Symantec Norton Ghost - 14.0 Instruction Manual

Page 1

Norton Ghost™

Page 2
Norton Ghost User's Guide
The software described in this book is furnishedunder alicense agreement andmay beused only in accordance with the terms of the agreement.
Documentation version 8.0
Legal Notice
Copyright © 2008 Symantec Corporation.
All rights reserved.
Symantec, the Symantec Logo, LiveUpdate, Symantec pcAnywhere, Symantec BackupExec, Norton, Symantec NetBackup, and Symantec Backup Exec Restore Anyware are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, .NET, and the Windows logo are registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. VeriSign® is a registered trademark of Verisign, Inc.
Gear Software is a registered trademark of GlobalSpec, Inc.
Google and Google Desktop are trademarks of Google, Inc.
Maxtor OneTouch is a trademark of Maxtor Corporation.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "ASIS"AND ALL EXPRESSOR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLYINVALID.SYMANTEC CORPORATIONSHALL NOT BE LIABLEFORINCIDENTAL OR CONSEQUENTIALDAMAGES INCONNECTIONWITHTHEFURNISHINGPERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The LicensedSoftware andDocumentationaredeemedto be "commercial computer software" and "commercial computersoftwaredocumentation" as defined in FAR Sections 12.212 and DFARS Section 227.7202.
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 USA
http://www.symantec.com
Page 3

Technical Support

Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product feature and function, installation, andconfiguration. TheTechnical Supportgroupalso authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
Symantec’s maintenance offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization
A telephone and web-based support that provides rapid response and
up-to-the-minute information
Upgrade insurance that delivers automatic software upgrade protection
Global support that is available 24 hours a day, 7 days a week worldwide.
Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program
Advanced features, including Technical Account Management
For information about Symantec’s Maintenance Programs, you can visit our Web site at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support. The specific features that are available may vary based on the level of maintenance that was purchased and the specific product that you are using.
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support information at the following URL:
www.symantec.com/techsupp/
Select your region or language under Global Support.
Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to recreate the problem.
Page 4
When you contact Technical Support, please have the following information available:
Product release level
Hardware information
Available memory, disk space, and NIC information
Operating system
Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If your Symantecproductrequiresregistration ora license key, access ourtechnical support Web page at the following URL:
www.symantec.com/techsupp/
Select your region orlanguage under Global Support, and then selectthe Licensing and Registration page.
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support.
Customer Service is available to assist with the following types of issues:
Questions regarding product licensing or serialization
Product registration updates such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade insurance and maintenance contracts
Information about the Symantec Value License Program
Page 5
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:
Asia-Pacific and Japan: contractsadmin@symantec.com
Europe, Middle-East, and Africa: semea@symantec.com
North America and Latin America: supportsolutions@symantec.com
Additional Enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following:
Symantec Early WarningSolutions
Managed Security Services
Consulting Services
Educational Services
These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur.
These services remove the burdenof managing andmonitoringsecuritydevices and events, ensuring rapid response to real threats.
Symantec Consulting Services provide on-site technical expertise from Symantec andits trusted partners. SymantecConsulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring and management capabilities, each focused on establishing andmaintaining the integrity and availabilityof your IT resources.
Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs.
Page 6
To access more information about Enterprise services, please visit our Web site at the following URL:
www.symantec.com
Select your country or language from the site index.
Page 7

Contents

Technical Support . ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .............. ... 3
Chapter 1 Introducing Norton Ghost™ . ... ... ... ... .............. ... ... ... ... ... ... .. 13
Getting started . ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... . 13
What's new in Norton Ghost 14.0 . ... ... ... ... ... ... .............. ... ... ... ... ... ... . 14
New features and enhancements added in the previous
release ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 15
About the Advanced page ... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... 17
Where to find more information . ... ... ... ... ... ... ... .............. ... ... ... ... ... ... 18
Chapter 2 Installing Norton Ghost .... ... ... ... ... ... ... ... ... ... ... ... .............. ... 19
Preparing for installation .. ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... .. 19
System requirements ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... 19
Supported file systems and removable media .. ... ... ... ... ... ... ... ... .... 20
Unavailable features .............. ... ... ... ... ... ... ... ... ... ... ... .............. .. 21
Installing Norton Ghost ..... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... . 22
Completing the installation ... ... ... ... ... ... ... ... ... ... .............. ... ... ... . 24
Activating Norton Ghost later ... ... ... ... ... ... ... ... .............. ... ... ... ... . 25
Setting up your first backup ... .............. ... ... ... ... ... ... ... ... ... ... ... ... 25
Updating Norton Ghost ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ...... 25
Uninstalling the product .... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... .... 26
Chapter 3 Ensuring the recovery of your computer .... ... ... ... ... ... ..... 27
About ensuring the recovery of your computer ... ... ... ... ... ... ... ... ... ... ... . 27
Testing Symantec Recovery Disk ............ ... ... ... ... ... ... ... ... ... ... ... ........ 28
If driver validation fails ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... 28
Creating a custom Symantec Recovery Disk CD ........ ... ... ... ... ... ... ... ... .. 29
Chapter 4 Getting Started . ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... .. 31
Key product components ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 31
How you use Norton Ghost .. ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... 32
Starting Norton Ghost .. ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... ...... 33
Configuring Norton Ghost default options . ... ... ... .............. ... ... ... ... ... . 34
Selecting a default backup destination . ... ... ... ... .............. ... ... ... ... 36
Page 8
Contents8
Adjusting the effects of a backup on computer performance .. ... ... ... 37
Adjusting default tray icon settings ........... ... ... ... ... ... ... ... ... ... ... .. 38
Managing file types ........... ... ... ... ... ... ... ... ... ... ... ... .............. ... .. 39
Using aliases for external drives .. ... ... ... ... ... ... ... .............. ... ... ... .. 41
Configuring FTP settings for use with Offsite Copy ... ... ... ... ... ... ..... 42
Logging Norton Ghost messages ... ... ... ... ... ... .............. ... ... ... ... ... 42
Enabling email notifications for product (event) messages ... ... ... ... . 44
Chapter 5 Best practices for backing up your data . ... ... ... ... ... ... ... .. 47
About backing up your data .. ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... .. 47
Choosing a backup type ... ................. ... ... ... ... ... ... ... ... ... ... ... ............ 48
Best practices for backing up .. ... ... ... ... ... ... ... ... .............. ... ... ... ... ... .. 48
About backups . .............. ... ... ... ... ... ... ... ... ... ... ... ................. ... ... 49
Before you back up . ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... .. 49
During a backup ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .............. .. 51
When the backup is complete ... ... ... ... ... ... ... ... ... ... ... ... .............. . 51
Additional tips about backups .. ... ... ... ... ................. ... ... ... ... ... ... ... ... .. 52
After defining your backup job .... ... ... ... ... ... ... ... ... ... ... ... ... .............. .. 53
Viewing the properties of a backup job ......... ... ... ... ... ... ... ... ... ... ... 53
About selecting a backup destination ....... ... ... ... ... ... ... ... ... ... ... ... ... ... 54
About backing up dual-boot computers ... ... ... .............. ... ... ... ... ... ... ... 56
Chapter 6 Backing up entire drives . ... .............. ... ... ... ... ... ... ... ... ... ... ... . 57
Defining a drive-based backup ........... ... ... ... ... ... ... ... ... ... ... ... ........... 57
Running a One Time Backup .... ... ... ... ... ... ... ... ... ... ... ... .............. .. 63
Files excluded from drive-based backups ... ... .............. ... ... ... ... ... . 65
About network credentials . ... ... ... ... ... ... ... .............. ... ... ... ... ... ... . 66
Run command files during a backup . ... ... ... ... ... ... ... ... .............. ... 66
Setting advanced options for drive-based backups ........ ... ... ... ... ... ... ... . 68
Editing advanced backup options . ... ... ... ... ... ... ... ................. ... ... . 69
About recovery point encryption .............. ... ... ... ... ... ... ... ... ... ... .. 70
Verifying a recovery point after creation .............. ... ... ... ... ... ... ... . 71
Viewing the progress of a backup . ... ... .............. ... ... ... ... ... ... ... ... . 72
About setting a compression level for drive-based backups .... ... ... ... ... ... 72
About Offsite Copy . ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... .. 73
How Offsite Copy works ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... 73
Using external drives as your Offsite Copy destination ... ... ... ... ... ... 74
Using a network server as your Offsite Copy destination ..... ... ... ... .. 75
Using an FTP server as your Offsite Copy destination ..... ... ... ... ... ... 76
Page 9
Chapter 7 Backing up files and folders . ... ... ... ... ... ... ... ... ... ... ... ... ......... 79
Defining a file and folder backup ... ... ... ... ... ... ... ... ... .............. ... ... ... .. 79
Folders excluded by default from file and folder backups ... ... ... ... ... ... ... 82
Chapter 8 Running and managing backup jobs ... ... ... ... ... ... ... ... ....... 83
Running an existing backup job immediately ... ... ... .............. ... ... ... ... . 83
Run a backup with options ... .............. ... ... ... ... ... ... ... ... ... ... ... ... .. 84
Adjusting the speed of a backup ... ... ... ... ... ... ... ... ... ... ... .............. ... ... 85
Stopping a backup or recovery task ........ ... ... ... ... ... ... ... ... ... ... ... ... ...... 86
Verifying that a backup is successful ... ... ... ... ... ... .............. ... ... ... ... ... 86
Editing backup settings ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... 87
Enabling event-triggered backups ... ... ... ... ... ... ... ... ... ... .............. ... ... . 87
Enabling Symantec ThreatCon Response ... ... ... .............. ... ... ... ... . 88
Editing a backup schedule ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... .. 89
Turning off a backup job ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... . 90
Deleting backup jobs ............... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... 90
Adding users who can back up your computer ..... ... ... ... ... ... ... ... ... ... ... 90
Chapter 9 Backing up remote computers from your
computer . ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... . 93
9Contents
About backing up other computers from your computer .. ... ... ... ... ... ... .. 93
Adding computers to the Computer List ... ... ... ... ... .............. ... ... ... ... ... 94
Deploying the agent ..... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... 95
Using the Norton Ghost Agent . ... ... .............. ... ... ... ... ... ... ... ... ... ... ... . 97
Managing the agent through Windows Services .. ... ... ... ... ... ... ... .......... 98
Best practices for using services . ... ... ... ... ... .............. ... ... ... ... ... ... ... .. 99
Opening Services ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... 100
Starting or stopping the agent service . ... ... ... ... ... ... .............. ... .. 100
Setting up recovery actions when the agent does not start ... ... ...... 101
Viewing Norton Ghost Agent dependencies ... ... ... ... ... ... ... .......... 102
Controlling access to Norton Ghost . ... .............. ... ... ... ... ... ... ... ... ... .. 103
Running Norton Ghost using different user rights ...... ... ... ... ... ... . 105
Chapter 10 Monitoring the status of your backups ... ... ... ... ............. 107
About monitoring backups ......... ... ... ... ... ... ... ... ... ... ... ... .............. ... 107
Rescanning a computer’s hard disk . ... ... ... .............. ... ... ... ... ... ... 108
Monitoring backup protection from the Home page . ... .............. ... ... .. 108
Monitoring backup protection from the Status page . ... ... ... ... ... ... ... ... 109
Configuring Norton Ghost to send SNMP traps ... ... ... ... ... ... .............. . 112
About the Norton Ghost management information base ... ... ... ... .. 113
Page 10
Contents10
Customize status reporting ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... 113
Viewing drive details ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ..... 114
Improving the protection level of a drive ... ... ... ... ... ... .............. ... ... ... 115
Using event log information to troubleshoot problems ... ... ... ... ... ... ... . 116
Chapter 11 Exploring the contents of a recovery point . ... ... ... ... ... .. 119
About exploring recovery points ... ... ... ... ... ... ... ... ... ... ... .............. ... . 119
Exploring a recovery point through Windows Explorer . ... ... ... ... ... ...... 120
Mounting a recovery point from Windows Explorer ........ ... ... ... ... . 121
Opening files within a recovery point ... ... ... ... ... ... ... ... ... ... ... ... ......... 121
Using a search engine .. ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ........... 122
Unmounting a recovery point drive ... ... ... ... ... ... ... ... .............. ... ... ... 123
Viewing the drive properties of a recovery point ... ... ... ... ... ... ... ... ... .... 123
Chapter 12 Managing backup destinations . ... ... ... ... ... ... ... ... ... ... ....... 125
About backup destinations ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... 125
How backup data works ......... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... . 125
About drive-based backups ... ... ... ... .............. ... ... ... ... ... ... ... ... ... 126
About file and folder backups ....... ... ... ... ... ... ... ... ... ... ... ... .......... 126
Managing recovery points . ... .............. ... ... ... ... ... ... ... ... ... ... ... ... ...... 127
Cleaning up old recovery points ... ... ................. ... ... ... ... ... ... ... ... 127
Deleting a recovery point set ... .............. ... ... ... ... ... ... ... ... ... ... ... . 128
Deleting recovery points within a set ...... ... ... ... ... ... ... ... ... ... ... ... . 128
Making copies of recovery points . ... ... ... ... ... ... .............. ... ... ... .. 129
Converting a recovery point to a virtual disk format ... ... ... ... ... ... ... ..... 130
Managing file and folder backup data ........... ... ... ... ... ... ... ... ... ... ... ... . 133
Viewing how much file and folder backup data is being
stored .. ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ........ 133
Limiting the number of file versions to keep ... ... ... ... ... ... ... ......... 134
Manually deleting files from your file and folder backup ... ... ... ... .. 134
Finding versions of a file or folder .............. ... ... ... ... ... ... ... ... ... ... 134
Automating management of backup data ... ... ... ... ... ... ... ... ... ... ... ....... 135
Moving your backup destination .... ... ... ... ... ... ... .............. ... ... ... ... ... . 136
Chapter 13 Recovering files, folders, or entire drives ... ... ... ... ... ... ... 139
About recovering lost data ........... ... ... ... ... ... ... ... ... ... ... ... .............. . 139
Recovering files and folders by using file and folder backup data ... ... ... 139
Recovering files and folders by using a recovery point ... ... ... ... ... ... ... .. 141
Opening files and folders stored in a recovery point ..... ... ... ... ... ... 143
If you cannot find the files or folders you want .. .............. ... ... ... .. 143
Recovering a secondary drive ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... 144
Page 11
About LightsOut Restore ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ...... 147
Setting up and using LightsOut Restore ...... ... ... ... ... ... ... ... ... ... ... 147
Configuring LightsOut Restore .. ... ... ... ... ... ... ... ... ... ... .............. .. 148
Chapter 14 Recovering a computer ... .............. ... ... ... ... ... ... ... ... ... ... ... ... 151
About recovering a computer ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .. 151
Starting a computer by using the recovery environment ... ... ... ... ... ... .. 152
Configuring your computer to boot from a CD ... ... ... ... ... ... ... ... .... 153
Preparing to recover a computer .. ... ... ... ... .............. ... ... ... ... ... ... ... ... 154
Scanning for viruses ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .. 154
Checking your hard disk for errors .... ... ... ... ... ... ... ... ... ... ... ... ...... 156
Recovering a computer . ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... 156
Restoring multiple drives by using a system index file . .............. ... ... .. 160
Recovering files and folders from the recovery environment ... ... ... ... .. 161
Exploring your computer ... ... ... ... ... ... ... ... ... ... .............. ... ... ... .. 163
Using the networking tools in the recovery environment ..... ... ... ... ... .. 163
Starting networking services ... ... ... ... ... ... ... ... ... ... ... .............. ... 163
Using the pcAnywhere thin host for a remote recovery . ... ........... 163
Mapping a network drive in the recovery environment ... ... ... ... ... . 166
Configuring network connection settings ... ... ... ... .............. ... ... . 166
Viewing properties of recovery points and drives .............. ... ... ... ... ... . 167
Viewing properties of a recovery point . ... ... ... ... ... ... ... ... ... ......... 168
Viewing the properties of a drive within a recovery point ... ... ... ... . 168
About the Support Utilities . ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 169
11Contents
Chapter 15 Copying a drive ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 171
About copying a drive .. ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... .. 171
Preparing to copy drives ... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... 171
Copying one hard drive to another hard drive . ... ... .............. ... ... ... ... . 172
Drive-to-drive copying options .. ... ... ... ... ... ... ... .............. ... ... ... .. 173
Appendix A Using a search engine to search recovery points ....... 175
About using a search engine to search recovery points ... ... ... ... ... ... ... .. 175
Enabling search engine support . .............. ... ... ... ... ... ... ... ... ... ... ... .... 175
Recovering files using Google Desktop's Search Desktop feature .. ... ... .. 177
If a file cannot be found using Google Desktop ... ... ... ... ............... 178
Index . ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... .. 179
Page 12
Contents12
Page 13
Chapter

