Symantec, the Symantec Logo, Norton, Norton AntiVirus, LiveUpdate, pcAnywhere, and
SmartSector are trademarks or registered trademarks of Symantec Corporation or its
affiliates inthe U.S. and other countries. Other names may betrademarks oftheir respective
owners.
Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, Hyper-V, and the Windows
logo areregistered trademarks or trademarks of Microsoft Corporation in the United States
and other countries. VeriSign® is a registered trademark of Verisign, Inc.
VMware, the VMware "boxes" logo and design are registered trademarks or trademarks of
VMware, Inc..
Gear Software is a registered trademark of GlobalSpec, Inc.
Google and Google Desktop are trademarks of Google, Inc.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATIONISPROVIDED "ASIS" AND ALLEXPRESS ORIMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLYINVALID. SYMANTEC CORPORATIONSHALL NOT BELIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The LicensedSoftware andDocumentation aredeemed tobe commercialcomputer software
as definedin FAR 12.212 and subject to restricted rights asdefined inFAR Section52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, displayor disclosure of the Licensed Software and Documentation bythe U.S.
Government shall be solely in accordance with the terms of this Agreement.
Page 3
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Page 4
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality.The Technical Support group also creates contentfor our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. Forexample, theTechnical Supportgroup works with Product Engineering
and SymantecSecurity Response to provide alerting services andvirus definition
updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week
■ Advanced features, including Account Management Services
For information about Symantec’s Maintenance Programs, you can visitour Web
site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenanceagreement may access Technical Support
information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at thecomputer on which the problem occurred, incase itis necessaryto replicate
the problem.
When you contact Technical Support, please have the following information
available:
■ Product release level
■ Hardware information
■ Available memory, disk space, and NIC information
■ Operating system
Page 5
■ Version and patch level
■ Network topology
■ Router, gateway, and IP address information
■ Problem description:
■ Error messages and log files
■ Troubleshooting that was performed before contacting Symantec
■ Recent software configuration changes and network changes
Licensing and registration
If yourSymantec product requires registration or a licensekey, accessour technical
support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and maintenance contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Page 6
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:
Additional enterprise services
Symantec offers a comprehensive setof services that allow you to maximize your
investment in Symantec products and to develop your knowledge, expertise, and
global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
customercare_apac@symantec.comAsia-Pacific and Japan
semea@symantec.comEurope, Middle-East, and Africa
supportsolutions@symantec.comNorth America and Latin America
Symantec EarlyWarning Solutions
Managed Security Services
Consulting Services
Educational Services
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
These servicesremove theburden ofmanaging andmonitoring securitydevices
and events, ensuring rapid response to real threats.
Symantec Consulting Services provide on-site technical expertise from
Symantec andits trustedpartners. SymantecConsulting Servicesoffer avariety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring,and managementcapabilities. Each is focused on
establishing andmaintaining the integrity and availability of your IT resources.
Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
Norton Ghostprovides advancedbackup andrecovery for your computer. Protect
any kindof datayou keep on your computer by making a backupof yourcomputer's
entire hard disk. Or, limit your backup to include only those files and folders that
mean the most to you.
You can schedule backups to capture your changes automatically as you work
from day to day. Or start a backup manually at any time. You can also easily
configure NortonGhost to run a backup in responseto specificevents. Forexample,
a backup can run when a particular application is started. Or, a backup can run
when a specified amount of new data is added to the drive.
When youexperience a problem with your computer, youcan restore a file, folder,
or an entire drive. This recovery process returns your computer to a previous,
functional state with the operating system, applications, and data files intact. Or,
if you accidentally delete a personal file, get it back with a few steps.
Using easy-to-follow wizards, you can set up fast and reliable backup jobs and
have themrun while you continue to work. Or,schedule yourbackups to run after
hours when your computer is idle.
When disaster strikes, Norton Ghost helps you recover your computer from the
effects of many common problems, including
Page 14
Introducing Norton Ghost™
14
What is new in Norton Ghost
■ Virus attacks: Damage might be done before a virus is quarantined.
■ Faulty software installations: Some software can negatively affect your
computer's performance, and slow it down to the point that programs or
documents require too much time to open. But when installed, removing a
program might not recover unintentional damage by the installation.
■ Hard drive failure: Data canbecome corrupted on your system drive (typically
C), making it impossible to start your operating system
■ Files accidentallydeleted or overwritten: Accidental deletion of filesis common,
but often costly.
■ Corrupted files: Individual files and folders can become corrupted by viruses,
or when a program used to modify them encounters an error.
What is new in Norton Ghost
Norton Ghost includes many enhancements and new features. Refer to the
following table for information about the latest features and enhancements:
Note: Not all listed features are available in all versions of this product.
Table 1-1
Improved support for virtual formats
Improved platform support
What is new Norton Ghost
DescriptionFeature
Norton Ghost now includes support for the
following virtual platforms:
■ VMware ESX 3.5i and 4.0i
■ VMware ESX 3.5 and 4.0
Norton Ghost now includes support for the
following platforms:
■ Windows 7
■ Windows Vista with SP2 (includes Home
Basic, Home Premium, Business-Retail,
and Ultimate)
Page 15
Hiding or showing the Advanced page
15Introducing Norton Ghost™
Table 1-1
Create recovery points from within
Symantec Recovery Disk
Convert recovery points to virtual disks
using a schedule
Support for Microsoft Hyper-V
Support for Blu-ray disc media
What is new Norton Ghost (continued)
DescriptionFeature
You can now create independent recovery
points using the new Back Up My Computer
feature in Symantec Recovery Disk.
Sometimes knownas acold backupor offline
backup, you can create recovery points of a
partition without the need to install Norton
Ghost or its Agent.
See “Aboutrunning aone-time backupfrom
Symantec Recovery Disk” on page 76.
You can now create schedules to convert
recovery points to VMware VirtualDisk and
Microsoft Virtual Disks, or directly to a
VMware ESX 3.5 server.
See “Defining a virtual conversion job”
on page 147.
You can now convert recovery points to
Hyper-V format and also import recovery
points to a Hyper-V server.
Back up your computer directly to Blu-ray,
DVD, orCD. Or,you cancopy recoverypoints
to Blu-ray, DVD, or CD.
Fully enabled 60-day trial
If you choose to delay installation of the
product license, all features still remain
enabled during the 60-day trial period. The
60-day trial period begins when you do a
particular task.
See “When youdelay licensing ”on page 20.
Hiding or showing the Advanced page
The Advanced page offers experienced Norton Ghost users a single view of the
most commonproduct features.If you have a good understanding of Norton Ghost,
you might prefer to perform most tasks from the Advanced view.
Page 16
Introducing Norton Ghost™
16
Getting more information about Norton Ghost
Note: When you refer to the documentation while using the Advanced page, the
first one or two steps do not apply. The first one or two steps merely indicate
where to access each feature from the other pages of the product interface. From
that point on, follow the remaining steps of each procedure.
The Advanced page can be hidden from view if you do not plan to use it.
To hide or show the Advanced page
Start Norton Ghost.
1
On the View menu, click ShowAdvanced Page to hide or show the Advanced
2
page.
Getting more information about Norton Ghost
To learn more about Norton Ghost, visit the Help and Support page. Depending
on which version and language of the product you have installed, the Help and
Support pageincludes one-click access to more information. The page alsoincludes
access tothe product help system, theproduct User's Guide. It also includes access
to theSymantec KnowledgeBase where you can find troubleshooting information.
To access Help and Support
Start Norton Ghost.
1
On the Home page, click Help > Help and Support.
2
Page 17
Chapter
Installing Norton Ghost
This chapter includes the following topics:
■ Before you install
■ Installing Norton Ghost
■ Updating Norton Ghost
■ About uninstalling Norton Ghost
Before you install
2
Installation procedures might vary, depending on your work environment and
which installation options you choose. This chapter focuses on installing the full
version of Norton Ghost from the installation CD.
Before you install Norton Ghost, ensure that your computer meets the system
requirements. Reviewthe Readme file on the installation CDfor anyknown issues.
System requirements
The following table lists the system requirements for Norton Ghost to function
properly.
Page 18
Installing Norton Ghost
18
Before you install
Table 2-1
Minimum system requirements
Operating system
RAM
Available hard disk space
Minimum requirementsComponent
The following Windows 32- or64-bit operatingsystems are
supported:
■ Windows 7
■ Windows Vista Ultimate
■ Windows Vista Business
■ Windows XP Professional/Home (SP2 or later)
■ Windows XP Media Center (SP2 or later)
The following are the memory requirements for each
component of Norton Ghost:
You can look up information about your writer if you know
the name of the manufacturer and model number of your
writer.
The Microsoft .NET Framework 2.0 or later is required to
run Norton Ghost.
If .NET Framework is not already installed, you are
prompted to install it after Norton Ghost is installed and
your computer is restarted.
The following virtual platforms are supported:
■ VMware Workstation 4, 5, and 6
■ VMware ESX 3.0, 3.5, and 4.0
■ VMware ESXi 3.5 and 4.0
■ VMware Server 1
■ VMware GSX Server 3.x (replaced by VMware Server)
■ Microsoft Virtual Server 2005 R2 and later
■ Microsoft Hyper-V 1.0 and 2.0
About supported file systems and removable media
Norton Ghost supports the following file systems and removable media:
Page 20
Installing Norton Ghost
20
Before you install
Supported file systems
Removable media
About disabled features
Norton Ghost supports the following file systems:
■ FAT16, FAT16X
■ FAT32, FAT32X
■ NTFS
■ GUID Partition Table (GPT)
■ Dynamic disks
■ Linux Ext2, Linux Ext3
■ Linux swap partitions
Note: You must decrypt encrypted NTFS drives before you
attempt to restore them. You cannot view the files that are
in a recovery point for an encrypted NTFS drive.
You can save recovery points locally (that is, on the same
computer whereNorton Ghostis installed). Or, you can save
recovery pointsto mostBlu-ray, DVD-R(W),DVD+RW, CD-R,
and CD-RW recorders. You can find an updated list of
supported drives on the Gear Software Web site.
http://www.gearsoftware.com
Norton Ghost also lets you save recovery points to most
USB devices, 1394 FireWire devices, REV, Jaz, Zip drives,
and magneto-optical devices.
Norton Ghost is packaged to meet various markets. Some features might not be
available, depending on the product you have purchased. However, all features
are documented. You should be aware of which features are included with the
version of the product you have purchased. If a feature is not accessible in the
product user interface, it is likely not included with your version of the product.
Refer tothe Symantec Web site for information about the featuresthat areincluded
with your version of Norton Ghost.
When you delay licensing
If you choose to delay installation of the license key, all features in Norton Ghost
remain enabled during the 60-day grace period.
Symantec Recovery Disk, a component of Norton Ghost, is available with no trial
period or evaluation. However, you need a valid license key to use the following
features in Symantec Recovery Disk:
■ Back Up My Computer wizard
Page 21
Installing Norton Ghost
See “About running a one-time backup from Symantec Recovery Disk”
on page 76.
The 60-day grace period of Norton Ghost begins when you do any one of the
following in the software:
■ Define a drive-based or file and folder backup
■ Recover a computer
■ Copy a drive
■ Consolidate incremental recovery points
■ Run a drive-based or file and folder backup
■ Define a scheduled convert to virtual disk job
■ Run a scheduled convert to virtual disk job
■ Define a one time convert to virtual disk job
If youuse an Evaluation copy ofthe product, it also expires after 60days. However,
all features are enabled until the end of the evaluation period, at which time you
must purchase the product or uninstall it. You can purchase a license at any time
(even after the evaluation period expires) without reinstalling the software.
21Installing Norton Ghost
Note: If this productcame pre-installed from a computer manufacturer, your trial
period couldbe as long as 90days. The product licensing or activation pageduring
install indicates the duration of your trial period.
See “Activating Norton Ghost later” on page 24.
Installing Norton Ghost
Before youbegin, you should review the requirements andscenarios for installing
Norton Ghost.
See “System requirements” on page 17.
Note: During the installation process, you might be required to restart the
computer. You should ensure proper functionality after the computer restarts.
You can do this by logging on again using the sameuser credentials that you used
to log on when you installed Norton Ghost.
Page 22
Installing Norton Ghost
22
Installing Norton Ghost
Warning: The Symantec Recovery Disk CD provides the tools that you need to
recover your computer. How you received Symantec Recovery Disk depends on
the version of the product that you purchased. For example, Symantec Recovery
Disk is included with your product either on a separate CD, or on your product
CD. Be sure you store the CD in a safe place.
To install Norton Ghost
Log onto your computer using either the Administrator account oran account
1
that has administrator privileges.
Insert the Norton Ghost product CD into the media drive of the computer.
2
The installation program should start automatically.
If the installation program does not run, type the following command at a
3
command prompt:.
<drive>:\autorun.exe
where <drive> is the drive letter of your media drive.
In the CD browser panel, click Install Norton Ghost.
4
In the License Agreement panel, read the license agreement, and then click
5
I accept the terms in the license agreement.
