Symantec Norton Ghost - 14.0 Instruction Manual

Norton Ghost™

Norton Ghost User's Guide
The software described in this book is furnishedunder alicense agreement andmay beused only in accordance with the terms of the agreement.
Documentation version 8.0
Legal Notice
Copyright © 2008 Symantec Corporation.
All rights reserved.
Symantec, the Symantec Logo, LiveUpdate, Symantec pcAnywhere, Symantec BackupExec, Norton, Symantec NetBackup, and Symantec Backup Exec Restore Anyware are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, .NET, and the Windows logo are registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. VeriSign® is a registered trademark of Verisign, Inc.
Gear Software is a registered trademark of GlobalSpec, Inc.
Google and Google Desktop are trademarks of Google, Inc.
Maxtor OneTouch is a trademark of Maxtor Corporation.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "ASIS"AND ALL EXPRESSOR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLYINVALID.SYMANTEC CORPORATIONSHALL NOT BE LIABLEFORINCIDENTAL OR CONSEQUENTIALDAMAGES INCONNECTIONWITHTHEFURNISHINGPERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The LicensedSoftware andDocumentationaredeemedto be "commercial computer software" and "commercial computersoftwaredocumentation" as defined in FAR Sections 12.212 and DFARS Section 227.7202.
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 USA
http://www.symantec.com

Technical Support

Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product feature and function, installation, andconfiguration. TheTechnical Supportgroupalso authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
Symantec’s maintenance offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization
A telephone and web-based support that provides rapid response and
up-to-the-minute information
Upgrade insurance that delivers automatic software upgrade protection
Global support that is available 24 hours a day, 7 days a week worldwide.
Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program
Advanced features, including Technical Account Management
For information about Symantec’s Maintenance Programs, you can visit our Web site at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support. The specific features that are available may vary based on the level of maintenance that was purchased and the specific product that you are using.
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support information at the following URL:
www.symantec.com/techsupp/
Select your region or language under Global Support.
Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to recreate the problem.
When you contact Technical Support, please have the following information available:
Product release level
Hardware information
Available memory, disk space, and NIC information
Operating system
Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If your Symantecproductrequiresregistration ora license key, access ourtechnical support Web page at the following URL:
www.symantec.com/techsupp/
Select your region orlanguage under Global Support, and then selectthe Licensing and Registration page.
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Select your country or language under Global Support.
Customer Service is available to assist with the following types of issues:
Questions regarding product licensing or serialization
Product registration updates such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade insurance and maintenance contracts
Information about the Symantec Value License Program
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:
Asia-Pacific and Japan: contractsadmin@symantec.com
Europe, Middle-East, and Africa: semea@symantec.com
North America and Latin America: supportsolutions@symantec.com
Additional Enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following:
Symantec Early WarningSolutions
Managed Security Services
Consulting Services
Educational Services
These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur.
These services remove the burdenof managing andmonitoringsecuritydevices and events, ensuring rapid response to real threats.
Symantec Consulting Services provide on-site technical expertise from Symantec andits trusted partners. SymantecConsulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring and management capabilities, each focused on establishing andmaintaining the integrity and availabilityof your IT resources.
Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs.
To access more information about Enterprise services, please visit our Web site at the following URL:
www.symantec.com
Select your country or language from the site index.

