Symantec Norton Ghost - 15.0 Instruction Manual

Norton Ghost 15.0 User's Guide

Norton Ghost 15.0 User's Guide
The softwaredescribed inthis bookis furnishedunder alicense agreementand maybe used only in accordance with the terms of the agreement.
Documentation version: 9.0
Legal Notice
Copyright © 2009 Symantec Corporation. All rights reserved.
Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, Hyper-V, and the Windows logo areregistered trademarks or trademarks of Microsoft Corporation in the United States and other countries. VeriSign® is a registered trademark of Verisign, Inc.
VMware, the VMware "boxes" logo and design are registered trademarks or trademarks of VMware, Inc..
Gear Software is a registered trademark of GlobalSpec, Inc.
Google and Google Desktop are trademarks of Google, Inc.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATIONISPROVIDED "ASIS" AND ALLEXPRESS ORIMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLYINVALID. SYMANTEC CORPORATIONSHALL NOT BELIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The LicensedSoftware andDocumentation aredeemed tobe commercialcomputer software as definedin FAR 12.212 and subject to restricted rights asdefined inFAR Section52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, displayor disclosure of the Licensed Software and Documentation bythe U.S. Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation 350 Ellis Street Mountain View, CA 94043
http://www.symantec.com

Technical Support

Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality.The Technical Support group also creates contentfor our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. Forexample, theTechnical Supportgroup works with Product Engineering and SymantecSecurity Response to provide alerting services andvirus definition updates.
Symantecs maintenance offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization
Telephone and Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers automatic software upgrade protection
Global support that is available 24 hours a day, 7 days a week
Advanced features, including Account Management Services
For information about Symantecs Maintenance Programs, you can visitour Web site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenanceagreement may access Technical Support information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at thecomputer on which the problem occurred, incase itis necessaryto replicate the problem.
When you contact Technical Support, please have the following information available:
Product release level
Hardware information
Available memory, disk space, and NIC information
Operating system
Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If yourSymantec product requires registration or a licensekey, accessour technical support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and maintenance contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:
Additional enterprise services
Symantec offers a comprehensive setof services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
customercare_apac@symantec.comAsia-Pacific and Japan
semea@symantec.comEurope, Middle-East, and Africa
supportsolutions@symantec.comNorth America and Latin America
Symantec EarlyWarning Solutions
Managed Security Services
Consulting Services
Educational Services
To access more information about Enterprise services, please visit our Web site at the following URL:
www.symantec.com
Select your country or language from the site index.
These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur.
These servicesremove theburden ofmanaging andmonitoring securitydevices and events, ensuring rapid response to real threats.
Symantec Consulting Services provide on-site technical expertise from Symantec andits trustedpartners. SymantecConsulting Servicesoffer avariety of prepackaged and customizable options that include assessment, design, implementation, monitoring,and managementcapabilities. Each is focused on establishing andmaintaining the integrity and availability of your IT resources.
Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs.

