Symantec, the Symantec Logo, LiveUpdate, Symantec pcAnywhere, Symantec Backup Exec, Norton, Symantec NetBackup, and Symantec Backup Exec Restore Anyware are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
The Technical Support group also authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/techsupp/ Select your region or language under Global Support, and then select the Licensing and Registration page.
Page 5
North America and Latin America: supportsolutions@symantec.com Additional Enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
Page 6
To access more information about Enterprise services, please visit our Web site at the following URL: www.symantec.com Select your country or language from the site index.
Chapter 1 Introducing Norton Ghost™ ..........13 Getting started ................13 What's new in Norton Ghost 14.0 ............ 14 New features and enhancements added in the previous release ................15 About the Advanced page .............. 17 Where to find more information ............18...
Page 8
Contents Adjusting the effects of a backup on computer performance ... 37 Adjusting default tray icon settings ........... 38 Managing file types ............... 39 Using aliases for external drives ..........41 Configuring FTP settings for use with Offsite Copy ....... 42 Logging Norton Ghost messages ..........
Page 9
Verifying that a backup is successful ..........86 Editing backup settings ..............87 Enabling event-triggered backups ........... 87 Enabling Symantec ThreatCon Response ........88 Editing a backup schedule ............. 89 Turning off a backup job ............... 90 Deleting backup jobs ..............90 Adding users who can back up your computer ........
Page 10
Contents Customize status reporting ............113 Viewing drive details ..............114 Improving the protection level of a drive ......... 115 Using event log information to troubleshoot problems ...... 116 Chapter 11 Exploring the contents of a recovery point ....119 About exploring recovery points ...........
Page 11
Contents About LightsOut Restore .............. 147 Setting up and using LightsOut Restore ........147 Configuring LightsOut Restore ..........148 Chapter 14 Recovering a computer ............. 151 About recovering a computer ............151 Starting a computer by using the recovery environment ....152 Configuring your computer to boot from a CD ......
Chapter Introducing Norton Ghost™ This chapter includes the following topics: Getting started What's new in Norton Ghost 14.0 About the Advanced page Where to find more information Getting started Norton Ghost provides advanced backup and recovery for your computer. Protect...
Introducing Norton Ghost™ What's new in Norton Ghost 14.0 Using easy-to-follow wizards, set up fast and reliable backups that run while you continue to work. Or schedule your backups to run after hours when you are no longer using your computer.
Introducing Norton Ghost™ What's new in Norton Ghost 14.0 Feature Description Create and manage aliases for your external To help you more easily identify external drives drives for use as backup destinations, Norton Ghost lets you assign an alias to each external drive.
Page 16
Introducing Norton Ghost™ What's new in Norton Ghost 14.0 Feature Description Windows Vista support Norton Ghost has been designed and tested to run in the new Windows Vista operating system, and still supports previous versions of Windows. “System requirements” on page 19.
Recovery Disk makes recovery easier than ever. If the Symantec Recovery Disk is missing specific drivers, use the Create Recovery Disk feature to create a modified Symantec Recovery Disk that includes the exact drivers needed to successfully boot your computer into the recovery enironment.
Help and Support page includes one-click access to more information, including the product help system, the product User's Guide, and access to the Symantec Knowledge Base where you can find troubleshooting information.
Chapter Installing Norton Ghost This chapter includes the following topics: Preparing for installation Installing Norton Ghost Updating Norton Ghost Uninstalling the product Preparing for installation Before you install Norton Ghost, make sure that your computer meets the system requirements. System requirements Table 2-1 lists the system requirements for Norton Ghost.
Symantec Recovery Disk: 512 MB minimum Note: If you are installing a multilingual or double-byte version of the product, you must have a minimum of 768 MB of RAM to run the Symantec Recovery Disk. Norton Ghost LightsOut Restore feature: 1 GB Available hard...
If a feature is not accessible in the product user interface, it is likely not included with your version of the product. Refer to the Symantec Web site for information about features included with your version of Norton Ghost.
If you receive this message, you should test the Symantec Recovery Disk (SRD). Testing the SRD verifies whether the drivers are required or if the devices on your system have compatible drivers that are available on the SRD.
Page 23
Click this button if you want to install Norton Ghostto an alternate location. If a driver that is used on your computer is not available on the Symantec Recovery Disk, you receive a notification message that includes the name of the driver.
Click Activate later to delay the activation of your license. After the trial period ends, the product will no longer work. If this product is a trial version of Norton Ghost and you want to purchase a product key, click Symantec Global Store to connect to the Symantec Web site. Click Next.
Updating Norton Ghost You can receive software updates that are associated with your version of the product over your Internet connection. LiveUpdate connects to the Symantec LiveUpdate server and automatically downloads and installs updates for each Symantec product that you own.
Installing Norton Ghost Uninstalling the product You run LiveUpdate as soon as you install the product. You should continue to run LiveUpdate periodically to obtain program updates. To update Norton Ghost On the Help menu, click LiveUpdate. In the LiveUpdate window, click Start to select the updates. Follow the on-screen instructions.
If Windows fails to start or it does not run normally, you can recover your computer by using the Symantec Recovery Disk (SRD). The drivers that are included on the recovery disk must match the drivers required to run your computer's network cards and hard disks.
Ensuring the recovery of your computer Testing Symantec Recovery Disk Note: Wireless network adapter drivers are not supported by the driver validation tool or by the SRD. Testing Symantec Recovery Disk You should test the SRD to ensure that the recovery environment runs properly on your computer.