Do one of the following:
6
■ In theLicense Agreement panel, click InstallNow to begin theinstallation.
■ In the License Agreement panel, click Custom Install, select or deselect
the options you want installed, and then click Install Now.
Installation options include:
Backup andRecovery Service
Recovery Point Browser
User Interface
The primary service that is required to back up or
recover your computer.
Enables you to browse, mount, copy, verify, and
restore files and folders using recovery points.
Installs the product user interface that is required
for interacting with the Norton Ghost Service.
Agent Deployment–Allows thecomputer onwhich
you have installed Norton Ghost to deploy the
Norton GhostAgent toother computersfor remote
recovery management.
Page 23
Installing Norton Ghost
23Installing Norton Ghost
CD/DVD Support
LiveUpdate
Click Finish to complete the installation.
7
Remove the product CD from the media drive, and then click Yes to exit the
8
installation wizard and restart the computer.
If you click No, you cannot run Norton Ghost until after you restart your
computer.
Completing the installation
After youinstall the product, you areprompted tolicense or activate your product.
You can then run LiveUpdate to check for product updates, and then configure
your first backup.
Note: If this productcame pre-installed from a computer manufacturer, your trial
period could be as long as 90 days. Refer to the Activate later label.
To complete the installation
Required for backing up directly to CD/DVD, and
for creatinga customSymantec Recovery Disk CD.
A CD/DVD burner is required to use this feature.
If your computer manufacturer installed the product, the Welcome page
might appear the first time that you run Norton Ghost.
Do one of the following:
2
■ Click I've already purchased the product and have a license key.
Note: You can find the license key on the back of your product CD jacket.
Do notlose the license key. Youmust use it when you install NortonGhost.
■ Click Activate later to delay the activation of your license. After the trial
period ends, the product will no longer work.
See “When you delay licensing ” on page 20.
■ If Norton Ghost is a trial version and you want to purchase a license key,
click Symantec Global Store.
Click Next.
3
Page 24
Installing Norton Ghost
24
Installing Norton Ghost
Do any of the following:
4
■ Click RunLiveUpdate to check forany product updates since theproduct
shipped.
■ Click Launch Easy Setup to open the Easy Setup window when you
complete the install process. (This option is not available in the Desktop
version of Norton Ghost.)
■ Click EnableGoogle DesktopFile andFolderRecovery if you wantGoogle
Desktop to search your recovery points for the files and folders that you
want to recover.
If you select this option, Norton Ghost automatically catalogs each file as
it creates a recovery point. Google Desktop can then use this catalog to
search for files by name. It does not index the contents of the files.
Note: This option is available only if Google Desktop is already installed
on your computer. If you plan to install Google Desktop, you can enable
search engine support later.
Click Finish.
5
Activating Norton Ghost later
If youdo not activate Norton Ghostbefore the trial period ends, the softwarestops
working. However, you can activate the product at any time after the trial period
expires.
To activate Norton Ghost later
On the Help menu, click Enter License Key.
1
Follow the on-screen prompts.
2
About setting up your first backup
Unless you deselected the Run Easy Setup check box during the setup wizard,
the Easy Setup window appears. If you do not run Easy Setup during the setup
wizard, it appears the first time you open the Run or Manage Backups window.
When the Easy Setup window is displayed, you can accept the default drive and
file and folder backup settings. Or, you can click any of the settings to edit them.
If you want the new backup to run immediately, be sure to select Run backupnow, and then click OK.
Page 25
Updating Norton Ghost
You canreceive software updates for yourversion of the product over an Internet
connection. LiveUpdate connects to the Symantec LiveUpdate server and
automatically downloads and installs updates for each Symantec product that
you own.
You run LiveUpdate as soon as you install the product. You should continue to
run LiveUpdate periodically to obtain program updates.
To update Norton Ghost
On the Help menu, click LiveUpdate.
1
In the LiveUpdate window, click Start to select the updates.
2
Follow the on-screen instructions.
When the installation is complete, click Close.
3
Some program updates might require that you restart your computer before
the changes take effect.
About uninstalling Norton Ghost
Updating Norton Ghost
25Installing Norton Ghost
When you upgrade Norton Ghost from a previous version of the product, the
install programautomatically uninstalls the previous versions.If needed, you can
manually uninstall the product.
Follow your operating system's instructions on how to uninstall software.
Page 26
Installing Norton Ghost
26
About uninstalling Norton Ghost
Page 27
Chapter
Ensuring the recovery of
your computer
This chapter includes the following topics:
■ About ensuring the recovery of your computer
■ Testing Symantec Recovery Disk
■ If driver validation fails
■ Creating a custom Symantec Recovery Disk CD
3
About ensuring the recovery of your computer
If Windowsfails to start or it does notrun normally,you can recover your computer
by using the Symantec Recovery Disk CD. The drivers that are included on the
recovery disk must match the drivers that are required to run your computer's
network cards and hard disks.
To help ensure that you have the drivers that you need to recover your computer,
you can use the Run Driver Validation tool available on the Symantec Recovery
Disk. The driver validation tool compares hardware drivers on the Symantec
Recovery Disk CD with the drivers that are required to run your computer's
network cards and hard disks.
You should run the driver validation test any time you make changes to the
network interface cards or storage controllers on a computer.
See “If driver validation fails” on page 28.
Note: The driver validation tool or Symantec Recovery Disk does not support
wireless network adapter drivers.
Page 28
Ensuring the recovery of your computer
28
Testing Symantec Recovery Disk
Testing Symantec Recovery Disk
You should test the Symantec Recovery Disk CD to ensure that the recovery
environment runs properly on your computer.
Note: Depending on which version of the product you have purchased, Symantec
Recovery Disk is either included on your product CD, or as a separate CD. You
should place the CD containing Symantec Recovery Disk in a safe place.
Testing the Symantec Recovery Disk CD lets you identify and solve the following
types of problems:
■ You cannot start Symantec Recovery Disk.
See “To configure a computer to boot from a CD” on page 175.
■ You do not have the necessary storage drivers to access recovery points on
the computer.
■ You need information about your system to help you run Symantec Recovery
Disk.
See “If driver validation fails” on page 28.
To test Symantec Recovery Disk
Run thedriver validationtool totest whetherSymantec RecoveryDisk works
1
with the network cards and storage devices on the computer.
Start your computer using the Symantec Recovery Disk CD.
2
See “Starting a computer by using Symantec Recovery Disk” on page 174.
When you have started Symantec Recovery Disk, do one of the following:
3
■ If you want to store recovery points on a network, run a mock restore of
a recoverypoint that is stored on a networkto test the network connection.
■ If you want to store recovery points on a computer, run a mock restore of
a recovery point that is stored locally to test the local hard drive
connection.
If driver validation fails
The driver validation test verifies whether the drivers for all storage devices and
network cards in use by the computer are available in Symantec Recovery Disk.
If the drivers are available on the recovery disk, youreceive a validation message.
If anydrivers are not included onthe recovery disk, the Driver Validation Results
dialog box appears.
Page 29
Creating a custom Symantec Recovery Disk CD
Without access to the correct drivers, a device cannot be used while you run
Symantec Recovery Disk. Therefore, if the recovery points that are required for
recovering yourcomputer are stored on a network or a local hard drive,you might
not have access to them.
You can find the drivers and copy them to a CD or a floppy disk, or you can create
a custom Symantec Recovery Disk CD.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
Creating a custom Symantec Recovery Disk CD
Even if driver validation succeeds and your Symantec Recovery Disk CD appears
to work, you should create a custom Symantec Recovery Disk CD. A custom CD
contains your computer's current network and storage device drivers. It helps to
ensure that in an emergency you can get to the recovery points that are required
to restore your computer.
Note: You must have a writeable Blu-ray/DVD/CD-RW drive to create a custom
Symantec Recovery Disk CD.
29Ensuring the recovery of your computer
To create a custom Symantec Recovery Disk CD
Attach and turn on all storage devices and network devices that you want to
1
make available.
Start Norton Ghost.
2
Insert the Symantec Recovery Disk CD into your media drive.
3
If necessary,specify the path or browse to themedia drive in which you placed
the Symantec Recovery Disk CD.
Click Tasks > Create Custom Recovery Disk CD.
4
Click Next.
5
Page 30
Ensuring the recovery of your computer
30
Creating a custom Symantec Recovery Disk CD
Specify the following:
6
Disk label
Burn SymantecRecovery Diskto CD/DVD
Save a copy of the custom Symantec
Recovery Disk (CD/DVD image file)
Click Next.
7
Review the list of storage and network drivers to be included, and add
8
Type the name that you want to use for
the Symantec Recovery Disk label.
If you want to save your customized
Symantec Recovery Disk to media, select
this option and then in the list box, select
the media burning device that you want
to use.
If you want to save your customized
Symantec Recovery Disk as an .iso file,
select this option, and then specify the
path to where you want to save the
resulting file.
additional drivers or remove the drivers you do not need.
On the Startup Options pane, select the default keyboard layout, display
9
language, and time zone from the respective lists.
Click Next.
10
On the Options pane, do the following:
11
Automatically start network services
Select this option if you want networking
to start automatically when you recover
the computerthrough LightsOut Restore.
Dynamic IP
Static IP
Click this option to connect to a network
without the need for additional network
configuration. You can click thisoption if
you knowthere isa DHCPserver available
on the network at the time you restore.
Click this option to connect to a network
with a particular network adapter and
specific addresssettings. You should click
this option if you know there is no DHCP
server (orthe DHCP serveris unavailable)
when you recover.
Page 31
Creating a custom Symantec Recovery Disk CD
31Ensuring the recovery of your computer
Automatically start Symantec
pcAnywhere
Select this option if you want the
Symantec pcAnywhere thin host to start
automatically when you start Symantec
Recovery Disk.
Click Configure to specify pcAnywhere
log on credentials and the following
optional parameters:
■ Host name
In the Host name box, type the name
that you want to use for the host.
You can leave this box blank to
configure thehost nameto bethe same
as the computer name.
■ Encryption level
To encrypt the data stream between
the host and remote computer, in the
Encryption level list, select one of the
following:
■ None
No encryption of the data stream
occurs between the host and
remote computer.
■ pcAnywhere
Scrambles data using a
mathematical algorithm so that a
third party cannot easily interpret
it.
This option is available on any
operating systemthat pcAnywhere
supports.
■ Symmetric
Encodes and decodes data using a
cryptographic key.
This option is available on any
Windows operating system that
supports the Microsoft CryptoAPI.
Click Next.
12
Page 32
Ensuring the recovery of your computer
32
Creating a custom Symantec Recovery Disk CD
On the License Setup pane, specify how you want to enable licensed features
13
in the customized Symantec Recovery Disk (such as the cold imaging feature
called Back Up My Computer).
Click Finish.
14
Warning: Be certain to test your new, custom Symantec Recovery Disk CD. It
ensures that you can use the CD to start your computer and that you can
access the drive that contains your recovery points.
See “Testing Symantec Recovery Disk” on page 28.
Page 33
Chapter
Getting Started
This chapter includes the following topics:
■ About key product components
■ How you use Norton Ghost
■ Starting Norton Ghost
■ Configuring Norton Ghost default options
About key product components
4
Norton Ghostincludes two key components: the program itself, and theSymantec
Recovery Disk CD.
Table 4-1
Norton Ghost program (user interface)
Key product components
DescriptionKey Component
The Norton Ghost program lets you define, schedule, and run backups of
your computer. Whenyou run a backup, recovery points of your computer
are created, which you can then use to recover your entire computer, or
individual drives, files, and folders. You can also manage recovery point
storage (backup destination), and monitor the backup status of your
computer to make sure your valuable data is backed up on a regular basis.
Page 34
Getting Started
34
How you use Norton Ghost
Table 4-1
Key product components (continued)
DescriptionKey Component
Symantec Recovery Disk CD
The Symantec Recovery Disk CD is used to start your computer in the
recovery environment. If your computer's operating system fails, use
Symantec RecoveryDisk torecover yoursystem drive (the drive where your
operating system is installed).
Note: Depending on which version of the product you have purchased,
Symantec Recovery Disk is either included on your product CD, or as a
separate CD. You should place the CD that contains Symantec Recovery
Disk in a safe place.
See “About recovering a computer” on page 173.
How you use Norton Ghost
While Norton Ghost does the work of backing up your files, folders, or entire
drives, you need to tell Norton Ghost what to backup, when to back it up, and
where to put the backed up data.
Using Norton Ghost includes the following key tasks:
■ Defining a backup
■ Running a backup
■ Recovering files, folders, or entire drives
Refer to the following figure to understand the relationship of these tasks.
Page 35
Starting Norton Ghost
35Getting Started
Figure 4-1
Using Norton Ghost
Starting Norton Ghost
Norton Ghost is installed in the Windows Program Files folder by default. During
installation, a program icon is installed in the Windows system tray from which
you can open Norton Ghost. You can also open Norton Ghost from the Windows
Start menu.
To start Norton Ghost
Depending onthe Windows version you are running, use one ofthe following
◆
methods:
Page 36
Getting Started
36
Configuring Norton Ghost default options
■ On the classic Windows taskbar, click Start > Programs > Norton Ghost
> Norton Ghost 15.0.
