an image file into segments (known as spans) that are limited to a user-specified size. This option is most commonly used to limit span sizes to 620 MB for later transfer to a CD-ROM disc.

Spanned image files

Spanned image files are similar to size-limited image files. The difference is that each segment file (or span) of the image file is limited by the actual volume size of the media to which the image is being saved. This lets you specify a drive and file name and lets Norton Ghost determine when to request another volume or location for the remaining data. This is very useful when using ZIP, JAZ, LS120 Superdisk, CD-R/RW, and other drive types.
Spanning must be executed locally. If you try to span over a peer-to-peer connection (LPT, USB, TCP/IP), a disk full error message appears. However, size limiting can be used in all situations.
Norton Ghost also allows size limiting of spans when spanning volumes to ensure that no span exceeds the maximum size.
With all image files, the only constraint on the selection of the destination volume is that it must not be part of the source selection. For example, it cannot be on a source disk or partition if that disk or partition is to be included in the image.
The spanned files are named according to Microsoft application guidelines. For example:
First file: Filename.gho
Second file: Filen001.ghs
Third file: Filen002.ghs
Page 65
Image files and volume spanning
You can use the -cns switch for an alternative naming standard. For example:
First file: Image.gho
Second file: Image.001
Third file: Image.002

Spanning across multiple volumes and limiting span sizes

When you create an image file from a disk or partition, the destination drive might have insufficient space to store the image file. If Norton Ghost determines that this is the case, it alerts you and asks whether to enable spanning. Norton Ghost assumes that compression reduces the size of the image by one-third when it determines whether the image will fit. Alternatively, you can use the -span and
-split command-line switches to configure Norton Ghost to use image file size limiting.
See “Command-line switches” on page 153.
Before it saves the disk contents to the image file, Norton Ghost shows the source and destination details and offers a chance to cancel. The default is to cancel.
Once the process starts, the image file creation continues until the destination volume is full.
65Image file options
If you started spanning onto a JAZ disk and want to span a 3.0 GB drive onto JAZ disks, you can choose to continue on JAZ disks. If you want to span across different forms of media, you can select a different type of media once the first portion of the span has completed. You cannot mix CD/DVD media with other types of media, such as JAZ or hard disk.
Record where the span segments are saved and the segment file names. Norton Ghost does not record the locations and file names you selected.
Information about the partitions is stored at the start of the image file. This is updated at the end of the Ghost process, which might require you to reinsert the first disk in the span set. Norton Ghost prompts you for the first disk in the span set and for subsequent volumes when restoring from an image.

Restoring from a spanned image

The process when restoring a disk or partition from a spanned image file is the same as restoring from an unspanned image file. However, during the restoration of the spanned image file, you are prompted for the locations of the image file spans. You must know the span segment locations and file names.
Page 66
66 Image file options

Image files and tape drives

You can continue on the same form of media. For example, if you originally spanned onto a JAZ disk and want to restore a 3.0 GB drive from JAZ disks, you can replace the disk and continue from JAZ disks. Alternatively, you can restore from different media types.
Norton Ghost automatically restores spanned images without prompting if it can find the next span.
See “Adding switches to your Ghost operation” on page 108.
Image files and tape drives
The Backup, Restore, and Clone Wizards do not support tape drives. You can back up, restore, and clone using Ghost.exe. Ghost.exe support of SCSI tape drives allows the storage of a single image file on a tape. When the image is written to the tape, Ghost.exe uses no associated file system, which means that you are unable to access the tape from a drive letter as if it were another storage drive. SCSI tapes do not support spanning to multiple tapes.
When you use tape drives with Ghost.exe, you can select the tape drive as the source or destination device in the File Locator window. Each SCSI tape device is shown as MTx, where x is a number starting at 0 and increasing incrementally for each drive present. For example, the following screen shows a tape drive MT0 available for use.
For Ghost.exe to access SCSI tape drives, a DOS ASPI driver must be installed prior to use.
See “Standard boot disks” on page 76.
Page 67
Ghost.exe in its default mode performs well with most SCSI tape devices. In some situations with older SCSI tape devices and possibly with unreliable tapes, Ghost.exe may need to be configured to slow down or alter the way it uses the tape device.
See “Command-line switches” on page 153.
Note: Ghost Explorer cannot access an image stored on tape.

GoBack and Norton Ghost

If GoBack is installed on your computer, then you cannot directly create image files or restore your computer.
You must disable GoBack before you use Norton Ghost wizards.

GoBack and Ghost.exe

To run Ghost.exe with GoBack, do one of the following:
GoBack and Norton Ghost
67Image file options
Uninstall GoBack and then run Ghost.exe as usual to take an image or restore
a computer.
To take an image of your computer, in the GoBack Boot Screen, select the
option to start your computer from a floppy disk with the GoBack drivers loaded. You can then use a Ghost boot disk to start Ghost.exe and take an image file.
See the GoBack user documentation. See “Creating a backup image file” on page 97.
To restore your computer, start your computer from a floppy disk. You can
then use a Ghost boot disk to start Ghost.exe and restore your computer. See “Restoring from an image file” on page 101.
Page 68
68 Image file options