Contents

Technical Support . ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .............. ... 3
Chapter 1 Introducing Norton Ghost™ . ... ... ... ... .............. ... ... ... ... ... ... .. 13
Getting started . ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... . 13
What's new in Norton Ghost 14.0 . ... ... ... ... ... ... .............. ... ... ... ... ... ... . 14
New features and enhancements added in the previous
release ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 15
About the Advanced page ... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... 17
Where to find more information . ... ... ... ... ... ... ... .............. ... ... ... ... ... ... 18
Chapter 2 Installing Norton Ghost .... ... ... ... ... ... ... ... ... ... ... ... .............. ... 19
Preparing for installation .. ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... .. 19
System requirements ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... 19
Supported file systems and removable media .. ... ... ... ... ... ... ... ... .... 20
Unavailable features .............. ... ... ... ... ... ... ... ... ... ... ... .............. .. 21
Installing Norton Ghost ..... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... . 22
Completing the installation ... ... ... ... ... ... ... ... ... ... .............. ... ... ... . 24
Activating Norton Ghost later ... ... ... ... ... ... ... ... .............. ... ... ... ... . 25
Setting up your first backup ... .............. ... ... ... ... ... ... ... ... ... ... ... ... 25
Updating Norton Ghost ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ...... 25
Uninstalling the product .... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... .... 26
Chapter 3 Ensuring the recovery of your computer .... ... ... ... ... ... ..... 27
About ensuring the recovery of your computer ... ... ... ... ... ... ... ... ... ... ... . 27
Testing Symantec Recovery Disk ............ ... ... ... ... ... ... ... ... ... ... ... ........ 28
If driver validation fails ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... 28
Creating a custom Symantec Recovery Disk CD ........ ... ... ... ... ... ... ... ... .. 29
Chapter 4 Getting Started . ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... .. 31
Key product components ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 31
How you use Norton Ghost .. ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... 32
Starting Norton Ghost .. ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... ...... 33
Configuring Norton Ghost default options . ... ... ... .............. ... ... ... ... ... . 34
Selecting a default backup destination . ... ... ... ... .............. ... ... ... ... 36
Contents8
Adjusting the effects of a backup on computer performance .. ... ... ... 37
Adjusting default tray icon settings ........... ... ... ... ... ... ... ... ... ... ... .. 38
Managing file types ........... ... ... ... ... ... ... ... ... ... ... ... .............. ... .. 39
Using aliases for external drives .. ... ... ... ... ... ... ... .............. ... ... ... .. 41
Configuring FTP settings for use with Offsite Copy ... ... ... ... ... ... ..... 42
Logging Norton Ghost messages ... ... ... ... ... ... .............. ... ... ... ... ... 42
Enabling email notifications for product (event) messages ... ... ... ... . 44
Chapter 5 Best practices for backing up your data . ... ... ... ... ... ... ... .. 47
About backing up your data .. ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... .. 47
Choosing a backup type ... ................. ... ... ... ... ... ... ... ... ... ... ... ............ 48
Best practices for backing up .. ... ... ... ... ... ... ... ... .............. ... ... ... ... ... .. 48
About backups . .............. ... ... ... ... ... ... ... ... ... ... ... ................. ... ... 49
Before you back up . ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... .. 49
During a backup ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .............. .. 51
When the backup is complete ... ... ... ... ... ... ... ... ... ... ... ... .............. . 51
Additional tips about backups .. ... ... ... ... ................. ... ... ... ... ... ... ... ... .. 52
After defining your backup job .... ... ... ... ... ... ... ... ... ... ... ... ... .............. .. 53
Viewing the properties of a backup job ......... ... ... ... ... ... ... ... ... ... ... 53
About selecting a backup destination ....... ... ... ... ... ... ... ... ... ... ... ... ... ... 54
About backing up dual-boot computers ... ... ... .............. ... ... ... ... ... ... ... 56
Chapter 6 Backing up entire drives . ... .............. ... ... ... ... ... ... ... ... ... ... ... . 57
Defining a drive-based backup ........... ... ... ... ... ... ... ... ... ... ... ... ........... 57
Running a One Time Backup .... ... ... ... ... ... ... ... ... ... ... ... .............. .. 63
Files excluded from drive-based backups ... ... .............. ... ... ... ... ... . 65
About network credentials . ... ... ... ... ... ... ... .............. ... ... ... ... ... ... . 66
Run command files during a backup . ... ... ... ... ... ... ... ... .............. ... 66
Setting advanced options for drive-based backups ........ ... ... ... ... ... ... ... . 68
Editing advanced backup options . ... ... ... ... ... ... ... ................. ... ... . 69
About recovery point encryption .............. ... ... ... ... ... ... ... ... ... ... .. 70
Verifying a recovery point after creation .............. ... ... ... ... ... ... ... . 71
Viewing the progress of a backup . ... ... .............. ... ... ... ... ... ... ... ... . 72
About setting a compression level for drive-based backups .... ... ... ... ... ... 72
About Offsite Copy . ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... .. 73
How Offsite Copy works ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... 73
Using external drives as your Offsite Copy destination ... ... ... ... ... ... 74
Using a network server as your Offsite Copy destination ..... ... ... ... .. 75
Using an FTP server as your Offsite Copy destination ..... ... ... ... ... ... 76
Chapter 7 Backing up files and folders . ... ... ... ... ... ... ... ... ... ... ... ... ......... 79
Defining a file and folder backup ... ... ... ... ... ... ... ... ... .............. ... ... ... .. 79
Folders excluded by default from file and folder backups ... ... ... ... ... ... ... 82
Chapter 8 Running and managing backup jobs ... ... ... ... ... ... ... ... ....... 83
Running an existing backup job immediately ... ... ... .............. ... ... ... ... . 83
Run a backup with options ... .............. ... ... ... ... ... ... ... ... ... ... ... ... .. 84
Adjusting the speed of a backup ... ... ... ... ... ... ... ... ... ... ... .............. ... ... 85
Stopping a backup or recovery task ........ ... ... ... ... ... ... ... ... ... ... ... ... ...... 86
Verifying that a backup is successful ... ... ... ... ... ... .............. ... ... ... ... ... 86
Editing backup settings ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... 87
Enabling event-triggered backups ... ... ... ... ... ... ... ... ... ... .............. ... ... . 87
Enabling Symantec ThreatCon Response ... ... ... .............. ... ... ... ... . 88
Editing a backup schedule ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... .. 89
Turning off a backup job ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... . 90
Deleting backup jobs ............... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... 90
Adding users who can back up your computer ..... ... ... ... ... ... ... ... ... ... ... 90
Chapter 9 Backing up remote computers from your
computer . ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... . 93
9Contents
About backing up other computers from your computer .. ... ... ... ... ... ... .. 93
Adding computers to the Computer List ... ... ... ... ... .............. ... ... ... ... ... 94