■ On the Windows taskbar, click Start > All Programs > Norton Ghost >
Norton Ghost 15.0.
■ In the Windows system tray, double-click the SymantecNorton Ghost
15.0 tray icon.
■ In the Windows system tray, right-click the Norton Ghost tray icon, and
then click Open Symantec Norton Ghost 15.0.
Configuring Norton Ghost default options
The Optionsdialog boxincludes several views that let you configure the following
default settings:
DescriptionOptions
General
Performance
Tray Icon
Specify adefault location where a backup will create and store
recovery pointsand file and folder backup data. Ifthe location
you choose is on a network, you can enter your user
authentication information.
See “Selecting a default backup destination” on page 38.
Lets you specify a default speed for backup or recovery
processes. Whenyou movethe slidercloser toFast, itincreases
the speed at which the program backs up or recovers your
computer. If you choose a slower speed it could improve the
performance ofyour computer, especiallyif you workon your
computer during a backup or recovery.
Note: During a backup or recovery, you have the option to
override this default setting to fit your needs at the time.
You can also configure network throttling to limit the effects
of backups on network performance.
See “Adjusting the effect of a backup on computer
performance” on page 39.
See “Enabling network throttling” on page 39.
You can turn on or off the system tray icon. You can also
specify whetherto showonly errormessages whenthey occur,
or to show both error messages and other information, such
as the completion of a backup.
See “Adjusting default tray icon settings” on page 40.
Page 37
Configuring Norton Ghost default options
37Getting Started
DescriptionOptions
File Types
Google Desktop
External Drives
Configure FTP
Log File
Lets you managefile types andfile type categories, which are
used as a method for selecting the types of files you want
included in a file and folder backup.
See “Managing file types” on page 41.
If Google Desktop is installed on your computer when you
install Norton Ghost, you have the option of enabling Google
Desktop fileand folderrecovery. Whenyou enablethis feature,
you can search for files (by file name) inside a recovery point
that was created with search engine support enabled.
If GoogleDesktop isnot installedon your computer when you
install Norton Ghost, you have the option of clicking a link to
the Web site where you can download and install Google
Desktop for free.
See “About using a search engine to search recovery points”
on page 201.
Delete orrename theunique namesyou havegiven toexternal
drives used as backup and Offsite Copy destinations.
See “Using nicknames for external drives” on page 43.
Specify default FTP settings to be used with Offsite Copy.
See “Configuring default FTP settings for use with Offsite
Copy” on page 44.
Lets you specify the types of product messages to log (errors,
warnings, and information), where to store the log file, and
set a maximum file size for the log file.
See “Logging Norton Ghost messages” on page 44.
Event Log
SMTP E-mail
Lets you specify the types of product messages to log (errors,
warnings, and information) in the Windows event log.
See “Logging Norton Ghost messages” on page 44.
If you want a history of actions taken by Norton Ghost, or of
error messages and warnings, you can choose to save them
in a log file on your computer, or to have them emailed to an
address you specify.
See “Enabling email notifications for product (event)
messages” on page 46.
Page 38
Getting Started
38
Configuring Norton Ghost default options
DescriptionOptions
SNMP Trap
To configure Norton Ghost default options
Start Norton Ghost.
1
Click Tasks > Options.
2
Select anoption you want to edit, make anynecessary changes, and then click
3
OK.
If youhave aNetwork ManagementSystem (NMS)application,
you can enable SNMP Traps support to send notifications to
you NMS application.
See “About SNMP traps” on page 122.
Selecting a default backup destination
You can specify the default destination for storing recovery points and file and
folder backup data created when you run a backup. This default location is used
if you do not specify a different location when you define a new backup.
To select a default backup destination
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click General.
2
Select Prepend computer name to backup data file names.
3
This is especially useful if you back up more than one computer to the same
drive. For example, you might back up a laptop and a desktop computer to
the same USB or network drive. By prepending the computer name to each
backup data file name, you can more easily identify which backup data files
belong to which computer.
Select Save backup files to a unique subfolder if you want Norton Ghost to
4
create a new subfolder that will serve as your backup destination.
Note: The new subfolder is given the same name as your computer. For
example, if your computer name is "MyLaptop", the new subfolder would be
named \MyLaptop.
Page 39
Configuring Norton Ghost default options
Enter a path to a folder where you want to store recovery points and file and
5
folder backup data, or click Browse to look for a location.
You cannot use an encrypted folder as your backup destination. If you want
to encrypt your backup data to prevent another user from accessing it, refer
to the Advanced options when you define or edit a backup.
If you entered the path to a location on a network, enter the user name and
6
password required to authenticate to the network.
Click OK.
7
Adjusting the effect of a backup on computer performance
If you are working on your computer when a backup is running—especially one
that is creating an independent recovery point—your computer might slow down.
This is because Norton Ghost is using your computer's hard disk and memory
resources to perform the backup.
However, you can actually change the speed of the backup as away of minimizing
the impact of Norton Ghost on your computer while you work.
To adjust the effect of a backup on computer performance
39Getting Started
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click Performance.
2
If you want to improve your computer's speed performance, move the slider
3
bar closer to Slow.
If you want the backup to complete more quickly, move the slider bar closer
4
to Fast.
Click OK.
5
Note: During a backup or recovery, you'llhave the option of overriding this default
setting to fit your needs at that moment.
See “Adjusting the speed of a backup” on page 94.
Enabling network throttling
Similar to computer performance adjustments, you can also limit the impact of
a backup on network performance.
Network performanceis affected by many variables. Consider thefollowing issues
before you use this feature:
Page 40
Getting Started
40
Configuring Norton Ghost default options
■ Network cards:Is yournetwork wiredor wireless?What arethe speedsof your
network cards?
■ Network backbone: What is the size of your network pipeline? Does it support
10 MB transfer rates, or 1 GB transfer rates?
■ Network server:How robust is your server hardware? Howfast isits processor?
How much RAM does it have? Is it fast or slow?
■ Backing up: How many computers are scheduled to back up at the same time?
■ Network traffic: Are backups scheduled to run when network traffic is heavy
or light?
Consider using this feature only when you know what your network can handle.
If you schedule your backups at staggered intervals and when network traffic is
low, you may not need to use this feature. Avoid backing up multiple computers
at the same time and to the same network destination.
Gather the required information about your network's performance and then
schedule backups accordingly. Then, if necessary, enable this feature and set the
Maximum network throughput to a setting that matches the circumstances.
To enable network throttling
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click Performance.
2
Select Enable network throttling.
3
In the Maximum network throttling field, enter the maximum amount (in
4
KB) of network throughput that Norton Ghost can send per second.
Click OK.
5
Adjusting default tray icon settings
You can turn the system tray icon on or off and specify whether to show only
error messages when they occur, or to show both error messages and other
information, such as the completion of a backup.
Page 41
Configuring Norton Ghost default options
To adjust default tray icon settings
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click Tray Icon and select one of the following:
2
41Getting Started
Show system tray icon
Show missed backups
Show system tray questions
Show status messages
Show error messages
Click OK.
3
Displays theNorton Ghosticon inthe system
tray.
You must select this option to enable or
disable any of the remaining options.
Notifies you when a backup was scheduled
but did not run.
This can happen when your computer was
turned off at the time a backup was
scheduled to run.
Offers helpful prompts in the form of
questions that can help you keep your data
backed up.
Displays messages about the status of
backup operations, such as notifying that a
backup has started, or that your backup
destination is getting full.
Displays error messages when errors occur
so thatyou canresolve any issues that might
hinder data protection.
Managing file types
When you define a file and folder backup, file types are a quick way to include
files you use the most.For example, if you keep music files on your computer, you
can configure a file and folder backupto include all music files(for example, .mp3,
.wav).
The most common file types and extensions are already defined for you. But you
can define additional file type categories as needed, and then edit them at any
time. For example, if you install a new program that requires the use of two new
file extensions (.pft and .ptp, for example), you can define a new file type and
define the two file extensions for that category. Then when you define a file and
folder backup, you can select the new category. When the backup is run, all files
ending with .pft and .ptp are backed up.
Page 42
Getting Started
42
Configuring Norton Ghost default options
To create a new file type and extensions
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click File Types.
2
At the bottom of the File types list, click the Adda file type (+) button to add
3
a file type category.
Type a descriptive name of the new file type category, and then press Enter.
4
At thebottom of the Extensions forlist, click the Addan extension (+) button,
5
and then type an asterisk (*) and a period, followed by the extension of the
file type you want to define, and then press Enter.
Click OK.
6
To edit a file type and extensions
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Click File Types.
2
Select a file type from the File types list, and then do one of the following:
3
■ Click the Rename a file type button (at the right of the - button) to edit
■ Select an extension in the Extensions for column and click the Rename
■ Click either the Restore default file types list or the Restore default
the name of the selected file type.
an extension button (at the right of the - button) to edit the name of the
extension.
extension list button to restore all default file types or extensions.
Caution: Any file types and extensions you have set up are removed. You
must add them again manually.
Click OK.
4
To delete a file type (and all of its extensions)
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Select a file type in the File types column.
2
You cannot delete a default file type. You can delete all but one extension of
a default file type, and you canadd additional extensions to adefault file type.
Click the Remove a file type (-) button , and then click OK.
3
Use this same procedure to remove file extensions from the Extensions for
list.
Page 43
Using nicknames for external drives
When you choose an external drive for use with Norton Ghost as either a backup
destination or an Offsite Copy destination, it can become confusing if you are
using morethan one drive, especially when the assigneddrive letterchanges each
time you plug in the drive.
To help you manage these destinations, Norton Ghost lets you assign a nickname
to eachexternal drive. Doing so does not changethe drivelabel, but is for use only
when you are accessing those drives from within Norton Ghost.
For example, you might be swapping out two different external drives used as
Offsite Copy destinations during any given week. Depending on the drive labels
assigned to each drive and whether or not the drive letter previously assigned
has changed, it could become confusing as to which drive you are using at any
given time.
However, byassociating unique nicknames to each drive, thenas you use the drive
with Norton Ghost, the nicknames you assigned appear in various locations in
Norton Ghost.
Note: It is also a good idea to place physical labels on each external drive to help
you manage the task of swapping the drives.
Configuring Norton Ghost default options
43Getting Started
For example,if youassigned the nickname, "Cathy Read" to onedrive, and"Thomas
Read" to a second drive, their nicknames appear in Norton Ghost whenever the
drives are plugged in to your computer.
See “About Offsite Copy” on page 81.
To make it even easier, the Options dialog box lets you see all of your drive
nicknames in one view. From this view, you can remove or edit existing names.
To remove or edit external drive nicknames
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Destinations, click External Drives.
2
Select an external drive from the list and then do one of the following:
3
■ Click Remove to delete the nickname associated with the external drive.
■ Click Rename to edit the nickname.
Page 44
Getting Started
44
Configuring Norton Ghost default options
Configuring default FTP settings for use with Offsite Copy
File Transfer Protocol, or FTP, is the simplest and most secure way to copy files
over the Internet. Norton Ghost serves as an FTP client to copy your recovery
points to a remote FTP server as a secondary backup of your critical data.
The Options dialog box lets you configure basic FTP settings to help ensure that
your recovery points are copied to your FTP server.
To configure default FTP settings for use with Offsite Copy
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Destinations, click Configure FTP.
2
Refer to the following table when making changes:
3
Connection mode:
Passive
(Recommended)
Connection mode:
Active
Limit connection
attempts to
Stop trying to
connect after
Default port
Passive (sometimeswritten "PASV")mode helpsavoid conflicts
with securitysystems. Thismode isnecessary forsome firewalls
and routers because when using passive mode, the FTP client
opens the connection to an IP Address and port that the FTP
server supplies.
Use active mode when connections or transfer attempts fail in
passive mode, or when you receive data socket errors. When
an FTP client connects using active mode, the server opens a
connection to an IP Address and port that the FTP client
supplies.
Specify the number of times Norton Ghost tries to connect to
an FTP server before giving up. Norton Ghost can attempt a
maximum of 100 times.
Specify the number of seconds Norton Ghost tries to connect
to an FTP server before giving up. You can specify up to 600
seconds (10 minutes).
Specify the port of the FTP server that is listening for a
connection.
You shouldconsult theFTP server administrator to be sure that
the port you specify is configured to receive incoming data.
Logging Norton Ghost messages
You can specify which product messages (errors, warnings, and information) are
logged asthey occur, and where the log fileis stored. Product messages can provide
useful information about the status of backups or related events. They can also
provide helpful information when you need to troubleshoot.
Page 45
Configuring Norton Ghost default options
Two logging methods are available: Norton Ghost logging, and the Windows
application log.
From the Options page, you can configure both methods.
To log Norton Ghost messages
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Notifications, click Log File.
2
Click the Selectthe priority andtype of messages list and select the priority
3
level at which a message should be logged.
45Getting Started
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
■ Errors
■ Warnings
■ Information
In the Log file location field, enter a path to where the log file should be
5
Send all messages, regardless of priority
levels.