Creating a custom Symantec Recovery Disk CD Even if driver validation succeeds and your Symantec Recovery Disk CD appears to work, you should create a custom Symantec Recovery Disk CD. A custom CD will contain your computer's current network and storage device drivers, helping to ensure that in an emergency you can get to the recovery points required to restore your computer.
Page 30
Select this option only if you know which drivers to select. Follow the on-screen instructions to complete the wizard. Warning: Be certain to test your new, customized Symantec Recovery Disk CD to make sure that it can start your computer and that you can access the drive containing your recovery points.
Key product components How you use Norton Ghost Starting Norton Ghost Configuring Norton Ghost default options Key product components Norton Ghost includes two key components: the program itself, and the Symantec Recovery Disk. Key product components Table 4-1 Key Component...
Key Component Description Symantec Recovery Disk The Symantec Recovery Disk (SRD) is used to boot your computer into the recovery environment. If your computer's operating system fails, use the SRD to recover your system drive (the drive where your operating system is installed).
Getting Started Starting Norton Ghost Using Norton Ghost Figure 4-1 Starting Norton Ghost Norton Ghost is installed in the Windows Program Files folder by default. During installation, a program icon is installed in the Windows system tray from which you can open Norton Ghost. You can also open Norton Ghost from the Windows Start menu.
Getting Started Configuring Norton Ghost default options To start Norton Ghost Do one of the following: On the classic Windows taskbar, click Start > Programs > Norton Ghost. On the Windows XP or Windows Vista taskbar, click Start > All Programs >...
Page 35
Getting Started Configuring Norton Ghost default options Options Description Tray Icon You can turn the system tray icon on or off and specify whether to show only error messages when they occur, or to show both error messages and other information, such as the completion of a backup.
Getting Started Configuring Norton Ghost default options Options Description SMTP E-mail If you want a history of actions taken by Norton Ghost, or of error messages and warnings, you can choose to save them in a log file on your computer, or to have them emailed to an address you specify.
Getting Started Configuring Norton Ghost default options Check Save backup files to a unique subfolder if you want Norton Ghost to create a new subfolder that will serve as your backup destination. Note: The new subfolder is given the same name as your computer. For example, if your computer name is "MyLaptop", the new subfolder would be named \MyLaptop.
Getting Started Configuring Norton Ghost default options Enabling network throttling Similar to computer performance adjustments, you can also limit the impact of a backup on network performance. However, because network performance is affected by many variables, you should consider the following issues before enabling this feature: Network cards: Is your network wired or wireless? What are the speeds of your network cards? Network backbone: What is the size of your network pipeline? Does it support...
Getting Started Configuring Norton Ghost default options To adjust default tray icon settings On the main menu bar, click Tasks > Options. Click Tray Icon and select one of the following: Show system tray icon Displays the Norton Ghost icon in the system tray.
Page 40
Getting Started Configuring Norton Ghost default options To create a new file type and extensions On the main menu bar, click Tasks > Options. Click File Types. At the bottom of the File types list, click the Add a file type (+) button to add a file type category.
Getting Started Configuring Norton Ghost default options Using aliases for external drives When you choose an external drive for use with Norton Ghost as either a backup destination or an Offsite Copy destination, it can become confusing if you are using more than one drive, especially when the assigned drive letter changes each time you plug in the drive.
Getting Started Configuring Norton Ghost default options Configuring FTP settings for use with Offsite Copy File Transfer Protocol, or FTP, is the simplest and most secure way to copy files over the Internet. Norton Ghost serves as an FTP client to copy your recovery points to a remote FTP server as a secondary backup of your critical data.
Page 43
Getting Started Configuring Norton Ghost default options Two logging methods are available: Norton Ghost logging, and the Windows application log. From the Options page, you can configure both methods. To configure a Norton Ghost log file On the main menu bar, click Tasks > Options. Under Notifications, click Log File.
Getting Started Configuring Norton Ghost default options Click the Select the priority and type of messages drop-down list and select the priority level at which a message should be logged. All messages Send all messages, regardless of priority levels. Medium and high priority messages Send only medium and high priority messages.
Page 45
Getting Started Configuring Norton Ghost default options Click the Select the priority and type of messages drop-down list and select the priority level at which an email should be sent. All messages Send all messages, regardless of priority levels. Medium and high priority messages Send only medium and high priority messages.
Page 46
Getting Started Configuring Norton Ghost default options...
Chapter Best practices for backing up your data This chapter includes the following topics: About backing up your data Choosing a backup type Best practices for backing up Additional tips about backups After defining your backup job About selecting a backup destination About backing up dual-boot computers About backing up your data To back up your computer or your individual files and folders, you do the following...
Best practices for backing up your data Choosing a backup type When to run the backup (automatically or manually) What compression levels to specify for recovery points, and whether to enable security settings (encryption and password protection). Which of the many other options you want to use. You can customize each backup according to your backup needs.
Best practices for backing up your data Best practices for backing up When the backup is complete About backups When you back up your computer, you choose from two types of backups: drive-based backup: backs up an entire hard drive file and folder backup: backs up only the files and folders you select Which backup type you choose depends on what you are trying to protect and how much storage space you have to store backup data (recovery points, and file...
Page 50
Best practices for backing up your data Best practices for backing up Consider using external drives as Using an external drive makes your backup data more your backup destination. portable. Should you need to remove your critical data from a particular location, you can quickly grab an external drive on your way out the door.
For other drive management solutions, go to the Symantec Web site at the following URL: www.symantec.com/. Verify the recovery point after you When you define a backup, you should select the create it to ensure that it is stable.