Deploying the agent ..... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... 95
Using the Norton Ghost Agent . ... ... .............. ... ... ... ... ... ... ... ... ... ... ... . 97
Managing the agent through Windows Services .. ... ... ... ... ... ... ... .......... 98
Best practices for using services . ... ... ... ... ... .............. ... ... ... ... ... ... ... .. 99
Opening Services ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... 100
Starting or stopping the agent service . ... ... ... ... ... ... .............. ... .. 100
Setting up recovery actions when the agent does not start ... ... ...... 101
Viewing Norton Ghost Agent dependencies ... ... ... ... ... ... ... .......... 102
Controlling access to Norton Ghost . ... .............. ... ... ... ... ... ... ... ... ... .. 103
Running Norton Ghost using different user rights ...... ... ... ... ... ... . 105
Chapter 10 Monitoring the status of your backups ... ... ... ... ............. 107
About monitoring backups ......... ... ... ... ... ... ... ... ... ... ... ... .............. ... 107
Rescanning a computer’s hard disk . ... ... ... .............. ... ... ... ... ... ... 108
Monitoring backup protection from the Home page . ... .............. ... ... .. 108
Monitoring backup protection from the Status page . ... ... ... ... ... ... ... ... 109
Configuring Norton Ghost to send SNMP traps ... ... ... ... ... ... .............. . 112
About the Norton Ghost management information base ... ... ... ... .. 113
Contents10
Customize status reporting ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ... 113
Viewing drive details ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ..... 114
Improving the protection level of a drive ... ... ... ... ... ... .............. ... ... ... 115
Using event log information to troubleshoot problems ... ... ... ... ... ... ... . 116
Chapter 11 Exploring the contents of a recovery point . ... ... ... ... ... .. 119
About exploring recovery points ... ... ... ... ... ... ... ... ... ... ... .............. ... . 119
Exploring a recovery point through Windows Explorer . ... ... ... ... ... ...... 120
Mounting a recovery point from Windows Explorer ........ ... ... ... ... . 121
Opening files within a recovery point ... ... ... ... ... ... ... ... ... ... ... ... ......... 121
Using a search engine .. ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ........... 122
Unmounting a recovery point drive ... ... ... ... ... ... ... ... .............. ... ... ... 123
Viewing the drive properties of a recovery point ... ... ... ... ... ... ... ... ... .... 123
Chapter 12 Managing backup destinations . ... ... ... ... ... ... ... ... ... ... ....... 125
About backup destinations ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... 125
How backup data works ......... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... . 125
About drive-based backups ... ... ... ... .............. ... ... ... ... ... ... ... ... ... 126
About file and folder backups ....... ... ... ... ... ... ... ... ... ... ... ... .......... 126
Managing recovery points . ... .............. ... ... ... ... ... ... ... ... ... ... ... ... ...... 127
Cleaning up old recovery points ... ... ................. ... ... ... ... ... ... ... ... 127
Deleting a recovery point set ... .............. ... ... ... ... ... ... ... ... ... ... ... . 128
Deleting recovery points within a set ...... ... ... ... ... ... ... ... ... ... ... ... . 128
Making copies of recovery points . ... ... ... ... ... ... .............. ... ... ... .. 129
Converting a recovery point to a virtual disk format ... ... ... ... ... ... ... ..... 130
Managing file and folder backup data ........... ... ... ... ... ... ... ... ... ... ... ... . 133
Viewing how much file and folder backup data is being
stored .. ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ........ 133
Limiting the number of file versions to keep ... ... ... ... ... ... ... ......... 134
Manually deleting files from your file and folder backup ... ... ... ... .. 134
Finding versions of a file or folder .............. ... ... ... ... ... ... ... ... ... ... 134
Automating management of backup data ... ... ... ... ... ... ... ... ... ... ... ....... 135
Moving your backup destination .... ... ... ... ... ... ... .............. ... ... ... ... ... . 136
Chapter 13 Recovering files, folders, or entire drives ... ... ... ... ... ... ... 139
About recovering lost data ........... ... ... ... ... ... ... ... ... ... ... ... .............. . 139
Recovering files and folders by using file and folder backup data ... ... ... 139
Recovering files and folders by using a recovery point ... ... ... ... ... ... ... .. 141
Opening files and folders stored in a recovery point ..... ... ... ... ... ... 143
If you cannot find the files or folders you want .. .............. ... ... ... .. 143
Recovering a secondary drive ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... 144
About LightsOut Restore ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ...... 147
Setting up and using LightsOut Restore ...... ... ... ... ... ... ... ... ... ... ... 147
Configuring LightsOut Restore .. ... ... ... ... ... ... ... ... ... ... .............. .. 148
Chapter 14 Recovering a computer ... .............. ... ... ... ... ... ... ... ... ... ... ... ... 151
About recovering a computer ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .. 151
Starting a computer by using the recovery environment ... ... ... ... ... ... .. 152
Configuring your computer to boot from a CD ... ... ... ... ... ... ... ... .... 153
Preparing to recover a computer .. ... ... ... ... .............. ... ... ... ... ... ... ... ... 154
Scanning for viruses ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .. 154
Checking your hard disk for errors .... ... ... ... ... ... ... ... ... ... ... ... ...... 156
Recovering a computer . ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... 156
Restoring multiple drives by using a system index file . .............. ... ... .. 160
Recovering files and folders from the recovery environment ... ... ... ... .. 161
Exploring your computer ... ... ... ... ... ... ... ... ... ... .............. ... ... ... .. 163
Using the networking tools in the recovery environment ..... ... ... ... ... .. 163
Starting networking services ... ... ... ... ... ... ... ... ... ... ... .............. ... 163
Using the pcAnywhere thin host for a remote recovery . ... ........... 163
Mapping a network drive in the recovery environment ... ... ... ... ... . 166
Configuring network connection settings ... ... ... ... .............. ... ... . 166
Viewing properties of recovery points and drives .............. ... ... ... ... ... . 167
Viewing properties of a recovery point . ... ... ... ... ... ... ... ... ... ......... 168
Viewing the properties of a drive within a recovery point ... ... ... ... . 168
About the Support Utilities . ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 169
11Contents
Chapter 15 Copying a drive ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... ....... 171
About copying a drive .. ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... .. 171
Preparing to copy drives ... ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... 171
Copying one hard drive to another hard drive . ... ... .............. ... ... ... ... . 172
Drive-to-drive copying options .. ... ... ... ... ... ... ... .............. ... ... ... .. 173
Appendix A Using a search engine to search recovery points ....... 175
About using a search engine to search recovery points ... ... ... ... ... ... ... .. 175
Enabling search engine support . .............. ... ... ... ... ... ... ... ... ... ... ... .... 175
Recovering files using Google Desktop's Search Desktop feature .. ... ... .. 177
If a file cannot be found using Google Desktop ... ... ... ... ............... 178
Index . ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... ... ... .............. ... ... ... ... ... ... ... ... ... .. 179
Contents12
Chapter