Introducing Norton Ghost™

This chapter includes the following topics:
Getting started
What's new in Norton Ghost 14.0
About the Advanced page
Where to find more information

Getting started

1
Norton Ghost provides advanced backup and recovery for your computer. Protect your documents, financialrecords, presentations, photos, music,videos, historical documents, or any other kinds of data you keep on your computer by making a backup of your computer's entire hard disk. Or, limit your backup to include only those files and folders that mean the most to you.
You can schedule backups to capture your changes automatically as you work from day to day. Or start a backup manually at any time. You can also easily configureNortonGhost to runa backup inresponse to specific events. For example, a backup canbe started whena particular application isstarted, or when a specified amount of new data has been added to the drive.
When you experience a problem with your computer, you can restore a file, folder, or an entire drive, to return your computer to a previous, working state with the operating system, applications, and data files intact. Or if you accidently delete a personal file, get it back with a few simple steps.
Page 14
Introducing Norton Ghost™
14

What's new in Norton Ghost 14.0

Using easy-to-follow wizards, set up fast and reliable backups that run while you continue to work. Or schedule your backups to run after hours when you are no longer using your computer.
When disaster strikes, Norton Ghost helps you recover your computer from the effects of many common problems, including
Virus attacks: Damage might be done before a virus is quarantined.
Faulty software installations: Some software can negatively affect your
computer's performance, slowing it down to the point that opening programs or documents can require too much time. But once installed, uninstalling a product might not recover unintentional damage done during an install.
C), making it impossible to start your operating system
Files accidentally deleted or overwritten:Accidentaldeletion of files is common,
but often costly.
Corrupted files: Individual files and folders can become corrupted by viruses,
or when a program used to modify them encounters an error.
What's new in Norton Ghost 14.0
Norton Ghost includes many enhancements and new features. Refer to the following table for information about the latest features and enhancements:
Note: Not all features listed are available in all versions of this product.
DescriptionFeature
Support for NTFS partitions
Offsite Copy
NortonGhost now supports NTFSpartitions up to 16TB (formatted with 4k clusters).
The new Offsite Copy feature adds an additional level of protection to your data by copying recovery points to a second hard disk drive. You can use an external USB or FireWire drive, or copy them over the network to aremote location through a local area connection, or using FTP.
See “About Offsite Copy” on page 73.
Page 15
What's new in Norton Ghost 14.0
15Introducing Norton Ghost™
DescriptionFeature
Create and manage aliases for your external drives
Symantec ThreatCon integration
Send Feedback tool
To help you more easily identify external drives for use asbackup destinations, Norton Ghost lets you assign an alias to each external drive. Doingso doesnot change the drive label, but is for use only when you are accessing those drives from within Norton Ghost.
See “Using aliases for external drives” on page 41.
Symantec ThreatCon is Symantec's early threat warning system. You can now configure Norton Ghost to detect a change in the threat level whenever your computer is connected tothe Internet. Whenthe threat level meets or exceeds the level you specify, Norton Ghost automatically starts a backup job. You can specify a different ThreatCon level for each backup.
See “Enabling Symantec ThreatCon
Response” on page 88.
We want to hear what you think. From the Home page,you can now share your opinion with us. We look at every comment we receive and consider how we can make our product better. Tell us what you think.
Help and Support center
To help you help yourself, a new Help and Support dialog provides direct links to available resources for helping you to get the most out of Norton Ghost.

New features and enhancements added in the previous release

If you are upgrading from an earlier release, you might be interested to know of the following enhancements added in previous releases of Norton Ghost.
DescriptionFeature
Enhanced ease-of-use
An improved user interface simplifies what you need to know and do to successfully back up or recover files, folders, or your entire computer. And for Norton Ghost experts, the Advanced page gives you a single view to most product features.
Page 16
Introducing Norton Ghost™
16
What's new in Norton Ghost 14.0
DescriptionFeature
Windows Vista support
Improved Easy Setup
File and folder backup
One Time backups
support
Convert a recovery point to virtual disk format
LightsOut Restore
Simplified scheduleeditor
Manage backup data
Norton Ghost has been designed and tested to run in the new Windows Vista operating system, and still supports previous versions of Windows.
See “System requirements” on page 19.
Now setting up your first backup is even easier with the enhanced Easy Setup, which appears either during install (unless you choose to skip it), or automatically the first time you run Norton Ghost. Specify a few preferences, and Norton Ghost can start backing up your computer on a regular basis.
Limit your backup to include a select set of files or folders. File and folder backups are especially useful if your backup storage space is limited and you make frequent changes to important documents that you want to back up.
Need to back up your data quickly? The new One Time Backup feature lets you define and run a backup at any time without saving the backup job for later use.
Search for and recover files stored in recovery points using Google Desktop™.Desktop search engine
Convert recovery points to one of two virtual disk formats for use in a virtual environment.
Restore a computer from a remote location, regardless of the state of the computer, provided that its file system is intact.
You can now easily edit your existing backup schedules without having to click through multiple dialogs or complete the entire backup wizard again.
Because recovery points and file and folder backup data require storage space, Norton Ghost gives you the freedom of where and how to handle the amount of disk space used for storing backup data. Norton Ghost offers simple tools for managing your backup data, and can even manage it for you automatically.
Improved backup and recovery status
Automatic backup destination detection
Browse lost or damaged files and folders
The home page offers the backup protection status in a single view. But you can also use the new Backups Calendar to view past and upcoming scheduled backups to see how protected your data really is.
Norton Ghost automatically detects when a new storage device is connected to your computer, and can prompt you to change your default backup destination to the new drive.
Enhanced browsing of files and folders inside recovery points makesrecovery quick and easy; the new file and folder backup feature also lets you quickly search for and recover files or folders.
Page 17

About the Advanced page

17Introducing Norton Ghost™
DescriptionFeature
Event-triggered backups
Performance throttling
Maxtor OneTouch™ integration
Modifiable Symantec Recovery Disk
In addition to scheduled and manual backups, Norton Ghost can detect certain events and run a backup automatically whenever they occur, providing an added level of protection for your computer.
Manually adjust the effect of a running backup on the performance of your computer to better match your needs at the moment. This feature is especially useful if you are working on your computer and don't want the backup process to slow you down.
And if you know the demographics of your network traffic, you can now set network throttling to prevent network overload.
If you have a Maxtor OneTouch™ external hard drive, you can back up your computer with the push of a button. No need to start Norton Ghost.
When you cannot start Windows, the newly enhanced Symantec Recovery Disk (SRD) makes recovery easier than ever.
If the Symantec Recovery Disk is missing specific drivers, use the Create Recovery Disk feature to create a modified Symantec Recovery Disk that includes the exact drivers needed to successfully boot your computer into the recovery enironment.
Note: If you purchased Norton Ghost pre-installed on a new computer, some features
in therecovery environment may ormaynot beincluded, depending onhowthe computer manufacturerchose to install it. The recovery environment has likely been pre-installed on a special partition on your computer.
About the Advanced page
The Advanced page offers experienced Norton Ghost users a single view of the most common product features. If you have a good understanding ofNortonGhost, you might prefer to perform most tasks from the Advanced view.
Note: When refering to the documentation while using the Advanced page, the first one or two steps do not apply because they indicate where to access each feature from the other pages of the product interface. From that point on, follow the remaining steps of each procedure.
The Advanced page can be hidden from view if you do not plan to use it.
To hide the Advanced page
Start Norton Ghost.
1
On the View menu, click Show Advanced Page.
2
Page 18
Introducing Norton Ghost™
18

Where to find more information

To show the Advanced page
Start Norton Ghost.
1
On the View menu, click Show Advanced Page.
2
Where to find more information
Tolearn more aboutNortonGhost, visit thenew Help and Support page. Depending on which version and language of the product you have installed, the Help and Support page includesone-click access to more information, including the product help system, the product User's Guide, and access to the Symantec Knowledge Base where you can find troubleshooting information.
To access Help and Support
Start Norton Ghost.
1
On the Home page, click Help > Help and Support.
2
Page 19
Chapter

Installing Norton Ghost

This chapter includes the following topics:
Preparing for installation
Installing Norton Ghost
Updating Norton Ghost
Uninstalling the product

Preparing for installation

2
Before you install Norton Ghost, make sure that your computer meets the system requirements.

System requirements

Table 2-1 lists the system requirements for Norton Ghost.
Table 2-1
Minimum RequirementsComponent
Operating system
The following Windows 32- or 64-bit operating systems are supported:
Windows Vista Home Basic
Windows Vista Home Premium
Windows Vista Ultimate
Windows Vista Business
Windows XP Professional/Home (SP2 or later)
Windows XP Media Center
Minimum system requirements
Page 20
Installing Norton Ghost
20
Preparing for installation
RAM
Available hard disk space
CD-ROM or DVD-ROM drive
Table 2-1
Minimum system requirements (continued)
Minimum RequirementsComponent
The following memory requirements are grouped by key components:
Norton Ghost Agent: 256 MB
Norton Ghost user interface and Recovery Point Browser: 256 MB
Symantec Recovery Disk: 512 MB minimum
Note: If you are installing a multilingual or double-byte version of the product, you must
have a minimum of 768 MB of RAM to run the Symantec Recovery Disk.
Norton Ghost LightsOut Restore feature: 1 GB
When installingthe entire product:Approximately 250to300 MB,dependingon thelanguage
of the product you are installing
Microsoft .NET Framework 2.0: 280 MB of hard disk space is required for 32-bit computers,
and 610 MB is required for 64-bit computers
Recoverypoints: Sufficient hard disk spaceon alocalhard disk ornetworkserver for storing
recovery points. The size of recovery points depends on the amount of data you have backed up and the type
of recovery point being stored. See “Best practices for backing up ” on page 48.
Norton Ghost LightsOut Restore feature: 2 GB
The drive can be any speed, but it must be capable of using as the startup drive from the BIOS.
Norton Ghost uses Gear Software technology. To verify that your CD writer or DVD writer is compatible, visit http://www.gearsoftware.com/support/recorders/index.cfm. You can look up information about your writer if you know the name of the manufacturer and model number of your writer.
Software
The Microsoft .NET Framework 2.0 is required to run Norton Ghost.
If the .NET Framework is not already installed, then you will be prompted to install it after Norton Ghost is installed and your computer is rebooted.
Virtual platforms (for converted recovery points)
The following virtual platforms are supported:
VMware GSX Server 3.1 and 3.2
VMware Server 1.0 (replacement/rename for GSX Server)
VMware ESX Server 2.5 and 3.0
VMware Infrastructure 3 (replacement/rename for ESX Server)
Microsoft Virtual Server 2005 R2

Supported file systems and removable media

Norton Ghost supports the following file systems and removable media:
Page 21
Preparing for installation
21Installing Norton Ghost
Supported file systems
Norton Ghost supports FAT16, FAT16X, FAT32, FAT32X, NTFS, GUID Partition Table (GPT), dynamic disks, Linux Ext2, Linux Ext3, and Linux swap partitions.
Note: You mustdecrypt encrypted NTFS drives before you attempt to restore them. You cannot
view the files that are in a recovery point for an encrypted NTFS drive.
Removable media
You can save recovery points locally (that is, on the same computer where Norton Ghost is installed) ortomost CD-R, CD-RW, DVD-R(W), and DVD+RW recorders. You canfindan updated list of supported drives on the Symantec Web site.
Norton Ghost also lets you save recovery points to most USB devices, 1394 FireWire devices, REV, Jaz, Zip drives, and magneto-optical devices.