Dynamic disks in Windows 2000/XP

Dynamic disks in Windows 2000/XP
Norton Ghost supports backing up, restoring, and cloning simple or mirrored volumes on dynamic disks. Spanned, striped, and RAID-5 volumes are not supported by Norton Ghost. You can back up an image of a partition on a disk in a dynamic disk set to an image file. If you back up a disk, then all of the partitions that Ghost supports on the disk, and only those partitions, are backed up to an image file.
Note: Norton Ghost supports simple volumes in a contiguous space. If a partition is not of this type, then it is not included in the image file.
Operations that support dynamic disks are as follows:
Partition to partition
Partition to image
Disk to disk
Disk to image
Check image
Check disk
CRC32
CRC32 verify
You can restore an image of a dynamic disk only to a basic disk, not to a dynamic disk. After you have restored the image file to a basic disk, you can then use Windows 2000 Disk Manager to convert the disk to a dynamic disk.
To delete a dynamic disk, use GDisk. Use the switch gdisk /mbr /wipe to delete all partitions from the disk. This method destroys all data on the disk.
See “Reinitializing the Master Boot Record” on page 132.
You can also take a disk image of a dynamic disk if you use the image all (-ia) switch. The -ia switch performs a sector-by-sector copy of the entire disk. The disk on which the image is to be restored must be identical to the source disk in every way. This function is only useful for creating a backup. If you restore an image created using -ia onto a drive with different geometry, Windows 2000 cannot interpret the dynamic disk.
Page 69
If you restore an -ia disk image of a dynamic disk onto a SCSI hard drive and you see a Destination drive too small message, you must load the ASPI driver for the SCSI card. Without an ASPI driver, Norton Ghost does not always detect the correct size of the SCSI drive and cannot determine whether the drive is large enough to hold the image.
Note: You should not take an image all of a dynamic disk because the method is slow and the image file would be very large.

Hibernation and swap files

When Norton Ghost creates image files or clones, it does not include hibernation and swap files. These files are valid only for one Windows session, and when they are included in an image file, they make it significantly larger.
Norton Ghost implements file skipping differently for each type of file system.
FAT file systems: Files are not included on the image file or destination disk.
NTFS file systems: A file with the same name is created on the image file or
destination disk, but the contents of the file are not copied.
Hibernation and swap files
69Image file options
The following files are skipped on all file systems:
386Spart.par
Amizvsus.pmf
Dos data.sf
Ghost.dta
Hiberfil.sys
Hibrn8.dat
Hybern8
Navsysl.dat
Navsysr.dat
Pagefile.sys
Pm_hiber.bin
Save2dsk.bin
Saveto.dsk
Page 70
70 Image file options
Hibernation and swap files
Spart.par
Swapper.dat
To s h i b e r . d a t
Virtpart.dat
Win386.swp
Page 71
Chapter

Creating boot disks with the Ghost Boot Wizard

This chapter includes the following topics:
Introducing the Norton Ghost Boot Wizard
What is a Ghost boot disk
When to create a Ghost boot disk
How to use a Ghost boot disk
6
Files included on a Ghost boot disk
Creating a recovery boot disk
Opening the Ghost Boot Wizard
Creating boot disks and boot images
Selecting a template
Multicard templates and the boot disk
Adding network drivers to the Ghost Boot Wizard
Adding command-line parameters to a boot package
Providing MS-DOS
Page 72
72 Creating boot disks with the Ghost Boot Wizard

Introducing the Norton Ghost Boot Wizard

Introducing the Norton Ghost Boot Wizard
The Ghost Boot Wizard creates Ghost boot disks that let you complete various Ghost tasks when starting Norton Ghost from DOS. For any task, the Ghost Boot Wizard guides you through the different steps to select the settings and drivers that are needed to create the boot disk.

What is a Ghost boot disk

A Ghost boot disk can be created using the Ghost Boot Wizard, a utility supplied with Norton Ghost. A boot disk is a floppy disk that loads DOS and driver files to let you run Ghost.exe on your computer.
Depending upon the driver files included on your boot disk, more than one floppy disk may be required to create a boot disk set.

When to create a Ghost boot disk

If you start and run Norton Ghost from Windows, then the only boot disk you need is a recovery boot disk. If you are running Norton Ghost from Windows, then the system files and drivers required to perform the backup, restore, or clone are provided for you.
Note: If you saved your image file directly to CD or DVD, then you do not need a recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to CD or DVD.
To use Ghost.exe you must have a Ghost boot disk. The following tasks require a boot disk:
Restoring your computer with Ghost.exe after software or hardware failure
Cloning a computer that does not have Windows installed

How to use a Ghost boot disk

Once you have created the necessary boot disks, you can insert a boot disk into your computer and restart your computer. This starts the computer in DOS and starts Ghost.exe. You can then run Ghost.exe to back up, restore, and clone on your computer from DOS.
See “Starting the Norton Ghost executable” on page 93.
Page 73

Files included on a Ghost boot disk

A Ghost boot disk contains the files required to run Ghost.exe. This includes the following:
Ghost.exe
The Norton Ghost for DOS executable.
DOS system files
PC-DOS is supplied for the purpose of creating Ghost boot disks. The DOS files are installed automatically when you create the boot disk in Ghost Boot Wizard.
Any files and drivers required to access the selected hardware
This includes CD-R/RW drivers, network protocol files, or network interface card drivers.
Note: In previous versions of Norton Ghost, MSCDEX was required to read an image from a CD. This is no longer necessary in Norton Ghost 2003.
Files included on a Ghost boot disk
73Creating boot disks with the Ghost Boot Wizard

When to include MS-DOS on a boot disk

By default, Norton Ghost includes PC-DOS on a Ghost boot disk. However, some computer models may not start from a Ghost boot disk that contains PC­DOS. If your computer does not start from a Ghost boot disk, create a new Ghost boot disk from the Ghost Boot Wizard and include Windows 95/98 MS-DOS.
You must provide Windows 95/98 MS-DOS for the computer running the Ghost Boot Wizard before you create an MS-DOS Ghost boot disk.
See “Providing MS-DOS” on page 89.