Introducing Norton Ghost™

This chapter includes the following topics:
Getting started
What's new in Norton Ghost 14.0
About the Advanced page
Where to find more information

Getting started

1
Norton Ghost provides advanced backup and recovery for your computer. Protect your documents, financialrecords, presentations, photos, music,videos, historical documents, or any other kinds of data you keep on your computer by making a backup of your computer's entire hard disk. Or, limit your backup to include only those files and folders that mean the most to you.
You can schedule backups to capture your changes automatically as you work from day to day. Or start a backup manually at any time. You can also easily configureNortonGhost to runa backup inresponse to specific events. For example, a backup canbe started whena particular application isstarted, or when a specified amount of new data has been added to the drive.
When you experience a problem with your computer, you can restore a file, folder, or an entire drive, to return your computer to a previous, working state with the operating system, applications, and data files intact. Or if you accidently delete a personal file, get it back with a few simple steps.
Introducing Norton Ghost™
14

What's new in Norton Ghost 14.0

Using easy-to-follow wizards, set up fast and reliable backups that run while you continue to work. Or schedule your backups to run after hours when you are no longer using your computer.
When disaster strikes, Norton Ghost helps you recover your computer from the effects of many common problems, including
Virus attacks: Damage might be done before a virus is quarantined.
Faulty software installations: Some software can negatively affect your
computer's performance, slowing it down to the point that opening programs or documents can require too much time. But once installed, uninstalling a product might not recover unintentional damage done during an install.
C), making it impossible to start your operating system
Files accidentally deleted or overwritten:Accidentaldeletion of files is common,
but often costly.
Corrupted files: Individual files and folders can become corrupted by viruses,
or when a program used to modify them encounters an error.
What's new in Norton Ghost 14.0
Norton Ghost includes many enhancements and new features. Refer to the following table for information about the latest features and enhancements:
Note: Not all features listed are available in all versions of this product.
DescriptionFeature
Support for NTFS partitions
Offsite Copy
NortonGhost now supports NTFSpartitions up to 16TB (formatted with 4k clusters).
The new Offsite Copy feature adds an additional level of protection to your data by copying recovery points to a second hard disk drive. You can use an external USB or FireWire drive, or copy them over the network to aremote location through a local area connection, or using FTP.
See “About Offsite Copy” on page 73.
What's new in Norton Ghost 14.0
15Introducing Norton Ghost™
DescriptionFeature
Create and manage aliases for your external drives
Symantec ThreatCon integration
Send Feedback tool
To help you more easily identify external drives for use asbackup destinations, Norton Ghost lets you assign an alias to each external drive. Doingso doesnot change the drive label, but is for use only when you are accessing those drives from within Norton Ghost.
See “Using aliases for external drives” on page 41.
Symantec ThreatCon is Symantec's early threat warning system. You can now configure Norton Ghost to detect a change in the threat level whenever your computer is connected tothe Internet. Whenthe threat level meets or exceeds the level you specify, Norton Ghost automatically starts a backup job. You can specify a different ThreatCon level for each backup.
See “Enabling Symantec ThreatCon
Response” on page 88.
We want to hear what you think. From the Home page,you can now share your opinion with us. We look at every comment we receive and consider how we can make our product better. Tell us what you think.
Help and Support center
To help you help yourself, a new Help and Support dialog provides direct links to available resources for helping you to get the most out of Norton Ghost.

