Norton Ghost 12.0 Readme

About this readme

Carefully read the issues in this document before installing and using Norton Ghost™. This document contains important information that was discovered after the product was released to manufacturing.

About product documentation

You can access the Help system from within the product for information regarding how to use and troubleshoot the product. You can also access the complete Norton Ghost User's Guide in PDF format in the \Docs folder on the product CD. The Troubleshooting appendix contains many known issues and workarounds.

Known issues

The following section contains known issues that might affect the functionality of Norton Ghost. Please review each section carefully.

General issues

Items in this section are not specific to any one feature of the product. Please review them carefully.

  • If your computer shares RAM with another device, such as your graphics card, then your computer might not meet the minimum RAM requirements for using one or more features of Norton Ghost. You should avoid sharing RAM if your computer only meets the minimum amount of RAM required by Norton Ghost.

    For example, the minimum RAM requirement for Symantec Recovery Disk is 512 MB. The entire RAM amount must be unshared and dedicated exclusively to Symantec Recovery Disk. If it is not dedicated and unshared, you may run out of memory when you restore recovery points or perform other tasks using Symantec Recovery Disk.

    Refer to the Norton Ghost User's Guide for minimum system requirements.

  • If you are using Microsoft BitLocker to secure the data on a drive, consider the following key points:

    • LightsOut Restore does not work on BitLocked drives. Therefore, if you BitLock your system drive, you cannot recover the drive using LightsOut Restore.

    • You can back up a BitLocked drive and then restore it using the Symantec Recovery Disk CD (or a customized version of the Symantec Recovery Disk).

    • After restoring a BitLocked drive, you must set up BitLocking again, as the drive will no longer be BitLocked after it is recovered.

    • If you are concerned about securing the data on a drive (which is a common reason for using BitLocker), you can encrypt your recovery points as a way of securing the data contained in them.

    • If you are restoring a recovery point of a Windows Vista computer that contains data from a previously Bitlocked drive to a new drive, you must have a recovery point of both the boot partition and the system partition.

      You must restore the boot partition first, and then restore the system partition second. This allows the boot configuration data (BCD, a new data store introduced with Windows Vista) to be updated so that your computer boots correctly.

  • When using a customized Symantec Recovery Disk CD, you might receive the following error:

    file:\\windows\system32\winload.exe status: 0xc0000001 The selected entry could not be loaded because the application is missing or corrupted.

    This error is known to occur if your operating system resides on a drive formatted to FAT32.

    To resolve this issue, reset %TEMP% to point to a secondary drive that is formatted to NTFS and that has enough disk space to host %TEMP%. Then re-create a custom Symantec Recovery Disk.

  • Sometimes Windows incorrectly reports insufficient hard disk space when saving a recovery point to a Linux Samba share. To solve this issue, verify that Windows identifies the correct amount of space.

  • If you are running Japanese and English computers on the same network, Japanese computer names may appear garbled in the console.

  • Norton Ghost does not support computers that use the GRUB Boot Loader.

  • Norton Ghost does not support computers that use Fedora Core3 Ext2/Ext3 or Grub 2 boot managers.

  • Norton Ghost does not support writing to a shared CD drive on another computer.

  • If you are using an Iomega REV drive to back up your system, in order to write to drives, you must download the correct REV driver by going to the Iomega Web site. The REV driver that ships on the REV drive CD is not compatible with Norton Ghost. The driver to download is rev_system_software-w32-x86-30345. You must log in with your Iomega user account information to download this driver.

  • If you encounter failures in saving recovery points to your network, Symantec recommends that you set up network throttling. Backing up multiple machines at the same time to the same network location can limit the bandwidth on your network.

    See the Norton Ghost User's Guide for more details about network throttling.

  • Norton Ghost does not support dual boot or boot-strapping environments. If you want to manually edit your partition's boot.ini file, do the following:

    • Do not select the option to reboot after a recovery point is restored.

    • Restore the recovery point.

    • From within Symantec Recovery Disk, choose Utilities > Edit boot.ini.

    • Make the needed changes, and then reboot your computer.

  • If you restore a file or folder that is shared, the sharing permissions are not restored. You will have to manually reconfigure the sharing permissions.

  • There is a known issue with re-targeting computers that use the Promise FastTrak 378 SATA controller.

  • If you are running Windows Vista and attempt to restore your system drive using recovery points that span multiple CDs or DVDs, you might encounter a known error. It appears that a conflict exists between Windows Vista and Gear CD/DVD drivers. To work around this issue, you should copy the required recovery points to a second internal or external hard drive, and then restore your computer from the second drive.

  • Because Microsoft Virtual Server and Virtual PC do not support 64-bit guests, Norton Ghost does not support the conversion of a 64-bit system volume to VHD format. However, you can convert data volumes to VHD format.