Unavailable features

Norton Ghost is packaged to meet various markets. Some features might not be available, depending on the product you have purchased. However, all features are documented. You should be aware of which features are included with the version of the product you have purchased. If a feature is not accessible in the product user interface, it is likely not included with your version of the product.
Refer to the Symantec Web site for information about features included with your version of Norton Ghost.
When you delay licensing
If you choose to delay installation of the product license (for a maximum of 30 days from the date of installation), the following features are unavailable until you install a valid license:
Copy Drive
Create Recovery Disk
LightsOut Restore
Convert to Virtual Disk
All other features are enabled during the 30 day grace period.
If you are using an Evaluation copy of the product, it also expires after 30 days. However, all features are enabled until the end of the evaluation period, at which time you must purchase the product or uninstall it. You can purchase a license at any time (even after the evaluation period expires) without reinstalling the software.
Page 22

Installing Norton Ghost

22
Installing Norton Ghost
Note: If this product came pre-installed from a computer manufacturer, your trial
period could be aslong as90 days. Theproductlicensing or activation page during install will indicate the duration of your trial period.
See “Activating Norton Ghost later” on page 25.
Installing Norton Ghost
See “System requirements” on page 19.
Note: During the installation process, you might be required to restart the computer. To ensure proper functionality after the computerrestarts,log on again using the same user credentials thatyou used to log on when you installed Norton Ghost.
The installation program scans your hardware for the required drivers. If the programdoes notfind the required drivers, you receive a drivervalidationmessage. If you receive this message, you should test the Symantec Recovery Disk (SRD). Testing the SRD verifies whether the drivers are required or if the devices onyour system have compatible drivers that are available on the SRD. Thedrivervalidation process should not interfere with your ability to install the product.
See “About ensuring the recovery of your computer” on page 27..
Warning: The SRD provides the tools that you need to recover your computer. It is included with your product either on a separate CD, or on your product CD, depending on the version of the product that you purchased. You should store the CD in a safe place.
To install Norton Ghost
Log onto your computer usingeither theAdministrator account oran account
1
that has administrator privileges.
Insert the Norton Ghost product CD into the media drive of the computer.
2
The installation program should start automatically.
Page 23
Installing Norton Ghost
If the installation program does not run, type the following command at a
3
command prompt:.
<drive>:\autorun.exe
where <drive> is the drive letter of your media drive.
In the CD browser panel, click Install Norton Ghost.
4
Read the license agreement, and then click I accept the terms in the license
5
agreement.
Do one of the following:
6
Click Install Now to begin the installation.
If you want to customize your settings, click Custom Install, select or
deselect the options you want installed, and then click Install Now. Installation options include:
23Installing Norton Ghost
User Interface
Backup and Recovery Service
CD/DVD Support
Recovery Point Browser
LiveUpdate
Change
If a driver that is used on your computer is not available on the Symantec
7
Installs the product user interface that is required for interacting with the Norton Ghost Service.
The primary service that is required to back up or recover your computer.
Required for backing up directly to CD/DVD, and for creating a customized Symantec Recovery Disk CD. A CD/DVD burner is required to use this feature.
Enables you to browse, mount, copy, verify, and restore files and folders using recovery points.
Keeps your Symantec software up-to-date with the latest product updates.
Click this button if you want to install Norton Ghostto an alternate location.
Recovery Disk, you receive a notification message that includes the name of
the driver. Write down the name of the driver file, and then clickOK to dismiss
the message.
Drivers are critical in the event that you need to use the Symantec Recovery
Disk CD to recover your system drive (the drive where your operating system
is installed).
See “About ensuring the recovery of your computer” on page 27.
Page 24
Installing Norton Ghost
24
Installing Norton Ghost
Click Finish to complete the installation.
8
Remove the product CD from the media drive, and then click Yes to exit the
9
installation wizard and restart the computer.
If you click No because you plan to restart your computer yourself at a later time, note that you cannot run Norton Ghost until after you restart your computer.

Completing the installation

After you install theproduct,you are prompted to license oractivateyourproduct. You can then run LiveUpdate to check for product updates, and then configure your first backup.
Note: If this product came pre-installed from a computer manufacturer, your trial period could be as long as 90 days. Refer to the Activate later label.
To complete the installation
In the Welcome panel, click Next.
1
If the product was installed by your computer manufacturer, the Welcome page might appear the first time that you run Norton Ghost.
Do one of the following:
2
Click I've already purchased the product and havea product key.
Note: You can find the product key on the back of your product CD jacket. Do not lose the product key. You must use it when you install Norton Ghost.
Click Activate later to delay the activation of your license. After the trial
period ends, the product will no longer work.
If this product is a trial version of Norton Ghost and you want to purchase
a product key, click Symantec Global Store to connect to the Symantec Web site.
Click Next.
3
Click Run LiveUpdate to check for any product updates since the product
4
shipped.
Click Launch Easy Setup to open the Easy Setup box when you complete the
5
install process.
Page 25
Click Enable GoogleDesktopFileandFolder Recovery if youwant use Google
6
Desktop to search your recovery points for the files and folders that youwant
to recover.
If you select this option, Norton Ghost automatically catalogs each file as it
creates a recovery point. Google Desktop can then use this catalog to search
for files by name. It does not index the content of the files.
Note: This option is available only if Google Desktop already is installed on
your computer. If you plan to install Google Desktop, you can enable search
engine support later.
Click Finish.
7

Activating Norton Ghost later

To activate Norton Ghost at any time after installation
On the Help menu, click Unlock Trial Product.
1
Refer to step 2 in the To complete the installation procedure.
2

Updating Norton Ghost

25Installing Norton Ghost

Setting up your first backup

Unless you unchecked the Run Easy Setup check box during the setup wizard, the Easy Setup window appears. If you don't run Easy Setup during the setup wizard, it appears the first time you open the Run or Manage Backups window.
When the Easy Setup window opens, you can either accept the default drive and file and folder backup settings, or you can click on any of the settings to modify them.
If you want the new backup to run immediately, be sure to select Run backup now, and then click OK.
Updating Norton Ghost
You can receive software updates that are associated with your version of the product over your Internet connection. LiveUpdate connects to the Symantec LiveUpdate server and automatically downloads and installs updates for each Symantec product that you own.
Page 26
Installing Norton Ghost
26

Uninstalling the product

You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates.
To update Norton Ghost
On the Help menu, click LiveUpdate.
1
In the LiveUpdate window, click Start to select the updates.
2
Follow the on-screen instructions.
When the installation is complete, click Close.
3
Some program updates might require that you restart your computer before the changes take effect.
Uninstalling the product
When you upgrade Norton Ghost from a previous version of the product, the install program automatically uninstalls theprevious versions. If needed, you can manually uninstall the product.
Follow your operating system's instructions on how to uninstall software.
Page 27
Chapter

Ensuring the recovery of your computer

This chapter includes the following topics:
About ensuring the recovery of your computer
Testing Symantec Recovery Disk
If driver validation fails
Creating a custom Symantec Recovery Disk CD
3

About ensuring the recovery of your computer

If Windows fails to start or it does not runnormally, you can recover your computer by using the Symantec Recovery Disk (SRD). The drivers that are included on the recovery disk must match the drivers required to run your computer's network cards and hard disks.
To help ensure that you have the drivers that you need to recover your computer, the installation process runs a driver validation test. The driver validation tool compares hardware drivers that are contained on the recovery disk with the drivers that are required to run your computer's network cards and hard disks.
The installation process automatically runs the driver validation test. You can also run a validation test at anytime by running the Symantec Recovery Disk Wizard.
You should run the driver validation test any time you make changes to the NIC cards or storage controllers on a computer.
See “If driver validation fails” on page 28.
Page 28
Ensuring the recovery of your computer
28

Testing Symantec Recovery Disk

Note: Wireless network adapter drivers are not supported by thedriver validation
tool or by the SRD.
Testing Symantec Recovery Disk
You should test the SRD to ensure that the recovery environment runs properly on your computer.
Note: Depending on which version of the product you have purchased, the SRD is either included on your product CD, or as a separate CD. You should place the CD containing the SRD in a safe place. Should you lose the CD, you can create a new one if you have have a CD burner.
Testing the SRD allows you to identify and solve the following types of problems:
You cannot boot into the recovery environment.
See “To configure your computer to boot from a CD” on page 153.
You do not have the necessary storage drivers to access recovery points on
the computer.
You need information about your system to help you run the recovery
environment.
To test the SRD
Run the drivervalidation tool to testwhether theSRD works withthe network
1
cards and storage devices on the computer.
Boot your computer using the SRD.
2
See “Starting a computer by using the recovery environment ” on page 152.
When you have bootedinto the recovery environment, do one of the following:
3
If you want to store recovery points on a network, run a mock restore of
a recoverypoint thatis stored ona network to testthe network connection.
If you want to store recovery points on the computer, run a mock restore
of a recovery point that is stored locally to test the local hard-drive connection.

If driver validation fails

The driver validation test verifies whether the drivers for all storage devices and network cards in use by the computer are available in the recovery environment.
Page 29

Creating a custom Symantec Recovery Disk CD

If the drivers are available on the recovery disk, you receive a validation message. If any drivers are missing from the recovery disk, the Driver Validation Results dialog appears.
Without access to the correct drivers, a device cannot be used while running the SRD. Therefore, if the recovery points required for recovering your computer are stored on a network or a local hard drive, you might not have access to them.
You can find the drivers and copy them to a CD or a floppy disk, or you can create a custom Symantec Recovery Disk CD.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
Creating a custom Symantec Recovery Disk CD
Even if driver validation succeeds and your Symantec Recovery Disk CD appears to work, you should create a custom Symantec Recovery Disk CD. A custom CD will contain your computer's current network and storage device drivers, helping to ensure that in an emergency you can get to the recovery points required to restore your computer.
29Ensuring the recovery of your computer
Note: You must have a writeable DVD/CD-RW drive to create a custom Symantec Recovery Disk.
To create a custom Symantec Recovery Disk CD
Start Norton Ghost.
1
Attach and turn on all storage devices and network devices that you want to
2
make available.
Insert the Symantec Recovery Disk CD into your CD-ROM drive.
3
From the main Norton Ghost window, click Tasks > Create Recovery Disk,
4
and then click Next.
If prompted, click Browse, select the drive that contains the Symantec
5
Recovery Disk CD, click OK, and then click Next.
Do one of the following:
6
Click Automatic(Recommended), and then click Next.
Click Custom, and then click Next.
Page 30
Ensuring the recovery of your computer
30
Creating a custom Symantec Recovery Disk CD
Select this option only if you know which drivers to select.
Follow the on-screen instructions to complete the wizard.
7
Warning: Be certain to test your new, customized Symantec Recovery Disk
CD to make sure that it can start your computer and that you can access the drive containing your recovery points.
See “Testing Symantec Recovery Disk” on page 28.
Page 31

Getting Started

This chapter includes the following topics:
Key product components
How you use Norton Ghost
Starting Norton Ghost
Configuring Norton Ghost default options

Key product components

Chapter
4
Norton Ghost includestwo key components: the program itself, andthe Symantec Recovery Disk.
Table 4-1
Norton Ghost program (user interface)
Key product components
DescriptionKey Component
The Norton Ghost program lets you define, schedule, and run backups of your computer. When you run a backup, recovery points of your computer are created, which you can then use to recover your entire computer, or individual drives, files, and folders. You can also manage recovery point storage (backup destination), and monitor the backup status of your computer to make sure your valuable data is backed up on a regular basis.
Page 32
Getting Started
32

How you use Norton Ghost

Table 4-1
Key product components (continued)
DescriptionKey Component
Symantec Recovery Disk
The Symantec Recovery Disk (SRD) is used to boot your computer into the recovery environment. If your computer's operating system fails, use the SRD to recover your system drive (the drive where your operating system is installed).
Note: Depending on which version of the product you have purchased, the
SRD is either included on your product CD, or as a separate CD. You should place the CD containing the SRD in a safe place. Should you lose the CD, you can create a new one if you have have a CD burner.
See “About recovering a computer ” on page 151.
How you use Norton Ghost
While Norton Ghost does the work of backing up your files, folders, or entire drives, you need to tell Norton Ghost what to backup, when to back it up, and where to put the backed up data.
Using Norton Ghost includes the following key tasks:
Defining a backup
Running a backup
Recovering files, folders, or entire drives
Refer to the following figure to understand the relationship of these tasks.
Page 33

Starting Norton Ghost

33Getting Started
Figure 4-1
Using Norton Ghost
Starting Norton Ghost
Norton Ghost is installed in the Windows Program Files folder by default. During installation, a program icon is installed in the Windows system tray from which you can open Norton Ghost. You can also open Norton Ghost from the Windows Start menu.
Note: To use the full version of Norton Ghost, you must activate the software.
See “Activating Norton Ghost later” on page 25.
Page 34
Getting Started
34

Configuring Norton Ghost default options

To start Norton Ghost
Do one of the following:
On the classic Windows taskbar, click Start > Programs > Norton Ghost.
On the Windows XP or Windows Vista taskbar, click Start > All Programs
> Norton Ghost.
In the Windows system tray, double-click the Norton Ghost tray icon.
In the Windows system tray, right-click the Norton Ghost tray icon, and
then click Open Norton Ghost.
Configuring Norton Ghost default options
The Optionsdialog box includes several views that let you configure the following default settings:
DescriptionOptions
General
Performance
Specify a defaultlocationwherea backup will create andstore recovery pointsand file andfolderbackupdata.If the location you choose is on a network, you can enter your user authentication information.
See “Selecting a default backup destination ” on page 36.
Lets you specify a default speed for backup or recovery processes.Movingthe slider closertoFast increases the speed at which the program backs up or recovers your computer. However, choosing a slower speed could improve the performance of your computer, especially if you are working on your computer during a backup or recovery.
Note: During a backup or recovery, you have the option to
override this default setting to fit your needs at the time.
You can also configure network throttling to limit the effects of backups on network performance.
See “Adjusting the effects of a backup on computer
performance” on page 37.
See “Enabling network throttling ” on page 38.
Page 35
Configuring Norton Ghost default options
35Getting Started
DescriptionOptions
Tray Icon
File Types
Google Desktop
External Drives
You can turn the system tray icon on or off and specify whether to show only error messages when they occur, or to show both error messages and other information, such as the completion of a backup.
See “Adjusting default tray icon settings ” on page 38.
Lets you manage file types and file type categories, which are used as a method for selecting the types of files you want included in a file and folder backup.
See “Managing file types ” on page 39.
If Google Desktop is installed on your computer when you install Norton Ghost, you have the option of enabling Google Desktop file and folder recovery.When you enable thisfeature, you can search for files (by file name) inside a recovery point that was created with search engine support enabled.
If GoogleDesktop is not installed on your computer when you install Norton Ghost, you have the option of clicking a link to the Web site where you can download and install Google Desktop for free.
See “About using a search engine to search recovery points” on page 175.
Delete orrenamethe unique names youhavegiven to external drives used as backup and Offsite Copy destinations.
See “Using aliases for external drives” on page 41.
Configure FTP
Log File
Event Log
Specify default FTP settings to be used with Offsite Copy.
See “Configuring FTP settings for use with Offsite Copy” on page 42.
Lets you specify the types of product messages to log (errors, warnings, and information), where to store the log file, and set a maximum file size for the log file.
See “Logging Norton Ghost messages” on page 42.
Lets you specify the types of product messages to log (errors, warnings, and information) in the Windows event log.
See “Logging Norton Ghost messages” on page 42.
Page 36
Getting Started
36
Configuring Norton Ghost default options
DescriptionOptions
SMTP E-mail
SNMP Trap
If you want a history of actions taken by Norton Ghost, or of error messages and warnings, you can choose to save them in a log file on your computer, or to have them emailed to an address you specify.
See “Enablingemail notifications for product (event) messages
on page 44.
If you haveaNetworkManagementSystem(NMS) application, you can enable SNMP Traps support to send notifications to you NMS application.
See “Configuring Norton Ghost tosendSNMP traps” on page112.
To configure default options
Start Norton Ghost and click Tasks > Options.
1
Select an option you want to modify, make any necessary changes, and then
2
click OK.