Best practices for backing up your data Additional tips about backups Review the Status page to verify Periodically review the Status page. You can also that backups have happened and review the events log on the Advanced page. to identify any potential problems. The event log records events when they occur, backups and any errors that might have occurred during or after a backup.
Best practices for backing up your data After defining your backup job Do not run a disk defragmentation program during a backup. Doing so will significantly increase the time that it takes to create the recovery point and might cause unexpected system resource issues. If you have two or more drives that are dependent on each other, you should include both drives in the same backup.
Best practices for backing up your data About selecting a backup destination About selecting a backup destination You should review the following information before deciding where to store recovery points and file and folder backup data. Note: If you choose to use CDs or DVDs as your backup destination (not recommended), you cannot back up to a sub-folder on the disk.
Page 55
Best practices for backing up your data About selecting a backup destination Selecting a backup destination (continued) Table 5-1 Backup destination Information to consider Network folder If your computer is connected to a network, you can save your recovery points and file and folder backup data to a network folder.
Best practices for backing up your data About backing up dual-boot computers Advantages and disadvantages of backup destinations (continued) Table 5-2 Backup destination Advantages Disadvantages Network drive Fast backup and recovery Must have supported NIC drivers to restore from Can schedule unattended (recommended) the recovery environment backups...
Chapter Backing up entire drives This chapter includes the following topics: Defining a drive-based backup Setting advanced options for drive-based backups About setting a compression level for drive-based backups About Offsite Copy How Offsite Copy works Defining a drive-based backup A drive-based backup takes a snapshot of your entire hard drive, capturing every bit of information that is stored on it for later retrieval.
Page 58
Backing up entire drives Defining a drive-based backup Click Back up my computer, and then click Next. Select one or more drives to back up, and then click Next. Press and hold Ctrl to select multiple drives. If you do not see a drive that you expected to see, check Show Hidden Drives. Do one of the following: If you selected a drive that has already been included in a defined backup, click Next, and then skip to step 8.
Page 59
Backing up entire drives Defining a drive-based backup On the Backup Destination page, select from the following options: Folder field Browse to the location in which you want to store the recovery points. If Norton Ghost detects that this location does not have enough available space, it alerts you.
Page 60
Backing up entire drives Defining a drive-based backup “About Offsite Copy” on page 73. Click Next. Note: You cannot use an encrypted folder as your backup destination. You can choose to encrypt your backup data to prevent another user from accessing it.
Page 61
Backing up entire drives Defining a drive-based backup Include system and temporary files Check this option to include indexing support for operating system and temporary files when a recovery point is created on the client computer. Description text box Type a description for the recovery point. The description can be anything that helps you further identify the recovery point's contents.
Page 62
Backing up entire drives Defining a drive-based backup Weekly Runs the backup at the time and on the days of the week that you specify. When you select this option, the Select the days of the week to protect box appears. Monthly Runs the backup at the time and on the days of the week that you specify.
Backing up entire drives Defining a drive-based backup Schedule Do one or more of the following: (Backup Time) Click Schedule, and then select the days and a start time for when the backup should run. Check Run more than once per day if you frequently modify data that you want to protect.
Page 64
Backing up entire drives Defining a drive-based backup Select one or more drives to back up and click Next. Note: Press and hold Ctrl to select multiple drives. Click Next. In the Backup Destination dialog box, select from the following options: Folder field Browse to the location in which you want to store the recovery points.
Backing up entire drives Defining a drive-based backup Description text box Type a description for the recovery point. The description can be anything that helps you further identify the recovery point's contents. Advanced In the Advanced Options dialog box, select any of the following options, and then click Use password Use Encryption...
Backing up entire drives Defining a drive-based backup About network credentials If you connect to a computer on a network, you must provide the user name and password for network access, even if you previously authenticated to the network. The Norton Ghost service runs on the local system account. When you enter network credentials, the following rules apply: If the computer you want to connect to is on a domain, provide the domain name, user name, and password.
Page 67
Backing up entire drives Defining a drive-based backup You can specify the location of command files if you want them to be located in a place other than the default location. You can also specify a location on a per-job basis, as well as specify a location that can be shared among several computers.
Backing up entire drives Setting advanced options for drive-based backups Recovery point creation stages Table 6-1 Stage Description Before data capture This stage occurs after a backup has started and before a recovery point is created. You can run a command during this stage to prepare for the recovery point creation process.
Backing up entire drives Setting advanced options for drive-based backups Divide into smaller files to You can split the recovery point into smaller files and simplify archiving specify the maximum size (in MB) for each file. For example, if you plan to copy a recovery point to ZIP disks from your backup destination, specify a file size of 100 MB or less, according to the size of each ZIP disk.
If you do not type the correct password or you forget the password, you cannot open the recovery point. Symantec Technical Support has no method for opening an encrypted recovery point. Besides bit strength, the make-up of the password can improve the security of your data.
Backing up entire drives Setting advanced options for drive-based backups Avoid using consecutive, repeating characters (for example, BBB or 88). Avoid using common words that you would find in a dictionary. Use at least one number. Use both uppercase and lowercase alpha characters. Use at least one special character such as ({}[],.<>;:’"?/|\`~!@#$%^&*()_-+=).
Backing up entire drives About setting a compression level for drive-based backups Viewing the progress of a backup You can view the progress of a backup while it runs to determine how much time remains until the backup completes. To view the progress of a backup While a backup is running, on the View menu, click Progress and Performance.
