Symantec 10024709 User Manual

Norton Ghost™ User’s Guide

Norton Ghost™ User’s Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 6.8
PN: 10024709
Copyright ©1998-2002 Symantec Corporation
All Rights Reserved.
Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Trademarks
Symantec, the Symantec logo, Norton Ghost, Ghost Walker, Ghost Explorer, and GDisk are trademarks of Symantec Corporation.
Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. IBM and PC-DOS are registered trademarks of International Business Machines Corporation. 3Com and EtherLink are registered trademarks of 3Com Corporation. Compaq is a registered trademark of Compaq Corporation. SuperDisk is a trademark of Imation Enterprises Corporation. Zip and Jaz are registered trademarks of Iomega Corporation. FireWire is a trademark of Apple Computer, Inc., registered in the U.S. and other countries.
Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.
Printed in the United States of America.
10987654321
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE "AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK ON THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED WITHIN SIXTY (60) DAYS OF PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
1. LICENSE:
The software which accompanies this license (collectively the "Software") is the property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, You will have certain rights to use the Software after Your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that Symantec may furnish to You. Except as may be modified by a Symantec license certificate, license coupon, or license key (each a "License Module") which accompanies, precedes, or follows this license, Your rights and obligations with respect to the use of this Software are as follows:
YOU MAY:
A. use one copy of the Software on a single computer. If a License Module accompanies, precedes, or follows this license, You may make that number of copies of the Software licensed to You by Symantec as provided in Your License Module. Your License Module shall constitute proof of Your right to make such copies. B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for archival purposes; C. use the Software on a network, provided that You have a licensed copy of the Software for each computer that can access the Software over that network; D. after written notice to Symantec, transfer the Software on a permanent basis to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this license; and E. use the Software in accordance with any additional permitted uses set forth in Section 9, below.
YOU MAY NOT:
A. copy the printed documentation which accompanies the Software; B. sublicense, rent or lease any portion of the Software; reverse
engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software, or create derivative works from the Software;
C. use a previous version or copy of the Software after You have received a disk replacement set or an upgraded version. Upon upgrading the Software, all copies of the prior version must be destroyed;
D. use a later version of the Software than is provided herewith unless You have purchased upgrade insurance or have otherwise separately acquired the right to use such later version;
E. use, if You received the software distributed on media containing multiple Symantec products, any Symantec software on the media for which You have not received a permission in a License Module; F. use the Software in any manner not authorized by this license; nor G. use the Software in any manner that contradicts any additional restrictions set forth in Section 9, below.
2. CONTENT UPDATES:
Certain Symantec software products utilize content that is updated from time to time (antivirus products utilize updated virus definitions; content filtering products utilize updated URL lists; firewall products utilize updated firewall rules; vulnerability assessment products utilize updated vulnerability data, etc.; collectively, these are referred to as "Content Updates"). You may obtain Content Updates for any period for which You have purchased a subscription for Content Updates for the Software (including any subscription included with Your original purchase of the Software), purchased upgrade insurance for the Software, entered into a maintenance agreement that includes Content Updates, or otherwise separately acquired the right to obtain Content Updates. This license does not otherwise permit You to obtain and use Content Updates.
3. SIXTY (60) DAY MONEY BACK GUARANTEE:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please contact Symantec Customer Service, for a refund of the money You paid for the Software (less shipping, handling, and any applicable taxes) at any time during the sixty (60) day period following the date of purchase.
.4. LIMITED WARRANTY:
Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.
5. DISCLAIMER OF DAMAGES:
SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT
OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS' LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
6. U.S. GOVERNMENT RESTRICTED RIGHTS:
RESTRICTED RIGHTS LEGEND. All Symantec products and documentation are commercial in nature. The software and software documentation are "Commercial Items", as that term is defined in 48 C.F.R. section 2.101, consisting of "Commercial Computer Software" and "Commercial Computer Software Documentation", as such terms are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R. section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and 48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R. section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section
227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other relevant sections of the Code of Federal Regulations, as applicable, Symantec's computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users, according to the terms and conditions contained in this license agreement. Manufacturer is Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA
95014.
7. EXPORT REGULATION:
Export, re-export of this Software is governed by the laws and regulations of the United States and import laws and regulations of certain other countries. Export or re-export of Software to any entity on the Denied Parties List and other lists promulgated by various agencies of the United States Federal Government is strictly prohibited.
8. GENERAL:
If You are located in North America or Latin America, this Agreement will be governed by the laws of the State of California, United States of America. Otherwise, this Agreement will be governed by the laws of England. This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment or similar communications between the parties. This Agreement may only be modified by a License Module or by a written document which has been signed by both You and Symantec. This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive termination. Should You have any questions concerning this Agreement, or if You desire to contact Symantec for any reason, please write: (i) Symantec Customer Service, 555 International Way, Springfield, OR 97477, USA, or (ii) Symantec Customer Service Center, PO BOX 5689, Dublin 15, Ireland.
9. ADDITIONAL USES AND RESTRICTIONS:
Notwithstanding any of the terms and conditions contained in the Symantec Corporation Software License Agreement, the following additional terms apply to the product you have purchased. You may:
(i) use the Software on one computer to clone, or apply an image of, a hard drive on that computer, or a portion thereof, to another hard drive on the same computer, a replacement computer, secondary
media, or network drive. If a License Module accompanies, precedes, or follows this license, you may make and use that number of copies of the Software licensed to you by Symantec as provided in your License Module on an equal number of individual computers pursuant to the terms of this license. Your License Module shall constitute proof of your right to make and use such copies;
(ii) use the Software on that same computer to create an image file of a hard drive on that computer and store the image file on removable media for disaster recovery purposes; (iii) use the Software to create a boot disk as described in the documentation for reapplying the hard drive image that was created for disaster recovery purposes to the hard drive on that same computer; and (iv) use the Software to clone a hard drive from that same computer to a replacement computer, in the manner described in the software documentation, and to use the Software on the replacement computer provided that the Software has been removed from the original computer. You may not use the Software commercially or non-commercially for the purpose of creating multiple computers or hard drives not connected to the original computer, with similar or identical configurations to that of the original computer or hard drive.
Chapter 1 About Norton Ghost
Introducing Norton Ghost ............................................................................. 14
What’s new in Norton Ghost 2003 ................................................................14
How Norton Ghost works .............................................................................. 15
Virtual Partition ......................................................................................15
Hardware restrictions .............................................................................. 16
Preparing for an emergency .................................................................... 16
Norton Ghost components ............................................................................17
Norton Ghost wizards ............................................................................. 17
Norton Ghost executable ........................................................................ 21
Ghost Boot Wizard .................................................................................. 22
Ghost Explorer ......................................................................................... 22
GDisk ....................................................................................................... 23
Ghost Walker ........................................................................................... 24