Creating a recovery boot disk

When you have created your first backup image, you must create a recovery boot disk and ensure that you can start your computer and access the backup image using the boot disk.
Note: If you saved your image file directly to CD or DVD, then you do not need a recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to CD or DVD.
Page 74
74 Creating boot disks with the Ghost Boot Wizard

Opening the Ghost Boot Wizard

See Table 6-1 to determine which type of boot disk you should create as a disaster recovery disk.
Once you have created a recovery boot disk, ensure that your computer starts with the boot disk or the CD/DVD.
To test your recovery boot disk or CD/DVD
1 Turn off your computer.
2 Insert the boot disk or CD/DVD into the disk drive of your computer and
start your computer.
3 Ensure that Ghost.exe starts and that you can access your backup image file.
See “Restoring a hard disk from an image file” on page 101.
4 Remove the disk from the disk drive of your computer and restart your
computer.
Opening the Ghost Boot Wizard
The procedures in this chapter assume that you know how to open the Ghost Boot Wizard.
To open the Ghost Boot Wizard
1 On the Windows taskbar, click Start > Programs > Norton Ghost.
2 In the Ghost Basic window, click Ghost Utilities.
3 In the Ghost Advanced window, click Norton Ghost Boot Wizard.
Page 75

Creating boot disks and boot images

The processes for creating boot images and disks can include any of the following features:
Support for CD-R/RW, DVD, LPT, USB, and FireWire
Network support for TCP/IP peer-to-peer connections
Support for reading an image from a CD-ROM
Support for mapping network drives
See Table 6-1 to decide which boot disk you should make.
Table 6-1 Boot disk types
Intended use of boot disk Ghost Boot Wizard options to select
Creating boot disks and boot images
75Creating boot disks with the Ghost Boot Wizard
Local use of Norton Ghost:
Disk-to-disk clone
Partition-to-partition clone
Disk or partition backup to local
disk or partition
Disk or partition backup to local
JAZ or ZIP drive
Disk or partition restore from local
disk or partition
Disk or partition restore from local
JAZ or ZIP drive
Clone, back up, or restore over peer-
to-peer connection between two computers using LPT or USB cable.
Clone, back up, or restore over TCP/
IP peer-to-peer connection with network support between two computers
Back up a computer directly to an
image file on a CD-ROM on a CD writer supported by Norton Ghost.
Restore a computer from an image
file on a CD-ROM on a CD-R/RW drive supported by Norton Ghost. See “Image files and CD/DVD
writers” on page 112.
You can use either of the following options:
Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
Peer-to-Peer Network Boot Disk
See “Boot disks with network support” on page 79.
Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
Peer-to-Peer Network Boot Disk
See “Boot disks with network support” on page 79.
Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
Page 76
76 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
Table 6-1 Boot disk types
Intended use of boot disk Ghost Boot Wizard options to select
Back up a computer directly to an
image file on a DVD on a DVD writer supported by Norton Ghost.
Restore a computer from an image
file on a DVD on a DVD drive supported by Norton Ghost.
Restore a computer from a Ghost
image file on a CD-ROM on a CD­R/RW drive not supported by Norton Ghost. The image file was not stored on the CD-ROM using Norton Ghost. Contains generic CD-ROM drivers.
Access files other than a Ghost image
file on a CD-ROM.
Map a drive on a workstation to a
shared resource on a server and use Norton Ghost to clone, back up, or restore.

Standard boot disks

Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
CD/DVD Startup Disk with Ghost
See “Boot disks with CD-ROM and DVD
support” on page 81.
CD/DVD Startup Disk with Ghost
See “Boot disks with CD-ROM and DVD
support” on page 81.
Drive Mapping Boot Disk
See “Boot disks with drive mapping network
support” on page 82.
The Ghost Boot Wizard creates a boot disk that does any one or a combination of the following:
Runs Ghost.exe for local operations.
Lets you write Ghost images directly to a CD-R/RW on a CD writer
supported by Norton Ghost. See “Image files and CD/DVD writers” on page 112.
Lets you write Ghost images directly to a DVD on a DVD writer supported
by Norton Ghost.
Page 77
Creating boot disks and boot images
Runs Ghost.exe on two computers connected by either an LPT or USB cable.
The default mode for an LPT connection is ECP/EPP High Speed. If you are having problems with your LPT connection, set the mode to Bidirectional 8bit or Bidirectional 4bit. The next time that you create a boot disk, the mode is reset to the default, ECP/EPP High Speed.
If you have multiple parallel ports and want to connect using a port other than the default LPT1, use the LPT port option to specify the port into which your cable is plugged.
Lets you use Ghost.exe to back up to or restore from an external device
connected by USB or FireWire.
To create a boot disk to run Ghost.exe, or with support for LPT, USB, or FireWire cables
1 In the Ghost Boot Wizard window, click Standard Ghost Boot Disk.
2 Click Next.
3 Do one or more of the following:
Check USB support to add support for USB peer-to-peer to the boot
disk.
Click Advanced to set the USB peer-to-peer drivers.
See “Setting the USB peer-to-peer drivers” on page 79.
Check LPT support to add support for LPT peer-to-peer to the boot
disk.
Click Advanced to change the LPT mode or port.
Click No USB support to exclude support for USB external devices.
Click USB 1.1 support to add support for USB 1.1 external devices to the
boot disk. If any of your USB cards/chipsets are USB 1.1, then you must select this
option.
Click USB 2.0 support to add support for USB 2.0 external devices to the
boot disk. If any of your USB cards/chipsets are USB 1.1, then do not select this
option. Select the USB 1.1 support option.
Click Firewire Support to add support for FireWire external devices to
the boot disk.
77Creating boot disks with the Ghost Boot Wizard
Page 78
78 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
Click Assign DOS drive letters to assign a DOS drive letter to a USB or
FireWire external device.
Click Include Adaptec ASPI drivers to add Adaptec ASPI drivers to the
boot disk. These drivers are required to write an image directly to a SCSI CD-R
that is supported by Norton Ghost.
4 Click Next.
5 Select one of the following:
Use PC-DOS: Includes PC-DOS on the boot disk.
Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
6 Click Next.
7 In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Norton Ghost. The default path to the Norton Ghost executable appears in the Ghost.exe
field.
8 In the Parameters field, type any required command-line parameters.
See “Adding command-line parameters to a boot package” on page 88.
9 Click Next.
10 In the Floppy Disk Drive field, select the appropriate drive letter.
11 In the Number of disks to create field, select the number of disks that you
want to create.
12 Ensure that Format disk(s) first is checked to format the disks before disk
creation. Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not bootable.
13 Ensure that Quick Format is checked to perform a quick format.
14 Click Next.
15 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 79
Setting the USB peer-to-peer drivers
You can select USB peer-to-peer drivers to include on the boot disk. In most cases, you do not need to alter the driver default. However, if you have problems connecting using peer-to-peer, then select the other options and retry the task.
To select USB peer-to-peer drivers
1 Select one of the following:
All drivers: Includes all USB peer-to-peer drivers on the boot disk.
UHCI driver: Includes only UHCI drivers on the boot disk.
OHCI driver: Includes only OHCI drivers on the boot disk.
2 Click OK.

