Symantec Norton Ghost - 15.0 Instruction Manual

Page 1

Norton Ghost 15.0 User's Guide

Page 2
Norton Ghost 15.0 User's Guide
The softwaredescribed inthis bookis furnishedunder alicense agreementand maybe used only in accordance with the terms of the agreement.
Documentation version: 9.0
Legal Notice
Copyright © 2009 Symantec Corporation. All rights reserved.
Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, Hyper-V, and the Windows logo areregistered trademarks or trademarks of Microsoft Corporation in the United States and other countries. VeriSign® is a registered trademark of Verisign, Inc.
VMware, the VMware "boxes" logo and design are registered trademarks or trademarks of VMware, Inc..
Gear Software is a registered trademark of GlobalSpec, Inc.
Google and Google Desktop are trademarks of Google, Inc.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATIONISPROVIDED "ASIS" AND ALLEXPRESS ORIMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLYINVALID. SYMANTEC CORPORATIONSHALL NOT BELIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The LicensedSoftware andDocumentation aredeemed tobe commercialcomputer software as definedin FAR 12.212 and subject to restricted rights asdefined inFAR Section52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, displayor disclosure of the Licensed Software and Documentation bythe U.S. Government shall be solely in accordance with the terms of this Agreement.
Page 3
Symantec Corporation 350 Ellis Street Mountain View, CA 94043
http://www.symantec.com
Page 4

Technical Support

Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality.The Technical Support group also creates contentfor our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. Forexample, theTechnical Supportgroup works with Product Engineering and SymantecSecurity Response to provide alerting services andvirus definition updates.
Symantecs maintenance offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization
Telephone and Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers automatic software upgrade protection
Global support that is available 24 hours a day, 7 days a week
Advanced features, including Account Management Services
For information about Symantecs Maintenance Programs, you can visitour Web site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenanceagreement may access Technical Support information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at thecomputer on which the problem occurred, incase itis necessaryto replicate the problem.
When you contact Technical Support, please have the following information available:
Product release level
Hardware information
Available memory, disk space, and NIC information
Operating system
Page 5
Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If yourSymantec product requires registration or a licensekey, accessour technical support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and maintenance contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
Page 6
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:
Additional enterprise services
Symantec offers a comprehensive setof services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
customercare_apac@symantec.comAsia-Pacific and Japan
semea@symantec.comEurope, Middle-East, and Africa
supportsolutions@symantec.comNorth America and Latin America
Symantec EarlyWarning Solutions
Managed Security Services
Consulting Services
Educational Services
To access more information about Enterprise services, please visit our Web site at the following URL:
www.symantec.com
Select your country or language from the site index.
These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur.
These servicesremove theburden ofmanaging andmonitoring securitydevices and events, ensuring rapid response to real threats.
Symantec Consulting Services provide on-site technical expertise from Symantec andits trustedpartners. SymantecConsulting Servicesoffer avariety of prepackaged and customizable options that include assessment, design, implementation, monitoring,and managementcapabilities. Each is focused on establishing andmaintaining the integrity and availability of your IT resources.
Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs.
Page 7

Contents

Technical Support ..... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ... 4
Chapter 1 Introducing Norton Ghost.. .... . .... . .... . .... ..... ..... .... . .... . .... . . 13
About Norton Ghost . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... 13
What is new in Norton Ghost ... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 14
Hiding or showing the Advanced page .... . .... ..... ..... .... . .... . .... ..... ..... ... 15
Getting more information about Norton Ghost ..... ..... .... . .... . .... . .... ..... 16
Chapter 2 Installing Norton Ghost ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 17
Before you install ..... .... . .... . .... . .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . 17
System requirements . ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ... 17
About supported file systems and removable media . .... . .... . .... ..... . 19
About disabled features . ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... 20
When you delay licensing ... ..... .... . .... . .... ..... ..... .... . .... . .... . .... .... 20
Installing Norton Ghost ... . .... . .... . .... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 21
Completing the installation ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... . 23
Activating Norton Ghost later ... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 24
About setting up your first backup . . .... . .... . .... ..... ..... .... . .... . .... .... 24
Updating Norton Ghost .... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .. 25
About uninstalling Norton Ghost .... . .... . .... ..... ..... .... . .... . .... . .... ..... .... 25
Chapter 3 Ensuring the recovery of your computer . ..... .... . .... . .... . ... 27
About ensuring the recovery of your computer . .... . .... ..... ..... .... . .... . .... 27
Testing Symantec Recovery Disk .... ..... .... . .... . .... ..... ..... .... . .... . .... . .... 28
If driver validation fails . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... .. 28
Creating a custom Symantec Recovery Disk CD ... . .... . .... ..... ..... .... . .... . . 29
Chapter 4 Getting Started . . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 33
About key product components ... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... .. 33
How you use Norton Ghost ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... 34
Starting Norton Ghost ... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... 35
Configuring Norton Ghost default options .... . .... ..... ..... .... . .... . .... ..... .. 36
Selecting a default backup destination .... ..... ..... .... . .... . .... . .... ..... . 38
Adjusting the effect of a backup on computer performance .... ..... ... 39
Page 8
Contents8
Adjusting default tray icon settings . .... . .... . .... . .... ..... ..... .... . .... . ... 40
Managing file types . . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... 41
Using nicknames for external drives . .... . .... ..... ..... .... . .... . .... . .... ... 43
Configuring default FTP settings for use with Offsite Copy ... ..... .... 44
Logging Norton Ghost messages .... . .... . .... . .... ..... ..... .... . .... . .... . ... 44
Enabling email notifications for product (event) messages .... . .... .... 46
Chapter 5 Best practices for backing up your data . .... . .... . .... ..... ..... 49
About backing up your data .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . . 49
About choosing a backup type . . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . . 50
Best practices for backing up . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . ... 50
About backups . .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .. 51
Before you back up ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 51
During a back up .... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . . 53
When a back up is finished .... . .... ..... ..... .... . .... . .... . .... ..... .... . .... . . 53
Additional tips about backups .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 54
After defining your backup job ... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... ... 55
Viewing the properties of a backup job . .... . .... . .... ..... ..... .... . .... . .... 55
About selecting a backup destination ..... .... . .... . .... . .... ..... ..... .... . .... . ... 56
About backing up dual-boot computers .... ..... .... . .... . .... . .... ..... ..... .... . . 58
Chapter 6 Backing up entire drives ..... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 59
About defining a drive-based backup ... .... . .... . .... . .... ..... ..... .... . .... . .... . 59
Defining a drive-based backup ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... 60
Related Drives options ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 62
Recovery point type options ... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . . 63
Backup destination options ... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... .. 64
Recovery point options ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .. 64
Advanced scheduling options . ..... ..... .... . .... . .... . .... ..... ..... .... . .... . . 66
About files that are excluded from drive-based backups ... ..... ..... ... 67
About network credentials ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . ... 68
About running command files during a backup ... . .... . .... ..... ..... .... . 68
Advanced options for drive-based backups ... . .... . .... ..... ..... .... . .... . . 70
Compression levels for drive-based backups ..... ..... .... . .... . .... . .... ..... .... 74
Running a one-time backup from Norton Ghost . . .... . .... . .... ..... ..... .... . .. 75
About running a one-time backup from Symantec Recovery
Disk ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ... 76
Running a one-time backup from Symantec Recovery Disk .... .... . ... 77
About Offsite Copy ... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 81
How Offsite Copy works . . .... . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... 81
About using external drives as your Offsite Copy
destination . . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 82
Page 9
About using a network server as your Offsite Copy
destination . . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 84
About using an FTP server as your Offsite Copy destination .... ..... .. 85
Chapter 7 Backing up files and folders . . .... . .... . .... ..... ..... .... . .... . .... . .... . 87
Defining a file and folder backup .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 87
About folders that are excluded by default from file and folder
backups .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... ... 89
Chapter 8 Running and managing backup jobs .... ..... .... . .... . .... . .... ... 91
Running an existing backup job immediately .... .... . .... . .... . .... ..... ..... .... 91
Running a backup with options . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... . 92
Backup options .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ... 93
Adjusting the speed of a backup .... . .... . .... ..... ..... .... . .... . .... . .... ..... .... . . 94
Stopping a task ... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... 94
Verifying that a backup is successful ... ..... .... . .... . .... . .... ..... ..... .... . .... . 95
Editing backup settings . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... ..... .. 95
Enabling event-triggered backups ... ..... .... . .... . .... ..... ..... .... . .... . .... . .... 96
About Symantec ThreatCon .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 96
Editing a backup schedule .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... 97
Turning off a backup job .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... .. 97
Deleting backup jobs . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 97
Adding users who can back up your computer . ..... ..... .... . .... . .... ..... ..... 98
9Contents
Chapter 9 Backing up remote computers from your
computer . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... ... 101
About backing up other computers from your computer .... . .... ..... ..... . 101
Adding computers to the Computer List ..... ..... .... . .... . .... . .... ..... ..... ... 102
Deploying the Norton Ghost Agent .... . .... . .... ..... ..... .... . .... . .... . .... ..... 103
Using the Norton Ghost Agent .. ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .. 105
About managing the Norton Ghost Agent through Windows
Services . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 106
About best practices for using services .. . .... . .... ..... ..... .... . .... . .... . .... . 107
Opening Windows Services ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 108
Starting or stopping the Norton Ghost Agent service .... .... . .... . .... 108
Setting up recovery actions when the Norton Ghost Agent does
not start ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 109
Viewing Norton Ghost Agent dependencies .. .... . .... . .... . .... ..... .... 110
Controlling access to Norton Ghost . . .... . .... . .... ..... ..... .... . .... . .... . .... .. 111
Running Norton Ghost using different user rights . .... . .... . .... ..... .. 113
Page 10
Contents10
Chapter 10 Monitoring the status of your backups ... . .... . .... ..... ..... .. 115
About monitoring backups . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 115
Rescanning a computers hard disk . . .... . .... . .... ..... ..... .... . .... . .... . . 116
Monitoring backup protection from the Home page .... . .... . .... . .... ..... .. 116
Monitoring backup protection from the Status page ... . .... ..... ..... .... . ... 118
About SNMP traps . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... .. 122
About the Norton Ghost management information base ... . .... . .... . 122
Customizing the status reporting of a drive (or file and folder
backups) .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 122
Viewing drive details .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... 124
Improving the protection level of a drive ... . .... . .... . .... ..... ..... .... . .... . .. 124
About using event log information to troubleshoot problems . .... ..... .... 127
Chapter 11 Exploring the contents of a recovery point . ..... .... . .... . .. 129
About exploring recovery points ... ..... .... . .... . .... . .... ..... ..... .... . .... . .... 129
Exploring a recovery point through Windows Explorer ..... .... . .... . .... . .. 130
Mounting a recovery point from Windows Explorer . . .... . .... ..... .... 131
Opening and restoring files within a recovery point . .... . .... . .... . .... ..... . 131
About using a search engine . . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .. 132
Dismounting a recovery point drive ... .... . .... . .... . .... ..... ..... .... . .... . .... . 133
Viewing the drive properties of a recovery point .... . .... ..... ..... .... . .... . . 133
Chapter 12 Managing backup destinations . . .... ..... ..... .... . .... . .... . .... ... 135
About backup destinations ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 135
About how backup data works .... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ... 135
About drive-based backups .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 136
About file and folder backups ... . .... . .... ..... ..... .... . .... . .... . .... ..... .. 136
Managing recovery point storage ... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 137
Cleaning up old recovery points . ..... .... . .... . .... . .... ..... ..... .... . .... . . 138
Deleting a recovery point set . .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 138
Deleting recovery points within a set .... ..... .... . .... . .... ..... ..... .... . . 139
Making copies of recovery points .... . .... . .... . .... ..... ..... .... . .... . .... . 139
Running a one-time virtual conversion ... ..... .... . .... . .... . .... ..... ..... .... . . 141
Defining a virtual conversion job . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... . 147
Running an existing virtual conversion job immediately ... . .... . .... . 153
Viewing the properties of a virtual conversion job . .... . .... ..... ..... .. 153
Viewing the progress of a virtual conversion job . .... . .... ..... ..... .... 153
Editing a virtual conversion job . .... . .... . .... ..... ..... .... . .... . .... ..... ... 153
Deleting a virtual conversion job ... ..... .... . .... . .... . .... ..... .... . .... . ... 154
About managing file and folder backup data ..... ..... .... . .... . .... . .... ..... .. 154
Viewing how much file and folder backup data is stored .... ..... .... . 155
Page 11
Limiting the number of file versions to keep .... . .... . .... ..... ..... .... . . 155
Manually deleting files from your file and folder backup ..... .... . .... 155
Finding versions of a file or folder . . .... ..... ..... .... . .... . .... ..... ..... ... 156
Automating management of backup data . .... . .... ..... ..... .... . .... . .... . .... . 156
Moving your backup destination . . .... . .... . .... ..... .... . .... . .... . .... ..... ..... . 157
Chapter 13 Recovering files, folders, or entire drives ... . .... . .... . .... ... 159
About recovering lost data . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 159
Recovering files and folders by using file and folder backup data .... ..... 159
Recovering files and folders using a recovery point .... . .... ..... ..... .... . ... 161
About opening files and folders stored in a recovery point .... . .... . . 163
About finding the files or folders you want ... ..... ..... .... . .... . .... . .... 163
Recovering a secondary drive . . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 164
Recovery options . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... ..... ... 165
Restoring using LightsOut Restore .... ..... .... . .... . .... ..... ..... .... . .... . .... . 166
Summary of the LightsOut Restore process ... . .... . .... ..... ..... .... . ... 167
Starting the LightsOut Restore Wizard .... . .... . .... . .... ..... ..... .... . ... 168
Chapter 14 Recovering a computer ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . . 173
About recovering a computer .... . .... ..... ..... .... . .... . .... . .... ..... .... . .... . ... 173
Starting a computer by using Symantec Recovery Disk . . .... . .... ..... ..... . 174
Configuring a computer to boot from a CD .... ..... .... . .... . .... . .... .... 175
How to prepare to recover a computer .... ..... ..... .... . .... . .... . .... ..... ..... . 176
Scanning for viruses .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . ... 176
Checking a hard disk for errors .... . .... ..... ..... .... . .... . .... . .... ..... .... 178
Recovering a computer ... . .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ... 178
Edit target drive and options ... ..... ..... .... . .... . .... . .... ..... ..... .... . ... 181
Recovering a computer from a virtual disk file . .... . .... ..... ..... .... . .... . ... 183
Virtual disk recovery options . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... 185
Recovering files and folders using Symantec Recovery Disk ... ..... ..... .. 187
Exploring files and folders on your computer using Symantec
Recovery Disk . . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... 188
About using the networking tools in Symantec Recovery Disk . ..... ..... . 188
Starting networking services . .... . .... . .... ..... ..... .... . .... . .... . .... ..... . 189
Using the pcAnywhere thin host for a remote recovery . .... ..... ..... 189
Mapping a network drive from within Symantec Recovery
Disk .... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... . 191
Configuring network connection settings .... . .... . .... . .... ..... ..... .... . 192
About viewing properties of recovery points and drives .... ..... .... . .... . .. 193
Viewing the properties of a recovery point ... . .... . .... . .... ..... ..... .... 193
Viewing the properties of a drive within a recovery point .... . .... . ... 194
About the Support Utilities ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... .. 195
11Contents
Page 12
Contents12
Chapter 15 Copying a drive ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... 197
About copying a drive ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... 197
Preparing to copy drives . ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ... 197
Copying one hard drive to another hard drive . . .... ..... ..... .... . .... . .... .... 198
About drive-to-drive copying options . ..... ..... .... . .... . .... . .... ..... .... 199
Appendix A Using a search engine to search recovery
points ... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... .. 201
About using a search engine to search recovery points .... . .... . .... ..... ... 201
Enabling search engine support . .... . .... . .... . .... ..... ..... .... . .... . .... ..... ... 201
Recovering files using Google Desktop's Search Desktop feature . . .... . .. 203
About finding a file using Google Desktop . .... . .... ..... ..... .... . .... . ... 203
Appendix B About backing up Microsoft virtual
environments .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 205
About backing up Microsoft virtual hard disks . . .... ..... .... . .... . .... . .... ... 205
About backing up and restoring Microsoft Hyper-V virtual
machines .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... 206
Index . . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .. 207
Page 13
Chapter