Contents

Technical Support ..... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ... 4
Chapter 1 Introducing Norton Ghost.. .... . .... . .... . .... ..... ..... .... . .... . .... . . 13
About Norton Ghost . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... 13
What is new in Norton Ghost ... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 14
Hiding or showing the Advanced page .... . .... ..... ..... .... . .... . .... ..... ..... ... 15
Getting more information about Norton Ghost ..... ..... .... . .... . .... . .... ..... 16
Chapter 2 Installing Norton Ghost ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 17
Before you install ..... .... . .... . .... . .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . 17
System requirements . ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ... 17
About supported file systems and removable media . .... . .... . .... ..... . 19
About disabled features . ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... 20
When you delay licensing ... ..... .... . .... . .... ..... ..... .... . .... . .... . .... .... 20
Installing Norton Ghost ... . .... . .... . .... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 21
Completing the installation ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... . 23
Activating Norton Ghost later ... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 24
About setting up your first backup . . .... . .... . .... ..... ..... .... . .... . .... .... 24
Updating Norton Ghost .... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .. 25
About uninstalling Norton Ghost .... . .... . .... ..... ..... .... . .... . .... . .... ..... .... 25
Chapter 3 Ensuring the recovery of your computer . ..... .... . .... . .... . ... 27
About ensuring the recovery of your computer . .... . .... ..... ..... .... . .... . .... 27
Testing Symantec Recovery Disk .... ..... .... . .... . .... ..... ..... .... . .... . .... . .... 28
If driver validation fails . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... .. 28
Creating a custom Symantec Recovery Disk CD ... . .... . .... ..... ..... .... . .... . . 29
Chapter 4 Getting Started . . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 33
About key product components ... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... .. 33
How you use Norton Ghost ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... 34
Starting Norton Ghost ... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... 35
Configuring Norton Ghost default options .... . .... ..... ..... .... . .... . .... ..... .. 36
Selecting a default backup destination .... ..... ..... .... . .... . .... . .... ..... . 38
Adjusting the effect of a backup on computer performance .... ..... ... 39
Contents8
Adjusting default tray icon settings . .... . .... . .... . .... ..... ..... .... . .... . ... 40
Managing file types . . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... 41
Using nicknames for external drives . .... . .... ..... ..... .... . .... . .... . .... ... 43
Configuring default FTP settings for use with Offsite Copy ... ..... .... 44
Logging Norton Ghost messages .... . .... . .... . .... ..... ..... .... . .... . .... . ... 44
Enabling email notifications for product (event) messages .... . .... .... 46
Chapter 5 Best practices for backing up your data . .... . .... . .... ..... ..... 49
About backing up your data .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . . 49
About choosing a backup type . . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . . 50
Best practices for backing up . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . ... 50
About backups . .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .. 51
Before you back up ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 51
During a back up .... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . . 53
When a back up is finished .... . .... ..... ..... .... . .... . .... . .... ..... .... . .... . . 53
Additional tips about backups .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 54
After defining your backup job ... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... ... 55
Viewing the properties of a backup job . .... . .... . .... ..... ..... .... . .... . .... 55
About selecting a backup destination ..... .... . .... . .... . .... ..... ..... .... . .... . ... 56
About backing up dual-boot computers .... ..... .... . .... . .... . .... ..... ..... .... . . 58
Chapter 6 Backing up entire drives ..... .... . .... . .... . .... ..... ..... .... . .... . .... . ... 59
About defining a drive-based backup ... .... . .... . .... . .... ..... ..... .... . .... . .... . 59
Defining a drive-based backup ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... 60
Related Drives options ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 62
Recovery point type options ... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . . 63
Backup destination options ... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... .. 64
Recovery point options ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .. 64
Advanced scheduling options . ..... ..... .... . .... . .... . .... ..... ..... .... . .... . . 66
About files that are excluded from drive-based backups ... ..... ..... ... 67
About network credentials ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . ... 68
About running command files during a backup ... . .... . .... ..... ..... .... . 68
Advanced options for drive-based backups ... . .... . .... ..... ..... .... . .... . . 70
Compression levels for drive-based backups ..... ..... .... . .... . .... . .... ..... .... 74
Running a one-time backup from Norton Ghost . . .... . .... . .... ..... ..... .... . .. 75
About running a one-time backup from Symantec Recovery
Disk ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ... 76
Running a one-time backup from Symantec Recovery Disk .... .... . ... 77
About Offsite Copy ... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 81
How Offsite Copy works . . .... . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... 81
About using external drives as your Offsite Copy
destination . . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 82
About using a network server as your Offsite Copy
destination . . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 84
About using an FTP server as your Offsite Copy destination .... ..... .. 85
Chapter 7 Backing up files and folders . . .... . .... . .... ..... ..... .... . .... . .... . .... . 87
Defining a file and folder backup .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 87
About folders that are excluded by default from file and folder
backups .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... ... 89
Chapter 8 Running and managing backup jobs .... ..... .... . .... . .... . .... ... 91
Running an existing backup job immediately .... .... . .... . .... . .... ..... ..... .... 91
Running a backup with options . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... . 92
Backup options .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ... 93
Adjusting the speed of a backup .... . .... . .... ..... ..... .... . .... . .... . .... ..... .... . . 94
Stopping a task ... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... 94
Verifying that a backup is successful ... ..... .... . .... . .... . .... ..... ..... .... . .... . 95
Editing backup settings . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... ..... .. 95
Enabling event-triggered backups ... ..... .... . .... . .... ..... ..... .... . .... . .... . .... 96
About Symantec ThreatCon .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 96
Editing a backup schedule .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... 97
Turning off a backup job .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... .. 97
Deleting backup jobs . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 97
Adding users who can back up your computer . ..... ..... .... . .... . .... ..... ..... 98
9Contents
Chapter 9 Backing up remote computers from your
computer . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... ... 101
About backing up other computers from your computer .... . .... ..... ..... . 101
Adding computers to the Computer List ..... ..... .... . .... . .... . .... ..... ..... ... 102
Deploying the Norton Ghost Agent .... . .... . .... ..... ..... .... . .... . .... . .... ..... 103
Using the Norton Ghost Agent .. ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .. 105
About managing the Norton Ghost Agent through Windows
Services . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... 106
About best practices for using services .. . .... . .... ..... ..... .... . .... . .... . .... . 107
Opening Windows Services ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 108
Starting or stopping the Norton Ghost Agent service .... .... . .... . .... 108
