Symantec GHOST 14 Manual page 8

Table of Contents

Advertisement

8
Contents
Chapter 5
Chapter 6
Adjusting default tray icon settings ........................................... 38
Managing file types ............................................................... 39
Using aliases for external drives ................................................ 41
Logging Norton Ghost messages ............................................... 42
About backing up your data ............................................................ 47
Choosing a backup type ................................................................. 48
Best practices for backing up ......................................................... 48
About backups ....................................................................... 49
Before you back up ................................................................. 49
During a backup ..................................................................... 51
When the backup is complete ................................................... 51
Additional tips about backups ......................................................... 52
After defining your backup job ........................................................ 53
Viewing the properties of a backup job ....................................... 53
About selecting a backup destination .............................................. 54
About backing up dual-boot computers ............................................ 56
Defining a drive-based backup ....................................................... 57
Running a One Time Backup ..................................................... 63
Files excluded from drive-based backups .................................... 65
About network credentials ....................................................... 66
Run command files during a backup .......................................... 66
Setting advanced options for drive-based backups .............................. 68
Editing advanced backup options .............................................. 69
About recovery point encryption .............................................. 70
Verifying a recovery point after creation .................................... 71
Viewing the progress of a backup .............................................. 72
About Offsite Copy ....................................................................... 73
How Offsite Copy works ................................................................. 73
........................ 47
.................................................... 57

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Norton ghostNorton ghost 14.0

Table of Contents