Contents

Chapter 2 Installing Norton Ghost
Minimum system requirements ..................................................................... 26
Ghost.exe ................................................................................................. 26
CD and DVD writing .............................................................................. 26
Supported backup media ........................................................................26
File systems supported for backup, restore, and cloning tasks ............. 27
Disaster recovery requirements .............................................................. 27
Installing Norton Ghost .................................................................................27
Installing Norton Ghost if purchased with Norton
SystemWorks Pro ............................................................................. 28
Installing Norton Ghost .......................................................................... 29
If the opening screen does not appear .................................................... 29
Registering Norton Ghost ....................................................................... 29
Updating Norton Ghost .................................................................................31
Uninstalling Norton Ghost ............................................................................ 31
Chapter 3 Backing up, restoring, and cloning from Norton Ghost
6 Contents
When to use Norton Ghost in Windows .......................................................34
Starting Norton Ghost in Windows ...............................................................34
Starting Norton Ghost from the tray icon ..............................................35
Creating a backup image file ...........................................................................36
Restoring your computer from an image file ................................................37
Cloning a hard disk or partition .....................................................................39
Launching Ghost.exe peer-to-peer .................................................................40
Identifying a hard disk ....................................................................................43
Chapter 4 Setting options and defaults
Setting Norton Ghost options and defaults ...................................................46
Adding command-line switches to a task ...............................................47
Assigning a drive letter to a CD/DVD drive ...........................................47
Setting the options for a mapped network drive ....................................47
Setting display options .............................................................................48
Setting the DOS version ..........................................................................49
Setting the image integrity check default ................................................51
Setting a compression level .....................................................................51
Assigning a password to an image file ....................................................52
Adding free space to the Virtual Partition ..............................................52
Installing SCSI drivers .............................................................................53
Setting external storage device drivers ....................................................54
Setting TCP/IP drivers .............................................................................54
Setting LPT peer-to-peer drivers .............................................................55
Installing extra drivers .............................................................................56
Installing USB peer-to-peer drivers ........................................................57
Running your computer from the Virtual Partition .....................................57
Restarting your computer from the Virtual Partition ...........................58
Checking the integrity of an image file ..........................................................58
Viewing the task log ........................................................................................59
Starting Ghost.exe ...........................................................................................59
What to do if a task fails ..................................................................................60
Chapter 5 Image file options
About Norton Ghost image files .................................................................... 62
Image files and compression .......................................................................... 62
Performance expectations on a network ................................................ 63
Image files and CRC32 ...................................................................................63
Image files and volume spanning ................................................................... 63
Standard image files ................................................................................63
Limitations on the image file size ........................................................... 64
Size-limited image files ........................................................................... 64
Spanned image files ................................................................................. 64
Spanning across multiple volumes and limiting span sizes ..................65
Restoring from a spanned image ............................................................ 65
Image files and tape drives .............................................................................66
GoBack and Norton Ghost ............................................................................. 67
GoBack and Ghost.exe ............................................................................ 67
Dynamic disks in Windows 2000/XP ............................................................68
Hibernation and swap files ............................................................................. 69
Chapter 6 Creating boot disks with the Ghost Boot Wizard
Introducing the Norton Ghost Boot Wizard ................................................ 72
What is a Ghost boot disk .............................................................................. 72
When to create a Ghost boot disk .................................................................. 72
How to use a Ghost boot disk ........................................................................72
Files included on a Ghost boot disk ............................................................... 73
When to include MS-DOS on a boot disk ............................................. 73
Creating a recovery boot disk ......................................................................... 73
Opening the Ghost Boot Wizard ................................................................... 74
Creating boot disks and boot images ............................................................. 75