Selecting a default backup destination

You can specify the default destination for storing recovery points and file and folder backup data created when you run a backup. This default location is used if you do not specify a different location when you define a new backup.
To set a default backup destination
On the menu bar, click Tasks > Options.
1
Click General.
2
Check Prependcomputer name to backup data file names.
3
This is especially useful if you back up more than one computer to the same drive. For example, you might back up a laptop and a desktop computer to the same USB or network drive. By prepending the computer name to each backup data file name, you can more easily identify which backup data files belong to which computer.
Page 37
Configuring Norton Ghost default options
Check Save backup files to a unique subfolder if you want Norton Ghost to
4
create a new subfolder that will serve as your backup destination.
Note: The new subfolder is given the same name as your computer. For
example, if your computer name is "MyLaptop", the new subfolder would be
named \MyLaptop.
Enter a path to a folder where you want to store recovery points and file and
5
folder backup data, or click Browse to look for a location.
You cannot use an encrypted folder as your backup destination. If you want
to encrypt your backup data to prevent another user from accessing it, refer
to the Advanced options when you define or edit a backup.
If you entered the path to a location on a network, enter the user name and
6
password required to authenticate to the network.
Click OK.
7

Adjusting the effects of a backup on computer performance

37Getting Started
If you are working on your computer when a backup is running—especially one that is creating an independent recovery point—your computer might slow down. This is because Norton Ghost is using your computer's hard disk and memory resources to perform the backup.
However, you can actually modify the speed of the backup as a way of minimizing the impact of Norton Ghost on your computer while you work.
To adjust the default effect of a backup on my computer's performance
On the main menu bar, click Tasks > Options.
1
Click Performance.
2
If you want to improve your computer's speed performance, move the slider
3
bar closer to Slow.
If you want the backup to complete more quickly, move the slider bar closer
4
to Fast.
Click OK.
5
Note: During a backup orrecovery, you'll have the option of overriding this default
setting to fit your needs at that moment.
See “Adjusting the speed of a backup ” on page 85.
Page 38
Getting Started
38
Configuring Norton Ghost default options
Enabling network throttling
Similar to computer performance adjustments, you can also limit the impact of a backup on network performance.
However, because network performance is affected by many variables,you should consider the following issues before enabling this feature:
Network cards: Is your network wired or wireless? What are the speeds of your
network cards?
Network backbone: What is the size of your network pipeline? Does it support
10 MB transfer rates, or 1 GB transfer rates?
Networkserver:Howrobustis your server hardware?Howfast is itsprocessor?
How much RAM does it have? Is it fast or slow?
Backing up: How many computers are scheduled to back up at the same time?
Network traffic: Are backups scheduled to run when network traffic is heavy
or light?
Consider using this feature only when you know what your network can handle. If you schedule your backups at staggered intervals, and if you schedule them when network traffic is low, you will likley not need to use this feature.
Gather the required information about your network's performance and then schedule backups accordingly. Then, if necessary, enable this feature and set the Maximum network throughput to a setting that matches the circumstances.
To enable network throttling
On the main menu bar, click Tasks > Options.
1
Click Performance.
2
Check Enable network throttling.
3
In the Maximum network throttling field, enter the maximum amount (in
4
KB) of network throughput that Norton Ghost can send per second.
Click OK.
5

Adjusting default tray icon settings

You can turn the system tray icon on or off and specify whether to show only error messages when they occur, or to show both error messages and other information, such as the completion of a backup.
Page 39
To adjust default tray icon settings
On the main menu bar, click Tasks > Options.
1
Click Tray Icon and select one of the following:
2
Configuring Norton Ghost default options
39Getting Started
Show system tray icon
Show missed backups
Show system tray questions
Show status messages
Show error messages
Click OK.
3
Displays theNorton Ghost iconin thesystem tray.
You must select this option to enable or disable any of the remaining options.
Notifies you when a backup was scheduled but did not run.
This can happen when your computer was turned off at the time a backup was scheduled to run.
Offers helpful prompts in the form of questions that can help you keep your data backed up.
Displays messages about the status of backup operations, such as notifying that a backup has started, or that your backup destination is getting full.
Displays error messages when errors occur so thatyou can resolve any issuesthat might hinder data protection.

Managing file types

When you define a file and folder backup, file types are a quick way to include files you use the most. For example, if you keep music files on your computer, you can configure a file and folder backup to include allmusic files(for example, .mp3, .wav).
The most common file types and extensions are already defined for you. But you can define additional file type categories as needed, and then edit them at any time. For example, if you install a new program that requires the use of two new file extensions (.pft and .ptp, for example), you can define a new file type and define the two file extensions for that category. Then when you define a file and folder backup, you can select the new category. When the backup is run, all files ending with .pft and .ptp are backed up.
Page 40
Getting Started
40
Configuring Norton Ghost default options
To create a new file type and extensions
On the main menu bar, click Tasks > Options.
1
Click File Types.
2
At the bottom of the File types list, click the Add a file type (+) button to add
3
a file type category.
Type a descriptive name of the new file type category, and then press Enter.
4
At the bottomof the Extensionsfor list, clickthe Add an extension (+) button,
5
and then type an asterisk (*) and a period, followed by the extension of the file type you want to define, and then press Enter.
Click OK.
6
To edit a file type and extensions
On the main menu bar, click Tasks > Options.
1
Click File Types.
2
Select a file type from the File types list, and then do one of the following:
3
Click the Rename a file type button (at the right of the - button) to edit
Select an extension in the Extensions for column and click the Rename
Click either the Restore default file types list or the Restore default
the name of the selected file type.
an extension button (at the right of the - button) to edit the name of the extension.
extension list button to restore all default file types or extensions.
Caution: Any file types and extensions you have set up are removed. Once removed, you will have to add them again manually.
Click OK.
4
To delete a file type (and all of its extensions)
On the main menu bar, click Tasks > Options.
1
Select a file type in the File types column.
2
You cannot delete a default file type. You can delete all but one extension of a default file type,and you canadd additional extensions to a default filetype.
Click the Remove a file type (-) button , and then click OK.
3
Use this same procedure to remove file extensions from the Extensions for list.
Page 41

Using aliases for external drives

When you choose an external drive for use with Norton Ghost as either a backup destination or an Offsite Copy destination, it can become confusing if you are using more than one drive, especially when the assigned drive letter changes each time you plug in the drive.
To help you manage these destinations, Norton Ghost lets you assign an alias to each external drive. Doing so does not change the drive label, but is for use only when you are accessing those drives from within Norton Ghost.
For example, you might be swapping out two different external drives used as Offsite Copy destinations during any given week. Depending on the drive labels assigned to each drive and whether or not the drive letter previously assigned has changed, it could become confusing as to which drive you are using at any given time.
However, by associating unique aliases to each drive, then as you use the drive with Norton Ghost, the aliases you assigned appear in various locations in Norton Ghost.
Note: It is also a good idea to place physical labels on each external drive to help you manage the task of swapping the drives.
Configuring Norton Ghost default options
41Getting Started
For example, if you assigned the alias, "Drive A: Monday" to one drive, and "Drive B: Wednesday" to a second drive, their aliases appear in Norton Ghost whenever the drives are plugged in to your computer.
See “About Offsite Copy” on page 73.
To make it even easier, the Options dialog box lets you see all of your alias drive names in one view. From this view, you can remove or edit existing names.
To remove or edit external drive aliases
On the main menu bar, click Tasks > Options.
1
Under Destinations, click External Drives.
2
Select an external drive from the list and then do one of the following:
3
Click Remove to remove the alias associated with the external drive.
Click Rename to modify the alias.
Page 42
Getting Started
42
Configuring Norton Ghost default options

Configuring FTP settings for use with Offsite Copy

File Transfer Protocol, or FTP, is the simplest and most secure way to copy files over the Internet. Norton Ghost serves as an FTP client to copy your recovery points to a remote FTP server as a secondary backup of your critical data.
The Options dialog box lets you configure basic FTP settings to help ensure that your recovery points are copied to your FTP server.
To configure default FTP settings
On the main menu bar, click Tasks > Options.
1
Under Destinations, click Configure FTP.
2
Refer to the following table when making changes:
3
Connection mode: Passive (Recommended)
Connection mode: Active
Limit connection attempts to
Stop trying to connect after
Default port
Passive(sometimeswritten"PASV") mode helps avoid conflicts with security systems. Thismode is necessaryforsome firewalls and routers because when using passive mode, the FTP client opens the connection to an IP Address and port that the FTP server supplies.
Use active mode when connections or transfer attempts fail in passive mode, or when you receive data socket errors. When an FTP client connects using active mode, the server opens a connection to an IP Address and port that the FTP client supplies.
Specify the number of times Norton Ghost tries to connect to an FTP server before giving up. Norton Ghost can attempt a maximum of 100 times.
Specify the number of seconds Norton Ghost tries to connect to an FTP server before giving up. You can specify up to 600 seconds (10 minutes).
Specify the port of the FTP server that is listening for a connection.
You should consultthe FTP server administrator to be sure that the port you specify is configured to recieve incoming data.

Logging Norton Ghost messages

You can specify which product messages (errors, warnings, and information) are logged as they occur, and where the log file isstored. Productmessages can provide useful information about the status of backups or related events, and can also provide helpful information when you are troubleshooting.
Page 43
Configuring Norton Ghost default options
Two logging methods are available: Norton Ghost logging, and the Windows application log.
From the Options page, you can configure both methods.
To configure a Norton Ghost log file
On the main menu bar, click Tasks > Options.
1
Under Notifications, click Log File.
2
Click the Select the priority and type of messages drop-down list and select
3
the priority level at which a message should be logged.
43Getting Started
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
Errors
Warnings
Information
In the Log file location field, enter a path to where the log file should be
5
Send all messages, regardless of priority levels.
Send only medium and high priority messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of priority levels.
created and stored.
If you don't know the path, click Browse and select a location.
In the Maximum file sizefield, specify a maximum size (in kilobytes) that the
6
log file is allowed to grow.
The file is kept within the limit you set by replacing the oldest logged items
in the file with new items as they occur.
Click OK.
7
To configure which product events are written to a Windows event log
On the main menu bar, click Tasks > Options.
1
Under Notifications, click Event Log.
2
Page 44
Getting Started
44
Configuring Norton Ghost default options
Click the Select the priority and type of messages drop-down list and select
3
the priority level at which a message should be logged.
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
Errors
Warnings
Information
Click OK.
5
Send all messages, regardless of priority levels.
Send only medium and high priority messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of priority levels.

Enabling email notifications for product (event) messages

Email notifications can be sent to a specified email address if there are any errors or warnings that occurred when a backup is run.
Note: If you do not have an SMTP server, this feature is unavailable to you.
Notificationscan also be sent to the system event log and a custom log file located in the Agent folder of the product installation.
If notifications are not being delivered, check the setup of your SMTP server to ensure that it is functioning properly.
To enable email notifications
On the main menu bar, click Tasks > Options.
1
Under Notifications, click SMTP E-mail.
2
Page 45
Configuring Norton Ghost default options
Click the Select the priority and type of messages drop-down list and select
3
the priority level at which an email should be sent.
45Getting Started
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
Errors
Warnings
Information
In the To address text box, type the email address (for example,
5
Send all messages, regardless of priority levels.
Send only medium and high priority messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of priority levels.
admin@domain.com) where notifications are to be sent.
If desired, type theemail address of thesender in the From address text field.
6
If you do not specify a From address, the name of the product will be used.
In the SMTP server text box, type the path to the SMTP server that will send
7
the email notification (for example, smtpserver.domain.com).
From the SMTP Authentication drop-down box, select the method to use to
8
authenticate to the SMTP server specified above.
Enter your SMTP username and password.
9
If you are not sure what your username and password are, contact a system
administrator.
Click OK.
10
Page 46
Getting Started
46
Configuring Norton Ghost default options
Page 47
Chapter

Best practices for backing up your data

This chapter includes the following topics:
About backing up your data
Choosing a backup type
Best practices for backing up
Additional tips about backups
5
After defining your backup job
About selecting a backup destination
About backing up dual-boot computers

About backing up your data

Tobackup your computer oryourindividual files andfolders, you do thefollowing steps:
Define a backup
Run the backup
See “How you use Norton Ghost” on page 32.
When you define a backup, you make the following decisions:
What to back up (files and folders, or an entire drive)
Where to store the backup data (backup destination)
Whether or not to use Offsite Copy to copy backup data to remote locations
Page 48
Best practices for backing up your data
48

Choosing a backup type

When to run the backup (automatically or manually)
What compression levels to specify for recovery points, and whether to enable
security settings (encryption and password protection).
Which of the many other options you want to use. You can customize each
backup according to your backup needs.
Choosing a backup type
There are two types of backups available:
Drive-based backup: Backs up an entire hard drive
File and folder backup: Backs up only the files and folders that you select
You can usethe following guidelines to determine whichtype of backup to choose:
Drive-based backup
File and folder backup
Use this backup type to do the following:
Back up and recover your computer's system drive
(typically, the C drive, which includes your operating system).
Back up and recover a specific hard drive, such as a
secondary drive (which is a drive other than the system drive on which your operating system is installed).
Recover lost or damaged files or folders from a specific
point in time.
Use this backup type to do the following:
Back up and recover specific files and folders, for
example personal files that are stored in the My Documents folder.
Back up and recover files of a specific type, for example
music (.mp3 or .wav) or photographs (.jpg or .bmp).
Recover a specific version of a file from a specific point
in time.
See “Before you back up” on page 49.

Best practices for backing up

As you prepare to back up your computer, review this information:
Before you back up
During a backup
Page 49

About backups

Best practices for backing up
49Best practices for backing up your data
When the backup is complete
When you back up your computer, you choose from two types of backups:
drive-based backup: backs up an entire hard drive
file and folder backup: backs up only the files and folders you select
Which backup type you choose depends on what you are trying to protect and how much storage space you have to store backup data (recovery points, and file and folder backup data).
The following table highlights the key uses of each backup type:
Use toBackup type
Drive-based backup
File and folder backup

Before you back up

Consider these best practices before defining and running your first backup:
Schedule backups when you know your computer will be turned on.
Use a secondary hard disk as your backup destination.
Back up and recover your computer (system drive, typically
drive C)
Back up and recover a specific hard drive (any secondary
drive, drives other than your system drive)
Recover lost or damaged files or folders using recovery
points
Back up and recover specific files and folders, such as
personal files stored in the My Documents folder
Back up and recover files of a specific type, such as music
(.mp3, .wav) or photographs (.jpg, .bmp)
Your computer must be turned on and Windows must be running at the time a backup occurs. If not, any scheduled backups are skipped until the computer is turned on again. You then are prompted to run the missed backup.
See “Choosing a backup type” on page 48.
You should store recovery points on a hard disk other than your primary hard disk C. This practice helps ensure that you can recover your system in the event that your primary hard disk fails.
See “About selecting abackup destination ” onpage 54.
Page 50
Best practices for backing up your data
50
Best practices for backing up
Consider using external drives as your backup destination.
Give nicknames to your external drives to help you easily identify them
Use Offsite Copy
Using anexternaldrive makes your backup datamore portable. Shouldyouneed to remove your critical data from a particular location, you can quickly grab an external drive on your way out the door.
See “About Offsite Copy” on page 73.
You can assign a nickname to each external drive to help keep track of where your backup data is stored for each computer you back up. Because drive letters can change each timeyouunplug and plugan external drive into your computer, a nickname ensures that you can always know which drive you are using when you are running Norton Ghost.
Using a nickname does not change the volume label of a drive. A nickname simply helps you identify the drive when using Norton Ghost.
And the nickname sticks with the drive, so that if you plug the drive into a second computer running another copy ofNortonGhost, the nickname appears.
Note: You might also consider placing a sticky label
on each drive that matches the nickname you've assigned.
See “Using aliases for external drives” on page 41.
Use Offsite Copy to copy your latest recovery points to either a portable storage device or a remote server. By copying recovery points to a portable hard disk, you can then take a copy of your data with you when you leave the office.
See “About Offsite Copy” on page 73.
Run backups on a regular and frequent basis.
When you define your backups, schedulethem to run frequently so that you have recovery points that span at least the last two months.
See “Editing a backup schedule ” on page 89.
See “Defining a drive-based backup ” on page 57.
Page 51
Best practices for backing up
51Best practices for backing up your data
Keep personal data on a separate drive than the drive on which Windows and your software programs are installed.
Verify the recovery point after you create it to ensure that it is stable.