Introducing Norton Ghost

This chapter includes the following topics:
About Norton Ghost
What is new in Norton Ghost
Hiding or showing the Advanced page
Getting more information about Norton Ghost

About Norton Ghost

1
Norton Ghostprovides advancedbackup andrecovery for your computer. Protect any kindof datayou keep on your computer by making a backupof yourcomputer's entire hard disk. Or, limit your backup to include only those files and folders that mean the most to you.
You can schedule backups to capture your changes automatically as you work from day to day. Or start a backup manually at any time. You can also easily configure NortonGhost to run a backup in responseto specificevents. Forexample, a backup can run when a particular application is started. Or, a backup can run when a specified amount of new data is added to the drive.
When youexperience a problem with your computer, youcan restore a file, folder, or an entire drive. This recovery process returns your computer to a previous, functional state with the operating system, applications, and data files intact. Or, if you accidentally delete a personal file, get it back with a few steps.
Using easy-to-follow wizards, you can set up fast and reliable backup jobs and have themrun while you continue to work. Or,schedule yourbackups to run after hours when your computer is idle.
When disaster strikes, Norton Ghost helps you recover your computer from the effects of many common problems, including
Page 14
Introducing Norton Ghost
14

What is new in Norton Ghost

Virus attacks: Damage might be done before a virus is quarantined.
Faulty software installations: Some software can negatively affect your
computer's performance, and slow it down to the point that programs or documents require too much time to open. But when installed, removing a program might not recover unintentional damage by the installation.
Hard drive failure: Data canbecome corrupted on your system drive (typically
C), making it impossible to start your operating system
Files accidentallydeleted or overwritten: Accidental deletion of filesis common,
but often costly.
Corrupted files: Individual files and folders can become corrupted by viruses,
or when a program used to modify them encounters an error.
What is new in Norton Ghost
Norton Ghost includes many enhancements and new features. Refer to the following table for information about the latest features and enhancements:
Note: Not all listed features are available in all versions of this product.
Table 1-1
Improved support for virtual formats
Improved platform support
What is new Norton Ghost
DescriptionFeature
Norton Ghost now includes support for the following virtual platforms:
VMware ESX 3.5i and 4.0i
VMware ESX 3.5 and 4.0
Norton Ghost now includes support for the following platforms:
Windows 7
Windows Vista with SP2 (includes Home
Basic, Home Premium, Business-Retail, and Ultimate)
Page 15

Hiding or showing the Advanced page

15Introducing Norton Ghost
Table 1-1
Create recovery points from within Symantec Recovery Disk
Convert recovery points to virtual disks using a schedule
Support for Microsoft Hyper-V
Support for Blu-ray disc media
What is new Norton Ghost (continued)
DescriptionFeature
You can now create independent recovery points using the new Back Up My Computer feature in Symantec Recovery Disk. Sometimes knownas acold backupor offline backup, you can create recovery points of a partition without the need to install Norton Ghost or its Agent.
See “Aboutrunning aone-time backupfrom
Symantec Recovery Diskon page 76.
You can now create schedules to convert recovery points to VMware VirtualDisk and Microsoft Virtual Disks, or directly to a VMware ESX 3.5 server.
See “Defining a virtual conversion job” on page 147.
You can now convert recovery points to Hyper-V format and also import recovery points to a Hyper-V server.
Back up your computer directly to Blu-ray, DVD, orCD. Or,you cancopy recoverypoints to Blu-ray, DVD, or CD.
Fully enabled 60-day trial
If you choose to delay installation of the product license, all features still remain enabled during the 60-day trial period. The 60-day trial period begins when you do a particular task.
See “When youdelay licensing ”on page 20.
Hiding or showing the Advanced page
The Advanced page offers experienced Norton Ghost users a single view of the most commonproduct features.If you have a good understanding of Norton Ghost, you might prefer to perform most tasks from the Advanced view.
Page 16
Introducing Norton Ghost
16

Getting more information about Norton Ghost

Note: When you refer to the documentation while using the Advanced page, the
first one or two steps do not apply. The first one or two steps merely indicate where to access each feature from the other pages of the product interface. From that point on, follow the remaining steps of each procedure.
The Advanced page can be hidden from view if you do not plan to use it.
To hide or show the Advanced page
Start Norton Ghost.
1
On the View menu, click ShowAdvanced Page to hide or show the Advanced
2
page.
Getting more information about Norton Ghost
To learn more about Norton Ghost, visit the Help and Support page. Depending on which version and language of the product you have installed, the Help and Support pageincludes one-click access to more information. The page alsoincludes access tothe product help system, theproduct User's Guide. It also includes access to theSymantec KnowledgeBase where you can find troubleshooting information.
To access Help and Support
Start Norton Ghost.
1
On the Home page, click Help > Help and Support.
2
Page 17
Chapter

Installing Norton Ghost

This chapter includes the following topics:
Before you install
Installing Norton Ghost
Updating Norton Ghost
About uninstalling Norton Ghost

Before you install

2
Installation procedures might vary, depending on your work environment and which installation options you choose. This chapter focuses on installing the full version of Norton Ghost from the installation CD.
Before you install Norton Ghost, ensure that your computer meets the system requirements. Reviewthe Readme file on the installation CDfor anyknown issues.

System requirements

The following table lists the system requirements for Norton Ghost to function properly.
Page 18
Installing Norton Ghost
18
Before you install
Table 2-1
Minimum system requirements
Operating system
RAM
Available hard disk space
Minimum requirementsComponent
The following Windows 32- or64-bit operatingsystems are supported:
Windows 7
Windows Vista Ultimate
Windows Vista Business
Windows XP Professional/Home (SP2 or later)
Windows XP Media Center (SP2 or later)
The following are the memory requirements for each component of Norton Ghost:
Norton Ghost Agent: 512 MB
Norton Ghostuser interfaceand RecoveryPoint Browser:
512 MB
Symantec Recovery Disk: 1 GB (dedicated)
LightsOut Restore: 1 GB
The following are hard disk space requirements for Norton Ghost and other areas:
When you install the entire product: Up to 430 MB is
required for a full install, depending on the language of the product you select.
Microsoft .NET Framework 2.0: 280 MB of hard disk
space is required for 32-bit computers, and 610 MB is required for 64-bit computers.
Recovery points: Sufficient hard disk space on a local
hard disk ornetwork server forstoring recovery points. The size of recovery points depends on the amount of
data you have backed up and the type of recovery point that is stored.
See “Best practices for backing up” on page 50.
LightsOut Restore: 2 GB
Page 19
Before you install
19Installing Norton Ghost
Table 2-1
Minimum system requirements (continued)
CD-ROM or DVD-ROM drive
Software
Virtual platforms (for converted recovery points)
Minimum requirementsComponent
The drive can be any speed, but it must be capable of being used as the startup drive from the BIOS.
Norton Ghostuses GearSoftware technology.To verifythat your CD writer or DVD writer is compatible, visit the Gear Software Web site.
http://www.gearsoftware.com/support/recorders/index.cfm
You can look up information about your writer if you know the name of the manufacturer and model number of your writer.
The Microsoft .NET Framework 2.0 or later is required to run Norton Ghost.
If .NET Framework is not already installed, you are prompted to install it after Norton Ghost is installed and your computer is restarted.
The following virtual platforms are supported:
VMware Workstation 4, 5, and 6
VMware ESX 3.0, 3.5, and 4.0
VMware ESXi 3.5 and 4.0
VMware Server 1
VMware GSX Server 3.x (replaced by VMware Server)
Microsoft Virtual Server 2005 R2 and later
Microsoft Hyper-V 1.0 and 2.0

About supported file systems and removable media

Norton Ghost supports the following file systems and removable media:
Page 20
Installing Norton Ghost
20
Before you install
Supported file systems
Removable media

About disabled features

Norton Ghost supports the following file systems:
FAT16, FAT16X
FAT32, FAT32X
NTFS
GUID Partition Table (GPT)
Dynamic disks
Linux Ext2, Linux Ext3
Linux swap partitions
Note: You must decrypt encrypted NTFS drives before you
attempt to restore them. You cannot view the files that are in a recovery point for an encrypted NTFS drive.
You can save recovery points locally (that is, on the same computer whereNorton Ghostis installed). Or, you can save recovery pointsto mostBlu-ray, DVD-R(W),DVD+RW, CD-R, and CD-RW recorders. You can find an updated list of supported drives on the Gear Software Web site.
http://www.gearsoftware.com
Norton Ghost also lets you save recovery points to most USB devices, 1394 FireWire devices, REV, Jaz, Zip drives, and magneto-optical devices.
Norton Ghost is packaged to meet various markets. Some features might not be available, depending on the product you have purchased. However, all features are documented. You should be aware of which features are included with the version of the product you have purchased. If a feature is not accessible in the product user interface, it is likely not included with your version of the product.
Refer tothe Symantec Web site for information about the featuresthat areincluded with your version of Norton Ghost.

When you delay licensing

If you choose to delay installation of the license key, all features in Norton Ghost remain enabled during the 60-day grace period.
Symantec Recovery Disk, a component of Norton Ghost, is available with no trial period or evaluation. However, you need a valid license key to use the following features in Symantec Recovery Disk:
Back Up My Computer wizard
Page 21

Installing Norton Ghost

See “About running a one-time backup from Symantec Recovery Disk” on page 76.
The 60-day grace period of Norton Ghost begins when you do any one of the following in the software:
Define a drive-based or file and folder backup
Recover a computer
Copy a drive
Consolidate incremental recovery points
Run a drive-based or file and folder backup
Define a scheduled convert to virtual disk job
Run a scheduled convert to virtual disk job
Define a one time convert to virtual disk job
If youuse an Evaluation copy ofthe product, it also expires after 60days. However, all features are enabled until the end of the evaluation period, at which time you must purchase the product or uninstall it. You can purchase a license at any time (even after the evaluation period expires) without reinstalling the software.
21Installing Norton Ghost
Note: If this productcame pre-installed from a computer manufacturer, your trial period couldbe as long as 90days. The product licensing or activation pageduring install indicates the duration of your trial period.
See “Activating Norton Ghost later” on page 24.
Installing Norton Ghost
Before youbegin, you should review the requirements andscenarios for installing Norton Ghost.
See “System requirements” on page 17.
Note: During the installation process, you might be required to restart the computer. You should ensure proper functionality after the computer restarts. You can do this by logging on again using the sameuser credentials that you used to log on when you installed Norton Ghost.
Page 22
Installing Norton Ghost
22
Installing Norton Ghost
Warning: The Symantec Recovery Disk CD provides the tools that you need to
recover your computer. How you received Symantec Recovery Disk depends on the version of the product that you purchased. For example, Symantec Recovery Disk is included with your product either on a separate CD, or on your product CD. Be sure you store the CD in a safe place.
To install Norton Ghost
Log onto your computer using either the Administrator account oran account
1
that has administrator privileges.
Insert the Norton Ghost product CD into the media drive of the computer.
2
The installation program should start automatically.
If the installation program does not run, type the following command at a
3
command prompt:.
<drive>:\autorun.exe
where <drive> is the drive letter of your media drive.
In the CD browser panel, click Install Norton Ghost.
4
In the License Agreement panel, read the license agreement, and then click
5
I accept the terms in the license agreement.
Do one of the following:
6
In theLicense Agreement panel, click InstallNow to begin theinstallation.
In the License Agreement panel, click Custom Install, select or deselect
the options you want installed, and then click Install Now. Installation options include:
Backup andRecovery Service
Recovery Point Browser
User Interface
The primary service that is required to back up or recover your computer.
Enables you to browse, mount, copy, verify, and restore files and folders using recovery points.
Installs the product user interface that is required for interacting with the Norton Ghost Service.
Agent Deployment–Allows thecomputer onwhich you have installed Norton Ghost to deploy the Norton GhostAgent toother computersfor remote recovery management.
Page 23
Installing Norton Ghost
23Installing Norton Ghost
CD/DVD Support
LiveUpdate
Click Finish to complete the installation.
7
Remove the product CD from the media drive, and then click Yes to exit the
8
installation wizard and restart the computer.
If you click No, you cannot run Norton Ghost until after you restart your
computer.