Boot disks with network support

The Ghost Boot Wizard helps you create boot disks that provide network support for TCP/IP peer-to-peer connections. You can use these boot disks to clone, restore, or back up using Norton Ghost on computers that are connected over a TCP/IP peer-to-peer connection.
Creating boot disks and boot images
79Creating boot disks with the Ghost Boot Wizard
Before you start this process, you need to know the types of network cards that are installed on your client computers. Unless you use the multicard template, you must create a boot disk for each network card.
To create a boot disk with network support
1 In the Ghost Boot Wizard window, click Peer-to-Peer Network Boot Disk.
2 Click Next.
3 Select the network driver for the make and model of the network card
installed on the client computer. See “Selecting a template” on page 84. If the correct driver is not in the list, add the driver. See “Adding network drivers to the Ghost Boot Wizard” on page 86. You can add more than one driver to the boot package. See “Multicard templates and the boot disk” on page 85.
4 Click Next.
Page 80
80 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
5 Select one of the following:
Use PC-DOS: Includes PC-DOS on the boot disk.
Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
6 In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Ghost. The default path to the Norton Ghost executable appears in the Ghost.exe
field.
7 In the Parameters field, type any required command-line parameters.
See “Adding command-line parameters to a boot package” on page 88.
8 Click Next.
9 Do one of the following:
Click DHCP will assign the IP settings if your network contains a
DHCP server.
Click The IP settings will be statically defined and complete the fields
below this option if your network does not contain a DHCP server. If you create more than one boot disk, then the static IP address
incrementally increases as each boot disk is created.
10 Click Next.
11 In the Floppy Disk Drive field, select the appropriate drive letter.
12 In the Number of disks to create field, select the number of disks that you
want to create.
13 Ensure that Format disk(s) first is checked to format the disks before disk
creation. Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not bootable.
14 Ensure that Quick Format is checked to perform a quick format.
15 Click Next.
16 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 81

Boot disks with CD-ROM and DVD support

A boot disk with CD-ROM and DVD support lets you access images and other files stored on CD-R/RW and DVD drives that are not supported by Norton Ghost.
This kind of disk also contains the DOS system files and Norton Ghost.
To create a boot disk with CD-ROM and DVD support
1 In the Ghost Boot Wizard window, click CD/DVD Startup Disk with Ghost.
2 Click Next.
3 Select one of the following:
Use PC-DOS: Includes PC-DOS on the boot disk.
Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
4 Click Next.
5 In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Ghost. The default path to the Ghost executable appears in the Ghost.exe field.
Creating boot disks and boot images
81Creating boot disks with the Ghost Boot Wizard
6 In the Parameters field, type any required command-line parameters.
See “Adding command-line parameters to a boot package” on page 88.
7 Click Next.
8 In the Floppy Disk Drive field, select the appropriate drive letter.
9 In the Number of disks to create field, select the number of disks that you
want to create.
10 Ensure that Format disk(s) first is checked to format the disks before disk
creation. Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not bootable.
11 Ensure that Quick Format is checked to perform a quick format.
12 Click Next.
13 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 82
82 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images