Backing up entire drives About Offsite Copy About Offsite Copy Backing up your data to a secondary hard disk is a critical first step to protect your information assets. But to make certain your data is safe, use Offsite Copy to copy your latest recovery points to either a portable storage device, remote server in your network, or to a remote FTP server.
Backing up entire drives How Offsite Copy works “To define a drive-based backup” on page 57. “Editing backup settings” on page 87. Using external drives as your Offsite Copy destination Use an external drive as your Offsite Copy destination. This method lets you take a copy of your data with you when you leave the office.
Backing up entire drives How Offsite Copy works On Wednesday morning, you bring drive B to the office. You plug in drive B and Norton Ghost detects that drive B is an Offsite Copy destination. Norton Ghost then automatically begins copying Monday night's base recovery point and Tuesday night's incremental recovery point.
Backing up entire drives How Offsite Copy works Using an FTP server as your Offsite Copy destination Using an FTP server as your Offsite Copy destination is similar to using a server. You must provide a valid FTP path to the FTP server. You must also provide the correct FTP connection information to Norton Ghost in order for this method to work correctly.
Page 77
Backing up entire drives How Offsite Copy works...
Page 78
Backing up entire drives How Offsite Copy works...
Chapter Backing up files and folders This chapter includes the following topics: Defining a file and folder backup Folders excluded by default from file and folder backups Defining a file and folder backup When you define and run a file and folder backup, copies are made of each of the files and folders that you have chosen to back up.
Page 80
Backing up files and folders Defining a file and folder backup Select the files and folders you want to include in your backup, and then click Next. Selecting file types lets Norton Ghost find and include files that match the files you want backed up.
Page 81
Backing up files and folders Defining a file and folder backup Click Schedule if you want the backup to run automatically, according to a schedule. If you want to run the backup only when you start it manually, uncheck Schedule. Enter a start time and select the days of the week when the backup should run.
Backing up files and folders Folders excluded by default from file and folder backups Folders excluded by default from file and folder backups The following folders and their contents are excluded automatically from file and folder backups: Windows folder Program Files folder Temporary folder Temporary Internet Files folder These folders are typically not used for storing personal files or folders.
Chapter Running and managing backup jobs This chapter includes the following topics: Running an existing backup job immediately Adjusting the speed of a backup Stopping a backup or recovery task Verifying that a backup is successful Editing backup settings Enabling event-triggered backups Editing a backup schedule Turning off a backup job Deleting backup jobs...
Running and managing backup jobs Running an existing backup job immediately Note: If necessary, you can run a quick backup of a particular drive without using a defined backup. “Running a One Time Backup” on page 63.. Norton Ghost can be configured to run a backup automatically when an event occurs on your computer, such as installing a new software program.
Running and managing backup jobs Adjusting the speed of a backup “Editing backup settings” on page 87. To run a backup with options On the Home page, click Run or Manage Backups. In the Run or Manage Backups window, select the drive-based backup job that you want to run.
Running and managing backup jobs Stopping a backup or recovery task To adjust the performance of a backup While a backup is running, on the View menu, click Progress and Performance. Do one of the following: If you want to increase the speed of your computer by reducing the speed of the backup, drag the slider toward Slow.
Running and managing backup jobs Editing backup settings “Verifying a recovery point after creation ” on page 71. To verify the success of a backup On the Status page, review the Backups calendar, and verify that the backup appears on the date that you ran it. Move your mouse over a backup icon to review the status of the backup.
But if you connect your computer to the Internet at any time, it becomes vulnerable. You do not have to enable or disable Symantec ThreatCon Response when you go on or off line. It simply works if you are online, but does nothing if you are off line.
From the drop-down list, select the threat level that when met or exceeded should start your backup job, and then click OK. Note: Level 1 of Symantec ThreatCon indicates that there are no threats. Because level 1 suggests no threats, it is not an option in the drop-down list.
Running and managing backup jobs Turning off a backup job Click Change Schedule. Make changes to the schedule, and then click OK. Turning off a backup job You can turn off a backup and re-enable it later. When you turn off a backup, it will not run according to its defined schedule, if it has one.
Page 91
To add users who can back up a computer On the Windows taskbar, click Start > Programs > Symantec > Norton Ghost > Security Configuration Tool. On Windows Vista, click Start > All Programs > Symantec > Security Configuration Tool.
Page 92
Running and managing backup jobs Adding users who can back up your computer Choose from the following options: Permissions Allow Deny Full Control Select to give the user or Select to deny the user or group full access to all of group administrative the features of Norton access to the features of...
Chapter Backing up remote computers from your computer This chapter includes the following topics: About backing up other computers from your computer Adding computers to the Computer List Deploying the agent Using the Norton Ghost Agent Managing the agent through Windows Services Best practices for using services Controlling access to Norton Ghost About backing up other computers from your...
You can deploy the agent without a license for a 30-day evaluation. After that time, you must purchase and install the license to continue managing the remote computer. You can purchase additional licenses at the Symantec Global Store. Visit: http://shop.symantecstore.com First, you add a computer's name or IP address to the Computer List.
You can install the agent to a computer that has less than 256 MB of RAM. However, Symantec Recovery Disk requires at least 512 MB of RAM for restoring the computer. Your computer must meet the minimum memory requirement to run the Recover My Computer wizard or the Recovery Point Browser from the recovery environment.
Page 96
Backing up remote computers from your computer Deploying the agent To prepare a computer in a workgroup environment to deploy the agent On the Windows taskbar, right-click Start, and then click Explore . On the Tools menu, click Folder Options > View. On the View tab, scroll to the end of the list and verify that the Use simple file sharing check box is unchecked, and then click OK.