Setting up recovery actions when the Norton Ghost Agent does
not start ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 109
Viewing Norton Ghost Agent dependencies .. .... . .... . .... . .... ..... .... 110
Controlling access to Norton Ghost . . .... . .... . .... ..... ..... .... . .... . .... . .... .. 111
Running Norton Ghost using different user rights . .... . .... . .... ..... .. 113
Contents10
Chapter 10 Monitoring the status of your backups ... . .... . .... ..... ..... .. 115
About monitoring backups . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 115
Rescanning a computers hard disk . . .... . .... . .... ..... ..... .... . .... . .... . . 116
Monitoring backup protection from the Home page .... . .... . .... . .... ..... .. 116
Monitoring backup protection from the Status page ... . .... ..... ..... .... . ... 118
About SNMP traps . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... .. 122
About the Norton Ghost management information base ... . .... . .... . 122
Customizing the status reporting of a drive (or file and folder
backups) .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 122
Viewing drive details .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... 124
Improving the protection level of a drive ... . .... . .... . .... ..... ..... .... . .... . .. 124
About using event log information to troubleshoot problems . .... ..... .... 127
Chapter 11 Exploring the contents of a recovery point . ..... .... . .... . .. 129
About exploring recovery points ... ..... .... . .... . .... . .... ..... ..... .... . .... . .... 129
Exploring a recovery point through Windows Explorer ..... .... . .... . .... . .. 130
Mounting a recovery point from Windows Explorer . . .... . .... ..... .... 131
Opening and restoring files within a recovery point . .... . .... . .... . .... ..... . 131
About using a search engine . . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .. 132
Dismounting a recovery point drive ... .... . .... . .... . .... ..... ..... .... . .... . .... . 133
Viewing the drive properties of a recovery point .... . .... ..... ..... .... . .... . . 133
Chapter 12 Managing backup destinations . . .... ..... ..... .... . .... . .... . .... ... 135
About backup destinations ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 135
About how backup data works .... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ... 135
About drive-based backups .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . 136
About file and folder backups ... . .... . .... ..... ..... .... . .... . .... . .... ..... .. 136
Managing recovery point storage ... ..... .... . .... . .... . .... ..... ..... .... . .... . ... 137
Cleaning up old recovery points . ..... .... . .... . .... . .... ..... ..... .... . .... . . 138
Deleting a recovery point set . .... . .... . .... . .... ..... ..... .... . .... . .... . .... . 138
Deleting recovery points within a set .... ..... .... . .... . .... ..... ..... .... . . 139
Making copies of recovery points .... . .... . .... . .... ..... ..... .... . .... . .... . 139
Running a one-time virtual conversion ... ..... .... . .... . .... . .... ..... ..... .... . . 141
Defining a virtual conversion job . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... . 147
Running an existing virtual conversion job immediately ... . .... . .... . 153
Viewing the properties of a virtual conversion job . .... . .... ..... ..... .. 153
Viewing the progress of a virtual conversion job . .... . .... ..... ..... .... 153
Editing a virtual conversion job . .... . .... . .... ..... ..... .... . .... . .... ..... ... 153
Deleting a virtual conversion job ... ..... .... . .... . .... . .... ..... .... . .... . ... 154
About managing file and folder backup data ..... ..... .... . .... . .... . .... ..... .. 154
Viewing how much file and folder backup data is stored .... ..... .... . 155
Limiting the number of file versions to keep .... . .... . .... ..... ..... .... . . 155
Manually deleting files from your file and folder backup ..... .... . .... 155
Finding versions of a file or folder . . .... ..... ..... .... . .... . .... ..... ..... ... 156
Automating management of backup data . .... . .... ..... ..... .... . .... . .... . .... . 156
Moving your backup destination . . .... . .... . .... ..... .... . .... . .... . .... ..... ..... . 157
Chapter 13 Recovering files, folders, or entire drives ... . .... . .... . .... ... 159
About recovering lost data . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 159
Recovering files and folders by using file and folder backup data .... ..... 159
Recovering files and folders using a recovery point .... . .... ..... ..... .... . ... 161
About opening files and folders stored in a recovery point .... . .... . . 163
About finding the files or folders you want ... ..... ..... .... . .... . .... . .... 163
Recovering a secondary drive . . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 164
Recovery options . .... ..... ..... .... . .... . .... . .... ..... .... . .... . .... . .... ..... ... 165
Restoring using LightsOut Restore .... ..... .... . .... . .... ..... ..... .... . .... . .... . 166
Summary of the LightsOut Restore process ... . .... . .... ..... ..... .... . ... 167
Starting the LightsOut Restore Wizard .... . .... . .... . .... ..... ..... .... . ... 168
Chapter 14 Recovering a computer ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . . 173
About recovering a computer .... . .... ..... ..... .... . .... . .... . .... ..... .... . .... . ... 173
Starting a computer by using Symantec Recovery Disk . . .... . .... ..... ..... . 174
Configuring a computer to boot from a CD .... ..... .... . .... . .... . .... .... 175
How to prepare to recover a computer .... ..... ..... .... . .... . .... . .... ..... ..... . 176
Scanning for viruses .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . ... 176
Checking a hard disk for errors .... . .... ..... ..... .... . .... . .... . .... ..... .... 178
Recovering a computer ... . .... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ... 178
Edit target drive and options ... ..... ..... .... . .... . .... . .... ..... ..... .... . ... 181
Recovering a computer from a virtual disk file . .... . .... ..... ..... .... . .... . ... 183
Virtual disk recovery options . . .... . .... ..... ..... .... . .... . .... . .... ..... ..... 185
Recovering files and folders using Symantec Recovery Disk ... ..... ..... .. 187
Exploring files and folders on your computer using Symantec
Recovery Disk . . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... 188
About using the networking tools in Symantec Recovery Disk . ..... ..... . 188
Starting networking services . .... . .... . .... ..... ..... .... . .... . .... . .... ..... . 189
Using the pcAnywhere thin host for a remote recovery . .... ..... ..... 189
Mapping a network drive from within Symantec Recovery
Disk .... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... . 191
Configuring network connection settings .... . .... . .... . .... ..... ..... .... . 192
About viewing properties of recovery points and drives .... ..... .... . .... . .. 193
Viewing the properties of a recovery point ... . .... . .... . .... ..... ..... .... 193
Viewing the properties of a drive within a recovery point .... . .... . ... 194
About the Support Utilities ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... .. 195
11Contents
Contents12
Chapter 15 Copying a drive ... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... 197
About copying a drive ... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... ..... ..... 197
Preparing to copy drives . ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ... 197
Copying one hard drive to another hard drive . . .... ..... ..... .... . .... . .... .... 198
About drive-to-drive copying options . ..... ..... .... . .... . .... . .... ..... .... 199
Appendix A Using a search engine to search recovery
points ... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... .. 201
About using a search engine to search recovery points .... . .... . .... ..... ... 201
Enabling search engine support . .... . .... . .... . .... ..... ..... .... . .... . .... ..... ... 201
Recovering files using Google Desktop's Search Desktop feature . . .... . .. 203
About finding a file using Google Desktop . .... . .... ..... ..... .... . .... . ... 203
Appendix B About backing up Microsoft virtual
environments .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . 205
About backing up Microsoft virtual hard disks . . .... ..... .... . .... . .... . .... ... 205
About backing up and restoring Microsoft Hyper-V virtual
machines .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... 206
Index . . .... ..... ..... .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .... ..... ..... .... . .... . .... . .. 207
Chapter