Boot disks with drive mapping network support

When your computers need to access a network drive, use the Ghost Boot Wizard to create boot disks that map a drive letter to a shared resource on a network server. This lets you use the local option in Ghost.exe to access a network drive.
To create a boot disk that supports mapping network drives
1 In the Ghost Boot Wizard window, click Drive Mapping Boot Disk.
2 Click Next.
3 Select the network driver for the particular make and model of the network
card installed on the computer. See “Selecting a template” on page 84. If the correct driver is not in the list, add the driver. See “Adding network drivers to the Ghost Boot Wizard” on page 86. You can add more than one driver to the boot package. See “Multicard templates and the boot disk” on page 85.
4 Click Next.
5 Select one of the following:
Use PC-DOS: Includes PC-DOS on the boot disk.
Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
6 Click Get MS Client and browse to the MS-DOS Client files to include the
Microsoft Client files if you are using MS-DOS. If you are using MS-DOS, you must include the Microsoft DOS Client files.
You must install the files on the Ghost Boot Wizard computer before you can include them in the boot package.
See “Installing MS-DOS Client files” on page 49.
7 Click Next.
8 In the Computer Name field, type the name of the client computer.
This specifies the name of the computer after it starts from the floppy disk and does not have to be the same name given to the computer in Windows. If you create more than one disk, a number is added to the computer name so that the names for subsequent disks are unique.
9 In the User Name field, type the user name that the boot disk will use to log
on to the network. This user must exist on the network and have sufficient access rights to the
files and directories that you want to use.
Page 83
Creating boot disks and boot images
10 In the Domain field, type the domain to which the user belongs.
11 In the Drive Letter field, select a drive letter to access a network share through
a mapped drive. Select a drive letter greater than any existing drive letter.
12 If you want to prevent the boot package from mapping a drive when the
computer starts, click None. In this case, map a drive from the DOS prompt after the computer has
started.
13 In the Maps To field, type the complete UNC path to the network share.
For example, to access a shared folder named Ghost on a computer named Boss, the UNC path is \\Boss\Ghost.
14 Click Next.
15 Do one of the following:
Click DHCP will assign the IP settings if your network contains a
DHCP server.
Click The IP settings will be statically defined and complete the fields
below this option if your network does not contain a DHCP server. Your network administrator can provide the values for these fields.
83Creating boot disks with the Ghost Boot Wizard
16 Click Next.
17 In the Floppy Disk Drive field, select the appropriate drive letter.
18 In the Number of disks to create field, select the number of disks that you
want to create.
19 Ensure that Format disk(s) first is checked to format the disks before disk
creation. Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not bootable.
20 Ensure that Quick Format is checked to perform a quick format.
21 Click Next.
22 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 84
84 Creating boot disks with the Ghost Boot Wizard

Selecting a template

Selecting a template
For the boot disk to work correctly, it is important that you select the correct template. When you create a boot disk for client computers, the template that you select must be suitable for the network cards installed in the computers that are to start from the package.
To determine which network interface card is installed in a computer, find the name of the driver from Network Properties within Windows. This must be done on the client computer for which you are preparing the boot disk.
To determine which network interface card is installed
To determine which network interface card is installed on a Windows 98 computer
1 On the Windows taskbar, click Start > Settings > Control Panel.
2 Double-click System.
3 Click Device Manager.
4 Expand Network Adapter.
The make and model of the installed network interface card are listed.
To determine which network interface card is installed on a Windows NT 4 computer
1 On the Windows taskbar, click Start > Settings > Control Panel.
2 Double-click Network.
The make and model of the installed network interface card are listed on the Adapters tab.
To determine which network interface card is installed on a Windows 2000 computer
1 On the Windows taskbar, click Start > Settings > Control Panel.
2 Double-click System.
3 On the Hardware tab, click Device Manager.
4 Expand Network adapters.
The make and model of the installed network interface card are listed.
The name of the network interface card as shown in Windows may not exactly match the name of the correct template in the Ghost Boot Wizard.
Page 85

Multicard templates and the boot disk

For example, Windows may list the card as 3Com Fast EtherLink XL 10/100Mb TX Ethernet NIC (3C905B-TX). In this case the text in paraenthesis is the actual model number of the card, which indicates that the Ghost Boot Wizard template named 3COM 3C90X (which works for all 3C90- cards) is the correct template.
In some cases you may have a choice between an NDIS2 driver and a packet driver version of the same template. Both templates should work, but you may find that one gives better performance. Experiment to see which one works better.
It is possible that there is no existing template in the Ghost Boot Wizard that is suitable for the network interface card installed in your computer. In this case, obtain the DOS drivers for the network interface card either from the disk supplied with the card or from the manufacturer's Web site, and add a new template to the Ghost Boot Wizard.
See “Adding network drivers to the Ghost Boot Wizard” on page 86.
If you have different network interface cards installed in client computers, then you may be able to use the multicard template to create a single boot package that works on each of your computers without modification.
85Creating boot disks with the Ghost Boot Wizard
Multicard templates and the boot disk
You can use multicard templates to create a boot disk package containing several NDIS2 drivers. When the computer starts from the boot disk, a special multicard driver checks the computer’s hardware to see if any of the NDIS2 drivers can be used to access the installed network card.
Multicard templates are useful because several makes and models of network cards are often used in a single LAN. You can create a single boot disk for use with all of your computers without modification.
Refer to the Software License Agreement for use restrictions.
The Network Interface Card window is available when creating a
Network Boot D
To create a multicard template
1 In the Network Interface Card window, click Multicard Template.
2 Click Next.
3 Select the required drivers from the list of NDIS2 drivers.
Select no more than four or five drivers, as space is limited on a floppy disk.
4 Click Next to continue creating the boot disk.
isk or a Drive Mapping Boot Disk.
Peer-to-Peer
Page 86
86 Creating boot disks with the Ghost Boot Wizard

Adding network drivers to the Ghost Boot Wizard

Adding network drivers to the Ghost Boot Wizard
The Ghost Boot Wizard includes drivers for over 130 network interface cards. If your driver is not in the list, you can add it to the wizard so that it is set up the next time that you need it.
The Network Interface Card window is available when creating a Peer-to-Peer Network Boot Disk or a Drive Mapping Boot Disk.
To begin adding a network driver to the Ghost Boot Wizard
1 In the Network Interface Card window, click Add.
2 Select one of the following:
Packet Driver
NDIS2 Driver
Many manufacturers ship both drivers with their network cards so you have a choice of which one to use.
3 Click OK to continue creating the boot disk.