Backing up remote computers from your computer Using the Norton Ghost Agent To manually install the agent Insert the Norton Ghost product CD into the media drive of the computer. The installation program should start automatically. If the installation program does not start, on the Windows taskbar, click Start >...
Backing up remote computers from your computer Managing the agent through Windows Services The Norton Ghost Agent does, however, have a tray icon available from the Windows system tray to provide feedback of current conditions and to perform common tasks. For example, you can view backup jobs created for the computer, reconnect the Norton Ghost Agent, or cancel a task that is currently running.
Backing up remote computers from your computer Best practices for using services Start, stop, or disable the Norton Ghost Agent on local and remote computers. “Starting or stopping the agent service” on page 100. Configure the user name and password that is used by the Norton Ghost Agent. “Controlling access to Norton Ghost ”...
Backing up remote computers from your computer Best practices for using services Best practices for using services (continued) Table 9-1 Best practice Description Use caution when changing default Changing the default Norton Ghost Agent settings for the Norton Ghost Agent. properties can prevent Norton Ghost from running correctly.
Backing up remote computers from your computer Best practices for using services Start or Restart You should start or restart the agent if Norton Ghost is unable to connect to the Norton Ghost Agent on a computer, or you cannot reconnect from Norton Ghost. Restart You should restart the agent after you change the user name or password that you use to log on to the Norton Ghost...
Backing up remote computers from your computer Best practices for using services Click OK. In the Services window, on the Action menu, click Properties. On the Recovery tab, in the First failure, Second failure, and Subsequent failures lists, select the action that you want: Restart the Service Specify the number of minutes before an attempt to restart the service is made.
Backing up remote computers from your computer Controlling access to Norton Ghost Required services Table 9-2 Service Startup type Event Log Automatic Plug and Play Automatic Remote Procedure Call (RPC) Automatic To view Norton Ghost Agent dependencies In the Services window, under Name, click Norton Ghost. “Opening Services ”...
Page 104
User-denied permissions override group-allow permissions. To add users and groups On the Windows taskbar, click Start > Programs > Symantec > Norton Ghost > Security Configuration Tool. Click Add. In the Select Users or Groups dialog box, click Advanced.
Controlling access to Norton Ghost To remove a user or group On the Windows Start menu, click Programs > Symantec > Norton Ghost > Security Configuration Tool. Select the user or group that you want to remove, and then click Remove.
Page 106
Backing up remote computers from your computer Controlling access to Norton Ghost To perform Run As from Windows Vista On the Windows taskbar, click Start > All Programs > Norton Ghost > Norton Ghost. Click Yes when prompted to add the required privileges. Enter the password for an administrator account, and then click OK.
Chapter Monitoring the status of your backups This chapter includes the following topics: About monitoring backups Monitoring backup protection from the Home page Monitoring backup protection from the Status page Configuring Norton Ghost to send SNMP traps Customize status reporting Viewing drive details Improving the protection level of a drive Using event log information to troubleshoot problems...
Monitoring the status of your backups Monitoring backup protection from the Home page Rescanning a computer’s hard disk Use Refresh to update the drive information that is displayed in various views of the product. This feature is useful when hard disk configurations have changed but the changes do not immediately appear in Norton Ghost.
Monitoring the status of your backups Monitoring backup protection from the Status page Backup protection levels (continued) Table 10-1 At risk No defined backup exists and no recovery points are available from which to recover the drive. An unprotected drive cannot be recovered and is at risk.
Page 110
Monitoring the status of your backups Monitoring backup protection from the Status page Backups calendar icons Table 10-2 Icon Description Icon states Represents a drive-based backup that This icon can appear in the following states: is configured to create a single, independent recovery point.
Page 111
Monitoring the status of your backups Monitoring backup protection from the Status page Backups calendar icons (continued) Table 10-2 Icon Description Icon states Represents a file and folder backup. It This icon can appear in the following states: indicates that a file and folder backup is scheduled to occur on the day that it Indicates that the backup ran and that file and folder appears in the backup timeline.
Monitoring the status of your backups Configuring Norton Ghost to send SNMP traps To monitor backup protection from the Status page On the Status page, review the Backups calendar and verify that the backup appears on the date that you ran it. In the Drives column, select the drive that you want to view.
Monitoring the status of your backups Customize status reporting Errors Warnings Information Select the version of SNMP traps to be sent (Version 1 or Version 2), and then click OK. About the Norton Ghost management information base The Norton Ghost management information base (MIB) is an enterprise MIB. It contains the Norton Ghost SNMP trap definitions.
Monitoring the status of your backups Viewing drive details To customize the status reporting of a drive (or file and folder backups) On the Status page, click a drive (or File and folders) to select it. You can also click Customize status reporting from the Home page. Click Customize status reporting.
Monitoring the status of your backups Improving the protection level of a drive To view drive details On the Advanced page, on the Content Bar, click the Drives tab. If the Advanced page is not visible on the Primary Navigation Bar, click View >...
Monitoring the status of your backups Using event log information to troubleshoot problems To improve the protection level of a drive On the Status page, select a drive that requires attention from the Drives column. In the Status section at the bottom of the page, right-click the backup you want to modify, and then select one of the following menu items: Run Backup Now Runs the selected backup job immediately.
Page 117
Monitoring the status of your backups Using event log information to troubleshoot problems Log entries provide information about the success or failure of numerous actions that were taken by Norton Ghost or by a user. It offers a single view of all of the information and program error messages.