During a backup

While a backup is running, consider the following best practices:
Improve your computer's performanceduring a backup
You should keep your operating system and software programs separate from your own data. This practice helps to speed the creation of recovery points and reduce the amount of information that needs to be restored.For example, usethe C drive torunWindows and to install and run software programs. Use the D drive to create, edit, and store personal files and folders.
For other drive management solutions, go to the Symantec Web site at the following URL:
www.symantec.com/.
When you define a backup, you should select the option to verify the recovery point to ensure that the recovery point can be used to recover lost data.
See “Choosing a backup type” on page 48.
If you are working at your computer and a backup starts to run, you might notice that the performance of your computer slows down. Norton Ghost requires significant system resources to run a backup. If slowing occurs, you can reduce the speed of the backup to improve computer performance until you are finished working.
See “Adjusting the speed of a backup ” on page 85.

When the backup is complete

After a backup completes, consider the following best practices:
Review the contents of recovery points and file and folder backup data.
Periodically review the contents of your recovery points to ensure that you back up only your essential data.
For file and folder backups, click Recover My Files from either the Home or Tasks pages. Then click Search to display thelatest version of allthe files that are included in your backup.
Fordrive-basedbackups, see Openingfiles and folders
stored in a recovery point.
Page 52
Best practices for backing up your data
52

Additional tips about backups

Review the Status page to verify that backups have happened and to identify any potential problems.
Manage storage space by eliminating old backup data.
Review the level of protection that is provided for each of your computer's drives.
Periodically review the Status page. You can also review the events log on the Advanced page.
The event log records events when they occur, backups and any errors that might have occurred during or after a backup.
If you do not see the Advanced page tab, click View > Show Advanced Page.
Note: Backup status and other messages are also
conveyed in the system tray. So you do not even need to start the product to identify the status of your backups.
See “Verifying that a backup is successful ”on page 86.
Delete outdated recovery points to make more hard disk space available.
Also, reduce the number of file versions that are created by file and folder backups.
See “Managing recovery points” on page 127.
See “Managingfileand folder backup data” on page133.
Check the Status page on a regular basis to ensure that each drive has a defined backup.
Maintain backup copies of your recovery points.
Store backup copies of your recovery points in a safe place. For example you can store them elsewhere on a network, or you can store them on CDs, DVDs, or tapes for long-term, off-site storage.
See “Making copies of recovery points ” on page 129.
Additional tips about backups
Consider the following tips when you run a defined backup:
Norton Ghost does not need to be running for a scheduled backup to start.
After you define a backup, you can close Norton Ghost.
The computer that is being backed up must be turned on and Windows must
be started.
All defined backups are saved automatically so that you can edit them or run
them later.
Page 53

After defining your backup job

Do not run a disk defragmentation program during a backup. Doing so will
significantly increase the time that it takes to create the recovery point and might cause unexpected system resource issues.
If you have two or more drives that are dependent on each other, you should
include both drives in the same backup. This provides the safest protection.
Include multiple drives in the same definedbackup to reduce the total number
of backups thatmust berun. Doingso minimizes interruptions whileyou work.
Use the Progress and Performance feature to reduce the impact of a backup
on your computer's performance. For example, if a scheduled backup starts while you are in the middle of a presentation, you can slow down the backup to give more processing resources back to your presentation program.
The power management featureson acomputercan conflict with Norton Ghost
during a backup. For example, your computer might be configured to go into hibernation mode
after a period of inactivity. You should consider turning off the power management features during a scheduled backup.
If a backup is interrupted, consider running it again.
If you experience problems while creating a backup, you may need to reboot
the computer.
53Best practices for backing up your data
After defining your backup job
All backup jobs you define are automatically saved so that you can edit or run them later.
After you define a backup and schedule it to run, you can close Norton Ghost. The program does not need to be running for a backup to start.
However, your computer must be turned on and Windows must be running at the time abackup occurs.If not,any scheduled backups are skipped until thecomputer is turned on again. You then are prompted to run the missed backup.

Viewing the properties of a backup job

You can review the settings and configuration of adefined backup withoutopening the backup job.
To view the properties of a backup job
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, select a backup job and then click
2
Tasks > Properties.
Page 54
Best practices for backing up your data
54

About selecting a backup destination

About selecting a backup destination
You should review the following information before deciding where to store recovery points and file and folder backup data.
Note: If you choose to use CDs or DVDs as your backup destination (not recommended), you cannot back up to a sub-folder on the disk. Backup data must be created at the root of CDs and DVDs.
Table 5-1 contains information that youneed toconsider when selecting a backup
destination.
Table 5-1
Local hard drive, USB drive, or FireWire drive
(recommended)
Selecting a backup destination
Information to considerBackup destination
The benefits of this option are as follows:
Fast backup and recovery
Can schedule unattended backups
Inexpensive because drive space can be overwritten
repeatedly
Off-site storage is possible
Reserves hard drive space for other uses
Although you can save the recovery point to the same drive that you are backing up, it is not recommended for the following reasons:
As the number or size of recovery points grows, you will
have less disk space available for regular use.
The recovery point is included in subsequent recovery
points of the drive, which increases the size of those recovery points.
If the computer suffers a catastrophic failure, you may
not be able to recover the recovery point you need, even if you save it to a different drive on the same hard disk.
Page 55
About selecting a backup destination
55Best practices for backing up your data
Table 5-1
Network folder
CD-RW/DVD-RW
Selecting a backup destination (continued)
Information to considerBackup destination
If your computer is connected to a network, you can save your recovery points and file and folder backup data to a network folder.
Backing up to a network folder typically requires that you authenticate to the computer that is hosting the folder. If the computer ispart of anetworkdomain, you must provide the domain name, user name, and password. For example, domain\username.
If you are connecting to a computer in a workgroup, you should provide the remote computer name and user name. For example: remote_computer_name\username.
When you save backup data to removable media, it is automatically split intothe correct sizes ifthe backup spans more than one media.
If more than one drive is being backed up, the recovery points for eachdrivearestoredindependently on the media, even if there is space to store recovery points frommultiple drives on the same media.
The schedulingof backups isnot available whenthis option is used.
Note: Using CD-RWs or DVD-RWs as your recovery point
storage location is not the best option because you will be required to swap disks during the process.
Table 5-2describes the advantages and disadvantages of different types ofbackup
destinations.
Table 5-2
Advantages and disadvantages of backup destinations
DisadvantagesAdvantagesBackup destination
Hard drive
(recommended)
Fast backup and recovery
Can schedule unattended
backups
Inexpensive because
drive space can be overwritten repeatedly
Uses valuable drive space
Vulnerable to loss if the
hard drive fails
Page 56
Best practices for backing up your data
56

About backing up dual-boot computers

Table 5-2
Network drive
(recommended)
Removable media (local)
Advantages and disadvantages of backup destinations (continued)
Fast backup and recovery
Can schedule unattended
backups
Inexpensive because
drive space can be overwritten repeatedly
Protection from local
hard drive failure
Off-site storage (through
existing network backup strategies)
Protection from hard
drive failure
Ideal for off-site storage
Reserves hard drive space
for other uses
About backing up dual-boot computers
You can back up dual-boot computers, even if you have drives (partitions) that are hidden in the operating system from which you run Norton Ghost.
When you run a drive backup, the entire contents of each drive is captured in a recovery point. When you restore a drive, the recovered drive is bootable.
DisadvantagesAdvantagesBackup destination
Must havesupported NIC
drivers to restore from the recoveryenvironment
Must understand and
assign the appropriate rights for users who will run backups and restore data
Note: In order for your computer to boot the same from a restored system as it did from the original configuration, you must back up, and then restore, every drive that includes operating system boot information.
You should not create incremental backups of shared data drives if Norton Ghost is installed on both operating systems and they are both set to manage the shared drive.
You might encounter issues if you try to use the Norton Ghost LightsOut Restore feature on dual-boot systems. It is not supported.
Page 57
Chapter

Backing up entire drives

This chapter includes the following topics:
Defining a drive-based backup
Setting advanced options for drive-based backups
About setting a compression level for drive-based backups
About Offsite Copy
How Offsite Copy works
6

Defining a drive-based backup

A drive-based backup takes a snapshot of your entire hard drive, capturing every bit of information that is stored on it for later retrieval. All of your files, folders, desktop settings, programs, and your operating system are captured into arecovery point. You can then use that recovery point to restore individual files or folders or your entire computer.
For optimum protection, you should define a drive-based backup and run it on a regular basis.
By default, scheduled independent recovery points or recovery point set names are appended with 001.v2i, 002.v2i, and so forth. Recovery point set names are appended with _i001.iv2i, _i002.iv2i, and so forth. For example, if your base recovery point is called C_Drive001.v2i, the first incremental recovery point is called C_Drive001_i001.iv2i.
To define a drive-based backup
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, click Define New.
2
If you have not yet defined a backup, the Easy Setup dialog appears instead.
Page 58
Backing up entire drives
58
Defining a drive-based backup
Click Back up my computer, and then click Next.
3
Select one or more drives to back up, and then click Next.
4
Press and hold Ctrl to select multiple drives.
If you do not see a drive that you expected to see, check Show Hidden Drives.
Do one of the following:
5
If you selected a drive that has already been included in a defined backup,
click Next, and then skip to step 8.
Click Add drives to an existing backup, click the Select the backup
drop-down list and select an existing backup, and then click Next.
Click Define a new backup to define a new backup, and then click Next.
Select the type of recovery point that you want the backup to create.
6
Recovery point set (recommended)
Independent recovery point
Click Next.
7
Schedule a base recovery point with additional recovery points thatcontainonly incremental changes that were made to your computer since the previous recovery point.
Incremental recoverypoints are created faster thanthe base recovery point. They also use less storage space than an independent recovery point.
Note: You can only have one recovery point set defined for
each drive. The Recovery Point Set option is not available if you have already assigned a selected drive to an existing backup and specified Recovery Point Set as the recovery point type. This option also is unavailable if you select an unmounted drivethat cannot be part of a recovery point set.
Creates a complete, independent copy of the drives that you select. This backup type typically requires more storage space, especially if you run the backup multiple times.
Page 59
Defining a drive-based backup
On the Backup Destination page, select from the following options:
8
59Backing up entire drives
Folder field
Network Credentials
Customize recovery point file names
Add
Browse to the location in which you want to store the recovery points.
If Norton Ghost detects that this location does not have enough available space, it alerts you. You should choose another location that has more space.
If you want to save the recovery point on a network share, type the user name and password for network access.
See “About network credentials” on page 66.
If you want to rename the recovery point, click Rename, andthen type anewfile name.
Default file names include the name of the computer followed by the drive letter.
Click this button to add up to two Offsite Copy destinations.
Offsite Copy automatically copiesyourlatest recovery points each time a backup completes to eithera portable storage device, such as an external drive, or to a remote server either through a local area network connection or to a remote FTP server.
See “About Offsite Copy” on page 73.
If you wantto make copies of yourrecovery pointsto store at a remote location
9
for added backup protection, do the following:
Click Add and then check EnableOffsite Copy.
Check the Promptme to start a copy when I attach an external Offsite
Copy destination drive option if you want recovery points automatically copied to external Offsite Copy destination drives whenever you plug one in to your computer.
Click Browse to locate an Offsite Copy destination.
Click Add an additional Offsite Copy destination if you want to add a
second destination, and then specify the path (a local folder, network path, or FTP address) to that destination.
Click OK.
Page 60
Backing up entire drives
60
Defining a drive-based backup
See “About Offsite Copy” on page 73.
Click Next.
10
Note: You cannot use an encrypted folder as your backup destination. You
can choose to encrypt your backup data to prevent another user from accessing it.
On the Options page, select from the following options:
11
Type a name for your backup.Name
Compression
Verify recovery point after creation
Limit thenumber ofrecovery pointsets saved for this backup
Enable search engine support
Select one of the following compression levels for the recovery point.:
None
Standard
Medium
High
See “About setting a compression level for
drive-based backups” on page 72.
The results can vary depending on the types of files that are saved in the drive.
Select this option to automatically test whether a recovery point or set of files is valid or corrupt.
Select this option to limit the number of recovery point sets that can be saved for this backup. You can limitthe numberof recovery point sets to reduce the risk of filling up the hard drive with recovery points. Each new recovery point set replaces the oldest set on your backup destination drive.
Select thisoption to leta search engine, such as GoogleDesktop,index all ofthe filenames that are contained in each recovery point. By indexing the file names, you can then use your search engine to locate files you want to restore.
See “About using a search engine to search
recovery points” on page 175.
Page 61
Defining a drive-based backup
61Backing up entire drives
Include system and temporary files
Description text box
Advanced
Click Next.
12
If appropriate, in the drop-down lists, select the command file (.exe, .cmd,
13
Check thisoptionto include indexing support for operating system and temporary files when arecovery point is createdon theclient computer.
Type a description for the recovery point. The description can be anything that helps you further identify the recovery point's contents.
In the Advanced Options dialog box, select any of the following options, and then click OK.
Divide into smaller files to simplify
archiving
Disable SmartSector Copying
Ignore bad sectors during copy
Use password
Use AES Encryption
See “Setting advanced options for
drive-based backups” on page 68.
.bat) that you want to run during a particular stage in the recovery point
creation process, and then specify the amount of time (in seconds) that you
want the command to run before it is stopped.
If you added the command file to the CommandFiles folder, you may need to
click Back, and then Next to see the files in each stage’s drop-down list.
See “Run command files during a backup ” on page 66.
Click Next.
14
Do one of the following:
15
If you chose a recovery point set as your recovery point type in step 6,
skip to the next step.
If you chose an independent recovery point as your recovery point type,
click the Automatically createa recovery point drop-down list, and then select one of the following options:
No Schedule
Runs the backup only when you runityourself, manually.
Page 62
Backing up entire drives
62
Defining a drive-based backup
Weekly
Monthly
Only run once
Click Schedule if you want the backup to run automatically, according to a
16
Runs the backup at the time and on the days of the week that you specify.
When youselectthis option, the Select thedays of the week to protect box appears.
Runs the backup at the time and on the days of the week that you specify.
When youselectthis option, the Select thedays of the month to protect box appears.
Runs the backup one time on the date and at the time you specify.
When youselectthis option,the Createa single recovery point box appears.
schedule.
If you only want to run the backup when you start it manually, uncheck Schedule and skip to the next step.
Enter a start time and select the days of the week when the backup should
17
run.
Click the Start a new recovery point set drop-down list, and then select how
18
frequently a new recovery point set should be started.
For example, if you select Monthly, a new base recover point is created the first time the backup runs during each new month.
For advanced scheduling options, such as setting up event triggers that start
19
the backup in response to specific events, click Advanced and configure any of the following options:
Page 63
Defining a drive-based backup
63Backing up entire drives
Schedule
(Backup Time)
Event Triggers
(General)
Click OK, and then click Next.
20
If you want to run the new backup immediately, click Run backup now.
21
Do one or more of the following:
Click Schedule, andthen select thedays and a starttimeforwhen
the backup should run.
Check Runmore than once per day if you frequentlymodify data
that you want to protect. Also, specify the maximum time that should occur between
backups and the number of times per day that the backup should run.
Click theAutomaticallyoptimizedrop-downlist, andthenselect
how often optimization should occur to help manage the disk space that is used by your backup destination.
Click theStarta new recoverypoint set drop-downlist andselect
how frequently a new recovery point set should be started. Click Custom to customize the option you select.
Select the type of events that should automatically start the backup.
See “Enabling event-triggered backups ” on page 87.
This option is not available if you configured an independent recovery point
with the option to run it only once.
Click Finish.
22