Adding packet drivers to the Ghost Boot Wizard

Packet drivers are usually DOS executables (with .com or .exe file extensions) that load from the Autoexec.bat file before Norton Ghost loads. Norton Ghost communicates directly with the packet driver to use the services provided by the network card.
To add a packet driver to the Ghost Boot Wizard
1 In the Template Properties window, on the Packet Driver tab, in the Driver
Executable field, click Browse to locate the packet driver so that the Ghost Boot Wizard can copy the file to the current template.
Packet drivers are usually included on the driver disk supplied with the network card. If you are installing the packet driver from the original disks that came with your network interface card, the packet driver should be in a directory called Packet or Pktdrv.
2 In the Parameters field, type the command-line parameters if the network
card requires them. These parameters vary from driver to driver and are usually optional with
plug-and-play network cards. Consult the documentation that came with the network card. This is often in the form of a Readme.txt file in the same directory as the driver itself.
Page 87
Adding network drivers to the Ghost Boot Wizard
3 Click Select Automatically to let Ghost determine the best multicasting
mode based on the information in the packet driver. If the Select Automatically mode does not work, try Receive Mode 5. If that
does not work, try Receive Mode 6.

Adding NDIS2 drivers to the Ghost Boot Wizard

NDIS2 drivers work with the Microsoft Network Client. NDIS2 drivers are DOS drivers that load from the DOS Config.sys file.
To add an NDIS2 driver to the Ghost Boot Wizard
1 In the Template Properties window, on the NDIS Driver tab, click Setup.
2 Locate the NDIS2 driver.
In many cases Ghost can automatically determine the other parameters for your network.When locating the directory that contains the driver, look for a folder named Ndis or Ndis2. If you have a choice between DOS and OS2 folders, select DOS.
3 Click OK.
If the setup fails to complete the driver properties, then complete the following fields manually:
Filename: Type the DOS file name for the NDIS2 driver.
Driver Name: Type the internal name of the driver.
The internal name of the driver is used when generating the Protocol.ini configuration file and must always end with a $ character. Read the sample Protocol.ini file in the same directory as the driver itself to find the driver name.
Parameters: Type the parameters for the Protocol.ini configuration file.
If you use Setup to automatically fill in this page, you will see the parameters that you need to adjust. For the majority of plug-and-play cards, all of the parameters are optional, so you can either accept the defaults or leave this field empty.
87Creating boot disks with the Ghost Boot Wizard
4 Click OK.
When you have created the template that you require, you can continue creating a boot disk.
Page 88
88 Creating boot disks with the Ghost Boot Wizard

Adding command-line parameters to a boot package

Customizing the template

You may require additional drivers and programs in order to use the network device attached to your computer. For example, many USB network devices must load an extra driver for the USB port before the driver for the network device.
You can add files to the template and customize the Autoexec.bat and Config.sys files of the resulting boot disk. Usually these are either DOS drivers or executable programs, but you can add any type of file. Files added to the template appear in the list to the right of the button.
If this template is used as a multicard template, then any additional files or modifications are overridden by its settings.
The Template Properties window is available when creating a
Boot Disk or a Drive Mapping Boot Disk.
To modify a template
1 In the Template Properties window, on the Advanced tab, click New.
2 Click Delete to delete the selected file from the list.
3 In the Autoexec.bat field, type any additional Autoexec.bat entries for the
driver. The entries appear before any network-related commands, such as
Netbind.com or the packet driver executable.
4 In the Config.sys field, type any additional Config.sys entries for the driver.
The entries appear before any driver-related devices to ensure that the enabling drivers load before the main network device drivers specified on the network driver page.
Peer-to-Peer Network
Adding command-line parameters to a boot package
You can add command-line parameters to a boot package to instruct Norton Ghost to perform certain actions.
See “Command-line switches” on page 153.
Command-line parameters can be added while creating a Standard Boot Disk, a Peer-to-Peer Network Boot Disk, or a CD/DVD Startup Disk with Ghost boot disk in the Ghost executable location window.
Page 89
In the following example, the parameters instruct Norton Ghost to back up your main disk to an image on another drive.
-clone,mode=create,src=1,dst=d:\backups\maindrv.gho
Table 6-2 Command parameters
Clone Parameters Description
mode=create Creates an image file
src=1 Specifies drive 1 as the source drive
dst=D:\Backups\Maindrv.gho Saves the image to the file D:\Backups\Maindrv.gho

Providing MS-DOS

The Ghost Boot Wizard includes PC-DOS on boot disks. However, a boot disk that includes PC-DOS might not start all computers. When you create a boot disk, you can include MS-DOS instead of PC-DOS.
If you use MS-DOS, then you must provide MS-DOS files on the computer on which you are creating the boot disk. Using an MS-DOS system disk that was formatted on a Windows 95/98 computer, you can install the MS-DOS files during the creation of the boot disk.
Providing MS-DOS
89Creating boot disks with the Ghost Boot Wizard
To install MS-DOS on your computer
To create an MS-DOS system disk on a Windows 95/98 computer
1 Insert a blank floppy disk into drive A of a Windows 95/98 computer.
2 Click Start > Program Files > Windows Explorer.
3 Right-click drive A.
Warning: Do not right-click drive C.
4 Click Format.
5 Check Copy System Files.
6 Click Start to format the disk.
You can install or uninstall MS-DOS while you are creating a boot disk.
Page 90
90 Creating boot disks with the Ghost Boot Wizard
Providing MS-DOS
To install MS-DOS on your computer
1 Insert the formatted floppy disk into drive A of the computer on which the
Ghost Boot Wizard is running.
2 In the DOS Version window, click Get MS-DOS.
3 Click OK.
To uninstall MS-DOS from your computer
1 In the DOS Version window, click Remove MS-DOS.
2 Click OK.
Page 91
Chapter