Standard boot disks ................................................................................. 76
Boot disks with network support ........................................................... 79
Boot disks with CD-ROM and DVD support ....................................... 81
Boot disks with drive mapping network support ..................................82
Selecting a template ........................................................................................84
Multicard templates and the boot disk .......................................................... 85
Adding network drivers to the Ghost Boot Wizard ...................................... 86
Adding packet drivers to the Ghost Boot Wizard ................................. 86
Adding NDIS2 drivers to the Ghost Boot Wizard ................................. 87
Customizing the template ....................................................................... 88
Adding command-line parameters to a boot package .................................. 88
Providing MS-DOS ......................................................................................... 89
7Contents
8 Contents
Chapter 7 Backing up, restoring, and cloning from DOS
An overview of using Ghost.exe .....................................................................92
Starting the Norton Ghost executable ............................................................93
Marking your disks ..................................................................................94
Navigating without a mouse ...........................................................................94
Establishing a peer-to-peer connection with Ghost.exe ................................95
Creating a backup image file ...........................................................................97
Backing up a hard disk to an image file ..................................................97
Backing up a partition to an image file ...................................................99
Restoring from an image file .........................................................................101
Restoring a hard disk from an image file ..............................................101
Restoring a partition from an image file ...............................................103
Cloning disks and partitions .........................................................................104
Cloning disk to disk ...............................................................................105
Cloning partition to partition ...............................................................106
Verifying image integrity ..............................................................................107
Adding switches to your Ghost operation ...................................................108
Chapter 8 Backing up and restoring with CD-R/RW and DVD-R/RW
Image files and CD/DVD writers .................................................................112
Saving an image file directly to a CD-R/RW or DVD-R/RW drive ............113
Saving an image file to an unsupported CD-R/RW or
DVD-R/RW drive ..................................................................................114
Splitting an image file during a backup ................................................115
Chapter 9 Using Ghost Explorer to modify image file contents
Understanding Ghost Explorer ....................................................................118
Viewing image files ........................................................................................119
Launching a file .............................................................................................119
Extracting a file or directory from an image file ..........................................120
Modifying image files in Ghost Explorer .....................................................120
Adding, moving, and deleting files .......................................................121
Listing the contents of an image file .............................................................121
Setting span file sizes .....................................................................................121
Splitting an image file ....................................................................................122
Compiling a file .............................................................................................122
Determining Norton Ghost image file version ............................................123
Using Ghost Explorer from the command line ...........................................123
Using Ghost Explorer with long file names ..........................................125
Chapter 10 Managing partitions using GDisk
Introducing GDisk ........................................................................................ 128
Running GDisk .............................................................................................128
Overview of main command-line switches ................................................. 129
Online Help for command-line switches ............................................. 130
Switches common to all GDisk commands .........................................130
Creating a partition ....................................................................................... 131
Reinitializing the Master Boot Record ......................................................... 132
Showing information about disks ................................................................ 133
Performing multiple GDisk operations using batch mode ........................134
FAT16 partitions in Windows NT ............................................................... 135
Deleting and wiping your disk .....................................................................135
Activating or deactivating a partition .......................................................... 137
Hiding or unhiding a partition ....................................................................137
Modifying the Windows NT/2000/XP boot menu ..................................... 138
Specifying the boot.ini path and file name .......................................... 138
Displaying the list of current boot entries ............................................ 138
Adding an entry to Boot.ini .................................................................. 138
Removing an entry from Boot.ini ........................................................ 141
Setting the default boot option and timeout .......................................141
Support for Large Hard Disks ......................................................................142
9Contents
Chapter 11 Updating Security Identifiers (SIDs) and computer names
Making SID changes with Ghost Walker on Windows NT-based
clients ..................................................................................................... 144
Norton Ghost Walker capabilities ........................................................ 144