New features and enhancements added in the previous release

If you are upgrading from an earlier release, you might be interested to know of the following enhancements added in previous releases of Norton Ghost.
DescriptionFeature
Enhanced ease-of-use
An improved user interface simplifies what you need to know and do to successfully back up or recover files, folders, or your entire computer. And for Norton Ghost experts, the Advanced page gives you a single view to most product features.
Introducing Norton Ghost™
16
What's new in Norton Ghost 14.0
DescriptionFeature
Windows Vista support
Improved Easy Setup
File and folder backup
One Time backups
support
Convert a recovery point to virtual disk format
LightsOut Restore
Simplified scheduleeditor
Manage backup data
Norton Ghost has been designed and tested to run in the new Windows Vista operating system, and still supports previous versions of Windows.
See “System requirements” on page 19.
Now setting up your first backup is even easier with the enhanced Easy Setup, which appears either during install (unless you choose to skip it), or automatically the first time you run Norton Ghost. Specify a few preferences, and Norton Ghost can start backing up your computer on a regular basis.
Limit your backup to include a select set of files or folders. File and folder backups are especially useful if your backup storage space is limited and you make frequent changes to important documents that you want to back up.
Need to back up your data quickly? The new One Time Backup feature lets you define and run a backup at any time without saving the backup job for later use.
Search for and recover files stored in recovery points using Google Desktop™.Desktop search engine
Convert recovery points to one of two virtual disk formats for use in a virtual environment.
Restore a computer from a remote location, regardless of the state of the computer, provided that its file system is intact.
You can now easily edit your existing backup schedules without having to click through multiple dialogs or complete the entire backup wizard again.
Because recovery points and file and folder backup data require storage space, Norton Ghost gives you the freedom of where and how to handle the amount of disk space used for storing backup data. Norton Ghost offers simple tools for managing your backup data, and can even manage it for you automatically.
Improved backup and recovery status
Automatic backup destination detection
Browse lost or damaged files and folders
The home page offers the backup protection status in a single view. But you can also use the new Backups Calendar to view past and upcoming scheduled backups to see how protected your data really is.
Norton Ghost automatically detects when a new storage device is connected to your computer, and can prompt you to change your default backup destination to the new drive.
Enhanced browsing of files and folders inside recovery points makesrecovery quick and easy; the new file and folder backup feature also lets you quickly search for and recover files or folders.

About the Advanced page

17Introducing Norton Ghost™
DescriptionFeature
Event-triggered backups
Performance throttling
Maxtor OneTouch™ integration
Modifiable Symantec Recovery Disk
In addition to scheduled and manual backups, Norton Ghost can detect certain events and run a backup automatically whenever they occur, providing an added level of protection for your computer.
Manually adjust the effect of a running backup on the performance of your computer to better match your needs at the moment. This feature is especially useful if you are working on your computer and don't want the backup process to slow you down.
And if you know the demographics of your network traffic, you can now set network throttling to prevent network overload.
If you have a Maxtor OneTouch™ external hard drive, you can back up your computer with the push of a button. No need to start Norton Ghost.
When you cannot start Windows, the newly enhanced Symantec Recovery Disk (SRD) makes recovery easier than ever.
If the Symantec Recovery Disk is missing specific drivers, use the Create Recovery Disk feature to create a modified Symantec Recovery Disk that includes the exact drivers needed to successfully boot your computer into the recovery enironment.
Note: If you purchased Norton Ghost pre-installed on a new computer, some features
in therecovery environment may ormaynot beincluded, depending onhowthe computer manufacturerchose to install it. The recovery environment has likely been pre-installed on a special partition on your computer.
About the Advanced page
The Advanced page offers experienced Norton Ghost users a single view of the most common product features. If you have a good understanding ofNortonGhost, you might prefer to perform most tasks from the Advanced view.
Note: When refering to the documentation while using the Advanced page, the first one or two steps do not apply because they indicate where to access each feature from the other pages of the product interface. From that point on, follow the remaining steps of each procedure.
The Advanced page can be hidden from view if you do not plan to use it.
To hide the Advanced page
Start Norton Ghost.
1
On the View menu, click Show Advanced Page.
2
Introducing Norton Ghost™
18