Send only medium and high priority
messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of
priority levels.
created and stored.
If you don't know the path, click Browse and select a location.
In the Maximum file size field, specify a maximum size (inkilobytes) that the
6
log file is allowed to grow.
The file is kept within the limit you set by replacing the oldest logged items
in the file with new items as they occur.
Click OK.
7
To configure which product events are written to a Windows event log
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Notifications, click Event Log.
2
Page 46
Getting Started
46
Configuring Norton Ghost default options
Click the Selectthe priority andtype of messages list and select the priority
3
level at which a message should be logged.
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
■ Errors
■ Warnings
■ Information
Click OK.
5
Send all messages, regardless of priority
levels.
Send only medium and high priority
messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of
priority levels.
Enabling email notifications for product (event) messages
Email notifications can be sent to a specified email address if there are any errors
or warnings that occurred when a backup is run.
Note: If you do not have an SMTP server, this feature is unavailable to you.
Notifications canalso be sent to the system event log anda custom log file located
in the Agent folder of the product installation.
If notifications are not delivered, check the setup of your SMTP server to ensure
that it functions properly.
To enable email notifications for product (event) messages
In Norton Ghost, on the menu bar, click Tasks > Options.
1
Under Notifications, click SMTP E-mail.
2
Page 47
Configuring Norton Ghost default options
Click the Selectthe priority andtype of messages list and select the priority
3
level at which an email should be sent.
47Getting Started
All messages
Medium and high priority messages
No messages
Select one or more of the following options:
4
■ Errors
■ Warnings
■ Information
In the To address text box, type the email address (for example,
5
Send all messages, regardless of priority
levels.
Send only medium and high priority
messages.
Send only high priority messages.High priority messages only
Do not send any messages, regardless of
priority levels.
admin@domain.com) where notifications are to be sent.
Optionally, type the email address of the sender in the From address text
6
field.
If you do not specify a From address, the name of the product is used.
In the SMTP server text box, type the path to the SMTP server that sends the
7
email notification (for example, smtpserver.domain.com).
From the SMTP Authentication drop-down box, select the method to use to
8
authenticate to the specified SMTP server.
Enter your SMTP user name and password.
9
If you are not sure what your user name and password are, contact a system
administrator.
Click OK.
10
Page 48
Getting Started
48
Configuring Norton Ghost default options
Page 49
Chapter
Best practices for backing
up your data
This chapter includes the following topics:
■ About backing up your data
■ About choosing a backup type
■ Best practices for backing up
■ Additional tips about backups
5
■ After defining your backup job
■ About selecting a backup destination
■ About backing up dual-boot computers
About backing up your data
To backup your computer or your individual filesand folders, you do the following:
■ Define a backup
■ Run the backup
See “How you use Norton Ghost” on page 34.
When you define a backup, you decide on the following:
■ What to back up (files and folders, or an entire drive)
■ Where to store the backup data (backup destination)
■ Whether or not to use Offsite Copy to copy backup data to remote locations
■ When to run the backup (automatically or manually)
Page 50
Best practices for backing up your data
50
About choosing a backup type
■ What compressionlevels tospecify forrecovery points,and whetherto enable
security settings (encryption and password protection).
■ Which of the many other options you want to use. You can customize each
backup according to your backup needs.
About choosing a backup type
There are two types of backups available:
■ Drive-based backup: Backs up an entire hard drive
■ File and folder backup: Backs up only the files and folders that you select
You canuse the following guidelines to determine whichtype of backup to choose:
Drive-based backup
File and folder backup
Use this backup type to do the following:
■ Back up and recover your computer's system drive
(typically, the C drive, which includes your operating
system).
■ Back up and recover a specific hard drive, such as a
secondary drive (which is a drive other than the system
drive on which your operating system is installed).
■ Recover lost or damaged files or folders from a specific
point in time.
Use this backup type to do the following:
■ Back up and recover specific files and folders, for
example personal files that are stored in the My
Documents folder.
■ Back up and recover files of a specific type, for example
music (.mp3 or .wav) or photographs (.jpg or .bmp).
■ Recover a specific version of a file from a specific point
in time.
See “Before you back up” on page 51.
Best practices for backing up
As you prepare to back up your computer, review this information:
■ Before you back up
■ During a back up
■ When a back up is finished
Page 51
About backups
Best practices for backing up
51Best practices for backing up your data
When you back up your computer, you choose from two types of backups:
■ drive-based backup: backs up an entire hard drive
■ file and folder backup: backs up only the files and folders you select
Which backup type you choose depends on what you are trying to protect and
how much storage space you have to store backup data (recovery points, and file
and folder backup data).
The following table highlights the key uses of each backup type:
Use toBackup type
Drive-based backup
File and folder backup
Before you back up
Consider these best practices before you define and run your first back up:
Schedule back ups when you know
your computer will be turned on.
Use a secondary hard disk as your
backup destination.
■ Back upand recoveryour computer (system drive, typically
drive C)
■ Back up and recover a specific hard drive (any secondary
drive, drives other than your system drive)
■ Recover lost or damaged files or folders using recovery
points
■ Back up and recover specific files and folders, such as
personal files stored in the My Documents folder
■ Back up and recover files of a specific type, such as music
(.mp3, .wav) or photographs (.jpg, .bmp)
Your computermust be turnedon andWindows must
be running at the time a back up occurs. If not, any
scheduled back ups are skipped until the computer is
turned on again. You then are prompted to run the
missed back up.
See “About choosing a backup type” on page 50.
You shouldstore recoverypoints ona harddisk other
than your primary hard disk C. It helps ensure that
you can recover your system in the event that your
primary hard disk fails.
See “About selecting a backup destination”
on page 56.
Page 52
Best practices for backing up your data
52
Best practices for backing up
Consider using external drives as
your backup destination.
Give nicknames to your external
drives to help you easily identify
them
Use Offsite Copy
Using anexternal drivemakes yourbackup datamore
portable. Shouldyou needto removeyour criticaldata
from a particular location, you can quickly grab an
external drive on your way out the door.
See “About Offsite Copy” on page 81.
You can assign a nickname to each external drive to
help keep track of where your backup data is stored
for each computer you back up. Because drive letters
can changeeach timeyou unplugand plugan external
drive into your computer, a nickname ensures that
you can always know whichdrive you are using when
you are running Norton Ghost.
Using a nickname does not change the volume label
of a drive. A nickname simply helps you identify the
drive when using Norton Ghost.
And the nickname sticks with the drive, sothat if you
plug the drive into a second computer running
another copyof NortonGhost, thenickname appears.
Note: You might also consider placing a sticky label
on each drive that matches the nickname that you
have assigned.
See “Usingnicknames forexternal drives”on page43.
Use Offsite Copy to copy your latest recovery points
to eithera portable storage device or a remote server.
By copying recovery points to a portable hard disk,
you can then take a copy of your data with you when
you leave the office.
See “About Offsite Copy” on page 81.
Run back ups on a regular and
frequent basis.
When youdefine your backups, schedulethem to run
frequently sothat you haverecovery points thatspan
at least the last two months.
See “Editing a backup schedule” on page 97.
See “Defining a drive-based backup” on page 60.
Page 53
Best practices for backing up
53Best practices for backing up your data
Keep personal data on a separate
drive than the drive on which
Windows and your software
programs are installed.
Verify the recovery point after you
create it to ensure that it is stable.
During a back up
If you are working at your computer and a back up starts to run, you might notice
that the performance of your computer slows down. Norton Ghost requires
significant system resources to run a back up. If slowing occurs, you can reduce
the speed of the back up to improve computer performance until you are finished
working.
See “Adjusting the speed of a backup” on page 94.
You should keep your operating system and software
programs separate from your own data. It speeds the
creation of recovery points and reduces the amount
of informationthat needsto be restored. For example,
use the C drive to run Windows and to install andrun
software programs. Use the D drive to create, edit,
and store personal files and folders.
For other drive management solutions, go to the
Symantec Web site at the following URL:
www.symantec.com/.
When you define a backup, you should select the
option to verify the recovery point to ensure that the
recovery point can be used to recover lost data.
See “About choosing a backup type” on page 50.
When a back up is finished
After a back up finishes, consider the following best practices:
Review the contents of recovery
points and file and folder backup
data.
Periodically review the contents of your recovery
points to ensure that you back up only your essential
data.
For file and folder backups, click Recover My Files
from either the Home or Tasks pages. Then click
Search to display the latest version ofall thefiles that
are included in your backup.
See “About opening files and folders stored in a
recovery point” on page 163.
Page 54
Best practices for backing up your data
54
Additional tips about backups
Review the Status page to verify
that backups have happened and
to identify any potential problems.
Manage storage space by
eliminating old backup data.
Review the level of protection that
is provided for each of your
computer's drives.
Periodically review the Status page. You can also
review the events log on the Advanced page.
The event log records events when they occur,
backups and any errors that might have occurred
during or after a backup.
If you do not see the Advanced page tab, click View >
Show Advanced Page.
Note: Backup status and other messages are also
conveyed in the system tray. So you do not even need
to start the product to identify the status of your
backups.
See “Verifyingthat abackup is successful” on page 95.
Delete outdated recovery points to make more hard
disk space available.
Also, reduce the number of file versions that are
created by file and folder backups.
See “Managing recovery point storage” on page 137.
See “About managing file and folder backup data”
on page 154.
Check the Status page on a regular basis to ensure
that each drive has a defined backup.
Maintain backup copies of your
recovery points.
Store backup copies of your recovery points in a safe
place. For example you can store them elsewhere on
a network, or you can store them on CDs, DVDs, or
tapes for long-term, off-site storage.
See “Making copies of recovery points” on page 139.
Additional tips about backups
Consider the following tips when you run a defined backup:
■ Norton Ghost does not need to be running for a scheduled backup to start.
After you define a backup, you can close Norton Ghost.
■ The computer that is being backed up must be turned on and Windows must
be started.
■ All defined backups are saved automatically so that you can edit them or run
them later.
Page 55
After defining your backup job
■ Do not run a disk defragmentation program during a backup. Doing so will
significantly increase the time that it takes to create the recovery point and
might cause unexpected system resource issues.
■ If you have two or more drives that are dependent on each other, you should
include both drives in the same backup. This provides the safest protection.
■ Include multipledrives inthe same defined backup to reduce the total number
of backupsthat must be run. Doing so minimizesinterruptions whileyou work.
■ Use the Progress and Performance feature to reduce the impact of a backup
on your computer's performance. For example, if a scheduled backup starts
while you are in the middle of a presentation, you can slow down the backup
to give more processing resources back to your presentation program.
■ The powermanagement featureson a computer can conflict with Norton Ghost
during a backup.
For example, your computer might be configured to go into hibernation mode
after a period of inactivity. You should consider turning off the power
management features during a scheduled backup.
■ If a backup is interrupted, consider running it again.
■ If you experience problems while creating a backup, you may need to reboot
the computer.
55Best practices for backing up your data
After defining your backup job
All backup jobs you define are automatically saved so that you can edit or run
them later.
After you define a backup and schedule it to run, youcan close NortonGhost. The
program does not need to be running for a backup to start.
However, your computer must be turnedon and Windows must be running at the
time abackup occurs. If not, any scheduled backupsare skippeduntil the computer
is turned on again. You then are prompted to run the missed backup.
Viewing the properties of a backup job
You canreview the settings and configuration of a defined backupwithout opening
the backup job.
To view the properties of a backup job
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, select a backup job and then click
2
Tasks > Properties.
Page 56
Best practices for backing up your data
56
About selecting a backup destination
About selecting a backup destination
You should review the following information before deciding where to store
recovery points and file and folder backup data.
Note: If you choose to use CDs or DVDs as your backup destination (not
recommended), you cannot back up to a sub-folder on the disk. Backup data must
be created at the root of CDs and DVDs.
The followingtable contains information that you need toconsider whenselecting
a backup destination.
Table 5-1
Local hard drive, USB drive,
or FireWire drive
(recommended)
Selecting a backup destination
Information to considerBackup destination
The benefits of this option are as follows:
■ Fast backup and recovery
■ Can schedule unattended backups
■ Inexpensive because drive space can be overwritten
repeatedly
■ Off-site storage is possible
■ Reserves hard drive space for other uses
Although you can save therecovery point to the samedrive
that you are backing up, it is not recommended for the
following reasons:
■ As the number or sizeof recovery points grows, youwill
have less disk space available for regular use.
■ The recovery point is included in subsequent recovery
points of the drive, which increases the size of those
recovery points.
■ If the computer suffers a catastrophic failure, you may
not be able to recover the recovery point you need, even
if you save it to a different drive on the same hard disk.
Page 57
About selecting a backup destination
57Best practices for backing up your data
Table 5-1
Network folder
CD-RW/DVD-RW
Selecting a backup destination (continued)
Information to considerBackup destination
If your computer is connected to a network, you can save
your recovery points and file and folder backup data to a
network folder.
Backing up to a network folder typically requires that you
authenticate to the computer that is hosting the folder. If
the computeris partof anetwork domain,you must provide
the domain name, user name, and password. For example,
domain\username.