Introducing Norton Ghost

This chapter includes the following topics:
About Norton Ghost
What is new in Norton Ghost
Hiding or showing the Advanced page
Getting more information about Norton Ghost

About Norton Ghost

1
Norton Ghostprovides advancedbackup andrecovery for your computer. Protect any kindof datayou keep on your computer by making a backupof yourcomputer's entire hard disk. Or, limit your backup to include only those files and folders that mean the most to you.
You can schedule backups to capture your changes automatically as you work from day to day. Or start a backup manually at any time. You can also easily configure NortonGhost to run a backup in responseto specificevents. Forexample, a backup can run when a particular application is started. Or, a backup can run when a specified amount of new data is added to the drive.
When youexperience a problem with your computer, youcan restore a file, folder, or an entire drive. This recovery process returns your computer to a previous, functional state with the operating system, applications, and data files intact. Or, if you accidentally delete a personal file, get it back with a few steps.
Using easy-to-follow wizards, you can set up fast and reliable backup jobs and have themrun while you continue to work. Or,schedule yourbackups to run after hours when your computer is idle.
When disaster strikes, Norton Ghost helps you recover your computer from the effects of many common problems, including
Introducing Norton Ghost
14

What is new in Norton Ghost

Virus attacks: Damage might be done before a virus is quarantined.
Faulty software installations: Some software can negatively affect your
computer's performance, and slow it down to the point that programs or documents require too much time to open. But when installed, removing a program might not recover unintentional damage by the installation.
Hard drive failure: Data canbecome corrupted on your system drive (typically
C), making it impossible to start your operating system
Files accidentallydeleted or overwritten: Accidental deletion of filesis common,
but often costly.
Corrupted files: Individual files and folders can become corrupted by viruses,
or when a program used to modify them encounters an error.
What is new in Norton Ghost
Norton Ghost includes many enhancements and new features. Refer to the following table for information about the latest features and enhancements:
Note: Not all listed features are available in all versions of this product.
Table 1-1
Improved support for virtual formats
Improved platform support
What is new Norton Ghost
DescriptionFeature
Norton Ghost now includes support for the following virtual platforms:
VMware ESX 3.5i and 4.0i
VMware ESX 3.5 and 4.0
Norton Ghost now includes support for the following platforms:
Windows 7
Windows Vista with SP2 (includes Home
Basic, Home Premium, Business-Retail, and Ultimate)