Where to find more information

To show the Advanced page
Start Norton Ghost.
1
On the View menu, click Show Advanced Page.
2
Where to find more information
Tolearn more aboutNortonGhost, visit thenew Help and Support page. Depending on which version and language of the product you have installed, the Help and Support page includesone-click access to more information, including the product help system, the product User's Guide, and access to the Symantec Knowledge Base where you can find troubleshooting information.
To access Help and Support
Start Norton Ghost.
1
On the Home page, click Help > Help and Support.
2
Chapter

Installing Norton Ghost

This chapter includes the following topics:
Preparing for installation
Installing Norton Ghost
Updating Norton Ghost
Uninstalling the product

Preparing for installation

2
Before you install Norton Ghost, make sure that your computer meets the system requirements.

System requirements

Table 2-1 lists the system requirements for Norton Ghost.
Table 2-1
Minimum RequirementsComponent
Operating system
The following Windows 32- or 64-bit operating systems are supported:
Windows Vista Home Basic
Windows Vista Home Premium
Windows Vista Ultimate
Windows Vista Business
Windows XP Professional/Home (SP2 or later)
Windows XP Media Center
Minimum system requirements
Installing Norton Ghost
20
Preparing for installation
RAM
Available hard disk space
CD-ROM or DVD-ROM drive
Table 2-1
Minimum system requirements (continued)
Minimum RequirementsComponent
The following memory requirements are grouped by key components:
Norton Ghost Agent: 256 MB
Norton Ghost user interface and Recovery Point Browser: 256 MB
Symantec Recovery Disk: 512 MB minimum
Note: If you are installing a multilingual or double-byte version of the product, you must
have a minimum of 768 MB of RAM to run the Symantec Recovery Disk.
Norton Ghost LightsOut Restore feature: 1 GB
When installingthe entire product:Approximately 250to300 MB,dependingon thelanguage
of the product you are installing
Microsoft .NET Framework 2.0: 280 MB of hard disk space is required for 32-bit computers,
and 610 MB is required for 64-bit computers
Recoverypoints: Sufficient hard disk spaceon alocalhard disk ornetworkserver for storing
recovery points. The size of recovery points depends on the amount of data you have backed up and the type
of recovery point being stored. See “Best practices for backing up ” on page 48.
Norton Ghost LightsOut Restore feature: 2 GB
The drive can be any speed, but it must be capable of using as the startup drive from the BIOS.
Norton Ghost uses Gear Software technology. To verify that your CD writer or DVD writer is compatible, visit http://www.gearsoftware.com/support/recorders/index.cfm. You can look up information about your writer if you know the name of the manufacturer and model number of your writer.
Software
The Microsoft .NET Framework 2.0 is required to run Norton Ghost.
If the .NET Framework is not already installed, then you will be prompted to install it after Norton Ghost is installed and your computer is rebooted.
Virtual platforms (for converted recovery points)
The following virtual platforms are supported:
VMware GSX Server 3.1 and 3.2
VMware Server 1.0 (replacement/rename for GSX Server)
VMware ESX Server 2.5 and 3.0
VMware Infrastructure 3 (replacement/rename for ESX Server)
Microsoft Virtual Server 2005 R2

Supported file systems and removable media

Norton Ghost supports the following file systems and removable media:
Preparing for installation
21Installing Norton Ghost
Supported file systems
Norton Ghost supports FAT16, FAT16X, FAT32, FAT32X, NTFS, GUID Partition Table (GPT), dynamic disks, Linux Ext2, Linux Ext3, and Linux swap partitions.
Note: You mustdecrypt encrypted NTFS drives before you attempt to restore them. You cannot
view the files that are in a recovery point for an encrypted NTFS drive.
Removable media
You can save recovery points locally (that is, on the same computer where Norton Ghost is installed) ortomost CD-R, CD-RW, DVD-R(W), and DVD+RW recorders. You canfindan updated list of supported drives on the Symantec Web site.
Norton Ghost also lets you save recovery points to most USB devices, 1394 FireWire devices, REV, Jaz, Zip drives, and magneto-optical devices.

Unavailable features

Norton Ghost is packaged to meet various markets. Some features might not be available, depending on the product you have purchased. However, all features are documented. You should be aware of which features are included with the version of the product you have purchased. If a feature is not accessible in the product user interface, it is likely not included with your version of the product.
Refer to the Symantec Web site for information about features included with your version of Norton Ghost.
When you delay licensing
If you choose to delay installation of the product license (for a maximum of 30 days from the date of installation), the following features are unavailable until you install a valid license:
Copy Drive
Create Recovery Disk
LightsOut Restore
Convert to Virtual Disk
All other features are enabled during the 30 day grace period.
If you are using an Evaluation copy of the product, it also expires after 30 days. However, all features are enabled until the end of the evaluation period, at which time you must purchase the product or uninstall it. You can purchase a license at any time (even after the evaluation period expires) without reinstalling the software.