If you are connecting to a computer in a workgroup, you
should provide the remote computer name and user name.
For example: remote_computer_name\username.
When you save backup data to removable media, it is
automatically splitinto the correct sizes if the backup spans
more than one media.
If more than one drive is being backed up, the recovery
points foreach driveare storedindependently on the media,
even ifthere isspace tostore recoverypoints frommultiple
drives on the same media.
The schedulingof backupsis notavailable whenthis option
is used.
Note: Using CD-RWs or DVD-RWs as your recovery point
storage location is not the best option because you will be
required to swap disks during the process.
The followingtable describes the advantages and disadvantages ofdifferent types
of backup destinations.
Table 5-2
Advantages and disadvantages of backup destinations
DisadvantagesAdvantagesBackup destination
Hard drive
(recommended)
■ Fast backupand recovery
■ Can scheduleunattended
backups
■ Inexpensive because
drive space can be
overwritten repeatedly
■ Uses valuabledrive space
■ Vulnerable to loss if the
hard drive fails
Page 58
Best practices for backing up your data
58
About backing up dual-boot computers
Table 5-2
Network drive
(recommended)
Removable media (local)
Advantages and disadvantages of backup destinations (continued)
■ Fast backupand recovery
■ Can scheduleunattended
backups
■ Inexpensive because
drive space can be
overwritten repeatedly
■ Protection from local
hard drive failure
■ Off-site storage (through
existing network backup
strategies)
■ Protection from hard
drive failure
■ Ideal for off-site storage
■ Reserves harddrive space
for other uses
About backing up dual-boot computers
You can back up dual-boot computers, even if you have drives (partitions) that
are hidden in the operating system from which you run Norton Ghost.
When you run a drive backup, the entire contents of each drive is captured in a
recovery point. When you restore a drive, the recovered drive is bootable.
DisadvantagesAdvantagesBackup destination
■ Must have supported
network interface card
drivers to restore from
Symantec Recovery Disk
■ Must understand and
assign the appropriate
rights for users who will
run backups and restore
data
Note: In order for your computer to boot the same from a restored system as it
did from the original configuration, you must back up, and then restore, every
drive that includes operating system boot information.
You should not create incremental backups of shared data drives if Norton Ghost
is installed on both operating systems and they are bothset to manage the shared
drive.
You might encounter issues if you try to use the Norton Ghost LightsOut Restore
feature on dual-boot systems. It is not supported.
Page 59
Chapter
Backing up entire drives
This chapter includes the following topics:
■ About defining a drive-based backup
■ Defining a drive-based backup
■ Compression levels for drive-based backups
■ Running a one-time backup from Norton Ghost
■ About running a one-time backup from Symantec Recovery Disk
■ About Offsite Copy
6
■ How Offsite Copy works
About defining a drive-based backup
A drive-based backup takes a snapshot of your entire hard drive, capturing every
bit of information that is stored on it for later retrieval. All of your files, folders,
desktop settings,programs, andyour operating system are captured into a recovery
point. You can then use that recovery point to restore individual files or folders
or your entire computer.
For optimum protection, you should define a drive-based backup and run it on a
regular basis.
By default, scheduled independent recovery points or recovery point set names
are appended with 001.v2i, 002.v2i, and so forth. Recovery point set names are
appended with _i001.iv2i, _i002.iv2i, and so forth. For example, if your base
recovery point is called CathyReadF001.v2i, the first incremental recovery point
is called CathyReadF001_i001.iv2i.
See “Defining a drive-based backup” on page 60.
Page 60
Backing up entire drives
60
Defining a drive-based backup
Defining a drive-based backup
Define a drive-based backup to take a shapshot of your entire hard drive.
To define a drive-based backup
On the Home or Tasks page, click Run or Manage Backups.
1
In the Run or Manage Backups window, click Define New.
2
If you have not yet defined a backup, the Easy Setup dialog appears instead.
Click Back up my computer, and then click Next.
3
Select one or more drives to back up, and then click Next.
4
Press and hold Ctrl to select multiple drives.
If youdo not see a drivethat you expected to see, select ShowHidden Drives.
If the RelatedDrives dialog box is displayed, set the appropriate option, and
5
then click Next. Otherwise, skip to the next step.
See “Related Drives options” on page 62.
Select the recovery point type that you want the backup to create.
6
See “Recovery point type options” on page 63.
Click Next.
7
On the Backup Destination panel, select the desired options.
8
See “Backup destination options” on page 64.
You cannot use an encrypted folder as your backup destination. You can
choose to encrypt your backup data to prevent another user from accessing
it.
(Optional) If you want to make copies of your recovery points to store at a
9
remote location for added backup protection, do the following:
■ Click Add and then select Enable Offsite Copy.
■ Select the Prompt me to start a copy when I attach an external Offsite
Copy destination drive option if you want recovery points automatically
copied to external Offsite Copy destination drives whenever you plug one
in to your computer.
■ Click Browse to locate an Offsite Copy destination.
■ Click Add an additional Offsite Copy destination if you want to add a
second destination,and then specify the path(a localfolder, network path,
or FTP address) to that destination.
■ Click OK.
Page 61
Defining a drive-based backup
See “About Offsite Copy” on page 81.
Click Next.
10
On the Options panel, set the recovery point options you want.
11
See “Recovery point options” on page 64.
(Optional) ClickAdvanced, set the advanced options you want,and then click
12
OK to return to the Options panel.
See “Advanced options for drive-based backups” on page 70.
(Optional) Ifyou want to run command files duringthe recoverypoint creation
13
process, click Command Files, set the command file options, and then click
OK to return to the Options panel.
If appropriate, in the lists, you can select the command file (.exe, .cmd, .bat)
that you want to run during a particular stage in the recovery point creation
process, and then specify the amount of time (in seconds) that you want the
command to run before it is stopped.
See “About running command files during a backup” on page 68.
Click Next.
14
Do one of the following:
15
■ If you chose a recovery point set as your recovery point type earlier in
step 6 above, skip to the next step.
■ If you chose an independent recovery point as your recovery point type,
select oneof the following options inthe Automaticallycreate arecovery
pointlist, click Next, review the options you have selected, then click
Finish.
Runs the backup at the time and on the days
of the week that you specify.
When youselect thisoption, theSelect thedays
of the week to protect box appears.
Runs the backup at the time and on the days
of the month that you specify.
When youselect thisoption, theSelect thedays
of the month to protect box appears.
Page 62
Backing up entire drives
62
Defining a drive-based backup
Only run once
If you want the backup to run automatically according to a schedule, select
16
Schedule, enter a start time, and select the days of the week when the backup
should run.
If you only want to run the backup when you start it manually, uncheck
Schedule and skip to the next step.
(Optional) Clickthe Custom button and specify how frequently a newrecovery
17
point set should be started.
For example, if you select Monthly, a new base recovery point is created the
first time the backup runs during each new month.
For advanced scheduling options, such as setting up event triggers that start
18
the backup in response to specific events, click Advanced and configure the
desired options.
See “Advanced scheduling options” on page 66.
Click OK, and then click Next.
19
(Optional) If you want to run the new backup immediately, click Run backup
20
now.
This option is not available if you configured an independent recovery point
with the option to run it only once.
Review the options you have selected, then click Finish.
21
Runs the backup one time on the date and at
the time you specify.
When youselect thisoption, the Create a single
recovery point box appears.
Related Drives options
The RelatedDrives wizard panel appears only if you initiallyselected a drive with
applications configured to use one or more of the drives that are listed in this
panel. Such applications include boot configuration databases (as found in
Windows Vista and Windows 7) that are on a separate drive from where the
operating system is installed.
If you want to backup an attached Microsoft Virtual Hard Disk (VHD), you must
create a separate backup job for the host drive and for the attached VHD. For
example, if the VHD host is on the C: drive and the attached VHD is the D: drive,
you must create a backup job for C: and a backup job for D:. Also, you cannot
backup an attached VHD that is nested within another attached VHD.
Page 63
See “About backing up Microsoft virtual hard disks” on page 205.
If you use Microsoft's BitLocker Drive Encryption to encrypt the data on a data
drive (any drive that does not have the operating system installed on it), be aware
that NortonGhost does not work with locked datadrives. Instead,you must unlock
the bitlocked drive before you can backup it up.
Generally, you should accept the preselected option Add all related drives(recommended). Doing so can help you with a successful recovery, should you
ever need to perform a restore in the future. If you deselect certain related drives
you may experience an incomplete recovery or an unsuccessful recovery.
Recovery point type options
Recovery point set and Independent recovery point are the two recovery point
type options that are available. Each option type is described in the table below.
Defining a drive-based backup
63Backing up entire drives
Table 6-1
Recovery point set (recommended)
Independent recovery point
Recovery point type options
DescriptionOption
Schedules a base recovery point with
additional recoverypoints that contain only
incremental changesthat weremade toyour
computer sincethe previousrecovery point.
Incremental recovery points are created
faster than the base recovery point. They
also use less storage space than an
independent recovery point.
Note: You can only haveone recovery point
set defined for each drive. The Recovery
Point Set option is not available if you have
already assigned a selected drive to an
existing backupand specifiedRecovery Point
Set as the recovery point type. This option
also is unavailable if you select an
unmounted drive that cannot be part of a
recovery point set.
Creates acomplete, independentcopy ofthe
drives that you select. This backup type
typically requires more storage space,
especially if you run the backup multiple
times.
Page 64
Backing up entire drives
64
Defining a drive-based backup
Backup destination options
The following table describes the options on the Backup Destination Page.
Table 6-2
Folder field
Edit
Customize recovery point file names
Backup destination options
DescriptionOption
Indicates the location where you want to
store the recovery points.
If Norton Ghost detects that this location
does not have enough available space, it
alerts you. You should choose another
location that has more space.
The Edit button only becomes active if you
have selected a backup destination that is
on anetwork. Ifthe backupdestination is on
a network, you can click the Edit button to
bring up a dialog where you can specify the
necessary user name and password for
network access.This also applies if you want
to save the recovery point on a network
share.
See “Aboutnetwork credentials”on page68.
Allows youto renamethe recoverypoint. To
rename a recovery point click Rename and
then type a new file name.
Default file names include the name of the
computer followed by the drive letter.
Add
Recovery point options
The following table describes the recovery point options on the Options page.
Allows you to add up to two Offsite Copy
destinations.
Offsite Copyautomatically copiesyour latest
recovery points each time a backup
completes toeither aportable storagedevice,
such as an external drive, or to a remote
server either through a local area network
connection or to a remote FTP server.
See “About Offsite Copy” on page 81.
Page 65
Defining a drive-based backup
65Backing up entire drives
Table 6-3
Recovery point options
Name
Compression
Verify recovery point after creation
Limit the number of recovery point sets
saved for this backup
DescriptionOptions
Type a name for your backup.
Note: This option does not appear if you
create a recovery point using the Back Up
MyComputer feature in SymantecRecovery
Disk.
Select one of the following compression
levels for the recovery point.:
■ None
■ Standard
■ Medium
■ High
See “Compression levels for drive-based
backups” on page 74.
The resultscan vary depending on the types
of files that are saved in the drive.
Select this option to automatically test
whether a recovery point or set of files is
valid or corrupt.
Select this option to limit the number of
recovery pointsets that can be saved for this
backup. You can limit the number of
recovery point sets to reduce the risk of
filling up the hard drive with recovery
points. Eachnew recovery point set replaces
the oldest set on your backup destination
drive.
This option only appears if you are creating
a recovery point set.
Note: This option does not appear if you
create a recovery point using the Back Up
MyComputer feature in SymantecRecovery
Disk.
Page 66
Backing up entire drives
66
Defining a drive-based backup
Table 6-3
Enable search engine support
Include system and temporary files
Recovery point options (continued)
DescriptionOptions
Select thisoption to let a search engine, such
as GoogleDesktop, indexall of the file names
that are contained in each recovery point.
By indexingthe filenames, youcan thenuse
your search engine to locate files you want
to restore.
This option is for NTFS file systems only.
See “About using a search engine to search
recovery points” on page 201.
Note: This option does not appear if you
create a recovery point using the Back Up
MyComputer feature in SymantecRecovery
Disk.
Select this option to include indexing
support foroperating systemand temporary
files when a recovery point is created on the
client computer.
Note: This option does not appear if you
create a recovery point using the Back Up
MyComputer feature in SymantecRecovery
Disk.
Advanced
Command Files
Description text box
Advanced scheduling options
The following table describes the advanced scheduling options.
See “Advanced options for drive-based
backups” on page 70.
See “About running command files during
a backup” on page 68.
Type a description for the recovery point.
The description can be anything that helps
you further identify the recovery point's
contents.
Page 67
Defining a drive-based backup
67Backing up entire drives
Table 6-4
Schedule (Backup Time)
Advanced scheduling options
DescriptionOption
Do one or more of the following:
■ Click Schedule, and then select the days
and a start time for when the backup
should run.
■ Select Runmore than once per dayif you
frequently edit data that you want to
protect.