Hiding or showing the Advanced page

15Introducing Norton Ghost
Table 1-1
Create recovery points from within Symantec Recovery Disk
Convert recovery points to virtual disks using a schedule
Support for Microsoft Hyper-V
Support for Blu-ray disc media
What is new Norton Ghost (continued)
DescriptionFeature
You can now create independent recovery points using the new Back Up My Computer feature in Symantec Recovery Disk. Sometimes knownas acold backupor offline backup, you can create recovery points of a partition without the need to install Norton Ghost or its Agent.
See “Aboutrunning aone-time backupfrom
Symantec Recovery Diskon page 76.
You can now create schedules to convert recovery points to VMware VirtualDisk and Microsoft Virtual Disks, or directly to a VMware ESX 3.5 server.
See “Defining a virtual conversion job” on page 147.
You can now convert recovery points to Hyper-V format and also import recovery points to a Hyper-V server.
Back up your computer directly to Blu-ray, DVD, orCD. Or,you cancopy recoverypoints to Blu-ray, DVD, or CD.
Fully enabled 60-day trial
If you choose to delay installation of the product license, all features still remain enabled during the 60-day trial period. The 60-day trial period begins when you do a particular task.
See “When youdelay licensing ”on page 20.
Hiding or showing the Advanced page
The Advanced page offers experienced Norton Ghost users a single view of the most commonproduct features.If you have a good understanding of Norton Ghost, you might prefer to perform most tasks from the Advanced view.
Introducing Norton Ghost
16

Getting more information about Norton Ghost

Note: When you refer to the documentation while using the Advanced page, the
first one or two steps do not apply. The first one or two steps merely indicate where to access each feature from the other pages of the product interface. From that point on, follow the remaining steps of each procedure.
The Advanced page can be hidden from view if you do not plan to use it.
To hide or show the Advanced page
Start Norton Ghost.
1
On the View menu, click ShowAdvanced Page to hide or show the Advanced
2
page.
Getting more information about Norton Ghost
To learn more about Norton Ghost, visit the Help and Support page. Depending on which version and language of the product you have installed, the Help and Support pageincludes one-click access to more information. The page alsoincludes access tothe product help system, theproduct User's Guide. It also includes access to theSymantec KnowledgeBase where you can find troubleshooting information.
To access Help and Support
Start Norton Ghost.
1
On the Home page, click Help > Help and Support.
2
Chapter

Installing Norton Ghost

This chapter includes the following topics:
Before you install
Installing Norton Ghost
Updating Norton Ghost
About uninstalling Norton Ghost

Before you install

2
Installation procedures might vary, depending on your work environment and which installation options you choose. This chapter focuses on installing the full version of Norton Ghost from the installation CD.
Before you install Norton Ghost, ensure that your computer meets the system requirements. Reviewthe Readme file on the installation CDfor anyknown issues.

System requirements

The following table lists the system requirements for Norton Ghost to function properly.
Installing Norton Ghost
18
Before you install
Table 2-1
Minimum system requirements
Operating system
RAM
Available hard disk space
Minimum requirementsComponent
The following Windows 32- or64-bit operatingsystems are supported:
Windows 7
Windows Vista Ultimate
Windows Vista Business
Windows XP Professional/Home (SP2 or later)
Windows XP Media Center (SP2 or later)
The following are the memory requirements for each component of Norton Ghost:
Norton Ghost Agent: 512 MB
Norton Ghostuser interfaceand RecoveryPoint Browser:
512 MB
Symantec Recovery Disk: 1 GB (dedicated)
LightsOut Restore: 1 GB
The following are hard disk space requirements for Norton Ghost and other areas:
When you install the entire product: Up to 430 MB is
required for a full install, depending on the language of the product you select.
Microsoft .NET Framework 2.0: 280 MB of hard disk
space is required for 32-bit computers, and 610 MB is required for 64-bit computers.
Recovery points: Sufficient hard disk space on a local
hard disk ornetwork server forstoring recovery points. The size of recovery points depends on the amount of
data you have backed up and the type of recovery point that is stored.
See “Best practices for backing up” on page 50.
LightsOut Restore: 2 GB
Before you install
19Installing Norton Ghost
Table 2-1
Minimum system requirements (continued)
CD-ROM or DVD-ROM drive
Software
Virtual platforms (for converted recovery points)
Minimum requirementsComponent
The drive can be any speed, but it must be capable of being used as the startup drive from the BIOS.
Norton Ghostuses GearSoftware technology.To verifythat your CD writer or DVD writer is compatible, visit the Gear Software Web site.
http://www.gearsoftware.com/support/recorders/index.cfm
You can look up information about your writer if you know the name of the manufacturer and model number of your writer.
The Microsoft .NET Framework 2.0 or later is required to run Norton Ghost.
If .NET Framework is not already installed, you are prompted to install it after Norton Ghost is installed and your computer is restarted.
The following virtual platforms are supported:
VMware Workstation 4, 5, and 6
VMware ESX 3.0, 3.5, and 4.0
VMware ESXi 3.5 and 4.0
VMware Server 1
VMware GSX Server 3.x (replaced by VMware Server)
Microsoft Virtual Server 2005 R2 and later
Microsoft Hyper-V 1.0 and 2.0