Installing Norton Ghost

22
Installing Norton Ghost
Note: If this product came pre-installed from a computer manufacturer, your trial
period could be aslong as90 days. Theproductlicensing or activation page during install will indicate the duration of your trial period.
See “Activating Norton Ghost later” on page 25.
Installing Norton Ghost
See “System requirements” on page 19.
Note: During the installation process, you might be required to restart the computer. To ensure proper functionality after the computerrestarts,log on again using the same user credentials thatyou used to log on when you installed Norton Ghost.
The installation program scans your hardware for the required drivers. If the programdoes notfind the required drivers, you receive a drivervalidationmessage. If you receive this message, you should test the Symantec Recovery Disk (SRD). Testing the SRD verifies whether the drivers are required or if the devices onyour system have compatible drivers that are available on the SRD. Thedrivervalidation process should not interfere with your ability to install the product.
See “About ensuring the recovery of your computer” on page 27..
Warning: The SRD provides the tools that you need to recover your computer. It is included with your product either on a separate CD, or on your product CD, depending on the version of the product that you purchased. You should store the CD in a safe place.
To install Norton Ghost
Log onto your computer usingeither theAdministrator account oran account
1
that has administrator privileges.
Insert the Norton Ghost product CD into the media drive of the computer.
2
The installation program should start automatically.
Installing Norton Ghost
If the installation program does not run, type the following command at a
3
command prompt:.
<drive>:\autorun.exe
where <drive> is the drive letter of your media drive.
In the CD browser panel, click Install Norton Ghost.
4
Read the license agreement, and then click I accept the terms in the license
5
agreement.
Do one of the following:
6
Click Install Now to begin the installation.
If you want to customize your settings, click Custom Install, select or
deselect the options you want installed, and then click Install Now. Installation options include:
23Installing Norton Ghost
User Interface
Backup and Recovery Service
CD/DVD Support
Recovery Point Browser
LiveUpdate
Change
If a driver that is used on your computer is not available on the Symantec
7
Installs the product user interface that is required for interacting with the Norton Ghost Service.
The primary service that is required to back up or recover your computer.
Required for backing up directly to CD/DVD, and for creating a customized Symantec Recovery Disk CD. A CD/DVD burner is required to use this feature.
Enables you to browse, mount, copy, verify, and restore files and folders using recovery points.
Keeps your Symantec software up-to-date with the latest product updates.
Click this button if you want to install Norton Ghostto an alternate location.
Recovery Disk, you receive a notification message that includes the name of
the driver. Write down the name of the driver file, and then clickOK to dismiss
the message.
Drivers are critical in the event that you need to use the Symantec Recovery
Disk CD to recover your system drive (the drive where your operating system
is installed).
See “About ensuring the recovery of your computer” on page 27.
Installing Norton Ghost
24
Installing Norton Ghost
Click Finish to complete the installation.
8
Remove the product CD from the media drive, and then click Yes to exit the
9
installation wizard and restart the computer.
If you click No because you plan to restart your computer yourself at a later time, note that you cannot run Norton Ghost until after you restart your computer.

Completing the installation

After you install theproduct,you are prompted to license oractivateyourproduct. You can then run LiveUpdate to check for product updates, and then configure your first backup.
Note: If this product came pre-installed from a computer manufacturer, your trial period could be as long as 90 days. Refer to the Activate later label.
To complete the installation
In the Welcome panel, click Next.
1
If the product was installed by your computer manufacturer, the Welcome page might appear the first time that you run Norton Ghost.
Do one of the following:
2
Click I've already purchased the product and havea product key.
Note: You can find the product key on the back of your product CD jacket. Do not lose the product key. You must use it when you install Norton Ghost.
Click Activate later to delay the activation of your license. After the trial
period ends, the product will no longer work.
If this product is a trial version of Norton Ghost and you want to purchase
a product key, click Symantec Global Store to connect to the Symantec Web site.
Click Next.
3
Click Run LiveUpdate to check for any product updates since the product
4
shipped.
Click Launch Easy Setup to open the Easy Setup box when you complete the
5
install process.
Click Enable GoogleDesktopFileandFolder Recovery if youwant use Google
6
Desktop to search your recovery points for the files and folders that youwant
to recover.
If you select this option, Norton Ghost automatically catalogs each file as it
creates a recovery point. Google Desktop can then use this catalog to search
for files by name. It does not index the content of the files.
Note: This option is available only if Google Desktop already is installed on
your computer. If you plan to install Google Desktop, you can enable search
engine support later.
Click Finish.
7

Activating Norton Ghost later

To activate Norton Ghost at any time after installation
On the Help menu, click Unlock Trial Product.
1
Refer to step 2 in the To complete the installation procedure.
2

Updating Norton Ghost

25Installing Norton Ghost

Setting up your first backup

Unless you unchecked the Run Easy Setup check box during the setup wizard, the Easy Setup window appears. If you don't run Easy Setup during the setup wizard, it appears the first time you open the Run or Manage Backups window.
When the Easy Setup window opens, you can either accept the default drive and file and folder backup settings, or you can click on any of the settings to modify them.
If you want the new backup to run immediately, be sure to select Run backup now, and then click OK.
Updating Norton Ghost
You can receive software updates that are associated with your version of the product over your Internet connection. LiveUpdate connects to the Symantec LiveUpdate server and automatically downloads and installs updates for each Symantec product that you own.
Installing Norton Ghost
26