Completing the installation

After youinstall the product, you areprompted tolicense or activate your product. You can then run LiveUpdate to check for product updates, and then configure your first backup.
Note: If this productcame pre-installed from a computer manufacturer, your trial period could be as long as 90 days. Refer to the Activate later label.
To complete the installation
Required for backing up directly to CD/DVD, and for creatinga customSymantec Recovery Disk CD. A CD/DVD burner is required to use this feature.
Keeps yourSymantec softwareup-to-date withthe latest product updates.
In the Welcome panel, click Next.
1
If your computer manufacturer installed the product, the Welcome page
might appear the first time that you run Norton Ghost.
Do one of the following:
2
Click I've already purchased the product and have a license key.
Note: You can find the license key on the back of your product CD jacket. Do notlose the license key. Youmust use it when you install NortonGhost.
Click Activate later to delay the activation of your license. After the trial
period ends, the product will no longer work. See “When you delay licensing ” on page 20.
If Norton Ghost is a trial version and you want to purchase a license key,
click Symantec Global Store.
Click Next.
3
Page 24
Installing Norton Ghost
24
Installing Norton Ghost
Do any of the following:
4
Click RunLiveUpdate to check forany product updates since theproduct
shipped.
Click Launch Easy Setup to open the Easy Setup window when you
complete the install process. (This option is not available in the Desktop version of Norton Ghost.)
Click EnableGoogle DesktopFile andFolderRecovery if you wantGoogle
Desktop to search your recovery points for the files and folders that you want to recover.
If you select this option, Norton Ghost automatically catalogs each file as it creates a recovery point. Google Desktop can then use this catalog to search for files by name. It does not index the contents of the files.
Note: This option is available only if Google Desktop is already installed on your computer. If you plan to install Google Desktop, you can enable search engine support later.
Click Finish.
5

Activating Norton Ghost later

If youdo not activate Norton Ghostbefore the trial period ends, the softwarestops working. However, you can activate the product at any time after the trial period expires.
To activate Norton Ghost later
On the Help menu, click Enter License Key.
1
Follow the on-screen prompts.
2

About setting up your first backup

Unless you deselected the Run Easy Setup check box during the setup wizard, the Easy Setup window appears. If you do not run Easy Setup during the setup wizard, it appears the first time you open the Run or Manage Backups window.
When the Easy Setup window is displayed, you can accept the default drive and file and folder backup settings. Or, you can click any of the settings to edit them.
If you want the new backup to run immediately, be sure to select Run backup now, and then click OK.
Page 25

Updating Norton Ghost

You canreceive software updates for yourversion of the product over an Internet connection. LiveUpdate connects to the Symantec LiveUpdate server and automatically downloads and installs updates for each Symantec product that you own.
You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates.
To update Norton Ghost
On the Help menu, click LiveUpdate.
1
In the LiveUpdate window, click Start to select the updates.
2
Follow the on-screen instructions.
When the installation is complete, click Close.
3
Some program updates might require that you restart your computer before
the changes take effect.

About uninstalling Norton Ghost

Updating Norton Ghost
25Installing Norton Ghost
When you upgrade Norton Ghost from a previous version of the product, the install programautomatically uninstalls the previous versions.If needed, you can manually uninstall the product.
Follow your operating system's instructions on how to uninstall software.
Page 26
Installing Norton Ghost
26
About uninstalling Norton Ghost
Page 27
Chapter

Ensuring the recovery of your computer

This chapter includes the following topics:
About ensuring the recovery of your computer
Testing Symantec Recovery Disk
If driver validation fails
Creating a custom Symantec Recovery Disk CD
3

About ensuring the recovery of your computer

If Windowsfails to start or it does notrun normally,you can recover your computer by using the Symantec Recovery Disk CD. The drivers that are included on the recovery disk must match the drivers that are required to run your computer's network cards and hard disks.
To help ensure that you have the drivers that you need to recover your computer, you can use the Run Driver Validation tool available on the Symantec Recovery Disk. The driver validation tool compares hardware drivers on the Symantec Recovery Disk CD with the drivers that are required to run your computer's network cards and hard disks.
You should run the driver validation test any time you make changes to the network interface cards or storage controllers on a computer.
See “If driver validation fails” on page 28.
Note: The driver validation tool or Symantec Recovery Disk does not support wireless network adapter drivers.
Page 28
Ensuring the recovery of your computer
28

Testing Symantec Recovery Disk

Testing Symantec Recovery Disk
You should test the Symantec Recovery Disk CD to ensure that the recovery environment runs properly on your computer.
Note: Depending on which version of the product you have purchased, Symantec Recovery Disk is either included on your product CD, or as a separate CD. You should place the CD containing Symantec Recovery Disk in a safe place.
Testing the Symantec Recovery Disk CD lets you identify and solve the following types of problems:
You cannot start Symantec Recovery Disk.
See “To configure a computer to boot from a CD” on page 175.
You do not have the necessary storage drivers to access recovery points on
the computer.
You need information about your system to help you run Symantec Recovery
Disk.
See “If driver validation fails” on page 28.
To test Symantec Recovery Disk
Run thedriver validationtool totest whetherSymantec RecoveryDisk works
1
with the network cards and storage devices on the computer.
Start your computer using the Symantec Recovery Disk CD.
2
See “Starting a computer by using Symantec Recovery Disk” on page 174.
When you have started Symantec Recovery Disk, do one of the following:
3
If you want to store recovery points on a network, run a mock restore of
a recoverypoint that is stored on a networkto test the network connection.
If you want to store recovery points on a computer, run a mock restore of
a recovery point that is stored locally to test the local hard drive connection.

If driver validation fails

The driver validation test verifies whether the drivers for all storage devices and network cards in use by the computer are available in Symantec Recovery Disk. If the drivers are available on the recovery disk, youreceive a validation message. If anydrivers are not included onthe recovery disk, the Driver Validation Results dialog box appears.
Page 29

Creating a custom Symantec Recovery Disk CD

Without access to the correct drivers, a device cannot be used while you run Symantec Recovery Disk. Therefore, if the recovery points that are required for recovering yourcomputer are stored on a network or a local hard drive,you might not have access to them.
You can find the drivers and copy them to a CD or a floppy disk, or you can create a custom Symantec Recovery Disk CD.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
Creating a custom Symantec Recovery Disk CD
Even if driver validation succeeds and your Symantec Recovery Disk CD appears to work, you should create a custom Symantec Recovery Disk CD. A custom CD contains your computer's current network and storage device drivers. It helps to ensure that in an emergency you can get to the recovery points that are required to restore your computer.
Note: You must have a writeable Blu-ray/DVD/CD-RW drive to create a custom Symantec Recovery Disk CD.
29Ensuring the recovery of your computer
To create a custom Symantec Recovery Disk CD
Attach and turn on all storage devices and network devices that you want to
1
make available.
Start Norton Ghost.
2
Insert the Symantec Recovery Disk CD into your media drive.
3
If necessary,specify the path or browse to themedia drive in which you placed
the Symantec Recovery Disk CD.
Click Tasks > Create Custom Recovery Disk CD.
4
Click Next.
5
Page 30
Ensuring the recovery of your computer
30
Creating a custom Symantec Recovery Disk CD
Specify the following:
6
Disk label
Burn SymantecRecovery Diskto CD/DVD
Save a copy of the custom Symantec Recovery Disk (CD/DVD image file)
Click Next.
7
Review the list of storage and network drivers to be included, and add
8
Type the name that you want to use for the Symantec Recovery Disk label.
If you want to save your customized Symantec Recovery Disk to media, select this option and then in the list box, select the media burning device that you want to use.
If you want to save your customized Symantec Recovery Disk as an .iso file, select this option, and then specify the path to where you want to save the resulting file.
additional drivers or remove the drivers you do not need.
On the Startup Options pane, select the default keyboard layout, display
9
language, and time zone from the respective lists.
Click Next.
10
On the Options pane, do the following:
11
Automatically start network services
Select this option if you want networking to start automatically when you recover the computerthrough LightsOut Restore.
Dynamic IP
Static IP
Click this option to connect to a network without the need for additional network configuration. You can click thisoption if you knowthere isa DHCPserver available on the network at the time you restore.
Click this option to connect to a network with a particular network adapter and specific addresssettings. You should click this option if you know there is no DHCP server (orthe DHCP serveris unavailable) when you recover.
Page 31
Creating a custom Symantec Recovery Disk CD
31Ensuring the recovery of your computer
Automatically start Symantec
pcAnywhere
Select this option if you want the Symantec pcAnywhere thin host to start automatically when you start Symantec Recovery Disk.
Click Configure to specify pcAnywhere log on credentials and the following optional parameters:
Host name
In the Host name box, type the name that you want to use for the host.
You can leave this box blank to configure thehost nameto bethe same as the computer name.
Encryption level
To encrypt the data stream between the host and remote computer, in the Encryption level list, select one of the following:
None
No encryption of the data stream occurs between the host and remote computer.
pcAnywhere
Scrambles data using a mathematical algorithm so that a third party cannot easily interpret it.
This option is available on any operating systemthat pcAnywhere supports.
Symmetric
Encodes and decodes data using a cryptographic key.
This option is available on any Windows operating system that supports the Microsoft CryptoAPI.
Click Next.
12
Page 32
Ensuring the recovery of your computer
32
Creating a custom Symantec Recovery Disk CD
On the License Setup pane, specify how you want to enable licensed features
13
in the customized Symantec Recovery Disk (such as the cold imaging feature called Back Up My Computer).
Click Finish.
14
Warning: Be certain to test your new, custom Symantec Recovery Disk CD. It
ensures that you can use the CD to start your computer and that you can access the drive that contains your recovery points.
See “Testing Symantec Recovery Disk” on page 28.
Page 33
Chapter

Getting Started

This chapter includes the following topics:
About key product components
How you use Norton Ghost
Starting Norton Ghost
Configuring Norton Ghost default options

About key product components

4
Norton Ghostincludes two key components: the program itself, and theSymantec Recovery Disk CD.
Table 4-1
Norton Ghost program (user interface)
Key product components
DescriptionKey Component
The Norton Ghost program lets you define, schedule, and run backups of your computer. Whenyou run a backup, recovery points of your computer are created, which you can then use to recover your entire computer, or individual drives, files, and folders. You can also manage recovery point storage (backup destination), and monitor the backup status of your computer to make sure your valuable data is backed up on a regular basis.
Page 34
Getting Started
34

How you use Norton Ghost

Table 4-1
Key product components (continued)
DescriptionKey Component
Symantec Recovery Disk CD
The Symantec Recovery Disk CD is used to start your computer in the recovery environment. If your computer's operating system fails, use Symantec RecoveryDisk torecover yoursystem drive (the drive where your operating system is installed).
Note: Depending on which version of the product you have purchased,
Symantec Recovery Disk is either included on your product CD, or as a separate CD. You should place the CD that contains Symantec Recovery Disk in a safe place.
See “About recovering a computer” on page 173.
How you use Norton Ghost
While Norton Ghost does the work of backing up your files, folders, or entire drives, you need to tell Norton Ghost what to backup, when to back it up, and where to put the backed up data.
Using Norton Ghost includes the following key tasks:
Defining a backup
Running a backup
Recovering files, folders, or entire drives
Refer to the following figure to understand the relationship of these tasks.
Page 35

Starting Norton Ghost

35Getting Started
Figure 4-1
Using Norton Ghost
Starting Norton Ghost
Norton Ghost is installed in the Windows Program Files folder by default. During installation, a program icon is installed in the Windows system tray from which you can open Norton Ghost. You can also open Norton Ghost from the Windows Start menu.
To start Norton Ghost
Depending onthe Windows version you are running, use one ofthe following
methods:
Page 36
Getting Started
36

Configuring Norton Ghost default options

On the classic Windows taskbar, click Start > Programs > Norton Ghost
> Norton Ghost 15.0.
On the Windows taskbar, click Start > All Programs > Norton Ghost >
Norton Ghost 15.0.
In the Windows system tray, double-click the SymantecNorton Ghost
15.0 tray icon.
In the Windows system tray, right-click the Norton Ghost tray icon, and
then click Open Symantec Norton Ghost 15.0.
Configuring Norton Ghost default options
The Optionsdialog boxincludes several views that let you configure the following default settings:
DescriptionOptions
General
Performance
Tray Icon
Specify adefault location where a backup will create and store recovery pointsand file and folder backup data. Ifthe location you choose is on a network, you can enter your user authentication information.
See “Selecting a default backup destination” on page 38.
Lets you specify a default speed for backup or recovery processes. Whenyou movethe slidercloser toFast, itincreases the speed at which the program backs up or recovers your computer. If you choose a slower speed it could improve the performance ofyour computer, especiallyif you workon your computer during a backup or recovery.
Note: During a backup or recovery, you have the option to
override this default setting to fit your needs at the time.
You can also configure network throttling to limit the effects of backups on network performance.
See “Adjusting the effect of a backup on computer
performanceon page 39.
See “Enabling network throttling” on page 39.
You can turn on or off the system tray icon. You can also specify whetherto showonly errormessages whenthey occur, or to show both error messages and other information, such as the completion of a backup.
See “Adjusting default tray icon settings” on page 40.
Page 37
Configuring Norton Ghost default options
37Getting Started
DescriptionOptions
File Types
Google Desktop
External Drives
Configure FTP
Log File
Lets you managefile types andfile type categories, which are used as a method for selecting the types of files you want included in a file and folder backup.
See “Managing file types” on page 41.
If Google Desktop is installed on your computer when you install Norton Ghost, you have the option of enabling Google Desktop fileand folderrecovery. Whenyou enablethis feature, you can search for files (by file name) inside a recovery point that was created with search engine support enabled.
If GoogleDesktop isnot installedon your computer when you install Norton Ghost, you have the option of clicking a link to the Web site where you can download and install Google Desktop for free.
See “About using a search engine to search recovery points” on page 201.
Delete orrename theunique namesyou havegiven toexternal drives used as backup and Offsite Copy destinations.
See “Using nicknames for external drives” on page 43.
Specify default FTP settings to be used with Offsite Copy.
See “Configuring default FTP settings for use with Offsite
Copyon page 44.
Lets you specify the types of product messages to log (errors, warnings, and information), where to store the log file, and set a maximum file size for the log file.
See “Logging Norton Ghost messages” on page 44.
Event Log
SMTP E-mail
Lets you specify the types of product messages to log (errors, warnings, and information) in the Windows event log.
See “Logging Norton Ghost messages” on page 44.
If you want a history of actions taken by Norton Ghost, or of error messages and warnings, you can choose to save them in a log file on your computer, or to have them emailed to an address you specify.
See “Enabling email notifications for product (event)
messageson page 46.
Page 38
Getting Started
38
Configuring Norton Ghost default options
DescriptionOptions
SNMP Trap
To configure Norton Ghost default options
Start Norton Ghost.
1
Click Tasks > Options.
2
Select anoption you want to edit, make anynecessary changes, and then click
3
OK.
If youhave aNetwork ManagementSystem (NMS)application, you can enable SNMP Traps support to send notifications to you NMS application.
See “About SNMP traps” on page 122.