About supported file systems and removable media

Norton Ghost supports the following file systems and removable media:
Installing Norton Ghost
20
Before you install
Supported file systems
Removable media

About disabled features

Norton Ghost supports the following file systems:
FAT16, FAT16X
FAT32, FAT32X
NTFS
GUID Partition Table (GPT)
Dynamic disks
Linux Ext2, Linux Ext3
Linux swap partitions
Note: You must decrypt encrypted NTFS drives before you
attempt to restore them. You cannot view the files that are in a recovery point for an encrypted NTFS drive.
You can save recovery points locally (that is, on the same computer whereNorton Ghostis installed). Or, you can save recovery pointsto mostBlu-ray, DVD-R(W),DVD+RW, CD-R, and CD-RW recorders. You can find an updated list of supported drives on the Gear Software Web site.
http://www.gearsoftware.com
Norton Ghost also lets you save recovery points to most USB devices, 1394 FireWire devices, REV, Jaz, Zip drives, and magneto-optical devices.
Norton Ghost is packaged to meet various markets. Some features might not be available, depending on the product you have purchased. However, all features are documented. You should be aware of which features are included with the version of the product you have purchased. If a feature is not accessible in the product user interface, it is likely not included with your version of the product.
Refer tothe Symantec Web site for information about the featuresthat areincluded with your version of Norton Ghost.

When you delay licensing

If you choose to delay installation of the license key, all features in Norton Ghost remain enabled during the 60-day grace period.
Symantec Recovery Disk, a component of Norton Ghost, is available with no trial period or evaluation. However, you need a valid license key to use the following features in Symantec Recovery Disk:
Back Up My Computer wizard

Installing Norton Ghost

See “About running a one-time backup from Symantec Recovery Disk” on page 76.
The 60-day grace period of Norton Ghost begins when you do any one of the following in the software:
Define a drive-based or file and folder backup
Recover a computer
Copy a drive
Consolidate incremental recovery points
Run a drive-based or file and folder backup
Define a scheduled convert to virtual disk job
Run a scheduled convert to virtual disk job
Define a one time convert to virtual disk job
If youuse an Evaluation copy ofthe product, it also expires after 60days. However, all features are enabled until the end of the evaluation period, at which time you must purchase the product or uninstall it. You can purchase a license at any time (even after the evaluation period expires) without reinstalling the software.
21Installing Norton Ghost
Note: If this productcame pre-installed from a computer manufacturer, your trial period couldbe as long as 90days. The product licensing or activation pageduring install indicates the duration of your trial period.
See “Activating Norton Ghost later” on page 24.
Installing Norton Ghost
Before youbegin, you should review the requirements andscenarios for installing Norton Ghost.
See “System requirements” on page 17.
Note: During the installation process, you might be required to restart the computer. You should ensure proper functionality after the computer restarts. You can do this by logging on again using the sameuser credentials that you used to log on when you installed Norton Ghost.
Installing Norton Ghost
22
Installing Norton Ghost
Warning: The Symantec Recovery Disk CD provides the tools that you need to
recover your computer. How you received Symantec Recovery Disk depends on the version of the product that you purchased. For example, Symantec Recovery Disk is included with your product either on a separate CD, or on your product CD. Be sure you store the CD in a safe place.
To install Norton Ghost
Log onto your computer using either the Administrator account oran account
1
that has administrator privileges.
Insert the Norton Ghost product CD into the media drive of the computer.
2
The installation program should start automatically.
If the installation program does not run, type the following command at a
3
command prompt:.
<drive>:\autorun.exe
where <drive> is the drive letter of your media drive.
In the CD browser panel, click Install Norton Ghost.
4
In the License Agreement panel, read the license agreement, and then click
5
I accept the terms in the license agreement.
Do one of the following:
6
In theLicense Agreement panel, click InstallNow to begin theinstallation.
In the License Agreement panel, click Custom Install, select or deselect
the options you want installed, and then click Install Now. Installation options include:
Backup andRecovery Service
Recovery Point Browser
User Interface
The primary service that is required to back up or recover your computer.
Enables you to browse, mount, copy, verify, and restore files and folders using recovery points.
Installs the product user interface that is required for interacting with the Norton Ghost Service.
Agent Deployment–Allows thecomputer onwhich you have installed Norton Ghost to deploy the Norton GhostAgent toother computersfor remote recovery management.
Installing Norton Ghost
23Installing Norton Ghost
CD/DVD Support
LiveUpdate
Click Finish to complete the installation.
7
Remove the product CD from the media drive, and then click Yes to exit the
8
installation wizard and restart the computer.
If you click No, you cannot run Norton Ghost until after you restart your
computer.