Norton Ghost Walker limitations ........................................................144
SID changing limitations ......................................................................145
Loss of access to external data objects .........................................................145
Identical user names and passwords across workstations ..........................145
Using Ghost Walker ...................................................................................... 146
Running Ghost Walker from the command line ................................. 148
Appendix A Command-line switches
Using Norton Ghost with switches ..............................................................154
Command-line switches ............................................................................... 154
Clone switch usage ........................................................................................ 166
Defining the type of clone command ................................................... 166
Setting a source for the clone switch ....................................................167
Setting a destination for the clone switch ............................................169
Setting a destination size for the clone switch .....................................169
Examples of clone switch usage ............................................................ 170
10 Contents
-CRC32 switch usage .....................................................................................172
Examples of -CRC32 usage ...................................................................173
Files not checked with CRC ..................................................................174
Ghost.exe and the Virtual Partition .............................................................175
Appendix B Transfer methods and hardware setup
Transfer and hardware requirements ...........................................................178
Peer-to-peer connections ..............................................................................178
SCSI tape drives .............................................................................................179
Removable media ..........................................................................................179
CD/DVD usage ..............................................................................................179
Internal drives ................................................................................................180
Third-party devices ................................................................................180
Appendix C USB and DirectParallel Cables
Parallel Technologies cables ..........................................................................182
Other USB cables ...........................................................................................182
Appendix D The Wattcp.cfg network configuration file
The Wattcp.cfg configuration file .................................................................184
Wattcp.cfg key words ....................................................................................184
Appendix E Cloning with Linux
Supported configurations .............................................................................188
Position of disk ..............................................................................................188
Boot configuration ........................................................................................188
Norton Ghost utility support ........................................................................189
Appendix F Troubleshooting
Ghost.exe error messages ..............................................................................192
Problems running Norton Ghost .................................................................193
Card not found/Card not installed .......................................................193
Creating an image on an NTFS partition .............................................193
Cannot start from drive A .....................................................................193
Windows NT blue screen ......................................................................194
Missing hibernation file .........................................................................194
Computer fails to restart .......................................................................194
Getting out of the Virtual Partition ......................................................195
Cancelling a Ghost.exe operation .........................................................195
Installing and uninstalling Norton Ghost ............................................195
Connecting using USB peer-to-peer .....................................................196
Writing to a recordable CD or DVD ........................................................... 196
Supported CD-R/RW and DVD drives ................................................ 196
Inaccessible CD-ROM drive ................................................................. 197
CD-R/RW disc ....................................................................................... 198
Using the correct boot disk ................................................................... 199
Loading CD-R/RW drivers ................................................................... 199
If the CD-R/RW does not appear in the list of destination drives ...... 199
Loading Ghost.exe from the floppy disk drive .................................... 199
Outdated computer BIOS ..................................................................... 199
Outdated CD-R/RW drive BIOS .......................................................... 200
Using PC-DOS or MS-DOS .................................................................. 200
High compression .................................................................................200
Using third-party software to write to the CD-R/RW disc ................. 200
Appendix G Diagnostics
Hard drive detection and diagnostic information ......................................202
View Log ................................................................................................202
Abort error file (Ghosterr.txt) ..............................................................202
Creating a full diagnostic statistics dump summary ........................... 202
Testing TCP/IP functionality .......................................................................203
11Contents
Appendix H Installing Norton Ghost from the command line
Choosing an interface type for installation ................................................. 206
Choosing an installation mode ....................................................................206
Installing from the command line ...............................................................207
Uninstalling from the command line ..........................................................208
Service and support solutions
Glossary
Index
CD Replacement Form
12 Contents
Chapter