Selecting a default backup destination

You can specify the default destination for storing recovery points and file and folder backup data created when you run a backup. This default location is used if you do not specify a different location when you define a new backup.
To select a default backup destination
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click General.
2
Select Prepend computer name to backup data file names.
3
This is especially useful if you back up more than one computer to the same drive. For example, you might back up a laptop and a desktop computer to the same USB or network drive. By prepending the computer name to each backup data file name, you can more easily identify which backup data files belong to which computer.
Select Save backup files to a unique subfolder if you want Norton Ghost to
4
create a new subfolder that will serve as your backup destination.
Note: The new subfolder is given the same name as your computer. For example, if your computer name is "MyLaptop", the new subfolder would be named \MyLaptop.
Page 39
Configuring Norton Ghost default options
Enter a path to a folder where you want to store recovery points and file and
5
folder backup data, or click Browse to look for a location.
You cannot use an encrypted folder as your backup destination. If you want
to encrypt your backup data to prevent another user from accessing it, refer
to the Advanced options when you define or edit a backup.
If you entered the path to a location on a network, enter the user name and
6
password required to authenticate to the network.
Click OK.
7

Adjusting the effect of a backup on computer performance

If you are working on your computer when a backup is runningespecially one that is creating an independent recovery pointyour computer might slow down. This is because Norton Ghost is using your computer's hard disk and memory resources to perform the backup.
However, you can actually change the speed of the backup as away of minimizing the impact of Norton Ghost on your computer while you work.
To adjust the effect of a backup on computer performance
39Getting Started
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click Performance.
2
If you want to improve your computer's speed performance, move the slider
3
bar closer to Slow.
If you want the backup to complete more quickly, move the slider bar closer
4
to Fast.
Click OK.
5
Note: During a backup or recovery, you'llhave the option of overriding this default
setting to fit your needs at that moment.
See “Adjusting the speed of a backup” on page 94.
Enabling network throttling
Similar to computer performance adjustments, you can also limit the impact of a backup on network performance.
Network performanceis affected by many variables. Consider thefollowing issues before you use this feature:
Page 40
Getting Started
40
Configuring Norton Ghost default options
Network cards:Is yournetwork wiredor wireless?What arethe speedsof your
network cards?
Network backbone: What is the size of your network pipeline? Does it support
10 MB transfer rates, or 1 GB transfer rates?
Network server:How robust is your server hardware? Howfast isits processor?
How much RAM does it have? Is it fast or slow?
Backing up: How many computers are scheduled to back up at the same time?
Network traffic: Are backups scheduled to run when network traffic is heavy
or light?
Consider using this feature only when you know what your network can handle. If you schedule your backups at staggered intervals and when network traffic is low, you may not need to use this feature. Avoid backing up multiple computers at the same time and to the same network destination.
Gather the required information about your network's performance and then schedule backups accordingly. Then, if necessary, enable this feature and set the Maximum network throughput to a setting that matches the circumstances.
To enable network throttling
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click Performance.
2
Select Enable network throttling.
3
In the Maximum network throttling field, enter the maximum amount (in
4
KB) of network throughput that Norton Ghost can send per second.
Click OK.
5

Adjusting default tray icon settings

You can turn the system tray icon on or off and specify whether to show only error messages when they occur, or to show both error messages and other information, such as the completion of a backup.
Page 41
Configuring Norton Ghost default options
To adjust default tray icon settings
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click Tray Icon and select one of the following:
2
41Getting Started
Show system tray icon
Show missed backups
Show system tray questions
Show status messages
Show error messages
Click OK.
3
Displays theNorton Ghosticon inthe system tray.
You must select this option to enable or disable any of the remaining options.
Notifies you when a backup was scheduled but did not run.
This can happen when your computer was turned off at the time a backup was scheduled to run.
Offers helpful prompts in the form of questions that can help you keep your data backed up.
Displays messages about the status of backup operations, such as notifying that a backup has started, or that your backup destination is getting full.
Displays error messages when errors occur so thatyou canresolve any issues that might hinder data protection.

Managing file types

When you define a file and folder backup, file types are a quick way to include files you use the most.For example, if you keep music files on your computer, you can configure a file and folder backupto include all music files(for example, .mp3, .wav).
The most common file types and extensions are already defined for you. But you can define additional file type categories as needed, and then edit them at any time. For example, if you install a new program that requires the use of two new file extensions (.pft and .ptp, for example), you can define a new file type and define the two file extensions for that category. Then when you define a file and folder backup, you can select the new category. When the backup is run, all files ending with .pft and .ptp are backed up.
Page 42
Getting Started
42
Configuring Norton Ghost default options
To create a new file type and extensions
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click File Types.
2
At the bottom of the File types list, click the Adda file type (+) button to add
3
a file type category.
Type a descriptive name of the new file type category, and then press Enter.
4
At thebottom of the Extensions forlist, click the Addan extension (+) button,
5
and then type an asterisk (*) and a period, followed by the extension of the file type you want to define, and then press Enter.
Click OK.
6
To edit a file type and extensions
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click File Types.
2
Select a file type from the File types list, and then do one of the following:
3
Click the Rename a file type button (at the right of the - button) to edit
Select an extension in the Extensions for column and click the Rename
Click either the Restore default file types list or the Restore default
the name of the selected file type.
an extension button (at the right of the - button) to edit the name of the extension.
extension list button to restore all default file types or extensions.
Caution: Any file types and extensions you have set up are removed. You must add them again manually.
Click OK.
4
To delete a file type (and all of its extensions)
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Select a file type in the File types column.
2
You cannot delete a default file type. You can delete all but one extension of a default file type, and you canadd additional extensions to adefault file type.
Click the Remove a file type (-) button , and then click OK.
3
Use this same procedure to remove file extensions from the Extensions for list.
Page 43

Using nicknames for external drives

When you choose an external drive for use with Norton Ghost as either a backup destination or an Offsite Copy destination, it can become confusing if you are using morethan one drive, especially when the assigneddrive letterchanges each time you plug in the drive.
To help you manage these destinations, Norton Ghost lets you assign a nickname to eachexternal drive. Doing so does not changethe drivelabel, but is for use only when you are accessing those drives from within Norton Ghost.
For example, you might be swapping out two different external drives used as Offsite Copy destinations during any given week. Depending on the drive labels assigned to each drive and whether or not the drive letter previously assigned has changed, it could become confusing as to which drive you are using at any given time.
However, byassociating unique nicknames to each drive, thenas you use the drive with Norton Ghost, the nicknames you assigned appear in various locations in Norton Ghost.
Note: It is also a good idea to place physical labels on each external drive to help you manage the task of swapping the drives.
Configuring Norton Ghost default options
43Getting Started
For example,if youassigned the nickname, "Cathy Read" to onedrive, and"Thomas Read" to a second drive, their nicknames appear in Norton Ghost whenever the drives are plugged in to your computer.
See “About Offsite Copy” on page 81.
To make it even easier, the Options dialog box lets you see all of your drive nicknames in one view. From this view, you can remove or edit existing names.
To remove or edit external drive nicknames
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Destinations, click External Drives.
2
Select an external drive from the list and then do one of the following:
3
Click Remove to delete the nickname associated with the external drive.
Click Rename to edit the nickname.
Page 44
Getting Started
44
Configuring Norton Ghost default options

Configuring default FTP settings for use with Offsite Copy

File Transfer Protocol, or FTP, is the simplest and most secure way to copy files over the Internet. Norton Ghost serves as an FTP client to copy your recovery points to a remote FTP server as a secondary backup of your critical data.
The Options dialog box lets you configure basic FTP settings to help ensure that your recovery points are copied to your FTP server.
To configure default FTP settings for use with Offsite Copy
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Destinations, click Configure FTP.
2
Refer to the following table when making changes:
3
Connection mode: Passive (Recommended)
Connection mode: Active
Limit connection attempts to
Stop trying to connect after
Default port
Passive (sometimeswritten "PASV")mode helpsavoid conflicts with securitysystems. Thismode isnecessary forsome firewalls and routers because when using passive mode, the FTP client opens the connection to an IP Address and port that the FTP server supplies.
Use active mode when connections or transfer attempts fail in passive mode, or when you receive data socket errors. When an FTP client connects using active mode, the server opens a connection to an IP Address and port that the FTP client supplies.
Specify the number of times Norton Ghost tries to connect to an FTP server before giving up. Norton Ghost can attempt a maximum of 100 times.
Specify the number of seconds Norton Ghost tries to connect to an FTP server before giving up. You can specify up to 600 seconds (10 minutes).
Specify the port of the FTP server that is listening for a connection.
You shouldconsult theFTP server administrator to be sure that the port you specify is configured to receive incoming data.

Logging Norton Ghost messages

You can specify which product messages (errors, warnings, and information) are logged asthey occur, and where the log fileis stored. Product messages can provide useful information about the status of backups or related events. They can also provide helpful information when you need to troubleshoot.
Page 45
Configuring Norton Ghost default options
Two logging methods are available: Norton Ghost logging, and the Windows application log.
From the Options page, you can configure both methods.
To log Norton Ghost messages
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Notifications, click Log File.
2
Click the Selectthe priority andtype of messages list and select the priority
3
level at which a message should be logged.
45Getting Started
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
Errors
Warnings
Information
In the Log file location field, enter a path to where the log file should be
5
Send all messages, regardless of priority levels.
Send only medium and high priority messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of priority levels.
created and stored.
If you don't know the path, click Browse and select a location.
In the Maximum file size field, specify a maximum size (inkilobytes) that the
6
log file is allowed to grow.
The file is kept within the limit you set by replacing the oldest logged items
in the file with new items as they occur.
Click OK.
7
To configure which product events are written to a Windows event log
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Notifications, click Event Log.
2
Page 46
Getting Started
46
Configuring Norton Ghost default options
Click the Selectthe priority andtype of messages list and select the priority
3
level at which a message should be logged.
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
Errors
Warnings
Information
Click OK.
5
Send all messages, regardless of priority levels.
Send only medium and high priority messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of priority levels.

Enabling email notifications for product (event) messages

Email notifications can be sent to a specified email address if there are any errors or warnings that occurred when a backup is run.
Note: If you do not have an SMTP server, this feature is unavailable to you.
Notifications canalso be sent to the system event log anda custom log file located in the Agent folder of the product installation.
If notifications are not delivered, check the setup of your SMTP server to ensure that it functions properly.
To enable email notifications for product (event) messages
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Notifications, click SMTP E-mail.
2
Page 47
Configuring Norton Ghost default options
Click the Selectthe priority andtype of messages list and select the priority
3
level at which an email should be sent.
47Getting Started
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
Errors
Warnings
Information
In the To address text box, type the email address (for example,
5
Send all messages, regardless of priority levels.
Send only medium and high priority messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of priority levels.
admin@domain.com) where notifications are to be sent.
Optionally, type the email address of the sender in the From address text
6
field.
If you do not specify a From address, the name of the product is used.
In the SMTP server text box, type the path to the SMTP server that sends the
7
email notification (for example, smtpserver.domain.com).
From the SMTP Authentication drop-down box, select the method to use to
8
authenticate to the specified SMTP server.
Enter your SMTP user name and password.
9
If you are not sure what your user name and password are, contact a system
administrator.
Click OK.
10
Page 48
Getting Started
48
Configuring Norton Ghost default options
Page 49
Chapter

Best practices for backing up your data

This chapter includes the following topics:
About backing up your data
About choosing a backup type
Best practices for backing up
Additional tips about backups
5
After defining your backup job
About selecting a backup destination
About backing up dual-boot computers

About backing up your data

To backup your computer or your individual filesand folders, you do the following:
Define a backup
Run the backup
See “How you use Norton Ghost” on page 34.
When you define a backup, you decide on the following:
What to back up (files and folders, or an entire drive)
Where to store the backup data (backup destination)
Whether or not to use Offsite Copy to copy backup data to remote locations
When to run the backup (automatically or manually)
Page 50
Best practices for backing up your data
50

About choosing a backup type

What compressionlevels tospecify forrecovery points,and whetherto enable
security settings (encryption and password protection).
Which of the many other options you want to use. You can customize each
backup according to your backup needs.
About choosing a backup type
There are two types of backups available:
Drive-based backup: Backs up an entire hard drive
File and folder backup: Backs up only the files and folders that you select
You canuse the following guidelines to determine whichtype of backup to choose:
Drive-based backup
File and folder backup
Use this backup type to do the following:
Back up and recover your computer's system drive
(typically, the C drive, which includes your operating system).
Back up and recover a specific hard drive, such as a
secondary drive (which is a drive other than the system drive on which your operating system is installed).
Recover lost or damaged files or folders from a specific
point in time.
Use this backup type to do the following:
Back up and recover specific files and folders, for
example personal files that are stored in the My Documents folder.
Back up and recover files of a specific type, for example
music (.mp3 or .wav) or photographs (.jpg or .bmp).
Recover a specific version of a file from a specific point
in time.
See “Before you back up” on page 51.