Running a One Time Backup

The OneTime Backup feature lets you quickly defineand runa backup that creates an independent recovery point. You use the One Time Backup Wizard to define the backup. The backup runswhen you complete theWizard. Thebackup definition is not saved for future use. You can use the independent recovery point later.
This feature is useful when you need to back up your computer or a particular drive quickly before a significant event. For example, you can run a one-time backup before you install new software. Or, you can run it when you learn about a new computer security threat.
To run a one time backup
On the Tasks page, click One Time Backup.
1
Click Next.
2
Page 64
Backing up entire drives
64
Defining a drive-based backup
Select one or more drives to back up and click Next.
3
Note: Press and hold Ctrl to select multiple drives.
Click Next.
4
In the Backup Destination dialog box, select from the following options:
5
Folder field
Rename button
Network Credentials
Click Next.
6
On the Options page, select from the following options:
7
Compression
Browse to the location in which you want to store the recovery points.
If Norton Ghost detects that this location does not have enough available space, it alerts you. You should choose another location that has more space.
If you want to rename the recovery point, click Rename, andthen type anewfile name.
Default file names include the name of the computer followed by the drive letter.
If you want to save the recovery point on a network share, type the user name and password for network access.
See “About network credentials” on page 66.
Select one of the following compression levels for the recovery point:
None
Standard
Medium
High
The results can vary depending on the types of files that are saved in the drive.
Verify recovery point after creation
Select this option to automatically test whether a recovery point or set of files is valid or corrupt.
Page 65
Defining a drive-based backup
65Backing up entire drives
Description text box
Advanced
Click Next.
8
If appropriate, in the drop-down lists, select the command file (.exe, .cmd,
9
Type a description for the recovery point. The description can be anything that helps you further identify the recovery point's contents.
In the Advanced Options dialog box, select any of the following options, and then click OK.
Use password
Use Encryption
Divide into smaller files to simplify
archiving
Ignore bad sectors during copy
Disable SmartSector Copying
See “Setting advanced options for
drive-based backups” on page 68.
.bat) that you want to run during a particular stage in the recovery point
creation process, and then specify the amount of time (in seconds) that you
want the command to run before it is stopped.
If you added the command file to the CommandFiles folder, you may need to
click Back, and then Next to see the files in each stage’s drop-down list.
See “Run command files during a backup ” on page 66.
Click Next.
10
Click Finish to run the backup.
11

Files excluded from drive-based backups

The following files are intentionally excluded from drive-based backups:
hiberfil.sys
pagefile.sys
These files contain temporary data that can take up a large amount of disk space. They are not needed, and there is no negative impact to your computer system after a complete system recovery.
These files do appear in recovery points, but they are placeholders. They contain no data.
Page 66
Backing up entire drives
66
Defining a drive-based backup

About network credentials

If you connect to a computer on a network, you must provide the user name and password for network access, even ifyou previously authenticated to the network. The Norton Ghost service runs on the local system account.
When you enter network credentials, the following rules apply:
If the computer you want to connect to is on a domain, provide the domain
name, user name, and password. For example: domain\username
If you connect to a computer in a workgroup, provide the remote computer
name and user name. For example: remote_computer_name\username
If you have mapped a drive, you might be required to supply the user name
and password again because the service runs in a different context and cannot recognize the mapped drive.
By going to the Tasks menu and selecting Options, you can set a default location, including network credentials. Then when you create future backup jobs, the dialog will default to the location you specified. Another option would be to create a specific "backup" user account. Then configure the Norton Ghost service to use this account.

Run command files during a backup

You can usecommand files (.exe, .cmd, .bat) duringa backup. You can use command files to integrate Norton Ghost with other backup routines that you might be running on the computer. You can also use command files to integrate with other applications that use a drive on the computer.
Note: You cannot run command files that include a graphical user interface, such as notepad.exe. Running such command files will cause the backup job to fail.
You can run a command file duringany ofthe following stages during thecreation of a recovery point:
Before data capture
After data capture
After recovery point creation
You can also specify the amount of time that a command file should be allowed to run.
Page 67
Defining a drive-based backup
You can specify the location of command files if you want them to be located in a placeother thanthe defaultlocation. You can also specifya locationon aper-job basis, as well as specify a location that can be shared among several computers. If you specify a network location, you must provide network credentials.
See “About network credentials” on page 66.
The most common use for running command files is to stop and restart non-VSS-aware databases that you want to back up.
To use a Visual Basic script file (.VBS) during a backup, you can create a batch file (.BAT) to run the script. For example, you can create a batch file called STOP.BAT that contains the following syntax:
Cscript script_filename.vbs
Make sure that Cscript precedes the file name of the Visual Basic script.
Warning: The command files cannot depend on any user interaction or have a visible user interface. You should test all command files independently of Norton Ghost before you use them during a backup.
When the backup begins, the command file is run during the specified stage. If an error occurs while a command file is running or the command file does not finish in the time you specified (regardless of the stage), the backup is stopped, the command file is terminated (if necessary), and the error information is logged and displayed.
Table 6-1 describes the stages of recovery point creation.
67Backing up entire drives
Page 68
Backing up entire drives
68

Setting advanced options for drive-based backups

Table 6-1
Before data capture
After data capture
Recovery point creation stages
DescriptionStage
This stage occurs after a backup has started and before a recovery point is created. You can run a command during this stage to prepare for the recovery pointcreationprocess.For example, you can closeany open applications that are using the drive.
Note: If you usethis option, besurethe command
file has an error recovery mechanism built into it. If the computer has one or more services that must be stopped at this stage (such as stopping a non-VSS aware database or a resource intensive application), and the command file does not contain any form of error recovery, one or more of the stopped services may not be restarted. An error in the command file can cause the recovery point creation process to stop immediately. No other command files will run.
See “How you use Norton Ghost” on page 32.
This stage occurs after a snapshot is created. Running a command duringthisstageis typically a safe point for allowing services to resume normal activity on thedrive while continuing the recovery point creation.
Because the snapshot takes only a few seconds to create, the database is in the backup state momentarily. A minimal number of log files are created.
After recovery point creation
This stage occurs after the recovery point is created.You can run a command duringthis stage to act on the recovery point itself. For example, you can copy it to an offline location.
Setting advanced options for drive-based backups
When you definea drive-based backup, you can set the following advanced options:
Page 69
Setting advanced options for drive-based backups
69Backing up entire drives
Divide into smaller files to simplify archiving
Disable SmartSector Copying
Ignore bad sectors during copy
Use password
Use AES encryption
You can split the recovery point into smaller files and specify the maximum size (in MB) for each file.
Forexample, if you plan to copy a recovery pointto ZIP disks from your backup destination, specify a file size of 100 MB or less, according to the size of each ZIP disk.
SmartSector technology speeds up the copying process by only copying the hard-disk sectors that contain data. However, in some cases, you might want to copy all sectors in their original layout, whether or not they contain data.
This optionlets you copy usedand unused hard-disksectors. This option increases processing time and usually results in a larger recovery point.
This option lets you run a backup even if there are bad sectors on the hard disk. Although most drives do not have bad sectors, the potential for problems increases during the lifetime of the hard disk.
This option sets a password on the recovery point when it is created. Passwords can include standard characters, not extended characters or symbols. (Use characters with an ASCII value of 128 or lower.)
A user must type this password before restoring a backup or viewing the contents of the recovery point.
You can encrypt your recovery point data to add another level of protection to your recovery points.
You can choose from the following encryption levels:
Low (8+ character password)
Medium (16+ character password)
High (32+ character password).

Editing advanced backup options

After you define a backup, you can go back at any time and edit the advanced options you chose when you first defined the backup.
To edit advanced backup options
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click Edit Settings.
Click Next twice.
2
Click Advanced.
3
Page 70
Backing up entire drives
70
Setting advanced options for drive-based backups
In the Advanced Options dialog box, make your changes, and then click OK.
4
Click Next three times, and then click Finish.
5

About recovery point encryption

You can enhance the security of your data by using the Advanced Encryption Standard (AES) to encrypt recovery points that you create or archive. You should use encryptionif you store recovery points on a network and want to protect them from unauthorized access and use.
You can also encrypt recovery points that were created with earlier versions of Symantec LiveState Recovery or Norton Ghost. However, encrypting those files will make them readable with the current product only.
You can view the encryption strength of a recovery point at any time by viewing the properties of the file from the Recovery Point Browser.
Encryption strengths are available in 128-bit, 192-bit, or 256-bit. While higher bit strengths requirelonger passwords, theresult is greater security for your data.
Table 6-2 explains the bit strength and required password length.
Table 6-2
You must provide the correct password before you can access or restore an encrypted recovery point.
Warning: Store the passwordin asecure place. Passwords arecase-sensitive.When you access orrestore a password encryptedrecovery point,NortonGhost prompts you for the case-sensitive password. If you do not type the correct password or you forget the password, you cannot open the recovery point.
Symantec Technical Support has no method for opening an encrypted recovery point.
Besides bit strength, the make-up of the password can improve the security of your data.
For better security, passwords should use the following general rules:
Password length
Password lengthBit strength
8 characters or longer128 (Standard)
16 characters or longer192 (Medium)
32 characters or longer256 (High)
Page 71
Avoid using consecutive, repeating characters (for example, BBB or 88).
Avoid using common words that you would find in a dictionary.
Use at least one number.
Use both uppercase and lowercase alpha characters.
Use at least one special character such as ({}[],.<>;:’"?/|\`~!@#$%^&*()_-+=).
Change the password after a set period of time.

Verifying a recovery point after creation

If youselected the Verify recovery point after creation option on the Options page of the Define Backup Wizard, the recovery point is checked to see that all of the files that make up the recovery point are available for you to open. Internal data structures in the recovery point are matched with the data that is available. Also, the recovery point can be uncompressed to create the expected amount of data (if you selected a compression level at the time of creation).
Note: The time required to create a recovery point is doubled when you use the Verify recover point after creation option.
Setting advanced options for drive-based backups
71Backing up entire drives
To verify the integrity of a recovery point
On the Tools page, click Run Recovery Point Browser.
1
Select a recovery point, and then click Open.
2
In the tree panel of the Recovery Point Browser, select the recovery point.
3
For example: C_Drive001.v2i.
On the File menu, click Verify Recovery Point.
4
If the Verify Recovery Point option is unavailable, you must first dismount
the recovery point. Right-click the recovery point and click Dismount
Recovery Point.
When the validation is complete, click OK.
5
If you prefer, you can have recovery points automatically verified for integrity
at the time they are created.
See “Setting advanced options for drive-based backups” on page 68.
Page 72
Backing up entire drives
72

About setting a compression level for drive-based backups

Viewing the progress of a backup

You can view the progress of a backup while it runs to determine how much time remains until the backup completes.
To view the progress of a backup
While a backup is running, on the View menu, click Progress and
Performance.
About setting a compression level for drive-based backups
During the creation of a recovery point, compression results may vary, depending on the types of files saved to the drive you are backing up.
Table 6-3 describes the available compression levels.
Table 6-3
None
Standard (recommended)
Medium
High
Compression levels
DescriptionCompression level
Use this option if storage space is not an issue. However, if the backup is being saved to a busy network drive, high compression may be faster than no compression because there is less data to write across the network.
This option uses low compression for a 40 percent average data compression ratio on recovery points. This setting is the default.
This option uses medium compression for a 45 precent average data compression ratio on recovery points.
This option uses high compression fora 50 percent average data compression ratio on recovery points. This setting is usually the slowest method.
When a high compression recovery point is created, CPU usage might be higher than normal. Other processes on the computer might also be slower. To compensate, you can adjust the operation speed of Norton Ghost. This might improve the performance of other resource-intensive applications that you are running at the same time.
Page 73

About Offsite Copy

Backing up your data to a secondary hard disk is a critical first step to protect your information assets. But to make certain your data is safe, use Offsite Copy to copy your latest recovery points to either a portable storage device, remote server in your network, or to a remote FTP server.
Regardless of the method you use, storing copies of your recovery points at a remote location provides a crucial level of redundancy in the event thatyour office becomes innaccesible. Offsite Copy can double your data protection by ensuring that you have a remote copy.

How Offsite Copy works

You enable and configure Offsite Copy when you define a new drive-based backup job. Or you can edit an existing backup job to enable Offsite Copy.
When you enable Offsite Copy, you specify up to two Offsite Copy destinations. After the backup job finishes creating recovery points, Offsite Copy verifies that at leastone of the Offsite Copydestinations are available. Offsite Copy then begins copying the new recovery points to the Offsite Copy destination.
Newest recoverypoints are copied first followed by the next oldest recovery points. If you have set up two Offsite Copy destinations, Offsite Copy copies recovery points to the destination that was added first. If an Offsite Copy destination is unavailable, Offsite Copy tries to copy recovery points to the second destination, if it is available. If neither destination is available, then Offsite Copy copies the recovery points the next time an Offsite Copy destination becomes available.
For example, suppose you have configured a backup job to run at 6 p.m. and configured an external drive as an Offsite Copy destination. However, when you leave the office at 5:30 p.m., you take the drive with you for safe keeping. When the backup job completes at 6:20 p.m., Norton Ghost detects that the Offsite Copy destination drive is not available and the copy process aborted. The following morning, you plug the drive back in to the computer. Norton Ghost detects the presence of the Offsite Copy destination drive and automatically begins copying your recovery points.
Offsite Copy is designed to use very little system resources so that the copying process is done in the background. This feature lets you continue to work at your computer with little or no impact on system resources.
If an Offsite Copy destination runs out of disk space, Offsite Copy identifies the oldest recovery points and removes them to make room for the most current recovery points. Offsite Copy then copies thecurrentrecovery points tothe Offsite Copy destination.
About Offsite Copy
73Backing up entire drives
Page 74
Backing up entire drives
74
How Offsite Copy works
See “To define a drive-based backup” on page 57.
See “Editing backup settings” on page 87.