Uninstalling the product

You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates.
To update Norton Ghost
On the Help menu, click LiveUpdate.
1
In the LiveUpdate window, click Start to select the updates.
2
Follow the on-screen instructions.
When the installation is complete, click Close.
3
Some program updates might require that you restart your computer before the changes take effect.
Uninstalling the product
When you upgrade Norton Ghost from a previous version of the product, the install program automatically uninstalls theprevious versions. If needed, you can manually uninstall the product.
Follow your operating system's instructions on how to uninstall software.
Chapter

Ensuring the recovery of your computer

This chapter includes the following topics:
About ensuring the recovery of your computer
Testing Symantec Recovery Disk
If driver validation fails
Creating a custom Symantec Recovery Disk CD
3

About ensuring the recovery of your computer

If Windows fails to start or it does not runnormally, you can recover your computer by using the Symantec Recovery Disk (SRD). The drivers that are included on the recovery disk must match the drivers required to run your computer's network cards and hard disks.
To help ensure that you have the drivers that you need to recover your computer, the installation process runs a driver validation test. The driver validation tool compares hardware drivers that are contained on the recovery disk with the drivers that are required to run your computer's network cards and hard disks.
The installation process automatically runs the driver validation test. You can also run a validation test at anytime by running the Symantec Recovery Disk Wizard.
You should run the driver validation test any time you make changes to the NIC cards or storage controllers on a computer.
See “If driver validation fails” on page 28.
Ensuring the recovery of your computer
28

Testing Symantec Recovery Disk

Note: Wireless network adapter drivers are not supported by thedriver validation
tool or by the SRD.
Testing Symantec Recovery Disk
You should test the SRD to ensure that the recovery environment runs properly on your computer.
Note: Depending on which version of the product you have purchased, the SRD is either included on your product CD, or as a separate CD. You should place the CD containing the SRD in a safe place. Should you lose the CD, you can create a new one if you have have a CD burner.
Testing the SRD allows you to identify and solve the following types of problems:
You cannot boot into the recovery environment.
See “To configure your computer to boot from a CD” on page 153.
You do not have the necessary storage drivers to access recovery points on
the computer.
You need information about your system to help you run the recovery
environment.
To test the SRD
Run the drivervalidation tool to testwhether theSRD works withthe network
1
cards and storage devices on the computer.
Boot your computer using the SRD.
2
See “Starting a computer by using the recovery environment ” on page 152.
When you have bootedinto the recovery environment, do one of the following:
3
If you want to store recovery points on a network, run a mock restore of
a recoverypoint thatis stored ona network to testthe network connection.
If you want to store recovery points on the computer, run a mock restore
of a recovery point that is stored locally to test the local hard-drive connection.

If driver validation fails

The driver validation test verifies whether the drivers for all storage devices and network cards in use by the computer are available in the recovery environment.

Creating a custom Symantec Recovery Disk CD

If the drivers are available on the recovery disk, you receive a validation message. If any drivers are missing from the recovery disk, the Driver Validation Results dialog appears.
Without access to the correct drivers, a device cannot be used while running the SRD. Therefore, if the recovery points required for recovering your computer are stored on a network or a local hard drive, you might not have access to them.
You can find the drivers and copy them to a CD or a floppy disk, or you can create a custom Symantec Recovery Disk CD.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
Creating a custom Symantec Recovery Disk CD
Even if driver validation succeeds and your Symantec Recovery Disk CD appears to work, you should create a custom Symantec Recovery Disk CD. A custom CD will contain your computer's current network and storage device drivers, helping to ensure that in an emergency you can get to the recovery points required to restore your computer.
29Ensuring the recovery of your computer
Note: You must have a writeable DVD/CD-RW drive to create a custom Symantec Recovery Disk.
To create a custom Symantec Recovery Disk CD
Start Norton Ghost.
1
Attach and turn on all storage devices and network devices that you want to
2
make available.
Insert the Symantec Recovery Disk CD into your CD-ROM drive.
3
From the main Norton Ghost window, click Tasks > Create Recovery Disk,
4
and then click Next.
If prompted, click Browse, select the drive that contains the Symantec
5
Recovery Disk CD, click OK, and then click Next.
Do one of the following:
6
Click Automatic(Recommended), and then click Next.
Click Custom, and then click Next.
Ensuring the recovery of your computer
30
Creating a custom Symantec Recovery Disk CD
Select this option only if you know which drivers to select.
Follow the on-screen instructions to complete the wizard.
7
Warning: Be certain to test your new, customized Symantec Recovery Disk
CD to make sure that it can start your computer and that you can access the drive containing your recovery points.
See “Testing Symantec Recovery Disk” on page 28.
Loading...
+ 154 hidden pages