Also, specify the maximum time that
should occur between backups and the
number of times per day that the backup
should run.
■ Click the Automatically optimize list,
and then select how often optimization
should occur to help manage the disk
space that is used by your backup
destination.
■ Click the Start a new recovery point set
list and select how frequently a new
recovery point set should be started.
Click Customto customizethe optionyou
select.
Event Triggers (General) (ThreatCon
Response)
Select the type of events that should
automatically start the backup.
See “Enabling event-triggered backups”
on page 96.
About files that are excluded from drive-based backups
The following files are intentionally excluded from drive-based backups:
■ hiberfil.sys
■ pagefile.sys
These files contain temporary data that can take up a large amount of disk space.
They are not needed, and there is no negative impact to your computer system
after a complete system recovery.
These file names do appear in recovery points, but they are placeholders. They
contain no data.
Page 68
Backing up entire drives
68
Defining a drive-based backup
About network credentials
If you are connecting to a computer on a network, you are required to enter the
user name and password for network access, even if you have previously
authenticated to the network. This is because the Norton Ghost 15.0 service runs
as the local System account.
When entering network credentials, the following rules apply:
■ If the computer you want to connect to is on a domain, you would enter the
domain name, user name, and password. For example: domain\username
■ If youare connecting to a computer in aworkgroup youwould enter the remote
computer name and user name. For example:
remote_computer_name\username
■ If you have mapped a drive, you might be required to supply the user name
and passwordat this dialog because theservice runs in a different context and
cannot recognize the mapped drive.
By going to the Tools menu and selecting Options, you can set a default location,
including network credentials. Then when you create future jobs, the dialog will
default to the location you specified. Another option would be to create a specific
"backup" user account for the enterprise and configure the Norton Ghost 15.0
service to use this account.
About running command files during a backup
You canuse commandfiles (.exe, .cmd, .bat) during a backup.You canuse command
files to integrate Norton Ghost with other backup routines that you might be
running on the computer. You can also use command files to integrate with other
applications that use a drive on the computer.
Note: You cannot run command files that include a graphical user interface, such
as notepad.exe. Running such command files will cause the backup job to fail.
You canrun a command file during any ofthe following stages during the creation
of a recovery point:
■ Run before snapshot creation
■ Run after shapshot creation
■ Run after recovery point creation
You can also specify the amount of time (in seconds) that a command file should
be allowed to run.
Page 69
Defining a drive-based backup
You can specify the location of command files if you want them to be located in
a placeother thanthe defaultlocation. Youcan alsospecify alocation ona per-job
basis, as well as specify a location that can be shared among several computers.
If you specify a network location, you will be asked for network credentials.
The most common use for running command files is to stop and restart
non-VSS-aware databases that you want to back up.
To use a Visual Basic script file (.VBS) during a backup, you can create a batch file
(.BAT) to run the script. For example, you can create a batch file called STOP.BAT
that contains the following syntax:
Cscript script_filename.vbs
Make sure that Cscript precedes the file name of the Visual Basic script.
Warning: The command files cannot depend on any user interaction or have a
visible user interface. You should test all command files independently of Norton
Ghost before you use them during a backup.
When the backup begins, the command file is run during the specified stage. If
an error occurs while a command file is running or the command file does not
finish in the time you specified (regardless of the stage), the backup is stopped,
the commandfile is terminated (if necessary), and theerror informationis logged
and displayed.
The following table describes the stages of recovery point creation.
69Backing up entire drives
Page 70
Backing up entire drives
70
Defining a drive-based backup
Table 6-5
Run before snapshot creation
Run after snapshot creation
Recovery point creation stages
DescriptionStage
This stage occurs after a backup has started and
before a recovery point is created. You can run a
command during this stage to prepare for the
recovery pointcreation process.For example,you
can closeany open applications that are using the
drive.
Note: Ifyou usethis option,be surethe command
file has an error recovery mechanism built into
it. If the computer has one or more services that
must be stopped at this stage (such as stopping a
non-VSS aware database or a resource intensive
application), and the command file does not
contain any form of error recovery, one or more
of the stopped services may not be restarted. An
error in thecommand file cancause the recovery
point creation process to stop immediately. No
other command files will run.
See “How you use Norton Ghost” on page 34.
This stage occurs after a snapshot is created.
Running acommand duringthis stageis typically
a safe point for allowing services to resume
normal activityon the drive while continuing the
recovery point creation.
Because the snapshot takes only a few secondsto
create, the database is in the backup state
momentarily. A minimal number of log files are
created.
Run after recovery point creation
This stage occurs after the recovery point file is
created. Youcan runa commandduring thisstage
to act on the recovery point itself. For example,
you can copy it to an offline location.
Advanced options for drive-based backups
When youdefine a drive-based backup, you can set the followingadvanced options:
Page 71
Defining a drive-based backup
71Backing up entire drives
Table 6-6
Advanced options for drive-based backups
Divide intosmaller filesto simplifyarchiving
Disable SmartSector™ Copying
Ignore bad sectors during copy
DescriptionOption
Splits the recovery point into smaller files
and specifies the maximum size (in MB) for
each file.
For example, if you plan to copy a recovery
point to ZIP disks from your backup
destination, specify a maximum file size of
100 MB, according to the size of each ZIP
disk.
SmartSector technology speeds up the
copying process bycopying only the
hard-disk sectors that contain data.
However, in some cases, you might want to
copy all sectors in their original layout,
whether or not they contain data.
Lets you copy used and unused hard-disk
sectors. This option increases process time
and usuallyresults ina largerrecovery point.
Lets you run a backup even if there are bad
sectors on the hard disk. Although most
drives do not have bad sectors, thepotential
for problems increases during the lifetime
of the hard disk.
Use password
Use AES encryption
Sets a password on the recovery point when
it iscreated. Passwordscan includestandard
characters. Passwords cannot include
extended characters, or symbols. (Use
characters with an ASCII value of 128 or
lower.)
A user must type this password before he or
she canrestore abackup orview thecontents
of the recovery point.
Encrypts recoverypoint datato add another
level of protection to your recovery points.
Choose fromthe followingencryption levels:
■ Low (8+ character password)
■ Medium (16+ character password)
■ High (32+ character password)
Page 72
Backing up entire drives
72
Defining a drive-based backup
Editing advanced backup options
After you define a backup, you can go back at any time and edit the advanced
options you chose when you first defined the backup.
To edit advanced backup options
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click Edit Settings.
2
Click Next twice.
3
Click Advanced.
4
In the Advanced Options dialog box, make your changes, and then click OK.
5
See “Advanced options for drive-based backups” on page 70.
Click Next three times, and then click Finish.
6
About recovery point encryption
You can enhance the security of your data by using the Advanced Encryption
Standard (AES) to encrypt recovery points that you create or archive. You should
use encryptionif you store recovery points on anetwork and want to protect them
from unauthorized access and use.
You can also encrypt recovery points that were created with earlier versions of
Symantec LiveState Recovery or Norton Ghost. However, encrypting those files
makes them readable with the current product only.
You can view the encryption strength of a recovery point at any time by viewing
the properties of the file from the Recovery Point Browser.
Encryption strengths are available in 128-bit, 192-bit, or 256-bit. While higher
bit strengthsrequire longer passwords, the resultis greater security for your data.
The following table explains the bit strength and required password length.
Table 6-7
You must provide the correct password before you can access or restore an
encrypted recovery point.
Password length
Password lengthBit strength
8 characters or longer128 (Standard)
16 characters or longer192 (Medium)
32 characters or longer256 (High)
Page 73
Defining a drive-based backup
Warning: Store the password in a secure place. Passwordsare case sensitive. When
you access or restore a recovery point that is password encrypted, Norton Ghost
prompts you for the case-sensitive password. If you do not type the correct
password or you forget the password, you cannot open the recovery point.
Symantec Technical Support cannot open an encrypted recovery point.
Besides bit strength, the format of the password can improve the security of your
data.
For better security, passwords should use the following general rules:
■ Do not use consecutive repeating characters (for example, BBB or 88).
■ Do not use common words you would find in a dictionary.
■ Use at least one number.
■ Use both uppercase and lowercase alpha characters.
■ Use at least one special character such as ({}[],.<>;:’"?/|\`~!@#$%^&*()_-+=).
■ Change the password after a set period of time.
73Backing up entire drives
Verifying the integrity of a recovery point
If youselected the Verify recovery point after creation option on the Options page
of the Define Backup wizard, the following occurs:
■ Norton Ghost verifies that all of the files that make up the recovery point are
available for you to open
■ Internal data structures in the recovery point are matched with the data that
is available
Also, the recovery point can be uncompressed to create the expected amount of
data (if you selected a compression level at the time of creation).
Note: The time that isrequired to create a recovery point is doubledwhen you use
the Verify recovey point after creation option.
If you prefer, you can have recovery points automatically verified for integrity at
the time they are created.
See “Advanced options for drive-based backups” on page 70.
To verify the integrity of a recovery point
On the Tools page, click Run Recovery Point Browser.
1
Select a recovery point, and then click OK.
2
Page 74
Backing up entire drives
74
Compression levels for drive-based backups
In the tree panel of the Recovery Point Browser, select the recovery point.
3
For example: C_Drive001.v2i.
On the File menu, click Verify Recovery Point.
4
If the Verify Recovery Point option is unavailable, you must first dismount
the recovery point. Right-click the recovery point and click DismountRecovery Point.
When the validation is complete, click OK.
5
Viewing the progress of a backup
You can view the progress of a backup while it runs to determine how much time
remains until the backup completes.
To view the progress of a backup
While a backup is running, on the View menu, click Progress and
◆
Performance.
Compression levels for drive-based backups
During thecreation of a recovery point, compression results may vary,depending
on the types of files saved to the drive you are backing up.
The following table describes the available compression levels.
Table 6-8
Compression levels
DescriptionCompression level
None
Standard (recommended)
Medium
Use this option if storage space is not an issue. However, if
the backup is being saved to a busy network drive, high
compression may be faster than no compression because
there is less data to write across the network.
This option uses low compression for a 40 percent average
data compression ratio on recovery points. This setting is
the default.
This option uses medium compression for a 45 precent
average data compression ratio on recovery points.
Page 75
Running a one-time backup from Norton Ghost
75Backing up entire drives
Table 6-8
High
Compression levels (continued)
DescriptionCompression level
This optionuses highcompression fora 50 percent average
data compression ratio on recovery points. This setting is
usually the slowest method.
When a high compression recovery point is created, CPU
usage might be higher than normal. Other processeson the
computer might also be slower. To compensate, you can
adjust the operation speed of Norton Ghost. This might
improve the performance of other resource-intensive
applications that you are running at the same time.
Running a one-time backup from Norton Ghost
You can use One Time Backup to quickly define and run a backup that creates an
independent recovery point from Norton Ghost. You use the One Time Backup
Wizard to define the backup. The backup runs when you complete the Wizard.
The backup definition is not saved for future use. You can use the independent
recovery point later.
This feature is useful when you need to back up your computer or a particular
drive quickly before a significant event. For example, you can run a one-time
backup before you install new software. Or, you can run it when you learn about
a new computer security threat.
You can also use Symantec Recovery Disk to create one time cold backups.
See “Aboutrunning a one-time backup from Symantec Recovery Disk” on page 76.
To run a one-time backup from Norton Ghost
On the Tasks page, click One Time Backup.
1
Click Next.
2
Select one or more drives to back up, and then click Next.
3
If the RelatedDrives dialog box is displayed, set the appropriate option, and
4
then click Next. Otherwise, skip to the next step.
See “Related Drives options” on page 62.
In the Backup Destinations panel, select the appropriate options.
5
See “Backup destination options” on page 64.
Click Next.
6
Page 76
Backing up entire drives
76
About running a one-time backup from Symantec Recovery Disk
On the Options panel, select the appropriate options.
7
See “Recovery point options” on page 64.
Click Next.
8
If appropriate, in the lists, select the command files that you want to run
9
during aparticular stage in the recoverypoint creation process. Then, specify
the amount of time (in seconds) that you want the command to run before it
is stopped.
If you added the command file to the CommandFiles folder, you may need to
click Back, and then Next to see the files in each stage’s list.
See “About running command files during a backup” on page 68.
Click Next.
10
Click Finish to run the backup.
11
About running a one-time backup from Symantec
Recovery Disk
Using a valid license key, you can create independent recovery points using the
new BackUp My Computerfeature inSymantec RecoveryDisk. Sometimesknown
as a cold backup or offline backup, you can create recovery points of a partition
without the need to install Norton Ghost or its agent.
With a cold backup, all files are closed when the backup occurs. You do not copy
any data that may be in the middle of being updated or accessed on the desktop
or server. Cold backups are particularly useful for databases. They ensure that
no files are written to or accessed at anytime during the backup so you have a
complete recovery point.
You can also use the Symantec Recovery Disk CD to create recovery points if you
experience any of the following:
■ A level of corruption prevents you from starting Windows on the computer.
■ Norton Ghostdoes not function properly while it runson aWindows operating
system.
■ You want to back up the condition of a damaged system before you recover.