About Norton Ghost

This chapter includes the following topics:
Introducing Norton Ghost
What’s new in Norton Ghost 2003
How Norton Ghost works
Norton Ghost components
1
14 About Norton Ghost

Introducing Norton Ghost

Introducing Norton Ghost
Norton Ghost protects your data from computer disasters. The intuitive Windows interface lets you create backup images of your hard disk or selected partitions. You can clone directly between two computers using a network, USB, or parallel connection. Norton Ghost is based on the robust cloning technology of Symantec Ghost Enterprise.
Norton Ghost includes the following features:
Backup flexibility: Back up directly to a wide range of hard drives and
removable media, including CD-R/RW drives, FireWire and USB hard drives, DVD devices, Iomega, ZIP, and JAZ drives.
Peer-to-peer communication: Fast peer-to-peer communication using high-
speed parallel, USB, or network IP connections.
Operating system support: You can back up, restore, or clone computers
installed with DOS, Windows 2000/XP/NT/9x, OS/2, or Linux.
File system support: You can back up, restore, or clone FAT, FAT32, NTFS,
and Linux Ext2/3 file systems.
Image file editing: Ghost Explorer lets you edit FAT and FAT32 image files.
Restore individual files: Ghost Explorer lets you restore individual files from
an image file.
Disk and partition management: You can run GDisk from DOS or in a
command shell from within Windows to manage partitions and disks.
Tutorials: A set of tutorials is included in Norton Ghost to provide a
demonstration of the most commonly used functions.

What’s new in Norton Ghost 2003

Windows user interface: You can launch Norton Ghost directly from
Windows without having to restart your computer.
Virtual Partition: Eliminates the need for a boot disk in most situations.
Linux support: You can back up, restore, and clone EXT3 file systems.
NTFS support: Norton Ghost now writes to NTFS partitions. You can store
an image file on an NTFS drive and restore from an image file located on an NTFS drive.
Mapped network drives: A computer on a network can be mapped to a drive
letter. This lets Norton Ghost see the computer as a local drive and back up to and restore from it.
Ghost Walker: This utility lets you update Security Identifiers (SID) and
computer names. Ghost Walker was previously available only in Symantec Ghost, the corporate version of Norton Ghost.
Support for FireWire, USB 1.1, USB 2.0: You can now use Norton Ghost to
back up, restore, and clone to and from FireWire, USB 1.1, and 2.0 devices, including hard disks and supported CD-R/RW and DVD drives.
DVD support: You can use Norton Ghost to back up to and restore from
supported DVD+ R/RW and DVD-R/RW drives.
Expanded CD-R/RW support: The CD-R/RW drives supported by Norton
Ghost have been increased to include most new drives.
Large drive support: Norton Ghost supports backing up, restoring, and
cloning IDE drives larger than 128 GB.