Completing the installation

After youinstall the product, you areprompted tolicense or activate your product. You can then run LiveUpdate to check for product updates, and then configure your first backup.
Note: If this productcame pre-installed from a computer manufacturer, your trial period could be as long as 90 days. Refer to the Activate later label.
To complete the installation
Required for backing up directly to CD/DVD, and for creatinga customSymantec Recovery Disk CD. A CD/DVD burner is required to use this feature.
Keeps yourSymantec softwareup-to-date withthe latest product updates.
In the Welcome panel, click Next.
1
If your computer manufacturer installed the product, the Welcome page
might appear the first time that you run Norton Ghost.
Do one of the following:
2
Click I've already purchased the product and have a license key.
Note: You can find the license key on the back of your product CD jacket. Do notlose the license key. Youmust use it when you install NortonGhost.
Click Activate later to delay the activation of your license. After the trial
period ends, the product will no longer work. See “When you delay licensing ” on page 20.
If Norton Ghost is a trial version and you want to purchase a license key,
click Symantec Global Store.
Click Next.
3
Installing Norton Ghost
24
Installing Norton Ghost
Do any of the following:
4
Click RunLiveUpdate to check forany product updates since theproduct
shipped.
Click Launch Easy Setup to open the Easy Setup window when you
complete the install process. (This option is not available in the Desktop version of Norton Ghost.)
Click EnableGoogle DesktopFile andFolderRecovery if you wantGoogle
Desktop to search your recovery points for the files and folders that you want to recover.
If you select this option, Norton Ghost automatically catalogs each file as it creates a recovery point. Google Desktop can then use this catalog to search for files by name. It does not index the contents of the files.
Note: This option is available only if Google Desktop is already installed on your computer. If you plan to install Google Desktop, you can enable search engine support later.
Click Finish.
5

Activating Norton Ghost later

If youdo not activate Norton Ghostbefore the trial period ends, the softwarestops working. However, you can activate the product at any time after the trial period expires.
To activate Norton Ghost later
On the Help menu, click Enter License Key.
1
Follow the on-screen prompts.
2

About setting up your first backup

Unless you deselected the Run Easy Setup check box during the setup wizard, the Easy Setup window appears. If you do not run Easy Setup during the setup wizard, it appears the first time you open the Run or Manage Backups window.
When the Easy Setup window is displayed, you can accept the default drive and file and folder backup settings. Or, you can click any of the settings to edit them.
If you want the new backup to run immediately, be sure to select Run backup now, and then click OK.

Updating Norton Ghost

You canreceive software updates for yourversion of the product over an Internet connection. LiveUpdate connects to the Symantec LiveUpdate server and automatically downloads and installs updates for each Symantec product that you own.
You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates.
To update Norton Ghost
On the Help menu, click LiveUpdate.
1
In the LiveUpdate window, click Start to select the updates.
2
Follow the on-screen instructions.
When the installation is complete, click Close.
3
Some program updates might require that you restart your computer before
the changes take effect.

About uninstalling Norton Ghost

Updating Norton Ghost
25Installing Norton Ghost
When you upgrade Norton Ghost from a previous version of the product, the install programautomatically uninstalls the previous versions.If needed, you can manually uninstall the product.
Follow your operating system's instructions on how to uninstall software.
Installing Norton Ghost
26
About uninstalling Norton Ghost
Chapter

Ensuring the recovery of your computer

This chapter includes the following topics:
About ensuring the recovery of your computer
Testing Symantec Recovery Disk
If driver validation fails
Creating a custom Symantec Recovery Disk CD
3