Page 118
Monitoring the status of your backups Using event log information to troubleshoot problems...
Chapter Exploring the contents of a recovery point This chapter includes the following topics: About exploring recovery points Exploring a recovery point through Windows Explorer Opening files within a recovery point Using a search engine Unmounting a recovery point drive Viewing the drive properties of a recovery point About exploring recovery points You can use Norton Ghost to explore files in a recovery point by assigning it a...
Exploring the contents of a recovery point Exploring a recovery point through Windows Explorer You can only run programs from within a mapped recovery point that do not rely on registry values, COM interfaces, dynamic link libraries (DLLs), or other similar dependencies.
Exploring the contents of a recovery point Opening files within a recovery point Mounting a recovery point from Windows Explorer You can also manually mount a recovery point as a drive by opening your backup destination folder in Windows Explorer. You can use Windows Explorer to search the contents of the recovery point.
If you have a desktop search engine, such as Google Desktop, you can configure your backups to create recovery points that are searchable. Note: If your organization uses Symantec Backup Exec Web Retrieve, it is likely that your network administrator has already enabled this feature.
Exploring the contents of a recovery point Unmounting a recovery point drive Unmounting a recovery point drive All of your mounted recovery point drives are unmounted when you restart the computer. You can also unmount the drives without restarting the computer. To dismount a recovery point in Windows Explorer In Windows Explorer, navigate to the mounted recovery point.
Page 124
Exploring the contents of a recovery point Viewing the drive properties of a recovery point To view the drive properties of a recovery point In the Recovery Point Browser, in the tree panel, click the recovery point that contains the drive that you want to view. Select a drive.
Chapter Managing backup destinations This chapter includes the following topics: About backup destinations How backup data works Managing recovery points Converting a recovery point to a virtual disk format Managing file and folder backup data Automating management of backup data Moving your backup destination About backup destinations A backup destination is the location in which your backup data is stored.
Managing backup destinations How backup data works File and folder Use this option to back up only the files and folders that you select. backup You can then restore any file or all of them at any time. This option typically requires less disk space than drive-based backups. About drive-based backups When you run a drive-based backup, a snapshot is taken of everything that is stored on your computer's hard disk.
Managing backup destinations Managing recovery points can even set a limit to the number of versions kept so that you can control the use of disk space. Managing recovery points Norton Ghost includes several features that help you manage your backup data. The key is to prevent backup data from taking up too much hard disk space on your computer while providing adequate backup protection in the event that you need to recover your computer, files, or folders.
Managing backup destinations Managing recovery points “Opening files within a recovery point” on page 121. “About exploring recovery points ” on page 119. To clean up old recovery points On the Tools page, click Manage Backup Destination. Click Clean Up. The recovery point sets that can be safely removed without eliminating your latest recovery point are selected automatically.
Managing backup destinations Managing recovery points Warning: Be careful about which recovery points you choose to delete. You could inadvertently lose data. For example, you create a new document, which is captured in the third recovery point in a recovery point set. You then accidentally delete the file, which is captured by the fourth recovery point.
Managing backup destinations Converting a recovery point to a virtual disk format Select which recovery point to copy, and then click OK. On the Welcome page of the Copy Recovery Point Wizard, click Next. Select the recovery point that you want to copy. Recovery point sets appear as single recovery points.
Page 131
Managing backup destinations Converting a recovery point to a virtual disk format VMware ESX Server 2.5 and 3.0 VMware Infrastructure 3 Microsoft Virtual Server 2005 R2 To convert a recovery point to virtual disk format On the Tools page, click Convert to Virtual Disk, and then click Next. Select the recovery point that you want to convert, and then click Next.
Page 132
Managing backup destinations Converting a recovery point to a virtual disk format Click Browse to locate the folder in which you want to place the virtual disk image. If you select a network location, type your network credentials. “About network credentials” on page 66.
Managing backup destinations Managing file and folder backup data Import location Type the path to the folder to which you want to import the virtual disk files. Note: The folder that you select must be different than the upload location folder. Remove intermediate files Check this option if you want the temporary files to...
Managing backup destinations Managing file and folder backup data Limiting the number of file versions to keep You can manage your file and folder backup data by limiting the number of versions of backup files that you keep. This can significantly reduce the amount of disk space required, especially if the files are large, as is often the case with audio and video files.
Managing backup destinations Automating management of backup data You can specify a limit to the number of versions of each file or folder stored in file and folder backup data. “Limiting the number of file versions to keep” on page 134. To find versions of a file or folder Open Windows Explorer.
Managing backup destinations Moving your backup destination Moving your backup destination You can change the backup destination for your recovery points and move your existing recovery points to a new location. For example, suppose you install a new external hard drive for storing your backup data. You could then change the backup destination for one or more backups to the new drive.
Page 137
Managing backup destinations Moving your backup destination If you have file and folder backup data that you want to move to the new backup destination, click Move file backup data. The Move File Backup Data option is not available no file and folder backup data is found at the original backup destination.
Page 138
Managing backup destinations Moving your backup destination...
Chapter Recovering files, folders, or entire drives This chapter includes the following topics: About recovering lost data Recovering files and folders by using file and folder backup data Recovering files and folders by using a recovery point Recovering a secondary drive About LightsOut Restore About recovering lost data Norton Ghost can restore lost files, folders, or entire drives by using recovery...
Page 140
Recovering files, folders, or entire drives Recovering files and folders by using file and folder backup data Norton Ghost includes a search tool to help you locate the files that you want to recover. To recover files and folders by using file and folder backup data On the Home or Tasks page, click Recover My Files.