How Norton Ghost works

How Norton Ghost works
15About Norton Ghost

Virtual Partition

The basis of Norton Ghost is a cloning function that creates an image file that contains all of the information required to recreate a complete disk or partition. Image files contain a backup copy of an entire drive or one or more partitions. The image file can be restored to one or more partitions or disks, replacing existing data.
The Virtual Partition is a partition that is created when you perform a backup, restore, clone, or other operation from Windows. All the files required for the backup, restore, or clone are automatically installed into the Virtual Partition and the task performed. Most of the Virtual Partition operation is not apparent to you. However, there may be some occasions when you must know what the Virtual Partition is and what it does, such as if you want to run Ghost.exe or another application from the Virtual Partition.
One primary partition slot must be available in the MBR for the Virtual Partition.
16 About Norton Ghost
How Norton Ghost works

Hardware restrictions

Norton Ghost is designed to restore to and clone identical hardware. When Microsoft Windows is installed, drivers necessary to support your hardware are installed to the hard disk and recorded in the Windows Registry. If you move an installation of Windows to another computer, either by directly moving the hard disk or copying it using a Ghost operation, there is no guarantee that it will boot or function correctly. Although Microsoft provides tools, such as Sysprep, that may alleviate these problems to volume license holders, these tools are usually unavailable to consumer or small business users.
A computer with Windows installed should be copied to a computer with identical hardware. Moving or cloning file systems that do not contain an operating system does not usually present a problem.

Preparing for an emergency

After you have installed Norton Ghost and created a backup image, you must create and test a recovery boot disk for use in an emergency. If you experience a critical failure and cannot start your computer, then you must have a recovery boot disk. This lets you start your computer in DOS and run Norton Ghost to restore your computer.
Note: If you saved your image file directly to CD or DVD, then you do not need a recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to CD or DVD.

Norton Ghost components

There are two methods of restoring your computer:
Norton Ghost
If you are able to start in Windows, then you may be able to run Norton Ghost from Windows on your hard disk and restore your computer with the latest backup image file that you have created.
See “Restoring your computer from an image file” on page 37.
Ghost.exe
If you cannot start Windows, then you must start your computer from a recovery boot disk or CD/DVD. This starts your computer and starts Norton Ghost in DOS. From Norton Ghost, you can access your image file and restore your computer to the latest backup image file.
See “Restoring from an image file” on page 101. The Ghost Boot Wizard helps you create a recovery boot disk. See “Creating boot disks and boot images” on page 75.
Warning: Create and test a recovery boot disk before you need it. If your computer crashes and you do not have a recovery boot disk, then you will have to find another computer on which to create a boot disk.
17About Norton Ghost
Norton Ghost components
Norton Ghost includes a number of products and utilities.

Norton Ghost wizards

Norton Ghost includes Windows wizards to guide you through the basic tasks.
18 About Norton Ghost
Norton Ghost components
These wizards include:
Backup Wizard
The Backup Wizard lets you select a hard disk or partition to back up to an image file.
Restore Wizard
The Restore Wizard lets you restore a hard disk or partition from an image file.
Norton Ghost components
Clone Wizard
The Clone Wizard lets you clone a hard disk or partition directly from another hard disk or partition.
Peer-to-Peer Wizard
The Peer-to-Peer Wizard starts Ghost.exe in the Virtual Partition with the peer­to-peer drivers loaded.
19About Norton Ghost
20 About Norton Ghost
Norton Ghost components
Create Virtual Partition Wizard
The Create Virtual Partition Wizard restarts your computer in the Virtual Partition in DOS with files from a selected directory. This enables you to run DOS applications.
Run Ghost Interactively Wizard
The Run Ghost Interactively Wizard restarts your computer in DOS and runs Ghost.exe.
Integrity Check
The image integrity check runs an integrity check on backup image files.
View Log
View Log lets you view logs created during Norton Ghost operations.