Best practices for backing up

As you prepare to back up your computer, review this information:
Before you back up
During a back up
When a back up is finished
Page 51

About backups

Best practices for backing up
51Best practices for backing up your data
When you back up your computer, you choose from two types of backups:
drive-based backup: backs up an entire hard drive
file and folder backup: backs up only the files and folders you select
Which backup type you choose depends on what you are trying to protect and how much storage space you have to store backup data (recovery points, and file and folder backup data).
The following table highlights the key uses of each backup type:
Use toBackup type
Drive-based backup
File and folder backup

Before you back up

Consider these best practices before you define and run your first back up:
Schedule back ups when you know your computer will be turned on.
Use a secondary hard disk as your backup destination.
Back upand recoveryour computer (system drive, typically
drive C)
Back up and recover a specific hard drive (any secondary
drive, drives other than your system drive)
Recover lost or damaged files or folders using recovery
points
Back up and recover specific files and folders, such as
personal files stored in the My Documents folder
Back up and recover files of a specific type, such as music
(.mp3, .wav) or photographs (.jpg, .bmp)
Your computermust be turnedon andWindows must be running at the time a back up occurs. If not, any scheduled back ups are skipped until the computer is turned on again. You then are prompted to run the missed back up.
See “About choosing a backup type” on page 50.
You shouldstore recoverypoints ona harddisk other than your primary hard disk C. It helps ensure that you can recover your system in the event that your primary hard disk fails.
See “About selecting a backup destination” on page 56.
Page 52
Best practices for backing up your data
52
Best practices for backing up
Consider using external drives as your backup destination.
Give nicknames to your external drives to help you easily identify them
Use Offsite Copy
Using anexternal drivemakes yourbackup datamore portable. Shouldyou needto removeyour criticaldata from a particular location, you can quickly grab an external drive on your way out the door.
See “About Offsite Copy” on page 81.
You can assign a nickname to each external drive to help keep track of where your backup data is stored for each computer you back up. Because drive letters can changeeach timeyou unplugand plugan external drive into your computer, a nickname ensures that you can always know whichdrive you are using when you are running Norton Ghost.
Using a nickname does not change the volume label of a drive. A nickname simply helps you identify the drive when using Norton Ghost.
And the nickname sticks with the drive, sothat if you plug the drive into a second computer running another copyof NortonGhost, thenickname appears.
Note: You might also consider placing a sticky label
on each drive that matches the nickname that you have assigned.
See “Usingnicknames forexternal drives”on page43.
Use Offsite Copy to copy your latest recovery points to eithera portable storage device or a remote server. By copying recovery points to a portable hard disk, you can then take a copy of your data with you when you leave the office.
See “About Offsite Copy” on page 81.
Run back ups on a regular and frequent basis.
When youdefine your backups, schedulethem to run frequently sothat you haverecovery points thatspan at least the last two months.
See “Editing a backup schedule” on page 97.
See “Defining a drive-based backup” on page 60.
Page 53
Best practices for backing up
53Best practices for backing up your data
Keep personal data on a separate drive than the drive on which Windows and your software programs are installed.
Verify the recovery point after you create it to ensure that it is stable.

During a back up

If you are working at your computer and a back up starts to run, you might notice that the performance of your computer slows down. Norton Ghost requires significant system resources to run a back up. If slowing occurs, you can reduce the speed of the back up to improve computer performance until you are finished working.
See “Adjusting the speed of a backup” on page 94.
You should keep your operating system and software programs separate from your own data. It speeds the creation of recovery points and reduces the amount of informationthat needsto be restored. For example, use the C drive to run Windows and to install andrun software programs. Use the D drive to create, edit, and store personal files and folders.
For other drive management solutions, go to the Symantec Web site at the following URL:
www.symantec.com/.
When you define a backup, you should select the option to verify the recovery point to ensure that the recovery point can be used to recover lost data.
See “About choosing a backup type” on page 50.

When a back up is finished

After a back up finishes, consider the following best practices:
Review the contents of recovery points and file and folder backup data.
Periodically review the contents of your recovery points to ensure that you back up only your essential data.
For file and folder backups, click Recover My Files from either the Home or Tasks pages. Then click Search to display the latest version ofall thefiles that are included in your backup.
See “About opening files and folders stored in a
recovery pointon page 163.
Page 54
Best practices for backing up your data
54

Additional tips about backups

Review the Status page to verify that backups have happened and to identify any potential problems.
Manage storage space by eliminating old backup data.
Review the level of protection that is provided for each of your computer's drives.
Periodically review the Status page. You can also review the events log on the Advanced page.
The event log records events when they occur, backups and any errors that might have occurred during or after a backup.
If you do not see the Advanced page tab, click View > Show Advanced Page.
Note: Backup status and other messages are also
conveyed in the system tray. So you do not even need to start the product to identify the status of your backups.
See “Verifyingthat abackup is successful” on page 95.
Delete outdated recovery points to make more hard disk space available.
Also, reduce the number of file versions that are created by file and folder backups.
See “Managing recovery point storage” on page 137.
See “About managing file and folder backup data” on page 154.
Check the Status page on a regular basis to ensure that each drive has a defined backup.
Maintain backup copies of your recovery points.
Store backup copies of your recovery points in a safe place. For example you can store them elsewhere on a network, or you can store them on CDs, DVDs, or tapes for long-term, off-site storage.
See “Making copies of recovery points” on page 139.
Additional tips about backups
Consider the following tips when you run a defined backup:
Norton Ghost does not need to be running for a scheduled backup to start.
After you define a backup, you can close Norton Ghost.
The computer that is being backed up must be turned on and Windows must
be started.
All defined backups are saved automatically so that you can edit them or run
them later.
Page 55

After defining your backup job

Do not run a disk defragmentation program during a backup. Doing so will
significantly increase the time that it takes to create the recovery point and might cause unexpected system resource issues.
If you have two or more drives that are dependent on each other, you should
include both drives in the same backup. This provides the safest protection.
Include multipledrives inthe same defined backup to reduce the total number
of backupsthat must be run. Doing so minimizesinterruptions whileyou work.
Use the Progress and Performance feature to reduce the impact of a backup
on your computer's performance. For example, if a scheduled backup starts while you are in the middle of a presentation, you can slow down the backup to give more processing resources back to your presentation program.
The powermanagement featureson a computer can conflict with Norton Ghost
during a backup. For example, your computer might be configured to go into hibernation mode
after a period of inactivity. You should consider turning off the power management features during a scheduled backup.
If a backup is interrupted, consider running it again.
If you experience problems while creating a backup, you may need to reboot
the computer.
55Best practices for backing up your data
After defining your backup job
All backup jobs you define are automatically saved so that you can edit or run them later.
After you define a backup and schedule it to run, youcan close NortonGhost. The program does not need to be running for a backup to start.
However, your computer must be turnedon and Windows must be running at the time abackup occurs. If not, any scheduled backupsare skippeduntil the computer is turned on again. You then are prompted to run the missed backup.

Viewing the properties of a backup job

You canreview the settings and configuration of a defined backupwithout opening the backup job.
To view the properties of a backup job
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, select a backup job and then click
2
Tasks > Properties.
Page 56
Best practices for backing up your data
56

About selecting a backup destination

About selecting a backup destination
You should review the following information before deciding where to store recovery points and file and folder backup data.
Note: If you choose to use CDs or DVDs as your backup destination (not recommended), you cannot back up to a sub-folder on the disk. Backup data must be created at the root of CDs and DVDs.
The followingtable contains information that you need toconsider whenselecting a backup destination.
Table 5-1
Local hard drive, USB drive, or FireWire drive
(recommended)
Selecting a backup destination
Information to considerBackup destination
The benefits of this option are as follows:
Fast backup and recovery
Can schedule unattended backups
Inexpensive because drive space can be overwritten
repeatedly
Off-site storage is possible
Reserves hard drive space for other uses
Although you can save therecovery point to the samedrive that you are backing up, it is not recommended for the following reasons:
As the number or sizeof recovery points grows, youwill
have less disk space available for regular use.
The recovery point is included in subsequent recovery
points of the drive, which increases the size of those recovery points.
If the computer suffers a catastrophic failure, you may
not be able to recover the recovery point you need, even if you save it to a different drive on the same hard disk.
Page 57
About selecting a backup destination
57Best practices for backing up your data
Table 5-1
Network folder
CD-RW/DVD-RW
Selecting a backup destination (continued)
Information to considerBackup destination
If your computer is connected to a network, you can save your recovery points and file and folder backup data to a network folder.
Backing up to a network folder typically requires that you authenticate to the computer that is hosting the folder. If the computeris partof anetwork domain,you must provide the domain name, user name, and password. For example, domain\username.
If you are connecting to a computer in a workgroup, you should provide the remote computer name and user name. For example: remote_computer_name\username.
When you save backup data to removable media, it is automatically splitinto the correct sizes if the backup spans more than one media.
If more than one drive is being backed up, the recovery points foreach driveare storedindependently on the media, even ifthere isspace tostore recoverypoints frommultiple drives on the same media.
The schedulingof backupsis notavailable whenthis option is used.
Note: Using CD-RWs or DVD-RWs as your recovery point
storage location is not the best option because you will be required to swap disks during the process.
The followingtable describes the advantages and disadvantages ofdifferent types of backup destinations.
Table 5-2
Advantages and disadvantages of backup destinations
DisadvantagesAdvantagesBackup destination
Hard drive
(recommended)
Fast backupand recovery
Can scheduleunattended
backups
Inexpensive because
drive space can be overwritten repeatedly
Uses valuabledrive space
Vulnerable to loss if the
hard drive fails
Page 58
Best practices for backing up your data
58

About backing up dual-boot computers

Table 5-2
Network drive
(recommended)
Removable media (local)
Advantages and disadvantages of backup destinations (continued)
Fast backupand recovery
Can scheduleunattended
backups
Inexpensive because
drive space can be overwritten repeatedly
Protection from local
hard drive failure
Off-site storage (through
existing network backup strategies)
Protection from hard
drive failure
Ideal for off-site storage
Reserves harddrive space
for other uses
About backing up dual-boot computers
You can back up dual-boot computers, even if you have drives (partitions) that are hidden in the operating system from which you run Norton Ghost.
When you run a drive backup, the entire contents of each drive is captured in a recovery point. When you restore a drive, the recovered drive is bootable.
DisadvantagesAdvantagesBackup destination
Must have supported
network interface card drivers to restore from Symantec Recovery Disk
Must understand and
assign the appropriate rights for users who will run backups and restore data
Note: In order for your computer to boot the same from a restored system as it did from the original configuration, you must back up, and then restore, every drive that includes operating system boot information.
You should not create incremental backups of shared data drives if Norton Ghost is installed on both operating systems and they are bothset to manage the shared drive.
You might encounter issues if you try to use the Norton Ghost LightsOut Restore feature on dual-boot systems. It is not supported.
Page 59
Chapter

Backing up entire drives

This chapter includes the following topics:
About defining a drive-based backup
Defining a drive-based backup
Compression levels for drive-based backups
Running a one-time backup from Norton Ghost
About running a one-time backup from Symantec Recovery Disk
About Offsite Copy
6
How Offsite Copy works

About defining a drive-based backup

A drive-based backup takes a snapshot of your entire hard drive, capturing every bit of information that is stored on it for later retrieval. All of your files, folders, desktop settings,programs, andyour operating system are captured into a recovery point. You can then use that recovery point to restore individual files or folders or your entire computer.
For optimum protection, you should define a drive-based backup and run it on a regular basis.
By default, scheduled independent recovery points or recovery point set names are appended with 001.v2i, 002.v2i, and so forth. Recovery point set names are appended with _i001.iv2i, _i002.iv2i, and so forth. For example, if your base recovery point is called CathyReadF001.v2i, the first incremental recovery point is called CathyReadF001_i001.iv2i.
See “Defining a drive-based backup” on page 60.
Page 60
Backing up entire drives
60

Defining a drive-based backup

Defining a drive-based backup
Define a drive-based backup to take a shapshot of your entire hard drive.
To define a drive-based backup
On the Home or Tasks page, click Run or Manage Backups.
1
In the Run or Manage Backups window, click Define New.
2
If you have not yet defined a backup, the Easy Setup dialog appears instead.
Click Back up my computer, and then click Next.
3
Select one or more drives to back up, and then click Next.
4
Press and hold Ctrl to select multiple drives.
If youdo not see a drivethat you expected to see, select ShowHidden Drives.
If the RelatedDrives dialog box is displayed, set the appropriate option, and
5
then click Next. Otherwise, skip to the next step.
See “Related Drives options” on page 62.
Select the recovery point type that you want the backup to create.
6
See “Recovery point type options” on page 63.
Click Next.
7
On the Backup Destination panel, select the desired options.
8
See “Backup destination options” on page 64.
You cannot use an encrypted folder as your backup destination. You can choose to encrypt your backup data to prevent another user from accessing it.
(Optional) If you want to make copies of your recovery points to store at a
9
remote location for added backup protection, do the following:
Click Add and then select Enable Offsite Copy.
Select the Prompt me to start a copy when I attach an external Offsite
Copy destination drive option if you want recovery points automatically copied to external Offsite Copy destination drives whenever you plug one in to your computer.
Click Browse to locate an Offsite Copy destination.
Click Add an additional Offsite Copy destination if you want to add a
second destination,and then specify the path(a localfolder, network path, or FTP address) to that destination.
Click OK.
Page 61
Defining a drive-based backup
See “About Offsite Copy” on page 81.
Click Next.
10
On the Options panel, set the recovery point options you want.
11
See “Recovery point options” on page 64.
(Optional) ClickAdvanced, set the advanced options you want,and then click
12
OK to return to the Options panel.
See “Advanced options for drive-based backups” on page 70.
(Optional) Ifyou want to run command files duringthe recoverypoint creation
13
process, click Command Files, set the command file options, and then click
OK to return to the Options panel.
If appropriate, in the lists, you can select the command file (.exe, .cmd, .bat)
that you want to run during a particular stage in the recovery point creation
process, and then specify the amount of time (in seconds) that you want the
command to run before it is stopped.
See “About running command files during a backup” on page 68.
Click Next.
14
Do one of the following:
15
If you chose a recovery point set as your recovery point type earlier in
step 6 above, skip to the next step.
If you chose an independent recovery point as your recovery point type,
select oneof the following options inthe Automaticallycreate arecovery pointlist, click Next, review the options you have selected, then click Finish.
61Backing up entire drives
No Schedule
Weekly
Monthly
Runs thebackup onlywhen yourun ityourself, manually.
Runs the backup at the time and on the days of the week that you specify.
When youselect thisoption, theSelect thedays of the week to protect box appears.
Runs the backup at the time and on the days of the month that you specify.
When youselect thisoption, theSelect thedays of the month to protect box appears.
Page 62
Backing up entire drives
62
Defining a drive-based backup
Only run once
If you want the backup to run automatically according to a schedule, select
16
Schedule, enter a start time, and select the days of the week when the backup should run.
If you only want to run the backup when you start it manually, uncheck Schedule and skip to the next step.
(Optional) Clickthe Custom button and specify how frequently a newrecovery
17
point set should be started.
For example, if you select Monthly, a new base recovery point is created the first time the backup runs during each new month.
For advanced scheduling options, such as setting up event triggers that start
18
the backup in response to specific events, click Advanced and configure the desired options.
See “Advanced scheduling options” on page 66.
Click OK, and then click Next.
19
(Optional) If you want to run the new backup immediately, click Run backup
20
now.
This option is not available if you configured an independent recovery point with the option to run it only once.
Review the options you have selected, then click Finish.
21
Runs the backup one time on the date and at the time you specify.
When youselect thisoption, the Create a single recovery point box appears.