Recovering files, folders, or entire drives Recovering files and folders by using a recovery point Click Recovered Files folder on the desktop to restore your files to a Recovered Files folder on your Windows desktop. Norton Ghost creates this folder during the restore. Click Alternate folder and type the path to the location in which you want to restore your files.
Page 142
Recovering files, folders, or entire drives Recovering files and folders by using a recovery point Filename Lets you browse to another location, for example, an external (USB) drive or removable media to select a recovery point (.v2i) file. Select this option, and then do the following: Click Browse, locate and select a recovery point (.v2i file), and then click Open.
Recovering files, folders, or entire drives Recovering files and folders by using a recovery point Click Recover Files. In the Recover My Files dialog box, do one of the following: Click Original folders to have your files restored in the original folder where they existed when they were backed up.
Recovering files, folders, or entire drives Recovering a secondary drive Recovering a secondary drive If you lose data on a secondary drive, you can use an existing recovery point for that drive to restore the data. A secondary drive is a drive other than the drive on which your operating system is installed.
Page 145
Recovering files, folders, or entire drives Recovering a secondary drive Do one of the following: To use the recovery point that is selected, click Next. Click Browse to select a different recovery point, and then click Next. If you need to access recovery points on a network that requires user authentication, enter your user name and password, and then click Next.
Page 146
If the Retry option fails, click Ignore to tell Windows to attempt to force a lock on the drive. If Ignore failes, you might be prompted to insert the Symantec Recovery Disk and manually start the recovery environment so that you can complete the recovery. When the recovery is finished, the...
Los Angeles goes down. You can connect to the computer from your remote location by using your server's remote connection capabilities. You can remotely access the Symantec Recovery Disk to start the computer in the recovery environment. You can then use the recovery environment to restore files or an entire system partition.
RILO or DRAC device to connect to the remote server, and power on the system or restart it. As the remote server starts, open the boot menu, and then select the Symantec recovery environment. The remote server boots into the Symantec recovery environment and the connection through RILO or DRAC is lost.
Page 149
You must install a license file. “Activating Norton Ghost later” on page 25. Insert your Symantec Recovery Disk CD into your CD-ROM drive, and then click Next. If necessary, specify the path to the CD-ROM drive in which you placed the Symantec Recovery CD, and then click Next.
Page 150
Recovering files, folders, or entire drives About LightsOut Restore The files are copied from the Symantec Recovery Disk. After the files are copied, you receive a message that indicates that LightsOut Restore successfully installed. If you want to ensure that you can use the LightsOut feature when you need it, check the Test installed LightsOut Restore check box.
(which is any drive other than your system drive, or the drive where your operating system is installed), you can restore the drive within Windows. The Symantec Recovery Disk lets you run a recovery environment that provides temporary access to Norton Ghost recovery features. For example, you can access the Recover My Computer Wizard to restart the computer into its previous, usable state.
Starting a computer by using the recovery environment The Symantec Recovery Disk lets you start a computer that can no longer run the Windows operating system. The Symantec Recovery Disk is included with Norton Ghost. When you boot your computer using the SRD CD, a simplified version of Windows starts that runs a recovery environment.
If you decline, you cannot start the recovery environment, and your computer will restart. Configuring your computer to boot from a CD To run Symantec Recovery Disk, you must be able to start your computer using a CD. To configure your computer to boot from a CD Turn on your computer.
Save the changes and exit the BIOS setup to restart the computer with the new settings. Press any key to start the recovery environment (Symantec Recovery Disk). When you start your computer with the SRD CD in the drive, you will see a prompt telling you to “Press any key to boot from CD”.
Page 155
User's Guide. To locate the latest virus definitions Insert the Symantec Recovery Disk CD into the media drive of the computer. The installation program should start automatically. If the installation program does not start, on the Windows taskbar, click Start >...
If more recent virus definitions are not found, you can still scan for viruses on your damaged computer by using the virus definitions that are on the Symantec Recovery Disk CD. However, the computer might not be protected from new viruses or threats.
Page 157
On the Home panel, click Recover My Computer. Note: If your recovery points are stored on a CD or DVD and you only have one CD/DVD drive, you can eject the Symantec Recovery Disk CD now. Insert the CD or DVD that contains your recovery points.
Page 158
Recovering a computer Recovering a computer System Displays a list of all of the drives on your computer and shows any associated recovery points. You can also select a system index file (.sv2i). Select this option, and then do the following: Click Browse, locate and select a recovery point (.sv2i), and then click Open.
Page 159
Recovering a computer Recovering a computer Partition type Sets the partition type as follows: Primary partition: Because hard disks are limited to four primary partitions, select this type if the drive will have four or less partitions. Logical partition: Select this type if you need more than four partitions.
Click Yes to restore the drive. Restoring multiple drives by using a system index file You can run the Recover My Computer wizard from the Symantec Recovery Disk to restore a computer that has multiple drives. This type of restore operation uses a system index file (.sv2i) to reduce the amount of time that is needed to restore...
The system index file contains a list of the most recent recovery points, which includes the original drive location of each recovery point. If you have suffered a catastrophic hard drive failure, you can also use Symantec Recovery Disk to perform a bare metal recovery of a computer.
Page 162
Recovering a computer Recovering files and folders from the recovery environment If the Symantec Recovery Disk cannot locate any recovery points, you are prompted to locate one. In the Open dialog box, navigate to a recovery point, select one, and then click Open.