Norton Ghost executable

Ghost.exe runs in DOS and lets you back up, restore, and clone. Because the executable is small with minimal conventional memory requirements, you can run it easily from a DOS boot disk or hard drive.
Norton Ghost components
21About Norton Ghost
22 About Norton Ghost
Norton Ghost components

Ghost Boot Wizard

The Ghost Boot Wizard is a Windows application that creates boot disks that start Norton Ghost when you turn on your computer. You can create boot disks for various cloning tasks. The wizard guides you through adding the drivers that are needed to create a boot disk.

Ghost Explorer

Ghost Explorer is a Windows application that lets you view directories and files in an image file. You can also add, recover, and delete individual directories and files from a FAT16/32 file system image file.
Norton Ghost components
Note: You can restore individual files from NTFS images, but you cannot update
NTFS images.
23About Norton Ghost

GDisk

GDisk is a complete replacement for the Microsoft FDISK and FORMAT utilities that allows the following:
FAT file system formatting
Batch mode operation
Hiding and unhiding of partitions
Secure disk wiping to US Department of Defense standards
Extensive partition reporting
Boot.ini manipulation (GDisk32 only)
Two versions of GDisk are supplied:
GDisk: Runs in DOS
GDisk32: Runs from the command prompt in a Windows operating system
24 About Norton Ghost
Norton Ghost components

Ghost Walker

Ghost Walker assigns a statistically unique security identifier (SID) and a unique computer name to cloned Microsoft Windows NT/2000/XP workstations. The SID is an important part of the Windows NT/2000/XP security architecture as it provides a unique identifier when these computers are networked. If you are cloning more than one computer using the multiuser pack, you can use Ghost Walker to set up each computer on a network with a unique identification, which is mandatory on a Microsoft network.
Chapter

Installing Norton Ghost

This chapter includes the following topics:
Minimum system requirements
Installing Norton Ghost
Updating Norton Ghost
Uninstalling Norton Ghost
2
26 Installing Norton Ghost

Minimum system requirements

Minimum system requirements
To install and run Norton Ghost, the minimum requirements are as follows:
IBM computer or 100% compatible
486 processor
VGA monitor (Super VGA recommended)
16 MB RAM (32 MB RAM recommended)
Microsoft-compatible mouse recommended
Microsoft Windows 98/2000/Me/XP or Microsoft Windows NT4 SP6a
Internet Explorer 5

Ghost.exe

Ghost.exe must be installed on a computer with the Norton Ghost minimum requirements. However, you can run Ghost.exe on a computer with the following minimum requirements:
IBM PC computer or 100% compatible
486 processor
16 MB RAM
VGA monitor
Microsoft-compatible mouse recommended

CD and DVD writing

CD or DVD writer supported by Norton Ghost

Supported backup media

In addition to saving a backup to a secondary partition or an internal hard disk, Norton Ghost can also save a backup to the following external media devices:
CD-R/RW
DVD+RW/-RW/+R/-R
USB 1.1/2.0 hard drive and CD/DVD recordable devices
FireWire (iEEE) 1394 hard drive and CD/DVD recordable devices

Installing Norton Ghost

Atapi tape (QIC157) devices
SCSI tape
A second computer using a peer-to-peer connection
Mapped network drive
ZIP drive
JAZ drive
To determine whether your device is supported by Norton Ghost, check that your device is listed on the Symantec support Web site.
http:\\www.ghost.com

File systems supported for backup, restore, and cloning tasks

All FAT
All NTFS
EXT2/3
See “Cloning with Linux” on page 187.
27Installing Norton Ghost

Disaster recovery requirements

To restore a backup image in the event of an operating system or hard disk failure, you must have one of the following recovery mechanisms in place before the emergency occurs:
Floppy disk drive and floppy disk with the correct drivers for the selected
backup device
CD or DVD device and a bootable CD-ROM with the backup image created
by Norton Ghost
See “Preparing for an emergency” on page 16.
Installing Norton Ghost
The installation instructions for Norton Ghost differ depending on how you have purchased Norton Ghost:
As a part of Norton SystemWorks Pro
Norton Ghost 2003
28 Installing Norton Ghost
Installing Norton Ghost