Related Drives options

The RelatedDrives wizard panel appears only if you initiallyselected a drive with applications configured to use one or more of the drives that are listed in this panel. Such applications include boot configuration databases (as found in Windows Vista and Windows 7) that are on a separate drive from where the operating system is installed.
If you want to backup an attached Microsoft Virtual Hard Disk (VHD), you must create a separate backup job for the host drive and for the attached VHD. For example, if the VHD host is on the C: drive and the attached VHD is the D: drive, you must create a backup job for C: and a backup job for D:. Also, you cannot backup an attached VHD that is nested within another attached VHD.
Page 63
See “About backing up Microsoft virtual hard disks” on page 205.
If you use Microsoft's BitLocker Drive Encryption to encrypt the data on a data drive (any drive that does not have the operating system installed on it), be aware that NortonGhost does not work with locked datadrives. Instead,you must unlock the bitlocked drive before you can backup it up.
Generally, you should accept the preselected option Add all related drives (recommended). Doing so can help you with a successful recovery, should you ever need to perform a restore in the future. If you deselect certain related drives you may experience an incomplete recovery or an unsuccessful recovery.

Recovery point type options

Recovery point set and Independent recovery point are the two recovery point type options that are available. Each option type is described in the table below.
Defining a drive-based backup
63Backing up entire drives
Table 6-1
Recovery point set (recommended)
Independent recovery point
Recovery point type options
DescriptionOption
Schedules a base recovery point with additional recoverypoints that contain only incremental changesthat weremade toyour computer sincethe previousrecovery point.
Incremental recovery points are created faster than the base recovery point. They also use less storage space than an independent recovery point.
Note: You can only haveone recovery point
set defined for each drive. The Recovery Point Set option is not available if you have already assigned a selected drive to an existing backupand specifiedRecovery Point Set as the recovery point type. This option also is unavailable if you select an unmounted drive that cannot be part of a recovery point set.
Creates acomplete, independentcopy ofthe drives that you select. This backup type typically requires more storage space, especially if you run the backup multiple times.
Page 64
Backing up entire drives
64
Defining a drive-based backup

Backup destination options

The following table describes the options on the Backup Destination Page.
Table 6-2
Folder field
Edit
Customize recovery point file names
Backup destination options
DescriptionOption
Indicates the location where you want to store the recovery points.
If Norton Ghost detects that this location does not have enough available space, it alerts you. You should choose another location that has more space.
The Edit button only becomes active if you have selected a backup destination that is on anetwork. Ifthe backupdestination is on a network, you can click the Edit button to bring up a dialog where you can specify the necessary user name and password for network access.This also applies if you want to save the recovery point on a network share.
See “Aboutnetwork credentials”on page68.
Allows youto renamethe recoverypoint. To rename a recovery point click Rename and then type a new file name.
Default file names include the name of the computer followed by the drive letter.
Add

Recovery point options

The following table describes the recovery point options on the Options page.
Allows you to add up to two Offsite Copy destinations.
Offsite Copyautomatically copiesyour latest recovery points each time a backup completes toeither aportable storagedevice, such as an external drive, or to a remote server either through a local area network connection or to a remote FTP server.
See “About Offsite Copy” on page 81.
Page 65
Defining a drive-based backup
65Backing up entire drives
Table 6-3
Recovery point options
Name
Compression
Verify recovery point after creation
Limit the number of recovery point sets saved for this backup
DescriptionOptions
Type a name for your backup.
Note: This option does not appear if you
create a recovery point using the Back Up MyComputer feature in SymantecRecovery
Disk.
Select one of the following compression levels for the recovery point.:
None
Standard
Medium
High
See “Compression levels for drive-based
backupson page 74.
The resultscan vary depending on the types of files that are saved in the drive.
Select this option to automatically test whether a recovery point or set of files is valid or corrupt.
Select this option to limit the number of recovery pointsets that can be saved for this backup. You can limit the number of recovery point sets to reduce the risk of filling up the hard drive with recovery points. Eachnew recovery point set replaces the oldest set on your backup destination drive.
This option only appears if you are creating a recovery point set.
Note: This option does not appear if you
create a recovery point using the Back Up MyComputer feature in SymantecRecovery
Disk.
Page 66
Backing up entire drives
66
Defining a drive-based backup
Table 6-3
Enable search engine support
Include system and temporary files
Recovery point options (continued)
DescriptionOptions
Select thisoption to let a search engine, such as GoogleDesktop, indexall of the file names that are contained in each recovery point. By indexingthe filenames, youcan thenuse your search engine to locate files you want to restore.
This option is for NTFS file systems only.
See “About using a search engine to search
recovery pointson page 201.
Note: This option does not appear if you
create a recovery point using the Back Up MyComputer feature in SymantecRecovery
Disk.
Select this option to include indexing support foroperating systemand temporary files when a recovery point is created on the client computer.
Note: This option does not appear if you
create a recovery point using the Back Up MyComputer feature in SymantecRecovery
Disk.
Advanced
Command Files
Description text box

Advanced scheduling options

The following table describes the advanced scheduling options.
See “Advanced options for drive-based
backupson page 70.
See “About running command files during
a backupon page 68.
Type a description for the recovery point. The description can be anything that helps you further identify the recovery point's contents.
Page 67
Defining a drive-based backup
67Backing up entire drives
Table 6-4
Schedule (Backup Time)
Advanced scheduling options
DescriptionOption
Do one or more of the following:
Click Schedule, and then select the days
and a start time for when the backup should run.
Select Runmore than once per dayif you
frequently edit data that you want to protect.
Also, specify the maximum time that should occur between backups and the number of times per day that the backup should run.
Click the Automatically optimize list,
and then select how often optimization should occur to help manage the disk space that is used by your backup destination.
Click the Start a new recovery point set
list and select how frequently a new recovery point set should be started.
Click Customto customizethe optionyou select.
Event Triggers (General) (ThreatCon Response)
Select the type of events that should automatically start the backup.
See “Enabling event-triggered backups” on page 96.

About files that are excluded from drive-based backups

The following files are intentionally excluded from drive-based backups:
hiberfil.sys
pagefile.sys
These files contain temporary data that can take up a large amount of disk space. They are not needed, and there is no negative impact to your computer system after a complete system recovery.
These file names do appear in recovery points, but they are placeholders. They contain no data.
Page 68
Backing up entire drives
68
Defining a drive-based backup

About network credentials

If you are connecting to a computer on a network, you are required to enter the user name and password for network access, even if you have previously authenticated to the network. This is because the Norton Ghost 15.0 service runs as the local System account.
When entering network credentials, the following rules apply:
If the computer you want to connect to is on a domain, you would enter the
domain name, user name, and password. For example: domain\username
If youare connecting to a computer in aworkgroup youwould enter the remote
computer name and user name. For example: remote_computer_name\username
If you have mapped a drive, you might be required to supply the user name
and passwordat this dialog because theservice runs in a different context and cannot recognize the mapped drive.
By going to the Tools menu and selecting Options, you can set a default location, including network credentials. Then when you create future jobs, the dialog will default to the location you specified. Another option would be to create a specific "backup" user account for the enterprise and configure the Norton Ghost 15.0 service to use this account.

About running command files during a backup

You canuse commandfiles (.exe, .cmd, .bat) during a backup.You canuse command files to integrate Norton Ghost with other backup routines that you might be running on the computer. You can also use command files to integrate with other applications that use a drive on the computer.
Note: You cannot run command files that include a graphical user interface, such as notepad.exe. Running such command files will cause the backup job to fail.
You canrun a command file during any ofthe following stages during the creation of a recovery point:
Run before snapshot creation
Run after shapshot creation
Run after recovery point creation
You can also specify the amount of time (in seconds) that a command file should be allowed to run.
Page 69
Defining a drive-based backup
You can specify the location of command files if you want them to be located in a placeother thanthe defaultlocation. Youcan alsospecify alocation ona per-job basis, as well as specify a location that can be shared among several computers. If you specify a network location, you will be asked for network credentials.
The most common use for running command files is to stop and restart non-VSS-aware databases that you want to back up.
To use a Visual Basic script file (.VBS) during a backup, you can create a batch file (.BAT) to run the script. For example, you can create a batch file called STOP.BAT that contains the following syntax:
Cscript script_filename.vbs
Make sure that Cscript precedes the file name of the Visual Basic script.
Warning: The command files cannot depend on any user interaction or have a visible user interface. You should test all command files independently of Norton Ghost before you use them during a backup.
When the backup begins, the command file is run during the specified stage. If an error occurs while a command file is running or the command file does not finish in the time you specified (regardless of the stage), the backup is stopped, the commandfile is terminated (if necessary), and theerror informationis logged and displayed.
The following table describes the stages of recovery point creation.
69Backing up entire drives
Page 70
Backing up entire drives
70
Defining a drive-based backup
Table 6-5
Run before snapshot creation
Run after snapshot creation
Recovery point creation stages
DescriptionStage
This stage occurs after a backup has started and before a recovery point is created. You can run a command during this stage to prepare for the recovery pointcreation process.For example,you can closeany open applications that are using the drive.
Note: Ifyou usethis option,be surethe command
file has an error recovery mechanism built into it. If the computer has one or more services that must be stopped at this stage (such as stopping a non-VSS aware database or a resource intensive application), and the command file does not contain any form of error recovery, one or more of the stopped services may not be restarted. An error in thecommand file cancause the recovery point creation process to stop immediately. No other command files will run.
See “How you use Norton Ghost” on page 34.
This stage occurs after a snapshot is created. Running acommand duringthis stageis typically a safe point for allowing services to resume normal activityon the drive while continuing the recovery point creation.
Because the snapshot takes only a few secondsto create, the database is in the backup state momentarily. A minimal number of log files are created.
Run after recovery point creation
This stage occurs after the recovery point file is created. Youcan runa commandduring thisstage to act on the recovery point itself. For example, you can copy it to an offline location.

Advanced options for drive-based backups

When youdefine a drive-based backup, you can set the followingadvanced options:
Page 71
Defining a drive-based backup
71Backing up entire drives
Table 6-6
Advanced options for drive-based backups
Divide intosmaller filesto simplifyarchiving
Disable SmartSectorCopying
Ignore bad sectors during copy
DescriptionOption
Splits the recovery point into smaller files and specifies the maximum size (in MB) for each file.
For example, if you plan to copy a recovery point to ZIP disks from your backup destination, specify a maximum file size of 100 MB, according to the size of each ZIP disk.
SmartSector technology speeds up the copying process bycopying only the hard-disk sectors that contain data. However, in some cases, you might want to copy all sectors in their original layout, whether or not they contain data.
Lets you copy used and unused hard-disk sectors. This option increases process time and usuallyresults ina largerrecovery point.
Lets you run a backup even if there are bad sectors on the hard disk. Although most drives do not have bad sectors, thepotential for problems increases during the lifetime of the hard disk.
Use password
Use AES encryption
Sets a password on the recovery point when it iscreated. Passwordscan includestandard characters. Passwords cannot include extended characters, or symbols. (Use characters with an ASCII value of 128 or lower.)
A user must type this password before he or she canrestore abackup orview thecontents of the recovery point.
Encrypts recoverypoint datato add another level of protection to your recovery points.
Choose fromthe followingencryption levels:
Low (8+ character password)
Medium (16+ character password)
High (32+ character password)
Page 72
Backing up entire drives
72
Defining a drive-based backup
Editing advanced backup options
After you define a backup, you can go back at any time and edit the advanced options you chose when you first defined the backup.
To edit advanced backup options
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click Edit Settings.
2
Click Next twice.
3
Click Advanced.
4
In the Advanced Options dialog box, make your changes, and then click OK.
5
See “Advanced options for drive-based backups” on page 70.
Click Next three times, and then click Finish.
6
About recovery point encryption
You can enhance the security of your data by using the Advanced Encryption Standard (AES) to encrypt recovery points that you create or archive. You should use encryptionif you store recovery points on anetwork and want to protect them from unauthorized access and use.
You can also encrypt recovery points that were created with earlier versions of Symantec LiveState Recovery or Norton Ghost. However, encrypting those files makes them readable with the current product only.
You can view the encryption strength of a recovery point at any time by viewing the properties of the file from the Recovery Point Browser.
Encryption strengths are available in 128-bit, 192-bit, or 256-bit. While higher bit strengthsrequire longer passwords, the resultis greater security for your data.
The following table explains the bit strength and required password length.
Table 6-7
You must provide the correct password before you can access or restore an encrypted recovery point.
Password length
Password lengthBit strength
8 characters or longer128 (Standard)
16 characters or longer192 (Medium)
32 characters or longer256 (High)
Page 73
Defining a drive-based backup
Warning: Store the password in a secure place. Passwordsare case sensitive. When
you access or restore a recovery point that is password encrypted, Norton Ghost prompts you for the case-sensitive password. If you do not type the correct password or you forget the password, you cannot open the recovery point.
Symantec Technical Support cannot open an encrypted recovery point.
Besides bit strength, the format of the password can improve the security of your data.
For better security, passwords should use the following general rules:
Do not use consecutive repeating characters (for example, BBB or 88).
Do not use common words you would find in a dictionary.
Use at least one number.
Use both uppercase and lowercase alpha characters.
Use at least one special character such as ({}[],.<>;:"?/|\`~!@#$%^&*()_-+=).
Change the password after a set period of time.
73Backing up entire drives
Verifying the integrity of a recovery point
If youselected the Verify recovery point after creation option on the Options page of the Define Backup wizard, the following occurs:
Norton Ghost verifies that all of the files that make up the recovery point are
available for you to open
Internal data structures in the recovery point are matched with the data that
is available
Also, the recovery point can be uncompressed to create the expected amount of data (if you selected a compression level at the time of creation).
Note: The time that isrequired to create a recovery point is doubledwhen you use the Verify recovey point after creation option.
If you prefer, you can have recovery points automatically verified for integrity at the time they are created.
See “Advanced options for drive-based backups” on page 70.
To verify the integrity of a recovery point
On the Tools page, click Run Recovery Point Browser.
1
Select a recovery point, and then click OK.
2
Page 74
Backing up entire drives
74