166. Using the pcAnywhere thin host for a remote recovery The Symantec Recovery Disk includes a pcAnywhere thin host, which lets you remotely access a computer in the recovery environment. The pcAnywhere thin host contains the minimum settings that are needed to support a single-use remote control session.
Page 164
To start the pcAnywhere thin host After you start the thin host from the Symantec Recovery Disk, it waits for a connection from a remote computer. You can connect to the thin host to remotely manage a recovery or to perform other tasks in the recovery environment. You must use Symantec pcAnywhere to connect to the thin host.
Page 165
Recovering a computer Using the networking tools in the recovery environment On the client computer, in Symantec pcAnywhere, configure a remote connection item. For more information, see the Symantec pcAnywhere User's Guide. Note: You do not need to choose to automatically login to the host on connection.
If there is no DHCP server or the DHCP server is unavailable, you must provide a static IP address and a subnet mask address for the computer on which you are running Symantec Recovery Disk. “Configuring network connection settings ”...
Recovering a computer Viewing properties of recovery points and drives To get a static IP address In the Network Adapter Configuration box, click Use the following IP address. Specify a unique IP address and subnet mask for the computer that you want to restore.
Recovering a computer Viewing properties of recovery points and drives Viewing the properties of a drive within a recovery point Viewing properties of a recovery point You can view various properties of a recovery point by using the Recovery Point Browser.
Support might ask you to use to troubleshoot any hardware issues that you encounter. You might be required to supply the information that is generated by these utilities if you call Symantec Technical Support for help resolving problems. Note: You should only use these tools as directed by Symantec Technical Support.
Page 170
Recovering a computer About the Support Utilities...
Chapter Copying a drive This chapter includes the following topics: About copying a drive Preparing to copy drives Copying one hard drive to another hard drive About copying a drive You can use the Copy Drive feature to copy your operating system, applications, and data from one hard drive to another hard drive.
Copying a drive Copying one hard drive to another hard drive To prepare to copy drives Do all of the following: Prepare the computer. Get the manufacturer's directions for installing the drive. Shut down the computer, and then disconnect the power cord. Discharge electricity by touching a grounded metal object.
It then boots from that location. If the drive is not bootable or you are not certain if it is, have a boot disk ready. You can use the Symantec Recovery Disk. The Set drive active option is valid for basic disks only (not...
Page 174
Option Description Disable SmartSector copying The SmartSector technology from Symantec speeds up the copying process by only copying the clusters and sectors that contain data. However, in a high-security environments, you might want to copy all clusters and sectors in their original layout, regardless of whether they contain data.
Appendix Using a search engine to search recovery points This appendix includes the following topics: About using a search engine to search recovery points Enabling search engine support Recovering files using Google Desktop's Search Desktop feature About using a search engine to search recovery points Norton Ghost supports the use of Google Desktop for searching for file names that are contained in recovery points.
Page 176
Using a search engine to search recovery points Enabling search engine support Install a search engine You can download and install Google Desktop for free from the Internet. Visit desktop.google.com. “To install Google Desktop” on page 176. Enable Google Desktop support A Google plug-in for Norton Ghost is required before you can use Google Search to locate and recover files.
Using a search engine to search recovery points Recovering files using Google Desktop's Search Desktop feature To enable Google Desktop support Start Norton Ghost. Click Tasks > Options > Google Desktop. Check Enable Google Desktop File and Folder Recovery. Click OK. This option is not available if you do not have Google Desktop installed.
Using a search engine to search recovery points Recovering files using Google Desktop's Search Desktop feature If a file cannot be found using Google Desktop If you are certain that your file is included in a recovery point that has search engine support enabled, but the file is not found, do the following: Right-click the Google Desktop icon in the system tray and click Indexing >...
Index backups (continued) define first 25 access defining and running 47 allow or deny users or groups 103 defining drive-based 57 activate the product 25 defining file and folder 79 Advanced page deleting 90 about 17 disabling 90 showing or hiding 17 dual-boot computers 56 agent edit advanced options 69...
Page 180
Index Driver Validation 27–28 drives cancelling the current operation 86 backup protection level 108 categories details about each 114 managing file types 39 improving protection levels of 115 checking computer agent services 97 protecting 108 command files recovering 139 running during a backup 66 restoring multiple using system index file 160 computer unmounting recovery point 123...
Page 181
Index file and folder backup about 126 hard disk deleting files from 134 recovery of 139 recovering using backup data from 139 hard disks file and folder backup data recovering primary 156 backup destination 54 rescanning 108 default storage location 36 hard drives managing 133 copying one to another 172...
Page 182
Index network RAM drives enabling throttling 38 not supported 21 network credentials recover computer rules when supplying 66 remotely 163 network services tasks to try first 154 configure connection settings 166 recovery get static IP address 166 about 139 starting in recovery environment (SRD) 163 cancelling 86 using in recovery environment (SRD) 163 computer (C drive) 151...
Page 183
97 supported 20 Support Utilities 169 reports, log file 99 sV2i files 161 requirements Symantec Backup Exec Web Retrieve system 19 configuring with backups 122 rescanning disks 108 use to search for recovery points 175 restarting agent 100...
Page 184
Index system drive Windows Vista recovering 27–28 support for 14, 19 system index file using to restore multiple drives 160 system requirements 19 System Restore Wizard 161 system tray icon adjusting default settings 38 show or hide 38 show or hide error messages 38 show or hide status messages 38 tabs Events and log file 99...
Need help?
Do you have a question about the GHOST 14 and is the answer not in the manual?
Questions and answers