Backing up, restoring, and cloning from DOS

This chapter includes the following topics:
An overview of using Ghost.exe
Starting the Norton Ghost executable
Navigating without a mouse
Establishing a peer-to-peer connection with Ghost.exe
7
Creating a backup image file
Restoring from an image file
Cloning disks and partitions
Verifying image integrity
Adding switches to your Ghost operation
Page 92
92 Backing up, restoring, and cloning from DOS

An overview of using Ghost.exe

An overview of using Ghost.exe
You can use the Norton Ghost executable, Ghost.exe, to clone a computer, create a backup, and restore a computer. You can add switches to the cloning task in the Options window or as parameters to Ghost.exe. Ghost.exe is run within DOS.
The following is an overview of the process of using Ghost.exe.
To use Norton Ghost
1 Start Ghost.exe.
Add command-line switches, if necessary. See “Command-line switches” on page 153.
2 If you want to establish a peer-to-peer connection, then set up the
connection.
3 Select the Norton Ghost operation:
Disk or partition to image file
Disk or partition from image file
Disk to disk
Partition to partition
4 Do one of the following:
Select the source hard disk or partitions.
Select the image file.
5 Do one of the following:
Select the destination hard disk or partition.
Select the image file.
Make sure that you select the correct destination to overwrite. The destination disk is completely overwritten with no chance of recovering any data.
6 Complete the Ghost operation.
Note: On the Ghost.exe main menu, the option of GhostCast is not supported.
The GhostCast functionality is available only with Symantec Ghost Enterprise Edition. If you require GhostCast functionality, see “Service and support
solutions” on page 209.
Page 93

Starting the Norton Ghost executable

Starting the Norton Ghost executable
The Norton Ghost executable is a DOS-based application and runs in DOS mode outside of Windows. If you run the Norton Ghost executable (Ghost.exe) within Windows 95/98/Me, note the following:
Files may be in an open or changing state. If these files are cloned or backed
up, the resulting destination files are left in an inconsistent state.
The partition on which Windows is installed must not be overwritten.
If you overwrite a disk or partition, the computer must be restarted.
Ghost.exe does not automatically restart the system.
Hard disk sizes may appear smaller than their actual sizes. The Norton Ghost
executable can only access the shown destination size. The remaining space is not used.
The Norton Ghost executable fails if you try to overwrite any of the
following:
Windows swap files
Registry files
Open files
93Backing up, restoring, and cloning from DOS
You cannot run Ghost.exe within Windows NT, Windows 2000/XP, Linux, OS/2, or other non-DOS operating systems. To run Ghost.exe on a computer that runs a non-DOS operating system, start the computer in DOS using a Ghost boot disk.
Page 94
94 Backing up, restoring, and cloning from DOS

Navigating without a mouse

To start the Norton Ghost executable
Do one of the following:
Insert a Ghost boot disk into the floppy disk drive of your computer and
start your computer. See “Creating boot disks and boot images” on page 75.
For Windows 98 computers, start your computer in DOS. At the DOS
prompt, type:
C:> \progra~1\symantec \Norton~1\ghost.exe
Running Norton Ghost in DOS may require additional DOS drivers to let Norton Ghost access and use some hardware. If you cannot access some hardware, such as a CD-R/RW drive, then create a boot disk that contains the drivers to access the hardware in DOS.
See “Creating boot disks and boot images” on page 75.
Use the Run Ghost Interactively Wizard.
See “Starting Ghost.exe” on page 59.

Marking your disks

The first time that you run Ghost.exe on your computer, the License agreement warning dialog box appears. When you click OK, Norton Ghost marks all hard disks to ensure that you do not see this message again.
To mark your disks
In the License agreement warning dialog box, click OK to mark your hard
disks.
Navigating without a mouse
If you have mouse drivers loaded, then you can use the mouse to navigate in Norton Ghost. You can also use the keyboard.
Use arrow keys to navigate the menu.
Press Tab to move from button to button.
Press Enter to activate the selected button.
Press Enter to select an item in a list.
Page 95