Compression levels for drive-based backups

In the tree panel of the Recovery Point Browser, select the recovery point.
3
For example: C_Drive001.v2i.
On the File menu, click Verify Recovery Point.
4
If the Verify Recovery Point option is unavailable, you must first dismount the recovery point. Right-click the recovery point and click Dismount Recovery Point.
When the validation is complete, click OK.
5
Viewing the progress of a backup
You can view the progress of a backup while it runs to determine how much time remains until the backup completes.
To view the progress of a backup
While a backup is running, on the View menu, click Progress and
Performance.
Compression levels for drive-based backups
During thecreation of a recovery point, compression results may vary,depending on the types of files saved to the drive you are backing up.
The following table describes the available compression levels.
Table 6-8
Compression levels
DescriptionCompression level
None
Standard (recommended)
Medium
Use this option if storage space is not an issue. However, if the backup is being saved to a busy network drive, high compression may be faster than no compression because there is less data to write across the network.
This option uses low compression for a 40 percent average data compression ratio on recovery points. This setting is the default.
This option uses medium compression for a 45 precent average data compression ratio on recovery points.
Page 75

Running a one-time backup from Norton Ghost

75Backing up entire drives
Table 6-8
High
Compression levels (continued)
DescriptionCompression level
This optionuses highcompression fora 50 percent average data compression ratio on recovery points. This setting is usually the slowest method.
When a high compression recovery point is created, CPU usage might be higher than normal. Other processeson the computer might also be slower. To compensate, you can adjust the operation speed of Norton Ghost. This might improve the performance of other resource-intensive applications that you are running at the same time.
Running a one-time backup from Norton Ghost
You can use One Time Backup to quickly define and run a backup that creates an independent recovery point from Norton Ghost. You use the One Time Backup Wizard to define the backup. The backup runs when you complete the Wizard. The backup definition is not saved for future use. You can use the independent recovery point later.
This feature is useful when you need to back up your computer or a particular drive quickly before a significant event. For example, you can run a one-time backup before you install new software. Or, you can run it when you learn about a new computer security threat.
You can also use Symantec Recovery Disk to create one time cold backups.
See “Aboutrunning a one-time backup from Symantec Recovery Disk” on page 76.
To run a one-time backup from Norton Ghost
On the Tasks page, click One Time Backup.
1
Click Next.
2
Select one or more drives to back up, and then click Next.
3
If the RelatedDrives dialog box is displayed, set the appropriate option, and
4
then click Next. Otherwise, skip to the next step.
See “Related Drives options” on page 62.
In the Backup Destinations panel, select the appropriate options.
5
See “Backup destination options” on page 64.
Click Next.
6
Page 76
Backing up entire drives
76

About running a one-time backup from Symantec Recovery Disk

On the Options panel, select the appropriate options.
7
See “Recovery point options” on page 64.
Click Next.
8
If appropriate, in the lists, select the command files that you want to run
9
during aparticular stage in the recoverypoint creation process. Then, specify the amount of time (in seconds) that you want the command to run before it is stopped.
If you added the command file to the CommandFiles folder, you may need to click Back, and then Next to see the files in each stages list.
See “About running command files during a backup” on page 68.
Click Next.
10
Click Finish to run the backup.
11
About running a one-time backup from Symantec Recovery Disk
Using a valid license key, you can create independent recovery points using the new BackUp My Computerfeature inSymantec RecoveryDisk. Sometimesknown as a cold backup or offline backup, you can create recovery points of a partition without the need to install Norton Ghost or its agent.
With a cold backup, all files are closed when the backup occurs. You do not copy any data that may be in the middle of being updated or accessed on the desktop or server. Cold backups are particularly useful for databases. They ensure that no files are written to or accessed at anytime during the backup so you have a complete recovery point.
You can also use the Symantec Recovery Disk CD to create recovery points if you experience any of the following:
A level of corruption prevents you from starting Windows on the computer.
Norton Ghostdoes not function properly while it runson aWindows operating
system.
You want to back up the condition of a damaged system before you recover.
For example, if a server or desktop is severely damaged, you can use the Symantec Recovery Disk CD to back upwhat remains of the system.Then, you can recover what you can later, after you restore an independent recovery point.
Page 77
About running a one-time backup from Symantec Recovery Disk
When you want to create a backup from the Symantec Recovery Disk CD, you are prompted for a valid license key only for the following scenarios:
You use the original, shipping version of the Symantec Recovery Disk CD to
create a backup of a computer that does not have Norton Ghost installed.
The computer that you intend to back up using the original, shipping version
of theSymantec Recovery Disk has an unlicensed installationof Norton Ghost.
You create a custom Symantec Recovery Disk CD on a computer that has an
unlicensed installation(60-day trial) of Norton Ghost. You thenuse the custom Symantec Recovery Disk CD to create a backup of a computer that does not have an installation of Norton Ghost.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
You choose not to add a license key at the time you create the customized
Symantec Recovery Disk CD.

Running a one-time backup from Symantec Recovery Disk

Using a valid license key, you can create independent recovery points using the Back Up MyComputer feature in Symantec Recovery Disk. Sometimes known as a cold backup or offline backup, you can create recovery points of a partition without the need to install Norton Ghost or its agent.
To run a one-time backup from Symantec Recovery Disk
77Backing up entire drives
If you intend to store the resulting recovery point on a USB device (for
1
example, an external hard drive), attach the device now.
Start the Symantec Recovery Disk CD on the computer you want to back up.
2
See “Starting a computer by using Symantec Recovery Disk” on page 174.
On the Home panel, click Back Up My Computer, and then click Next.
3
If prompted, enter a valid license key, and then click Next.
4
Select one or more drives that you want to back up, and then click Next.
5
Page 78
Backing up entire drives
78
About running a one-time backup from Symantec Recovery Disk
In the Backup Destination panel, set the options you want, then click Next.
6
Folder field
Map a network drive
Recovery point file names field
Lets you browse to and specify the location where you want to store the independent recovery point.
Lets youmap anetwork driveby usingthe UNC path of the computer on which you want to store the recovery point.
For example, \\computer_name\share_name or \\IP_address\share_name.
Lets youedit the recovery point file name. To do this, select a drive, click Rename, type a new file name, and then click OK.
Page 79
About running a one-time backup from Symantec Recovery Disk
In theOptions panel, set the desired compression levelfor the recovery point.
7
79Backing up entire drives
None
Standard (recommended)
Medium
High
Use this option if storage space is not an issue. However, if the backup is being saved to a busy network drive, high compression may be faster than no compression because there is less data to write across the network.
This optionuses low compressionfor a40 percent average data compression ratio on recovery points. This setting is the default.
This optionuses mediumcompression for a 45 precent average data compression ratio on recovery points.
This option uses high compression for a 50 percentaverage datacompression ratio on recoverypoints. This setting is usually the slowest method.
When a high compression recovery point is created, CPU usage might be higher than normal. Other processes on the computer might also be slower. To compensate, youcan adjust the operation speed of Norton Ghost. This might improve the performance of other resource-intensive applications that you are running at the same time.
If you want to verify whether the recovery point is valid after its creation,
8
select Verify recovery point after creation.
In the Description text box, type a descriptionthat you want associated with
9
the recovery point.
Click Advanced.
10
In the Advancedoptions panel, set the options you want, and then click OK.
11
Page 80
Backing up entire drives
80
About running a one-time backup from Symantec Recovery Disk
Divide into smaller files to simplify archive
Disable SmartSector copying
Ignore bad sectors during copy
Use password
You can split the recovery point into smaller files and specify the maximum size (in MB) for each file.
For example, if you plan to copy a recovery point to ZIP disks from your backup destination, specify a minimum file size of 100 MB, according to the size of each ZIP disk.
SmartSector technology speeds up the copying process bycopying only the hard-disk sectors that contain data. However, in some cases, you might want to copyall sectorsin theiroriginal layout, whether or not they contain data.
Lets you copy used and unused hard-disk sectors. Thisoption increasesprocess time and usually results in a larger recovery point.
Lets you run a backup even if there are bad sectors on the hard disk. Although most drives do not have bad sectors, the potential for problems increases during the lifetime of the hard disk.
Sets a password on the recovery point when it is created. Passwords can include standard characters. Passwords cannot include extended characters, or symbols. (Use characterswith anASCII valueof 128 or lower.)
A user must type this password before he or she can restore a backup or view the contents of the recovery point.
Use AES encryption
Encrypts recovery point data to add another level of protection to your recovery points.
Choose from the following encryption levels:
Low (8+ character password)
Medium (16+ character password)
High (32+ character password)
Page 81
Click Next.
12
Click Finish to run the backup.
13
When the backup is finished, click Close to return to the main Symantec
14
Recovery Disk window.

About Offsite Copy

Backing up your data to a secondary hard disk is a critical first step to protecting your information assets. But to make certain your data is safe, use Offsite Copy. This feature copies your latest, complete recovery points to either a portable storage device, a remote server in your network, or to a remote FTP server.
Regardless of the method you use, storing copies of your recovery points at a remote locationprovides a crucial level ofredundancy inthe event that your office becomes inaccessible. Offsite Copy can double your data protection by ensuring that you have a remote copy.
See “How Offsite Copy works” on page 81.
See “About using external drives as your Offsite Copy destination” on page 82.
See “About using a network server as your Offsite Copy destination” on page 84.
See “About using an FTP server as your Offsite Copy destination” on page 85.
About Offsite Copy
81Backing up entire drives

How Offsite Copy works

You enableand configure Offsite Copy when you definea newdrive-based backup job. Or you can edit an existing backup job to enable Offsite Copy.
When you enable Offsite Copy, you specify up to two Offsite Copy destinations. After the backup job finishes creating recovery points, Offsite Copy verifies that at leastone of the Offsite Copydestinations are available. Offsite Copy then begins copying the new recovery points to the Offsite Copy destination.
The most recent recovery points are copied first, followed by the next newest recovery points. If you have set up two Offsite Copy destinations, Offsite Copy copies recovery points to the destination that was added first. If an Offsite Copy destination is unavailable, Offsite Copy tries tocopy recovery points to thesecond destination, if it is available. If neither destination is available, then Offsite Copy copies the recovery points the next time an Offsite Copy destination becomes available.
For example, suppose you have configured a backup job to run at 6 p.m. and configured an external drive as an Offsite Copy destination. However, when you leave the office at 5:30 p.m., you take the drive with you for safe keeping. When
Page 82
Backing up entire drives
82
How Offsite Copy works
the backup job completes at 6:20 p.m., Norton Ghost detects that the Offsite Copy destination drive is not available and the copy process is aborted. The following morning, you plug the drive back in to the computer. Norton Ghost detects the presence of the Offsite Copy destination drive and automatically begins copying your recovery points.
Offsite Copy is designed to use very little system resources so that the copying process is done in the background. This feature lets you continue to work at your computer with little or no impact on system resources.
If an Offsite Copy destination runs out of disk space, Offsite Copy identifies the oldest recovery points and removes them to make room for the most current recovery points.Offsite Copy then copies thecurrent recoverypoints to the Offsite Copy destination.
See “About using external drives as your Offsite Copy destination” on page 82.
See “About using a network server as your Offsite Copy destination” on page 84.
See “About using an FTP server as your Offsite Copy destination” on page 85.
See “To define a drive-based backup” on page 60.
See “Editing backup settings” on page 95.

About using external drives as your Offsite Copy destination

Use an external drive as your Offsite Copy destination. This method lets you take a copyof yourdata with you when you leave the office. Byusing twoexternal hard disks, you can be certain that you have a recent copy of your data both on and off site.
For example, suppose on a Monday morning you define a new backup job of your system drive. You choose a recovery point set as your backup job type. You set up an external drive (A) as the first Offsite Copy destination, and another external drive (B) as the second Offsite Copy destination. You schedule the backup job to run every midnight except on the weekends. You also enable recovery point encryption to protect the data that you take with you from unauthorized access.
See “About recovery point encryption ” on page 72.
Before you leave the office on Monday evening, you plug in drive A and take drive B home with you.
Page 83
How Offsite Copy works
On Tuesday morning, you find that Monday's base recovery point has been successfully copied to drive A. At the end of the day, you unplug drive A and take it home for safe keeping.
On Wednesday morning, you bring drive B to the office. You plug in drive B and Norton Ghost detects that drive B is an Offsite Copy destination. Norton Ghost then automaticallybegins copyingMonday night'sbase recoverypoint and Tuesday night's incremental recovery point. At the end of the day Wednesday, you take drive B home and place it in a safe place with drive A.
You now have multiple copies of recovery points stored at two separate, physical locations: youroriginal recovery points stored on your backup destinations at the office, and copies of those same recovery points stored on your Offsite Copy destination drives. Your Offsite Copy destination drives are stored in a safe place at your home.
83Backing up entire drives
The nextmorning, Thursday, you take drive A to the officeand plugit in. Tuesday and Wednesday night's recovery points are then automatically copied to drive A.
Note: Consider using the external drive naming feature that lets you provide a nickname, to each drive. Then place matching physical labels on each external drive to help you manage the task of swapping the drives.
See “Using nicknames for external drives” on page 43.
Page 84
Backing up entire drives
84
How Offsite Copy works
Each time you plug in either drive A or B, the latest recovery points are added to the drive. This method gives you multiple points in time for recovering your computer in the event that the original backup destination drives fail or become unrecoverable.
Using external drives as your Offsite Copy destination ensures that you have a copy of your backup data stored at two separate, physical locations.