About ensuring the recovery of your computer

If Windowsfails to start or it does notrun normally,you can recover your computer by using the Symantec Recovery Disk CD. The drivers that are included on the recovery disk must match the drivers that are required to run your computer's network cards and hard disks.
To help ensure that you have the drivers that you need to recover your computer, you can use the Run Driver Validation tool available on the Symantec Recovery Disk. The driver validation tool compares hardware drivers on the Symantec Recovery Disk CD with the drivers that are required to run your computer's network cards and hard disks.
You should run the driver validation test any time you make changes to the network interface cards or storage controllers on a computer.
See “If driver validation fails” on page 28.
Note: The driver validation tool or Symantec Recovery Disk does not support wireless network adapter drivers.
Ensuring the recovery of your computer
28

Testing Symantec Recovery Disk

Testing Symantec Recovery Disk
You should test the Symantec Recovery Disk CD to ensure that the recovery environment runs properly on your computer.
Note: Depending on which version of the product you have purchased, Symantec Recovery Disk is either included on your product CD, or as a separate CD. You should place the CD containing Symantec Recovery Disk in a safe place.
Testing the Symantec Recovery Disk CD lets you identify and solve the following types of problems:
You cannot start Symantec Recovery Disk.
See “To configure a computer to boot from a CD” on page 175.
You do not have the necessary storage drivers to access recovery points on
the computer.
You need information about your system to help you run Symantec Recovery
Disk.
See “If driver validation fails” on page 28.
To test Symantec Recovery Disk
Run thedriver validationtool totest whetherSymantec RecoveryDisk works
1
with the network cards and storage devices on the computer.
Start your computer using the Symantec Recovery Disk CD.
2
See “Starting a computer by using Symantec Recovery Disk” on page 174.
When you have started Symantec Recovery Disk, do one of the following:
3
If you want to store recovery points on a network, run a mock restore of
a recoverypoint that is stored on a networkto test the network connection.
If you want to store recovery points on a computer, run a mock restore of
a recovery point that is stored locally to test the local hard drive connection.

If driver validation fails

The driver validation test verifies whether the drivers for all storage devices and network cards in use by the computer are available in Symantec Recovery Disk. If the drivers are available on the recovery disk, youreceive a validation message. If anydrivers are not included onthe recovery disk, the Driver Validation Results dialog box appears.

Creating a custom Symantec Recovery Disk CD

Without access to the correct drivers, a device cannot be used while you run Symantec Recovery Disk. Therefore, if the recovery points that are required for recovering yourcomputer are stored on a network or a local hard drive,you might not have access to them.
You can find the drivers and copy them to a CD or a floppy disk, or you can create a custom Symantec Recovery Disk CD.
See “Creating a custom Symantec Recovery Disk CD” on page 29.
Creating a custom Symantec Recovery Disk CD
Even if driver validation succeeds and your Symantec Recovery Disk CD appears to work, you should create a custom Symantec Recovery Disk CD. A custom CD contains your computer's current network and storage device drivers. It helps to ensure that in an emergency you can get to the recovery points that are required to restore your computer.
Note: You must have a writeable Blu-ray/DVD/CD-RW drive to create a custom Symantec Recovery Disk CD.
29Ensuring the recovery of your computer
To create a custom Symantec Recovery Disk CD
Attach and turn on all storage devices and network devices that you want to
1
make available.
Start Norton Ghost.
2
Insert the Symantec Recovery Disk CD into your media drive.
3
If necessary,specify the path or browse to themedia drive in which you placed
the Symantec Recovery Disk CD.
Click Tasks > Create Custom Recovery Disk CD.
4
Click Next.
5
Ensuring the recovery of your computer
30
Creating a custom Symantec Recovery Disk CD
Specify the following:
6
Disk label
Burn SymantecRecovery Diskto CD/DVD
Save a copy of the custom Symantec Recovery Disk (CD/DVD image file)
Click Next.
7
Review the list of storage and network drivers to be included, and add
8
Type the name that you want to use for the Symantec Recovery Disk label.
If you want to save your customized Symantec Recovery Disk to media, select this option and then in the list box, select the media burning device that you want to use.
If you want to save your customized Symantec Recovery Disk as an .iso file, select this option, and then specify the path to where you want to save the resulting file.
additional drivers or remove the drivers you do not need.
On the Startup Options pane, select the default keyboard layout, display
9
language, and time zone from the respective lists.
Click Next.
10
On the Options pane, do the following:
11
Automatically start network services
Select this option if you want networking to start automatically when you recover the computerthrough LightsOut Restore.
Dynamic IP
Static IP
Click this option to connect to a network without the need for additional network configuration. You can click thisoption if you knowthere isa DHCPserver available on the network at the time you restore.
Click this option to connect to a network with a particular network adapter and specific addresssettings. You should click this option if you know there is no DHCP server (orthe DHCP serveris unavailable) when you recover.
Loading...
+ 183 hidden pages