Establishing a peer-to-peer connection with Ghost.exe

Establishing a peer-to-peer connection with Ghost.exe
If you are using an LPT, USB, or TCP peer-to-peer connection, then you must set up the connection between your computers before a clone, backup or restore operation.
The computers must be physically connected using one of the following:
LPT: A parallel connection cable
USB: A USB 1.1 cable
TCP peer-to-peer: A network connection
See “TCP/IP connections” on page 178.
In a peer-to-peer operation, one computer is designated the master computer, and the other is designated the slave computer. This table describes the possible Norton Ghost processes and the master/slave relationships that exist between two computers.
Table 7-1 Master and slave computers
95Backing up, restoring, and cloning from DOS
Action Master Slave
Disk-to-disk clone Computer containing source
disk
Back up disk to image file
Restore disk from image file
Partition-to-partition clone
Back up partition to image file
Restore partition from image file
Computer containing source disk
Computer containing destination disk
Computer containing source partition
Computer containing source partition
Computer containing destination partition
Computer containing destination disk
Computer receiving destination image file
Computer containing source image file
Computer containing destination partition
Computer receiving destination image file
Computer containing source image file
Select which computer is the master (the computer from which you control the connection), and which is the slave (the other computer participating in the connection). All operator input must occur on the master computer.
Page 96
96 Backing up, restoring, and cloning from DOS
Establishing a peer-to-peer connection with Ghost.exe
You must have two Ghost boot disks with which to start your computers. Create the boot disks using the Ghost Boot Wizard.
Note: Ensure that both boot disks are created with the same version of Norton Ghost. You cannot use one boot disk created in Norton Ghost 2002 and one boot disk created in Norton Ghost 2003 in the same task.
See “Creating boot disks and boot images” on page 75.
To connect two computers peer-to-peer
1 Insert a Ghost Boot Disk into the floppy disk drive of each computer.
2 Restart each computer.
3 On the slave computer, on the main menu, do one of the following:
Click Peer to peer > USB > Slave to start the computer as the slave
computer in a USB connection.
Click Peer to peer > LPT > Slave to start the computer as the slave
computer in an LPT connection.
Click Peer to peer > TCP/IP > Slave to start the computer as the slave
computer in a TCP/IP connection. Take note of the IP address displayed in the Slave Connect dialog box.
4 On the master computer, on the main menu, do one of the following:
Click Peer to peer > USB > Master to start the computer as the master
computer in a USB connection.
Click Peer to peer > LPT > Master to start the computer as the master
computer in an LPT connection.
Click Peer to peer > TCP/IP > Master to start the computer as the
master computer in a TCP/IP connection and type the IP address displayed on the slave computer.
Page 97

Creating a backup image file

You can create a backup of either of the following:
A hard disk
A partition
The backup is saved as an image file, which you can store on one of the following:
A second hard disk
A second partition on your hard disk (partition backup only)
LS120 Superdisk, JAZ, or ZIP disk
CD-R/RW or DVD-R/RW
See “Saving an image file directly to a CD-R/RW or DVD-R/RW drive” on page 113.
Ta p e
Locally mapped network file server
Another computer using peer-to-peer
Creating a backup image file
97Backing up, restoring, and cloning from DOS
Compression may affect the speed of operations. When you select a compression level, Norton Ghost estimates the amount of space available for the destination image file. If there is insufficient space, Norton Ghost prompts you to enable spanning of image files.

Backing up a hard disk to an image file

When you back up a hard disk, a copy of the entire disk is saved as an image file.
Page 98
98 Backing up, restoring, and cloning from DOS
Creating a backup image file
To back up a disk to an image file
1 On the Norton Ghost main menu, do one of the following:
Local: Click Local > Disk > To Im ag e .
Peer-to-peer connection: Click Disk > To I ma g e.
2 In the Source Drive dialog box, select the source disk.
The Source Drive dialog box shows details of every disk that Norton Ghost finds on the local computer.
3 In the File Locator dialog box, type the image file destination and name.
4 In the Image file description dialog box, type a description of the image file.
You can modify this description in Ghost Explorer when the image file has been created.
5 Click Save.
6 In the Compress Image? dialog box, do one of the following:
Click No for no compression (high speed).
Click Fast for low compression (medium speed).
Click High for high compression (slower speed).
See “Image files and compression” on page 62.
7 When the “Proceed with Image File Creation?” question appears, check the
details and ensure that the correct options are selected.
Page 99
8 Do one of the following:
Click Ye s to proceed with the image file creation.
The system performs an integrity check of the file structure on the source disk and then copies the source disk to the destination image file. If you need to abort the process, press Ctrl+C, but be aware that this leaves the destination image file in an unknown state.
Click No to return to the menu.
9 If spanning is enabled and required, click Ye s and type the location of the
next span of the image file. See “Image files and volume spanning” on page 63.
Note: If the image file reaches the size of 2 GB and there is not enough space to continue, you are prompted to insert the next media to continue.
Verify the integrity of the image file when it has been created.
See “Verifying image integrity” on page 107.

Backing up a partition to an image file

Creating a backup image file
99Backing up, restoring, and cloning from DOS
You can create an image file from one or more partitions to use as a backup or to clone onto another partition or disk.
To back up a partition to an image file
1 On the main menu, do one of the following:
Local: Click Local > Partition > To Ima ge.
Peer-to-peer connection: Click Partition > To I ma g e.
2 In the Source Drive dialog box, select the source drive.
The Source Drive dialog box contains the details of every disk that Norton Ghost finds on the local computer.
3 In the Source Partition dialog box, select the source partitions to include in
the destination image file. The Source Partition dialog box contains the details of all the partitions on
the selected source disk. Multiple partitions may be selected.
4 Click OK.
5 In the File Locator dialog box, select the image file destination and name.
Page 100
100 Backing up, restoring, and cloning from DOS
Creating a backup image file
6 In the Image file description dialog box, type a description of the image file.
You can modify this description in Ghost Explorer when the image file has been created.
7 Click Save.
8 In the Compress Image? dialog box, do one of the following:
Click No for no compression (high speed).
Click Fast for low compression (medium speed).
Click High for high compression (slower speed).
See “Image files and compression” on page 62.
9 In the Proceed with partition image creation? dialog box, ensure that the
correct options are selected.
10 Do one of the following:
Click Ye s to proceed with the image file creation.
The system performs a quick integrity check of the file structure on the source partitions and then copies the source partitions to the destination image file. If you need to abort the process, press Ctrl+C, but be aware that this leaves the destination image file in an unknown state.
Click No to return to the menu.
11 If spanning is enabled and required, click Ye s and type the location of the
next span of the image file. See “Image files and volume spanning” on page 63.
Note: If the image file reaches the size of 2 GB and there is not enough space to continue, you are prompted to insert the next media to continue.
Verify the integrity of the image file when it has been created.
See “Verifying image integrity” on page 107.
Loading...