Installing Norton Ghost if purchased with Norton SystemWorks Pro

If you have purchased Norton Ghost as part of Norton SystemWorks Pro, then Norton Ghost is installed from the Norton SystemWorks Pro CD.
To install Norton Ghost from Norton SystemWorks
1 Insert the Norton SystemWorks 2003 CD into the CD-ROM drive.
2 In the Norton SystemWorks 2003 window, click Install Norton SystemWorks
2003.
3 Click OK to accept the Virus detection message.
4 Click Next.
5 In the License Agreement window, click I accept the license agreement, and
then click Next. If you select I do not accept the license agreement, you cannot continue with
the installation.
6 Confirm the installation location.
To select a different location for the installed files, click Browse.
7 Click Next.
8 Select an installation type:
Typical: The most common programs are installed. This is the best
choice for most users.
Complete: All programs are installed. This is the best choice for users
who want to take advantage of all the product features.
Express: The most common programs are installed with the default
settings and fewer prompts.
9 In the Select Features window, select Norton Ghost 2003 and click one of the
following:
Will be installed on local hard drive
Entire feature will be installed on local hard drive
To install only Norton Ghost, click the other Norton SystemWorks components and select Entire feature will be unavailable.
10 Click Next.
11 Continue with the type of installation you chose. After installation, you may
receive a prompt telling you that your computer needs to be restarted for the updates to take effect.

Installing Norton Ghost

If you have purchased Norton Ghost separately from Norton SystemWorks Pro, then Norton Ghost is installed from the Norton Ghost CD.
To install Norton Ghost from the Norton Ghost CD
1 Insert the Norton Ghost CD into the CD-ROM drive.
2 In the Norton Ghost 2003 window, click Install Norton Ghost 2003.
3 In the Norton Ghost 2003 - InstallShield Wizard window, click Next.
4 In the License Agreement window, click I accept the license agreement, and
then click Next. If you select I do not accept the license agreement, you cannot continue with
the installation.
5 In the User name field, type a user name.
6 In the Organization field, type an organization, if you belong to one.
7 Click Next.
8 Confirm the installation location.
To select a different location for the installed files, click Change.
Installing Norton Ghost
29Installing Norton Ghost
9 Click Next.
10 Click Install to start the installation.

If the opening screen does not appear

Sometimes, a computer’s CD-ROM drive does not automatically start a CD.
To start the installation from the Norton Ghost CD
1 On your desktop, double-click My Computer.
2 In the My Computer dialog box, double-click the icon for your CD-ROM
drive.
3 From the list of files, double-click Ncdstart.exe.

Registering Norton Ghost

To stay informed of upcoming Symantec products, please fill out the details for registration of Norton Ghost. If you choose not to register the software using the Information Wizard or if registration fails for some reason, you can register on the Symantec Web site at www.symantec.com or by using the Product
30 Installing Norton Ghost
Installing Norton Ghost
Registration option in the Help menu in the Norton Ghost window. On the Web site, go to the Products page for the registration link.
To register Norton Ghost
1 In the first Registration window, select the country from which you are
registering and the country in which you live (if different), and then click Next.
2 If you would like information from Symantec about Norton Ghost, select the
method by which you want to receive that information, and then click Next.
3 Type your name and whether you want Norton Ghost registered to you or
your company, and then click Next.
4 Type your address, and then click Next.
5 Do one of the following:
Answer the survey questions to help Symantec improve its products and
services, and then click Next.
Skip the survey by clicking Next.
6 Select whether you want to register Norton Ghost through the Internet or by
mail.
If you want to register by mail, your computer must be connected to a
printer that the Information Wizard can use to print the registration form.
If you want to register using the Internet, you must be connected to the
Internet.
7 Click Next.
If you submitted your registration through the Internet, the Information Wizard displays the serial number for your product.
8 Write down the serial number or click Print to get a copy of your registration
information for future reference.
9 Click Next.
10 Select whether you want to use your existing profile the next time you
register a Symantec product or type the information as part of registration.
11 Click Finish.
Loading...
+ 191 hidden pages