Using external drives as your Offsite Copy destination

Use an external drive as your Offsite Copy destination. This method lets you take a copyof yourdata withyou when youleave the office. By using two externalhard disks, you can be certain that you have a recent copy of your data both on and off site.
For example, suppose on a Monday morning you define a new backup job of your system drive. You choose a recovery point set as your backup job type. You set up an external drive (A) as the first Offsite Copy destination, and another external drive (B) as the second Offsite Copy destination. You schedule the backup job to run every midnight except on the weekends. You also enable recovery point encryption to protect the data that you take with you from unauthorized access.
See “About recovery point encryption ” on page 70.
Before you leave the office on Monday evening, you plug in drive A and take drive B home with you.
On Tuesday morning, you find that Monday's base recovery point has been successfully copied to drive A. At the end of the day, you unplug drive A and take it home for safe keeping.
Page 75
How Offsite Copy works
On Wednesday morning, you bring drive B to the office. You plug in drive B and Norton Ghost detects that drive B is an Offsite Copy destination. Norton Ghost then automatically beginscopyingMonday night'sbase recoverypoint and Tuesday night's incremental recovery point. At the end of the day Wednesday, you take drive B home and place it in a safe place with drive A.
You now have multiple copies of recovery points stored at two separate, physical locations: your original recovery points stored on your backup destinations at the office, and copies of those same recovery points stored on your Offsite Copy destination drives. Your Offsite Copy destination drives are stored in a safe place at your home.
The next morning, Thursday, you take drive A to the office and plug it in. Tuesday and Wednesday night's recovery points are then automatically copied to drive A.
Note: Consider using the external drive naming feature that lets you provide a unique name, or alias, to each drive. Then place matching physical labels on each external drive to help you manage the task of swapping the drives.
See “Using aliases for external drives” on page 41.
Each time you plug in either drive A or B, the latest recovery points are added to the drive. This method gives you multiple points in time for recovering your computer in the event that the original backup destination drives fail or become unrecoverable.
Using external drives as your Offsite Copy destination ensures that you have a copy of your backup data stored at two separate, physical locations.
75Backing up entire drives

Using a network server as your Offsite Copy destination

You can also specify a local area network server as an Offsite Copy destination. You must be able to access the server that you plan to use. You must either map a local drive to the server, or provide a valid UNC path.
For example, suppose that you set up a local external drive as your first Offsite Copy destination. Then you identify a server that is located at a second physical location from your own office. You add the remote server as a second Offsite Copy destination. As backups occur, recovery points are copied first to the external hard drive, and then to the remote server.
If the remote server becomes unavailable for a period of time, Offsite Copy copies all recovery points created since the last connection. If there is no room to hold all of the recovery points available, Offsite Copy removes the oldest recovery points from the FTP server, making room for the newest recovery points.
Page 76
Backing up entire drives
76
How Offsite Copy works

Using an FTP server as your Offsite Copy destination

Using an FTP server as your Offsite Copy destination is similar to using a server. You must provide a valid FTP path to the FTP server.
You must also provide the correct FTP connection information to Norton Ghost in order for this method to work correctly. When Offsite Copy is configured correctly, it copies recovery points to the directory that you specified on the FTP server. If the server becomes unavailable for a period of time, Offsite Copy copies all recovery points created since the last connection. If there is no room to hold all of the recovery points available, Offsite Copy removes the oldest recovery points from the FTP server, making room for the newest recovery points.
See “Configuring FTP settings for use with Offsite Copy” on page 42.
Page 77
How Offsite Copy works
77Backing up entire drives
Page 78
Backing up entire drives
78
How Offsite Copy works
Page 79
Chapter

Backing up files and folders

This chapter includes the following topics:
Defining a file and folder backup
Folders excluded by default from file and folder backups

Defining a file and folder backup

When you define and run a file and folder backup, copies are made of each of the files and folders that you have chosen to back up. They are converted into a compressed format, and then stored in a sub-folder at the location you specify, which by default is the same backup destination that is used for storing recovery points.
To define a file and folder backup
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, click Define New.
2
If you have not yet defined a backup, the Easy Setup dialog appears.
Select Back up selected files and folders, and then click Next.
3
7
Page 80
Backing up files and folders
80
Defining a file and folder backup
Select the files and folders you want to include in your backup, and then click
4
Next.
Selecting file types lets Norton Ghost find and include files that match the files you want backed up. If a file type is not included in the predefined list, click Add File Type. You can also manually select folders or individual files.
Note: On all versions of Windows, except for Windows Vista, the My Documents folder contains two subfolders by default: My Pictures and My Music. These folders contain only the shortcuts tofolders at another location and not the actual files. This might lead you to think that by including My Documents and all subfolders in your backup, your picture and music files will get backed up.
If you intend to back up your pictures and music files, be sure to include the actual folders where your files are stored. On Windows Vista, these folders exist at the same level as Documents (formerly, My Documents).
In the Name box, type a name for your new backup.
5
In the Description (optional) box, type a description for the new backup.
6
Click Browse to locate a folder for storing your backup data or accept the
7
default location.
Note: You cannot use an encrypted folder as your backup destination. If you want to encrypt your backup data to prevent another user from accessing it, refer to the next step.
To modify advanced options, click Advanced. Do any of the following:
8
Click Use password, and then type a password.
Use standard characters, not extended characters or symbols. You must type this password before you restore a backup or view its contents.
For an additional level of security, click Use encryption to encrypt your
file data.
In the Exclude group box, uncheck any of the folders you want to include
in your backup. The folders listed are typically notused for storing personalfiles orfolders.
These folders are backed up whenyou define and run adrive-based backup of your system drive (typically C).
Click OK, and then click Next.
9
Page 81
Defining a file and folder backup
Click Schedule if you want the backup to run automatically, according to a
10
schedule.
If you want to run the backup only when you start it manually, uncheck
Schedule.
Enter a start time and select the days of the week when the backup should
11
run.
For advanced scheduling options, such as setting up event triggers that start
12
the backup in response to specific events, click Advanced and configure any
of the following options:
81Backing up files and folders
Schedule (Backup Time)
Event Triggers (General)
Click Next to review the backup options you have selected.
13
Toreviewthe total number andsize of files to be included in the backup, click
14
Do one or more of the following:
Click Schedule, and then select the
days and a start time for when the backup should run.
Check Run more than once per day if
you frequently modify data that you want to protect.
Also, specify the maximum time that should occur between backups and the number of times per day that the backup should run.
Select the type of events that should automatically start the backup.
See “Enabling event-triggered backups ” on page 87.
Preview.
Note: Depending on the amount of data you haveidentified for file and folder
backup, the preview process could take several minutes.
If you want to run the new backup immediately, click Run backup now, and
15
then click Finish.
Page 82
Backing up files and folders
82

Folders excluded by default from file and folder backups

Folders excluded by default from file and folder backups
The following folders and their contents are excluded automatically from file and folder backups:
Windows folder
Program Files folder
Temporary folder
Temporary Internet Files folder
These folders are typically not used for storing personal files or folders. However, they are backed up when you define and run a drive-based backup of your system drive (typically C).
See “Defining a file and folder backup ” on page 79.
You can include these folders when you define a file and folder backup.
Page 83
Chapter

Running and managing backup jobs

This chapter includes the following topics:
Running an existing backup job immediately
Adjusting the speed of a backup
Stopping a backup or recovery task
Verifying that a backup is successful
8
Editing backup settings
Enabling event-triggered backups
Editing a backup schedule
Turning off a backup job
Deleting backup jobs
Adding users who can back up your computer

Running an existing backup job immediately

This is particularly useful when you are about to install a new product and want to make sure you have a current recovery point in the event that something goes wrong with the installation. It can also help you to ensure that you have a backup of your work after you have modified a large number of files and you don't want to wait for a regularly scheduled backup.
You can run an existing backup at any time.
Page 84
Running and managing backup jobs
84
Running an existing backup job immediately
Note: If necessary, you can run a quick backup of a particular drive without using
a defined backup.
See “Running a One Time Backup” on page 63..
Norton Ghost can be configured to run a backup automatically when an event occurs on your computer, such as installing a new software program.
See “Enabling event-triggered backups ” on page 87.
When you runa backup, you should closeany partitioning software that is running, such as Norton PartitionMagic. Also, you should not run any disk defragmenting software during a backup.
You can also schedule backups to run automatically, according to a schedule.
See “Editing a backup schedule ” on page 89.
To run an existing backup immediately from the system tray
On the Windows desktop, right-click the Norton Ghost system tray icon.
1
Click Run Backup Now.
2
Click a backup job to start the backup.
3
If the menus displays No Jobs, you must start Norton Ghost and define a backup.
To run an existing backup immediately from within Norton Ghost
On the Home page, click Run or Manage Backups.
1
Select a backup from the list, and then click Run Now.
2

Run a backup with options

If you want toquickly run an existing drive-based backup, butyou want thebackup to create an alternate type of recovery point, use the Run Backup With Options feature.
This is a unique option in that if you run an existing backup job, the recovery point created is dictated by the type of recovery point that was created the last time the backup job was run. Use this option to create an alternate recovery point type.
Note: Using this option does not change the settings of the defined backup. To do that, you must open the backup and modify its settings manually.
See “Editing a backup schedule ” on page 89.
Page 85

Adjusting the speed of a backup

See “Editing backup settings” on page 87.
To run a backup with options
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, select the drive-based backup job
2
that you want to run.
Click Tasks > Run Backup With Options.
3
Select one of the following options:
4
Note: Depending on the current state of the backup, one or more options
might be disabled. For example, if youhave not yetrun thebackup, you cannot
select the first option,Incremental recoverypoint of recent changes, because
the base recovery point has not yet been created.
85Running and managing backup jobs
Incremental recovery point of recent
changes
New recovery point set
Independent recovery point
Click OKto run the backup job and create therecovery point typeyou selected.
5
Adjusting the speed of a backup
Depending on the speed of your computer, how much RAM you have installed, and the number of programs you are running during a backup, your computer could become sluggish.
You can manually adjust the effect of a backup on the performance of your computer to match your needs at the moment. This feature is useful if you are working on your computer and don't want the backup process to slow you down.
Select this option if the backup already has a base recovery point created and you want to simply capture changes made to the drive since the last backup.
Select this option if you want to start a completely new recovery point set. When you select this option, a base recovery point is created.
Select this option to create an independent recovery point, which is a complete snap shot of your entire drive.
To specify an alternate backup location, click Browse.
Page 86
Running and managing backup jobs
86

Stopping a backup or recovery task

To adjust the performance of a backup
While a backup is running, on the View menu, click Progress and
1
Performance.
Do one of the following:
2
If you want to increase the speed of your computer by reducing the speed
of the backup, drag the slider toward Slow.
If you want the backup to complete as quickly as possible and you are not
doing extensive work on your computer, drag the slider toward Fast.
When you are finished, click Hide to dismiss the Progress and Performance
3
dialog box.
Stopping a backup or recovery task
You can stop a backup or a recovery task that has already started.
To stop a backup or recovery task
Do one of the following:
On theView menu, clickProgress and Performance, andthen click Cancel
Operation.
On the Windows system tray, right-click the Norton Ghost tray icon, and
then click Cancel CurrentOperation.

Verifying that a backup is successful

After a backup completes, you can validate the success of the backup from the Status page to ensure you have a way to recover lost or damaged data.
The Status page contains a scrolling calendar that is aligned with each drive on your computer. The calendar lets you quickly identify when a backup ran, and what type of backup it was. It also identifies upcoming, scheduled backups.
See “Monitoring backup protection from the Status page ” on page 109.
Note: When you define a drive-based backup, you should select the option to verify the recovery point after it is created.
Depending on the amount of data being backed up, this can significantly increase the time it takes to complete the backup. However, it can ensure that you have a valid recovery point when the backup finishes.
Page 87
See “Verifying a recovery point after creation ” on page 71.
To verify the success of a backup
On the Status page, review the Backups calendar, and verify that the backup
1
appears on the date that you ran it.
Move your mouse over a backup icon to review the status of the backup.
2

Editing backup settings

You can modify the settings of an existing backup. The Edit Settings feature gives you access to several ofthe key pages ofthe Define Backup Wizard. You canmodify every setting except the option to change the recovery point type.
To edit backup settings
On the Home or Tasks pages, click Run or Manage Backups.
1
Select a backup to edit.
2
Click Edit Settings.
3
Make changes to the backup.
4
See “Defining a drive-based backup ” on page 57.
See “Defining a file and folder backup ” on page 79.
Editing backup settings
87Running and managing backup jobs

Enabling event-triggered backups

Norton Ghost can detect certain events and run a backup when they occur.
For example, to protect your computer when you install new software, Norton Ghost can run a backup when it detects that new software is being installed. If a problem occurs that harms your computer, you can use this recovery point to restore your computer to its previous state.
You can configure Norton Ghost toautomaticallyrun abackup when thefollowing events occur:
Any application is installed
A specified application is started
Any user logs on to Windows
Any user logs off of Windows
The data added to a drive exceeds a specified number of megabytes
This option is unavailable for file and folder backups.
Page 88
Running and managing backup jobs
88
Enabling event-triggered backups
The Maxtor OneTouch™ external hard drive button is pushed
Note: This feature only appearsif you have a Maxtor OneTouchdrive installed, and you are running a Windows XP 32-bit platform.
To enable event-triggered backups
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click ChangeSchedule.
2
Click General under Event Triggers.
3
Select the events you want detected, and then click OK.
4

Enabling Symantec ThreatCon Response

ThreatCon is Symantec's early warning security threat system. When Symantec identifies various threats, the ThreatCon team adjusts the threat level to give people and systems adequate warning inorderto protectdata and systems against attack.
When you enable the Symantec ThreatCon Response trigger for a particular backup job, Norton Ghost detects changes in the threat level, assuming your computer is online at the time. When Norton Ghost detects that the ThreatCon level you chose is either reached or exceeded, the backupjob in which you enabled Symantec ThreatCon Response is started automatically. You then have a recovery point to use to recover your data should your computer become affected by the latest threat.
Note: If your computer is not online, then it is not susceptible to online threats. But if you connect your computer to the Internet at any time, it becomes vulnerable. You do not have to enable or disable Symantec ThreatCon Response when you go on or off line. It simply works if you are online, but does nothing if you are off line.
Table 8-1
Level
Level 2
Norton Ghost ThreatCon levels
DescriptionThreat
No discernable security threats exist.Level 1
Security threats could occur, although no specific threats have been known to occur.
Page 89