About using a network server as your Offsite Copy destination

You can also specify a local area network server as an Offsite Copy destination. You must be able to access the server that you plan to use. You must either map a local drive to the server, or provide a valid UNC path.
For example, suppose that you set up a local external drive as your first Offsite Copy destination. Then you identify a server that is located at a second physical location fromyour own office. You add the remote server as a secondOffsite Copy destination. As backups occur, recovery points are copied first to the external hard drive, and then to the remote server.
If the remote server becomes unavailable for a period of time, Offsite Copy copies all recovery points that were created since the last connection. If there is no room to hold all of the recovery points available, Offsite Copy removes the oldest recovery points from the network server. In turn, it makes room for the newest recovery points.
Page 85
How Offsite Copy works

About using an FTP server as your Offsite Copy destination

Using anFTP server as your Offsite Copy destination is similar to usinga network path. You must provide a valid FTP path to the FTP server.
You must also provide the correct FTP connection information to Norton Ghost in order for this method to work correctly. When Offsite Copy is configured correctly, it copies recovery points to the directory that you specified on the FTP server. If the server becomes unavailable for a period of time, Offsite Copy copies all recovery points that were created since the last connection. If there is no room to hold all of the recovery points available, Offsite Copy removes the oldest recovery pointsor recoverypoint setsfrom the FTP server. In turn, it makes room for the newest recovery points.
See “Configuring default FTP settings for use with Offsite Copy” on page 44.
85Backing up entire drives
Page 86
Backing up entire drives
86
How Offsite Copy works
Page 87
Chapter

Backing up files and folders

This chapter includes the following topics:
Defining a file and folder backup
About folders that are excluded by default from file and folder backups

Defining a file and folder backup

When you define and run a file and folder backup, copies are made of each of the files and folders that you have chosen to back up. They are converted into a compressed format, and then stored in a sub-folder at the location you specify, which by default is the same backup destination that is used for storing recovery points.
To define a file and folder backup
7
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, click Define New.
2
If you have not yet defined a backup, the Easy Setup dialog appears.
Select Back up selected files and folders, and then click Next.
3
Page 88
Backing up files and folders
88
Defining a file and folder backup
Select the files and folders you wantto include in your backup,and then click
4
Next.
Selecting file types lets Norton Ghost find and include files that match the files you want backed up. If a file type is not included in the predefined list, click Add FileType. You can also manually select folders or individual files.
Note: On all versions of Windows, except for Windows Vista, the My Documents folder contains two subfolders by default: My Pictures and My Music. Thesefolders containonly the shortcuts to folders at another location and not the actual files. This might lead you to think that by including My Documents and all subfolders in your backup, your picture and music files will get backed up.
If you intend to back up your pictures and music files, be sure to include the actual folders where your files are stored. On Windows Vista, these folders exist at the same level as Documents (formerly, My Documents).
In the Name box, type a name for your new backup.
5
In the Description (optional) box, type a description for the new backup.
6
Click Browse to locate a folder for storing your backup data or accept the
7
default location.
Note: You cannot use an encrypted folder as your backup destination. If you want to encrypt your backup data to prevent another user from accessing it, refer to the next step.
To add or edit advancedoptions, click Advanced and doany of the following:
8
Click Use password, and then type a password.
Use standard characters, not extended characters or symbols. You must type this password before you restore a backup or view its contents.
For an additional level of security, click Use AES encryption to encrypt
your file data. You can also use the drop-down menu to specify the level of encryption
you want.
In the Exclude group box, uncheck any of the folders you want to include
in your backup. The folderslisted are typically not usedfor storing personal files or folders.
These foldersare backed up when you define and run adrive-based backup of your system drive (typically C).
Page 89

About folders that are excluded by default from file and folder backups

See “About folders that are excluded by default from file and folder
backupson page 89.
Click OK, and then click Next.
9
Click Schedule if you want the backup to run automatically, according to a
10
schedule.
If you want to run the backup only when you start it manually, uncheck
Schedule.
Enter a start time and select the days of the week when the backup should
11
run.
For advanced scheduling options, such as setting up event triggers that start
12
the backup in response to specific events, click Advanced and configure the
desired options.
See Table 6-4 on page 67.
Click Next and review the backup options you have selected.
13
To reviewthe totalnumber and size of files to be included in the backup, click
14
Preview.
89Backing up files and folders
Note: Depending on the amount of datayou have identified for fileand folder
backup, the preview process could take several minutes.
If you want to run the new backup immediately, click Run backup now, then
15
click Finish.
About folders that are excluded by default from file and folder backups
The followingfolders and their contents areexcluded automatically from file and folder backups:
Windows folder
Program Files folder
Temporary folder
Temporary Internet Files folder
These foldersare typically not used for storing personal files or folders. However, they are backed up when you define and run a drive-based backup of your system drive (typically C).
Page 90
Backing up files and folders
90
About folders that are excluded by default from file and folder backups
See “Defining a file and folder backup” on page 87.
You can include these folders when you define a file and folder backup.
Page 91
Chapter

Running and managing backup jobs

This chapter includes the following topics:
Running an existing backup job immediately
Running a backup with options
Adjusting the speed of a backup
Stopping a task
8
Verifying that a backup is successful
Editing backup settings
Enabling event-triggered backups
Editing a backup schedule
Turning off a backup job
Deleting backup jobs
Adding users who can back up your computer

Running an existing backup job immediately

This is particularly useful when you are about to install a new product and want to make sure you have a current recovery point in the event that something goes wrong with the installation. It can also help you to ensure that you have a backup of your work after you have modified a large number of files and you don't want to wait for a regularly scheduled backup.
Page 92
Running and managing backup jobs
92

Running a backup with options

You can run an existing backup at any time.
Note: If necessary, you can run a quick backup of a particular drive without using a defined backup.
See “Running a one-time backup from Norton Ghost” on page 75.
Norton Ghost can be configured to run a backup automatically when an event occurs on your computer, such as installing a new software program.
See “Enabling event-triggered backups” on page 96.
When yourun a backup, you should close any partitioning softwarethat isrunning, such as Norton PartitionMagic. Also, you should not run any disk defragmenting software during a backup.
You can also schedule backups to run automatically, according to a schedule.
See “Editing a backup schedule” on page 97.
To run an existing backup immediately from the system tray
On the Windows desktop, right-click the Norton Ghost system tray icon.
1
Click Run Backup Now.
2
Click a backup job to start the backup.
3
If the menus displays No Jobs, you must start Norton Ghost and define a backup.
To run an existing backup immediately from within Norton Ghost
On the Home page, click Run or Manage Backups.
1
Select a backup from the list, and then click Run Now.
2
Running a backup with options
If youwant to quickly run an existing drive-basedbackup, butyou want the backup to create an alternate type of recovery point, use the Run Backup With Options feature.
This is a unique option in that if you run an existing backup job, the recovery point created is dictated by the type of recovery point that was created the last time the backup job was run. Use thisoption to create an alternate recovery point type.
Page 93
Running a backup with options
Note: Using this option does not change the settings of the defined backup. To do
that, you must open the backup and edit its settings manually.
See “Editing a backup schedule” on page 97.
See “Editing backup settings” on page 95.
To run a backup with options
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, select the drive-based backup job
2
that you want to run.
Click Tasks > Run Backup With Options.
3
Select the desired options on the Run Backup With Options page.
4
Note: Depending on the current state of the backup, one or more options
might bedisabled. For example, if you have notyet run the backup, you cannot
select thefirst option, Incremental recovery point of recent changes, because
the base recovery point has not yet been created.
93Running and managing backup jobs

Backup options

See “Backup options” on page 93.
Click OKto run the backup job and createthe recovery point type you selected.
5
Incremental recovery point of recent changes, New recovery point set, and Independent recovery point are the three options that are available. Each option type is described in the table below.
Table 8-1
Backup options
DescriptionOptions
Incremental recovery point of recent changes
New recovery point set
Select this option if the backup already has a base recovery point created and you want to simplycapture changesmade tothe drive since the last backup.
Select this option if you want to start a completely new recovery point set. When you select this option, a base recovery point is created.
Page 94
Running and managing backup jobs
94

Adjusting the speed of a backup

Table 8-1
Independent recovery point
Backup options (continued)
Adjusting the speed of a backup
Depending on the speed of your computer, how much RAM you have installed, and the number of programs you are running during a backup, your computer could become sluggish.
You can manually adjust the effect of a backup on the performance of your computer to match your needs at the moment. This feature is useful if you are working on your computer and don't want the backup process to slow you down.
To adjust the speed of a backup
While a backup is running, on the View menu, click Progress and
1
Performance.
Do one of the following:
2
If you want to increase the speed of your computer by reducing the speed
of the backup, drag the slider toward Slow.
If you want the backup to complete as quickly as possible and you are not
doing extensive work on your computer, drag the slider toward Fast.
DescriptionOptions
Select this option to create an independent recovery point, which is a complete snap shot of your entire drive.
To specifyan alternatebackup location,click Browse.
When you are finished, click Hide to dismiss the Progress and Performance
3
dialog box.

Stopping a task

You can stop a recovery point task or a restore task that has already started.
To stop the current task
Do one of the following:
On the Tools menu, click Cancel the Current Operation.
On theTools menu,click ProgressandPerformance, andthen clickCancel
Operation.
Page 95

Verifying that a backup is successful

On the Windows system tray, right-click the Norton Ghost tray icon, and
then click Cancel the Current Operation.
Verifying that a backup is successful
After a backup completes, you can validate the success of the backup from the Status page to ensure you have a way to recover lost or damaged data.
The Status page contains a scrolling calendar that is aligned with each drive on your computer. The calendar lets you quickly identify when a backup ran, and what type of backup it was. It also identifies upcoming, scheduled backups.
See “Monitoring backup protection from the Status page” on page 118.
Note: When you define a drive-based backup,you shouldselect the option to verify the recovery point after it is created.
Depending on the amount of data being backed up, this can significantly increase the time it takes to complete the backup. However, it can ensure that you have a valid recovery point when the backup finishes.
95Running and managing backup jobs
See “Verifying the integrity of a recovery point” on page 73.
To verify that a backup is successful
On the Status page, review the Backups calendar, and verify that the backup
1
appears on the date that you ran it.
Move your mouse over a backup icon to review the status of the backup.
2

Editing backup settings

You can edit the settings of an existing backup. The Edit Settings feature gives you access to several of the key pages of the Define Backup Wizard. You can edit every setting except the option to change the recovery point type.
To edit backup settings
On the Home or Tasks page, click Run or Manage Backups.
1
Select a backup to edit.
2
Click Edit Settings.
3
Make changes to the backup.
4
See “Defining a drive-based backup” on page 60.
See “Defining a file and folder backup” on page 87.
Page 96
Running and managing backup jobs
96

Enabling event-triggered backups

Enabling event-triggered backups
Norton Ghost can detect certain events and run a backup when they occur.
For example, to protect your computer when you install new software, Norton Ghost can run a backup when it detects that new software isabout to be installed. If a problem occurs that harms your computer, you can use this recovery point to restore your computer to its previous state.
You canconfigure Norton Ghost to automatically run a backup whenthe following events occur:
Any application is installed.
A specified application is started.
Any user logs on to Windows.
Any user logs off of Windows.
The data that was added to a drive exceeds a specified number of megabytes.
This option is unavailable for file and folder backups.
To enable event-triggered backups
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click Change Schedule.
2
Click General under Event Triggers.
3
Select the events you want detected, and then click OK.
4

About Symantec ThreatCon

ThreatCon is Symantec's early warning security threat system. When Symantec identifies various threats, the ThreatCon team adjusts the threat level. This adjustment givespeople andsystems adequatewarning to protect data and systems against attack.
When youenable theSymantec ThreatCon trigger for a selected backup job, Norton Ghost detects changes in the threat level. Your computer must be connected to the Internet at the time. If the ThreatCon level is either reached or exceeded, the backup job in which you enabled Symantec ThreatCon is started automatically. You then have a recovery point to use to recover your data should your computer become affected by the latest threat.
Page 97
Note: If your computer is not online, then it is not susceptible to online threats. But if you connect your computer to the Internet at any time, it becomes vulnerable. You do not have to enable or disable Symantec ThreatCon when you go on or offline. It works if you are online, but does nothing if you are off line.
For moreinformation aboutSymantec ThreatCon,visit http://www.symantec.com.

Editing a backup schedule

You canedit any of the schedule properties for a defined backup toadjust thedate and time.
To edit a backup schedule
On the Home page, click Run or Manage Backups.
1
Select a backup to edit.
2
Click Change Schedule.
3
Make changes to the schedule, and then click OK.
4
Editing a backup schedule
97Running and managing backup jobs

Turning off a backup job

You can turn off a backup and re-enable it later. When you turn off a backup, it will not run according to its defined schedule, if it has one. When a backup is turned off, triggered events will not run it, nor can you run it manually.
You can also delete a defined backup (not recovery points).
See “Deleting backup jobs” on page 97.
To turn off a backup job
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup that you want to turn off.
2
On the Tasks menu, click Disable Backup.
3
Repeat this procedure to re-enable the backup. The Disable Backup menu
item changes to Enable Backup when you disable the selected backup.

Deleting backup jobs

You can delete backup jobs when they are no longer needed.
Page 98
Running and managing backup jobs
98

Adding users who can back up your computer

Deleting abackup jobdoes not delete the recovery points or file and folder backup data from the storage location. Only the backup job is deleted.
See “Managing recovery point storage” on page 137.
To delete backup jobs
On the Home page, click Run or Manage Backups.
1
Select one or more backups, and then click Remove.
2
Click Yes.
3
Adding users who can back up your computer
You can use the Security Configuration Tool to control which users on your computer can access and configure key features of Norton Ghost.
For example, all users with Limited Windows accounts can run existing backup jobs, but they cannot create new jobs or edit existing jobs. However, using the Security Configuration Tool, you can grant administrative privileges to a Limited user account. When you do, that user has full access to Norton Ghost and can create, edit, delete, and run backup jobs.
Note: By default, all users can run existing backup jobs. But only users with administrative accounts can create, edit, or delete backup jobs.
To add users who can back up a computer
On the Windows taskbar, click Start > Programs > Symantec Norton Ghost
1
> Security Configuration Tool.
On Windows Vista, click Start > All Programs > Symantec > Security Configuration Tool.
Click Add.
2
In the Enter the object names to select box, type the names of the users or
3
groups you want to add.
Click OK.
4
To delete users or groups, select a user or group, and then click Remove.
5
Click OK to apply your changes and close the Security Configuration Tool.
6
Page 99
Adding users who can back up your computer
To configure access rights for users or groups
On the Windows taskbar, click Start > Programs > Symantec Norton Ghost
1
> Security Configuration Tool
On Windows Vista and Windows 7, click Start > All Programs > Symantec >
Security Configuration Tool.
Select a user or group from the Group or user names box.
2
Choose from the following options:
3
DenyAllowPermissions
99Running and managing backup jobs
Full Control
Status Only
Click OK to apply your changes and close the Security Configuration Tool.
4
Select to give the user or group full access to all of the features of Norton Ghost. Full control gives users the right to create, edit, and delete backup jobs, including existing jobs.
Select to deny the user or group administrative access to the features of Norton Ghost. They can run existing backup jobs, but they cannot create, edit, or delete them.
Select to deny the user or group administrative access to the features of Norton Ghost. They can run existing backup jobs, but they cannot create, edit, or delete them.
When you deny Status Only, the user or group cannot access any of the features of Norton Ghost.
Page 100
Running and managing backup jobs
100
Adding users who can back up your computer
Loading...