For example, if a server or desktop is severely damaged, you can use the
Symantec Recovery Disk CD to back upwhat remains of the system.Then, you
can recover what you can later, after you restore an independent recovery
point.
Page 77
About running a one-time backup from Symantec Recovery Disk
When you want to create a backup from the Symantec Recovery Disk CD, you are
prompted for a valid license key only for the following scenarios:
■ You use the original, shipping version of the Symantec Recovery Disk CD to
create a backup of a computer that does not have Norton Ghost installed.
■ The computer that you intend to back up using the original, shipping version
of theSymantec Recovery Disk has an unlicensed installationof Norton Ghost.
■ You create a custom Symantec Recovery Disk CD on a computer that has an
unlicensed installation(60-day trial) of Norton Ghost. You thenuse the custom
Symantec Recovery Disk CD to create a backup of a computer that does not
have an installation of Norton Ghost.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
■ You choose not to add a license key at the time you create the customized
Symantec Recovery Disk CD.
Running a one-time backup from Symantec Recovery Disk
Using a valid license key, you can create independent recovery points using the
Back Up MyComputer feature in Symantec Recovery Disk. Sometimes known as
a cold backup or offline backup, you can create recovery points of a partition
without the need to install Norton Ghost or its agent.
To run a one-time backup from Symantec Recovery Disk
77Backing up entire drives
If you intend to store the resulting recovery point on a USB device (for
1
example, an external hard drive), attach the device now.
Start the Symantec Recovery Disk CD on the computer you want to back up.
2
See “Starting a computer by using Symantec Recovery Disk” on page 174.
On the Home panel, click Back Up My Computer, and then click Next.
3
If prompted, enter a valid license key, and then click Next.
4
Select one or more drives that you want to back up, and then click Next.
5
Page 78
Backing up entire drives
78
About running a one-time backup from Symantec Recovery Disk
In the Backup Destination panel, set the options you want, then click Next.
6
Folder field
Map a network drive
Recovery point file names field
Lets you browse to and specify the
location where you want to store the
independent recovery point.
Lets youmap anetwork driveby usingthe
UNC path of the computer on which you
want to store the recovery point.
For example,
\\computer_name\share_name or
\\IP_address\share_name.
Lets youedit the recovery point file name.
To do this, select a drive, click Rename,
type a new file name, and then click OK.
Page 79
About running a one-time backup from Symantec Recovery Disk
In theOptions panel, set the desired compression levelfor the recovery point.
7
79Backing up entire drives
None
Standard (recommended)
Medium
High
Use this option if storage space is not an
issue. However, if the backup is being
saved to a busy network drive, high
compression may be faster than no
compression because there is less data to
write across the network.
This optionuses low compressionfor a40
percent average data compression ratio
on recovery points. This setting is the
default.
This optionuses mediumcompression for
a 45 precent average data compression
ratio on recovery points.
This option uses high compression for a
50 percentaverage datacompression ratio
on recoverypoints. This setting is usually
the slowest method.
When a high compression recovery point
is created, CPU usage might be higher
than normal. Other processes on the
computer might also be slower. To
compensate, youcan adjust the operation
speed of Norton Ghost. This might
improve the performance of other
resource-intensive applications that you
are running at the same time.
If you want to verify whether the recovery point is valid after its creation,
8
select Verify recovery point after creation.
In the Description text box, type a descriptionthat you want associated with
9
the recovery point.
Click Advanced.
10
In the Advancedoptions panel, set the options you want, and then click OK.
11
Page 80
Backing up entire drives
80
About running a one-time backup from Symantec Recovery Disk
Divide into smaller files to simplify
archive
Disable SmartSector copying
Ignore bad sectors during copy
Use password
You can split the recovery point into
smaller files and specify the maximum
size (in MB) for each file.
For example, if you plan to copy a
recovery point to ZIP disks from your
backup destination, specify a minimum
file size of 100 MB, according to the size
of each ZIP disk.
SmartSector technology speeds up the
copying process bycopying only the
hard-disk sectors that contain data.
However, in some cases, you might want
to copyall sectorsin theiroriginal layout,
whether or not they contain data.
Lets you copy used and unused hard-disk
sectors. Thisoption increasesprocess time
and usually results in a larger recovery
point.
Lets you run a backup even if there are
bad sectors on the hard disk. Although
most drives do not have bad sectors, the
potential for problems increases during
the lifetime of the hard disk.
Sets a password on the recovery point
when it is created. Passwords can include
standard characters. Passwords cannot
include extended characters, or symbols.
(Use characterswith anASCII valueof 128
or lower.)
A user must type this password before he
or she can restore a backup or view the
contents of the recovery point.
Use AES encryption
Encrypts recovery point data to add
another level of protection to your
recovery points.
Choose from the following encryption
levels:
■ Low (8+ character password)
■ Medium (16+ character password)
■ High (32+ character password)
Page 81
Click Next.
12
Click Finish to run the backup.
13
When the backup is finished, click Close to return to the main Symantec
14
Recovery Disk window.
About Offsite Copy
Backing up your data to a secondary hard disk is a critical first step to protecting
your information assets. But to make certain your data is safe, use Offsite Copy.
This feature copies your latest, complete recovery points to either a portable
storage device, a remote server in your network, or to a remote FTP server.
Regardless of the method you use, storing copies of your recovery points at a
remote locationprovides a crucial level ofredundancy inthe event that your office
becomes inaccessible. Offsite Copy can double your data protection by ensuring
that you have a remote copy.
See “How Offsite Copy works” on page 81.
See “About using external drives as your Offsite Copy destination” on page 82.
See “About using a network server as your Offsite Copy destination” on page 84.
See “About using an FTP server as your Offsite Copy destination” on page 85.
About Offsite Copy
81Backing up entire drives
How Offsite Copy works
You enableand configure Offsite Copy when you definea newdrive-based backup
job. Or you can edit an existing backup job to enable Offsite Copy.
When you enable Offsite Copy, you specify up to two Offsite Copy destinations.
After the backup job finishes creating recovery points, Offsite Copy verifies that
at leastone of the Offsite Copydestinations are available. Offsite Copy then begins
copying the new recovery points to the Offsite Copy destination.
The most recent recovery points are copied first, followed by the next newest
recovery points. If you have set up two Offsite Copy destinations, Offsite Copy
copies recovery points to the destination that was added first. If an Offsite Copy
destination is unavailable, Offsite Copy tries tocopy recovery points to thesecond
destination, if it is available. If neither destination is available, then Offsite Copy
copies the recovery points the next time an Offsite Copy destination becomes
available.
For example, suppose you have configured a backup job to run at 6 p.m. and
configured an external drive as an Offsite Copy destination. However, when you
leave the office at 5:30 p.m., you take the drive with you for safe keeping. When
Page 82
Backing up entire drives
82
How Offsite Copy works
the backup job completes at 6:20 p.m., Norton Ghost detects that the Offsite Copy
destination drive is not available and the copy process is aborted. The following
morning, you plug the drive back in to the computer. Norton Ghost detects the
presence of the Offsite Copy destination drive and automatically begins copying
your recovery points.
Offsite Copy is designed to use very little system resources so that the copying
process is done in the background. This feature lets you continue to work at your
computer with little or no impact on system resources.
If an Offsite Copy destination runs out of disk space, Offsite Copy identifies the
oldest recovery points and removes them to make room for the most current
recovery points.Offsite Copy then copies thecurrent recoverypoints to the Offsite
Copy destination.
See “About using external drives as your Offsite Copy destination” on page 82.
See “About using a network server as your Offsite Copy destination” on page 84.
See “About using an FTP server as your Offsite Copy destination” on page 85.
See “To define a drive-based backup” on page 60.
See “Editing backup settings” on page 95.
About using external drives as your Offsite Copy destination
Use an external drive as your Offsite Copy destination. This method lets you take
a copyof yourdata with you when you leave the office. Byusing twoexternal hard
disks, you can be certain that you have a recent copy of your data both on and off
site.
For example, suppose on a Monday morning you define a new backup job of your
system drive. You choose a recovery point set as your backup job type. You set up
an external drive (A) as the first Offsite Copy destination, and another external
drive (B) as the second Offsite Copy destination. You schedule the backup job to
run every midnight except on the weekends. You also enable recovery point
encryption to protect the data that you take with you from unauthorized access.
See “About recovery point encryption ” on page 72.
Before you leave the office on Monday evening, you plug in drive A and take drive
B home with you.
Page 83
How Offsite Copy works
On Tuesday morning, you find that Monday's base recovery point has been
successfully copied to drive A. At the end of the day, you unplug drive A and take
it home for safe keeping.
On Wednesday morning, you bring drive B to the office. You plug in drive B and
Norton Ghost detects that drive B is an Offsite Copy destination. Norton Ghost
then automaticallybegins copyingMonday night'sbase recoverypoint and Tuesday
night's incremental recovery point. At the end of the day Wednesday, you take
drive B home and place it in a safe place with drive A.
You now have multiple copies of recovery points stored at two separate, physical
locations: youroriginal recovery points stored on your backup destinations at the
office, and copies of those same recovery points stored on your Offsite Copy
destination drives. Your Offsite Copy destination drives are stored in a safe place
at your home.
83Backing up entire drives
The nextmorning, Thursday, you take drive A to the officeand plugit in. Tuesday
and Wednesday night's recovery points are then automatically copied to drive A.
Note: Consider using the external drive naming feature that lets you provide a
nickname, to each drive. Then place matching physical labels on each external
drive to help you manage the task of swapping the drives.
See “Using nicknames for external drives” on page 43.
Page 84
Backing up entire drives
84
How Offsite Copy works
Each time you plug in either drive A or B, the latest recovery points are added to
the drive. This method gives you multiple points in time for recovering your
computer in the event that the original backup destination drives fail or become
unrecoverable.
Using external drives as your Offsite Copy destination ensures that you have a
copy of your backup data stored at two separate, physical locations.
About using a network server as your Offsite Copy destination
You can also specify a local area network server as an Offsite Copy destination.
You must be able to access the server that you plan to use. You must either map
a local drive to the server, or provide a valid UNC path.
For example, suppose that you set up a local external drive as your first Offsite
Copy destination. Then you identify a server that is located at a second physical
location fromyour own office. You add the remote server as a secondOffsite Copy
destination. As backups occur, recovery points are copied first to the external
hard drive, and then to the remote server.
If the remote server becomes unavailable for a period of time, Offsite Copy copies
all recovery points that were created since the last connection. If there is no room
to hold all of the recovery points available, Offsite Copy removes the oldest
recovery points from the network server. In turn, it makes room for the newest
recovery points.
Page 85
How Offsite Copy works
About using an FTP server as your Offsite Copy destination
Using anFTP server as your Offsite Copy destination is similar to usinga network
path. You must provide a valid FTP path to the FTP server.
You must also provide the correct FTP connection information to Norton Ghost
in order for this method to work correctly. When Offsite Copy is configured
correctly, it copies recovery points to the directory that you specified on the FTP
server. If the server becomes unavailable for a period of time, Offsite Copy copies
all recovery points that were created since the last connection. If there is no room
to hold all of the recovery points available, Offsite Copy removes the oldest
recovery pointsor recoverypoint setsfrom the FTP server. In turn, it makes room
for the newest recovery points.
See “Configuring default FTP settings for use with Offsite Copy” on page 44.
85Backing up entire drives
Page 86
Backing up entire drives
86
How Offsite Copy works
Page 87
Chapter
Backing up files and folders
This chapter includes the following topics:
■ Defining a file and folder backup
■ About folders that are excluded by default from file and folder backups
Defining a file and folder backup
When you define and run a file and folder backup, copies are made of each of the
files and folders that you have chosen to back up. They are converted into a
compressed format, and then stored in a sub-folder at the location you specify,
which by default is the same backup destination that is used for storing recovery
points.
To define a file and folder backup
7
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, click Define New.
2
If you have not yet defined a backup, the Easy Setup dialog appears.
Select Back up selected files and folders, and then click Next.
3
Page 88
Backing up files and folders
88
Defining a file and folder backup
Select the files and folders you wantto include in your backup,and then click
4
Next.
Selecting file types lets Norton Ghost find and include files that match the
files you want backed up. If a file type is not included in the predefined list,
click Add FileType. You can also manually select folders or individual files.
Note: On all versions of Windows, except for Windows Vista, the My
Documents folder contains two subfolders by default: My Pictures and My
Music. Thesefolders containonly the shortcuts to folders at another location
and not the actual files. This might lead you to think that by including My
Documents and all subfolders in your backup, your picture and music files
will get backed up.
If you intend to back up your pictures and music files, be sure to include the
actual folders where your files are stored. On Windows Vista, these folders
exist at the same level as Documents (formerly, My Documents).
In the Name box, type a name for your new backup.
5
In the Description (optional) box, type a description for the new backup.
6
Click Browse to locate a folder for storing your backup data or accept the
7
default location.
Note: You cannot use an encrypted folder as your backup destination. If you
want to encrypt your backup data to prevent another user from accessing it,
refer to the next step.