Editing a backup schedule

89Running and managing backup jobs
Table 8-1
Level
Formore information about SymantecThreatCon,visit http://www.symantec.com.
To configure Symantec ThreatCon Response
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click ChangeSchedule.
2
Click ThreatCon Response under Event Triggers.
3
From the drop-down list, select the threat level that when met or exceeded
4
should start your backup job, and then click OK.
Note: Level 1 of Symantec ThreatCon indicates that there are no threats.
Because level 1 suggests no threats, it is not an option in the drop-down list.
However, you can disable Symantec ThreatCon Reponse by choosing the first
option.
See “To disable Symantec ThreatCon Response” on page 89.
Norton Ghost ThreatCon levels (continued)
DescriptionThreat
An isolated security threat is in progress.Level 3
Extreme global security threats are in progress.Level 4
To disable Symantec ThreatCon Response
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click ChangeSchedule.
2
Click ThreatCon Response under Event Triggers.
3
From the drop-down list, select DoNotMonitor- Disable, and then click OK.
4
Editing a backup schedule
You can edit any of the schedule properties for a defined backup to adjust the date and time.
To edit a backup schedule
On the Home page, click Run or Manage Backups.
1
Select a backup to edit.
2
Page 90
Running and managing backup jobs
90

Turning off a backup job

Click Change Schedule.
3
Make changes to the schedule, and then click OK.
4
Turning off a backup job
You can turn off a backup and re-enable it later. When you turn off a backup, it will not run according to its defined schedule, if it has one. When a backup is turned off, triggered events will not run it, nor can you run it manually.
You can also delete a defined backup (not recovery points).
See “Deleting backup jobs ” on page 90.
To turn off a backup job
On the Home page, click Run or Manage Backups.
1
Select the backup that you want to turn off.
2
Click Tasks > Disable Backup.
3
Repeat this procedure to re-enable the backup. The Disable Backup menu item changes to Enable Backup when you disable the selected backup.

Deleting backup jobs

You can delete backup jobs when they are no longer needed.
Deleting a backup jobdoes not delete the recoverypoints or file and folder backup data from the storage location. Only the backup job is deleted.
If you want to deletebackup data (recovery pointsand file andfolder backup data), refer to the following topics:
See “Managing recovery points” on page 127.
To delete backup jobs
On the Home page, click Run or Manage Backups.
1
Select one or more backups, and then click Remove.
2
Click Yes.
3

Adding users who can back up your computer

You can use the Security Configuration Tool to control which users on your computer can access and configure key features of Norton Ghost.
Page 91
Adding users who can back up your computer
For example, all users with Limited Windows accounts can run existing backup jobs, but they cannot create new jobs or modify existing jobs. However, using the Security Configuration Tool, you can grant administrative privileges to a Limited user account. When you do, that user has full access to Norton Ghost and can create, modify, delete, and run backup jobs.
Note: By default, all users can run existing backup jobs. But only users with administrative accounts can create, edit, or delete backup jobs.
To add users who can back up a computer
On the Windows taskbar, click Start > Programs > Symantec > NortonGhost
1
> Security Configuration Tool.
On Windows Vista, click Start > All Programs > Symantec > Security
Configuration Tool.
Click Add.
2
In the Enter the object names to select box, type the names of the users or
3
groups you want to add.
Click OK.
4
To delete users or groups, select a user or group, and then click Remove.
5
Click OK to apply your changes and close the Security Configuration Tool.
6
To configure access rights for users or groups
On the Windows taskbar, click Start > Programs > Symantec > NortonGhost
1
> Security Configuration Tool
On Windows Vista, click Start > All Programs > Symantec > Security
Configuration Tool.
Select a user or group from the Group or user names box.
2
91Running and managing backup jobs
Page 92
Running and managing backup jobs
92
Adding users who can back up your computer
Choose from the following options:
3
DenyAllowPermissions
Full Control
Status Only
Click OK to apply your changes and close the Security Configuration Tool.
4
Select to give the user or group full access to all of the features of Norton Ghost. Full control gives users the right to create, edit, and delete backup jobs, including existing jobs.
Select to deny the user or group administrative access to the features of Norton Ghost. They can run existing backup jobs, but they cannot create, edit, or delete them.
Select to deny the user or group administrative access to the features of Norton Ghost. They can run existing backup jobs, but they cannot create, edit, or delete them.
When you deny Status Only, the user or group cannot access any of the features of Norton Ghost.
Page 93
Chapter

Backing up remote computers from your computer

This chapter includes the following topics:
About backing up other computers from your computer
Adding computers to the Computer List
9
Deploying the agent
Using the Norton Ghost Agent
Managing the agent through Windows Services
Best practices for using services
Controlling access to Norton Ghost

About backing up other computers from your computer

Norton Ghost lets you connect to, and back up a second computer on your home or office network. You can manage as many computers as needed, but you can only manage one computer at a time.
Page 94
Backing up remote computers from your computer
94

Adding computers to the Computer List

Note: Youmust purchase a separate license for each computer you want tomanage.
You can deploy the agent without a license for a 30-day evaluation. After that time, you must purchase and install the license to continue managing the remote computer. You can purchase additional licenses at the Symantec Global Store. Visit:
http://shop.symantecstore.com
First, you add a computer's name or IP address to the Computer List. Then, you deploy the Norton Ghost Agent to the remote computer. Oncethe agent isinstalled, the computer automatically restarts. After the computer restarts, you can then connect to thecomputer. When you do,the Norton Ghost product interface changes to reflect the status of the remote computer. At any time, you can switch back to manage your own, local computer.
Adding computers to the Computer List
Before you can back up drives on a remote computer, you must first add the computer to the Computer List. You can then quickly switch between your local computer and any other computer on the list.
To add computers to the Computer List
On the Norton Ghost menu bar, click Computers > Add.
1
Do one of the following:
2
Type the name of the computer
Type the IP address of the computer
If you are in a workgroup environment instead of a domain you must manually specifythe computer nameforthe computer you want to manage by browsing to it by using the Browse button.
If you don't know the name of the computer, or its IP address, click Browse
3
and search for the computer you want to add, and then click OK.
Click OK to add the computer to the Computer List.
4
To add a local computer
On the Norton Ghost menu bar, click Computers > Add Local Computer.
1
Click OK.
2
Page 95
To remove a computer from the Computer List
On the Norton Ghost menu bar, click Computers > Edit List.
1
Select the remote computer that you want to remove, click the minus sign
2
(-), and then click OK.
Note: Removing a computer from the Computer List does not uninstall the
agent from the computer. You must run your operating system's uninstall
program.

Deploying the agent

You can deploy the Norton Ghost Agent to thecomputers that areon the Computer List by using the Agent Deployment feature. After you install the agent, you can create backup jobs directly from Norton Ghost.
Note: Because of increased security with Windows Vista, you cannot deploy the Norton Ghost Agent to Windows Vista without making security configuration changes. The same issue occurs when you attempt to deploy the agent from Windows Vista to another computer. You can manually install the agent on the target computer using the product CD.
Deploying the agent
95Backing up remote computers from your computer
Note: If you deselected the Agent Deployment option during installation, this feature is not available. You can run the installation again, and select the Modify option to add this feature back in.
You can install the agent to a computer that has less than 256 MB of RAM. However, Symantec Recovery Disk requires at least 512 MB of RAM for restoring the computer. Your computer must meet the minimum memory requirement to run the Recover My Computer wizard or the Recovery Point Browser from the recovery environment.
Note: If you are installing a multilingual version of the product, you must have a minimum of 768 MB of RAM to run the Symantec Recovery Disk.
If your computers are set up in a workgroup environment, you should prepare your local computer before you deploy an agent.
Page 96
Backing up remote computers from your computer
96
Deploying the agent
To prepare a computer in a workgroup environment to deploy the agent
On the Windows taskbar, right-click Start, and then click Explore .
1
On the Tools menu, click Folder Options > View.
2
On the View tab, scroll to the end of the list and verify that the Use simple
3
file sharing check box is unchecked, and then click OK.
On the Windows taskbar, click Start > Settings > Control Panel > Windows
4
Firewall.
On the Exceptions tab, check File and Printer Sharing, and then click OK.
5
Note: You should close any open applications before you continue with the agent
installation. If the Reboot check box is selected, the computer will automatically restart at the end of the installation wizard.
To deploy the Norton Ghost Agent
On the Norton Ghost menu bar, click Computers > select a computer from
1
the menu.
You must have administrator rights on the computer to which you are installing the agent.
Click Deploy Agent.
2
In the Deploy Norton Ghost Agent dialog box, specify the administrator user
3
name (or a user name that has administrator rights) and the password.
In a workgroup environment, you must specify the remote computer name. You cannot use an IP address, even if you have successfully connected to the computer by using an IP address.
For example, type RemoteComputerName\UserName
If you want to restart the computer when the agent installation is finished,
4
click Reboot when finished.
Note: The computer cannot be backed up until the computer is restarted. However, be sure to warn the user of the impending reboot so that they can save their work.
Click OK.
5
Page 97

Using the Norton Ghost Agent

To manually install the agent
Insert the Norton Ghost product CD into the media drive of the computer.
1
The installation program should start automatically.
If theinstallation program does notstart, on the Windows taskbar, click Start
2
> Run, type the following command, then click OK.
<drive>:\autorun.exe
where <drive> is the drive letter of your media drive.
For Windows Vista, if the Run option is not visible, do the following:
Right-click the Start button, and click Properties.
On the Start Menu tab, click Customize.
Scroll down and check Run command.
Click OK.
In the CD browser panel, click Install Norton Ghost.
3
In the Welcome panel, click Next.
4
Read the license agreement, click I acceptthetermsinthelicenseagreement,
5
and then click Next.
If you want to change the default location forthe program files, click Change,
6
locate the folder in which you want to install the agent, and then click OK.
Click Next.
7
Click Custom, and then click Next.
8
Click Norton GhostService, and then click This feature will be installed on
9
local hard drive.
This feature is the agent.
Set all other features to This feature will not be installed.
10
Click Next, and then click Install.
11
97Backing up remote computers from your computer
Using the Norton Ghost Agent
The Norton Ghost Agent is the unseen “engine” that does the actual backing up and restoring of data on a remote computer. Because the Norton Ghost Agent functions as a service, it does not have a graphical interface.
See “Managing the agent through Windows Services” on page 98.
See “Controlling access to Norton Ghost ” on page 103.
Page 98
Backing up remote computers from your computer
98

Managing the agent through Windows Services

The Norton Ghost Agent does, however, have a tray icon available from the Windows system tray to provide feedback of current conditions and to perform common tasks. For example, you can view backup jobs created for the computer, reconnect the Norton Ghost Agent, or cancel a task that is currently running.
You can install the agent manually by visiting each computer you want to protect and install the agent from the product CD. A more efficient method, however, is to use the Norton Ghost Deploy Agent feature to remotely install the agent on a computer in the domain whose data you want to protect.
To use the Norton Ghost Agent
On the Windows system tray, do one of the following:
Right-click the Norton Ghost tray icon,and thenclick Reconnect to restart
the service automatically. You cannot run a backup until the service is running.
If Norton Ghost is installed on the computer, double-click the Norton
Ghost tray icon to start the program. If only the agent is installed, double-clicking the tray icon only displays
an About dialog box.
If the computer has Norton Ghost installed, right-click the Norton Ghost
tray icon to display a menu of common Norton Ghost Agent tasks.
Managing the agent through Windows Services
The Norton Ghost Agent is a Windows service that runs in the background.
It provides the following:
locally running scheduled backup jobs, even when there are no users, or an
unprivileged user, logged on to the computer
Allows administrators toremotelyback up computers throughout anenterprise
from Norton Ghost running on another computer.
See “Using the Norton Ghost Agent ” on page 97.
Note: To manage the Norton Ghost Agent, you must be logged on as a local administrator.
You can manage the Norton Ghost Agent in the following ways:
Page 99
Start, stop, or disable the Norton Ghost Agent on local and remote computers.
See “Starting or stopping the agent service” on page 100.
See “Controlling access to Norton Ghost ” on page 103.
Set up recovery actions to take place if the Norton Ghost Agent fails to start.
For example, you can restart the Norton Ghost Agent automatically or restart the computer.
See “Setting up recovery actions when the agent does not start” on page 101.

Best practices for using services

Table 9-1 describes some best practices for using services.
Best practices for using services
99Backing up remote computers from your computer
Table 9-1
Check the Events tab first before using Services.
Verify that the Norton Ghost Agent starts without user intervention.
Best practices for using services
DescriptionBest practice
The Events tab inthe Advancedviewcan help you to track down the source of a problem, particularly when it is associated with theNorton Ghost Agent.You should view themost recent log entries in the Events tab for more information about the potential causes of the problem.
The Norton Ghost Agent is configured to start automatically when Norton Ghost starts.You can view the status information to verify that the Norton Ghost Agent has started. The Status area in the Task pane displays a Ready status message when the agent starts.
You can also test that the Norton Ghost Agent is starting automatically by looking inServices.You can check the status and restart the service if necessary. If the Startup type is set to automatic, you should restart the agent.
See “Starting or stopping the agent service” on page 100.
Page 100
Backing up remote computers from your computer
100
Best practices for using services
Table 9-1
Use caution when changing default settings for the Norton Ghost Agent.

Opening Services

There are several methods you can use to open Services to manage the Norton Ghost Agent.
To open Services
1
Best practices for using services (continued)
DescriptionBest practice
Changing the default Norton Ghost Agent properties can prevent Norton Ghost from running correctly. You should use caution when changing the default Startup type and Log On settings of the Norton Ghost Agent. It is configuredto start andlog on automatically when you start Norton Ghost .
Do one of the following:
On the Windows Vista taskbar, click Start > ControlPanel > Classic View
> Administrative Tools, and then double-click Services.
On the Windows taskbar, click Start > Settings > Control Panel >
Administrative Tools > Services.
On the Windows XP taskbar, click Start > Control Panel > Performance
andMaintenance>AdministrativeTools, and thendouble-click Services.
On the Windows taskbar, click Start > Run.
In the Open text field, type services.msc, and then click OK.
Under the Name column, scroll through the list of services until you see
2
Norton Ghost (the name of the agent).
Its status should be Started.
See “Starting or stopping the agent service” on page 100.

Starting or stopping the agent service

To start, stop, or restart the Norton Ghost Agent service, you must be logged on as an administrator. (If your computer is connected to a network, network policy settings might prevent you from completing these tasks.)
You might need to start, stop, or restart the Norton Ghost Agent service for the following reasons:
Loading...