To add or edit advancedoptions, click Advanced and doany of the following:
8
■ Click Use password, and then type a password.
Use standard characters, not extended characters or symbols. You must
type this password before you restore a backup or view its contents.
■ For an additional level of security, click Use AES encryption to encrypt
your file data.
You can also use the drop-down menu to specify the level of encryption
you want.
■ In the Exclude group box, uncheck any of the folders you want to include
in your backup.
The folderslisted are typically not usedfor storing personal files or folders.
These foldersare backed up when you define and run adrive-based backup
of your system drive (typically C).
Page 89
About folders that are excluded by default from file and folder backups
See “About folders that are excluded by default from file and folder
backups” on page 89.
Click OK, and then click Next.
9
Click Schedule if you want the backup to run automatically, according to a
10
schedule.
If you want to run the backup only when you start it manually, uncheck
Schedule.
Enter a start time and select the days of the week when the backup should
11
run.
For advanced scheduling options, such as setting up event triggers that start
12
the backup in response to specific events, click Advanced and configure the
desired options.
See Table 6-4 on page 67.
Click Next and review the backup options you have selected.
13
To reviewthe totalnumber and size of files to be included in the backup, click
14
Preview.
89Backing up files and folders
Note: Depending on the amount of datayou have identified for fileand folder
backup, the preview process could take several minutes.
If you want to run the new backup immediately, click Run backup now, then
15
click Finish.
About folders that are excluded by default from file
and folder backups
The followingfolders and their contents areexcluded automatically from file and
folder backups:
■ Windows folder
■ Program Files folder
■ Temporary folder
■ Temporary Internet Files folder
These foldersare typically not used for storing personal files or folders. However,
they are backed up when you define and run a drive-based backup of your system
drive (typically C).
Page 90
Backing up files and folders
90
About folders that are excluded by default from file and folder backups
See “Defining a file and folder backup” on page 87.
You can include these folders when you define a file and folder backup.
Page 91
Chapter
Running and managing
backup jobs
This chapter includes the following topics:
■ Running an existing backup job immediately
■ Running a backup with options
■ Adjusting the speed of a backup
■ Stopping a task
8
■ Verifying that a backup is successful
■ Editing backup settings
■ Enabling event-triggered backups
■ Editing a backup schedule
■ Turning off a backup job
■ Deleting backup jobs
■ Adding users who can back up your computer
Running an existing backup job immediately
This is particularly useful when you are about to install a new product and want
to make sure you have a current recovery point in the event that something goes
wrong with the installation. It can also help you to ensure that you have a backup
of your work after you have modified a large number of files and you don't want
to wait for a regularly scheduled backup.
Page 92
Running and managing backup jobs
92
Running a backup with options
You can run an existing backup at any time.
Note: If necessary, you can run a quick backup of a particular drive without using
a defined backup.
See “Running a one-time backup from Norton Ghost” on page 75.
Norton Ghost can be configured to run a backup automatically when an event
occurs on your computer, such as installing a new software program.
See “Enabling event-triggered backups” on page 96.
When yourun a backup, you should close any partitioning softwarethat isrunning,
such as Norton PartitionMagic. Also, you should not run any disk defragmenting
software during a backup.
You can also schedule backups to run automatically, according to a schedule.
See “Editing a backup schedule” on page 97.
To run an existing backup immediately from the system tray
On the Windows desktop, right-click the Norton Ghost system tray icon.
1
Click Run Backup Now.
2
Click a backup job to start the backup.
3
If the menus displays No Jobs, you must start Norton Ghost and define a
backup.
To run an existing backup immediately from within Norton Ghost
On the Home page, click Run or Manage Backups.
1
Select a backup from the list, and then click Run Now.
2
Running a backup with options
If youwant to quickly run an existing drive-basedbackup, butyou want the backup
to create an alternate type of recovery point, use the Run Backup With Options
feature.
This is a unique option in that if you run an existing backup job, the recovery
point created is dictated by the type of recovery point that was created the last
time the backup job was run. Use thisoption to create an alternate recovery point
type.
Page 93
Running a backup with options
Note: Using this option does not change the settings of the defined backup. To do
that, you must open the backup and edit its settings manually.
See “Editing a backup schedule” on page 97.
See “Editing backup settings” on page 95.
To run a backup with options
On the Home page, click Run or Manage Backups.
1
In the Run or Manage Backups window, select the drive-based backup job
2
that you want to run.
Click Tasks > Run Backup With Options.
3
Select the desired options on the Run Backup With Options page.
4
Note: Depending on the current state of the backup, one or more options
might bedisabled. For example, if you have notyet run the backup, you cannot
select thefirst option, Incremental recovery point of recent changes, because
the base recovery point has not yet been created.
93Running and managing backup jobs
Backup options
See “Backup options” on page 93.
Click OKto run the backup job and createthe recovery point type you selected.
5
Incremental recovery point of recent changes, New recovery point set, and
Independent recovery point are the three options that are available. Each option
type is described in the table below.
Table 8-1
Backup options
DescriptionOptions
Incremental recovery point of recent
changes
New recovery point set
Select this option if the backup already has
a base recovery point created and you want
to simplycapture changesmade tothe drive
since the last backup.
Select this option if you want to start a
completely new recovery point set. When
you select this option, a base recovery point
is created.
Page 94
Running and managing backup jobs
94
Adjusting the speed of a backup
Table 8-1
Independent recovery point
Backup options (continued)
Adjusting the speed of a backup
Depending on the speed of your computer, how much RAM you have installed,
and the number of programs you are running during a backup, your computer
could become sluggish.
You can manually adjust the effect of a backup on the performance of your
computer to match your needs at the moment. This feature is useful if you are
working on your computer and don't want the backup process to slow you down.
To adjust the speed of a backup
While a backup is running, on the View menu, click Progress and
1
Performance.
Do one of the following:
2
■ If you want to increase the speed of your computer by reducing the speed
of the backup, drag the slider toward Slow.
■ If you want the backup to complete as quickly as possible and you are not
doing extensive work on your computer, drag the slider toward Fast.
DescriptionOptions
Select this option to create an independent
recovery point, which is a complete snap
shot of your entire drive.
To specifyan alternatebackup location,click
Browse.
When you are finished, click Hide to dismiss the Progress and Performance
3
dialog box.
Stopping a task
You can stop a recovery point task or a restore task that has already started.
To stop the current task
Do one of the following:
◆
■ On the Tools menu, click Cancel the Current Operation.
■ On theTools menu,click ProgressandPerformance, andthen clickCancel
Operation.
Page 95
Verifying that a backup is successful
■ On the Windows system tray, right-click the Norton Ghost tray icon, and
then click Cancel the Current Operation.
Verifying that a backup is successful
After a backup completes, you can validate the success of the backup from the
Status page to ensure you have a way to recover lost or damaged data.
The Status page contains a scrolling calendar that is aligned with each drive on
your computer. The calendar lets you quickly identify when a backup ran, and
what type of backup it was. It also identifies upcoming, scheduled backups.
See “Monitoring backup protection from the Status page” on page 118.
Note: When you define a drive-based backup,you shouldselect the option to verify
the recovery point after it is created.
Depending on the amount of data being backed up, this can significantly increase
the time it takes to complete the backup. However, it can ensure that you have a
valid recovery point when the backup finishes.
95Running and managing backup jobs
See “Verifying the integrity of a recovery point” on page 73.
To verify that a backup is successful
On the Status page, review the Backups calendar, and verify that the backup
1
appears on the date that you ran it.
Move your mouse over a backup icon to review the status of the backup.
2
Editing backup settings
You can edit the settings of an existing backup. The Edit Settings feature gives
you access to several of the key pages of the Define Backup Wizard. You can edit
every setting except the option to change the recovery point type.
To edit backup settings
On the Home or Tasks page, click Run or Manage Backups.
1
Select a backup to edit.
2
Click Edit Settings.
3
Make changes to the backup.
4
See “Defining a drive-based backup” on page 60.
See “Defining a file and folder backup” on page 87.
Page 96
Running and managing backup jobs
96
Enabling event-triggered backups
Enabling event-triggered backups
Norton Ghost can detect certain events and run a backup when they occur.
For example, to protect your computer when you install new software, Norton
Ghost can run a backup when it detects that new software isabout to be installed.
If a problem occurs that harms your computer, you can use this recovery point
to restore your computer to its previous state.
You canconfigure Norton Ghost to automatically run a backup whenthe following
events occur:
■ Any application is installed.
■ A specified application is started.
■ Any user logs on to Windows.
■ Any user logs off of Windows.
■ The data that was added to a drive exceeds a specified number of megabytes.
This option is unavailable for file and folder backups.
To enable event-triggered backups
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup you want to edit, and then click Change Schedule.
2
Click General under Event Triggers.
3
Select the events you want detected, and then click OK.
4
About Symantec ThreatCon
ThreatCon is Symantec's early warning security threat system. When Symantec
identifies various threats, the ThreatCon team adjusts the threat level. This
adjustment givespeople andsystems adequatewarning to protect data and systems
against attack.
When youenable theSymantec ThreatCon trigger for a selected backup job, Norton
Ghost detects changes in the threat level. Your computer must be connected to
the Internet at the time. If the ThreatCon level is either reached or exceeded, the
backup job in which you enabled Symantec ThreatCon is started automatically.
You then have a recovery point to use to recover your data should your computer
become affected by the latest threat.
Page 97
Note: If your computer is not online, then it is not susceptible to online threats.
But if you connect your computer to the Internet at any time, it becomes
vulnerable. You do not have to enable or disable Symantec ThreatCon when you
go on or offline. It works if you are online, but does nothing if you are off line.
For moreinformation aboutSymantec ThreatCon,visit http://www.symantec.com.
Editing a backup schedule
You canedit any of the schedule properties for a defined backup toadjust thedate
and time.
To edit a backup schedule
On the Home page, click Run or Manage Backups.
1
Select a backup to edit.
2
Click Change Schedule.
3
Make changes to the schedule, and then click OK.
4
Editing a backup schedule
97Running and managing backup jobs
Turning off a backup job
You can turn off a backup and re-enable it later. When you turn off a backup, it
will not run according to its defined schedule, if it has one. When a backup is
turned off, triggered events will not run it, nor can you run it manually.
You can also delete a defined backup (not recovery points).
See “Deleting backup jobs” on page 97.
To turn off a backup job
On the Home or Tasks page, click Run or Manage Backups.
1
Select the backup that you want to turn off.
2
On the Tasks menu, click Disable Backup.
3
Repeat this procedure to re-enable the backup. The Disable Backup menu
item changes to Enable Backup when you disable the selected backup.
Deleting backup jobs
You can delete backup jobs when they are no longer needed.
Page 98
Running and managing backup jobs
98
Adding users who can back up your computer
Deleting abackup jobdoes not delete the recovery points or file and folder backup
data from the storage location. Only the backup job is deleted.
See “Managing recovery point storage” on page 137.
To delete backup jobs
On the Home page, click Run or Manage Backups.
1
Select one or more backups, and then click Remove.
2
Click Yes.
3
Adding users who can back up your computer
You can use the Security Configuration Tool to control which users on your
computer can access and configure key features of Norton Ghost.
For example, all users with Limited Windows accounts can run existing backup
jobs, but they cannot create new jobs or edit existing jobs. However, using the
Security Configuration Tool, you can grant administrative privileges to a Limited
user account. When you do, that user has full access to Norton Ghost and can
create, edit, delete, and run backup jobs.
Note: By default, all users can run existing backup jobs. But only users with
administrative accounts can create, edit, or delete backup jobs.
To add users who can back up a computer
On the Windows taskbar, click Start > Programs > Symantec Norton Ghost
1
> Security Configuration Tool.
On Windows Vista, click Start > All Programs > Symantec > SecurityConfiguration Tool.
Click Add.
2
In the Enter the object names to select box, type the names of the users or
3
groups you want to add.
Click OK.
4
To delete users or groups, select a user or group, and then click Remove.
5
Click OK to apply your changes and close the Security Configuration Tool.
6
Page 99
Adding users who can back up your computer
To configure access rights for users or groups
On the Windows taskbar, click Start > Programs > Symantec Norton Ghost
1
> Security Configuration Tool
On Windows Vista and Windows 7, click Start > All Programs > Symantec >
Security Configuration Tool.
Select a user or group from the Group or user names box.
2
Choose from the following options:
3
DenyAllowPermissions
99Running and managing backup jobs
Full Control
Status Only
Click OK to apply your changes and close the Security Configuration Tool.
4
Select to give the user or
group full access to all of
the features of Norton
Ghost. Full control gives
users the right to create,
edit, and delete backup
jobs, including existing
jobs.
Select to deny the user or
group administrative
access to the features of
Norton Ghost. They can
run existing backup jobs,
but they cannot create,
edit, or delete them.
Select to deny the user or
group administrative
access to the features of
Norton Ghost. They can
run existing backup jobs,
but they cannot create,
edit, or delete them.
When you deny Status
Only, the user or group
cannot access any of the
features of Norton Ghost.
Page 100
Running and managing backup jobs
100
Adding users who can back up your computer
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.