  • If you are using a network location as your backup destination, make sure that you have provided a valid network user name and password. Norton Ghost frequently accesses the backup destination to verify that you have valid recovery points. If your network account is in a domain, common security procedures lock your account after a certain number of failed login attempts. If your login credentials are invalid, you could be locked out of your network account after multiple, failed attempts by Norton Ghost to access the backup destination.

  • If you want to use a dynamic disk as your backup destination, you should run the Symantec Recovery Disk to see if the dynamic disk is accessible. You must have access to the recovery points stored in your backup destination in order to recover your computer.

Installation issues

Items in this section relate to issues found with installing Norton Ghost.

  • Norton Ghost does not support Global Partition Table (GPT) partitions.

  • After installing Norton Ghost, you are prompted to reboot your computer. Rebooting your computer is necessary in order to install and activate the system drivers, symsnap.sys and v2imount.sys.

  • If you uninstall Norton Ghost, the capicom.dll file might still appear in the system directory. This is a shared .dll file that is used to perform LiveUpdate for all Symantec products. If you have multiple Symantec products on your computer, or if it is unclear whether the file is needed, it will not be uninstalled.

  • If you uninstall any earlier version of this product, you might encounter a problem with the virtual volume driver. Uninstall and reinstall Norton Ghost. If this does not correct the issue, you may need to call Symantec Technical Support for assistance in correcting the product's registry entries.

  • The following files are temporary shortcuts and icons created by MSI:

    (Windows XP) <system_drive_letter>:\WINDOWS\Installer\{guid_number}\ _F2526B23_3845_44C8_A4C5_5D43FF9A707F

    • 1033.MST

    • ARPPRODUCTICON.exe

    • ImageBrowser_32_digit_number.exe

    • NewShortcut12_32_digit_number.exe

    • SecurityV2i_32_digit_number.EXE

  • The Norton Ghost install disables the Windows Last Access Time setting, which is used record the date and time when files are accessed. This setting significantly slows down backup jobs that have search engine support enabled.

    Note:

    On Windows Vista, this setting is already disabled by default.

    If you depend on Last Access Time and can accept its effect on the speed of backup jobs that have search engine support enabled, you can use the following set of parameters at installation time to ensure that Last Access Time is left enabled. You must run this command from within the \Install folder on the product CD.

    The easiest way to run the install with these parameter settings is from the Windows Run command:

To leave Last Access Time enabled

  1. On the Windows taskbar, click Start > Run, and then type the following command:

    setup.exe /s /v"/qn DMFILEACCESS=1"

  2. Click OK.

Uninstallation issues

This section contains issues discovered when uninstalling Norton Ghost.

  • When you uninstall Norton Ghost, LiveUpdate remains installed on your computer. If you want to uninstall LiveUpdate, go to your Windows Start menu, and then choose Settings > Control Panel > Add or Remove Programs > LiveUpdate > Remove.

  • The following is a list of folders containing files that remain on a computer following an uninstall of the software. If you want, you can manually delete these files inside the specified folder; however, it is not necessary to remove them.

    • system_drive_letter:\Documents and Settings\Administrator\Application Data\IsolatedStorage.

      The IsolatedStorage folder contains folders and several .xml and .dat files. These files are used by the Microsoft .NET Framework application to store window sizes, locations, and so forth.

      Note:

      You should determine whether other applications are using the IsolatedStorage folder before removing it.

    • system_drive_letter:\Documents and Settings\Administrator\Local Settings\Application Data\Application History

      The Application History folder contains three .INI files: ngen.exe.89f695a3.ini, PolMigrate.exe.b48b92de.ini, and V2iConsole.exe.d0888215.ini. These files are created by the Microsoft .NET Framework for each .NET application that is run.

    • system_drive_letter:\Documents and Settings\All Users\Application Data\Symantec

      This folder contains the "hpc" folder required for software license enforcement.

    • system_drive_letter:\Program Files\Common Files\Symantec Shared\Licenses

      This folder contains the Norton Ghost license file and may include other Symantec license files for other products.

  • Windows Registry entries created by the install include the following:

    • HKEY_USERS\.DEFAULT\Software\Symantec

    • HKEY_USERS\S-1-5-21-1409082233-1275210071-1801674531-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu\Programs\Norton Ghost

  • The following is a list of files that are installed outside the default folder location where the software is installed. All of these files are removed during an uninstall of the software.

    (Windows XP) <system_drive_letter>:\WINDOWS\system32

    • EventMonitors.dll

    • GEARAspi.dll

    • Gearsec.exe

    Also, the following folders:

    • (Windows XP) <system_drive_letter>:\WINDOWS\system32\drivers

LightsOut Restore

If you are using LightsOut Restore, consider the following known issues:

Remote management

If you are using the one-to-one management feature, review the following key points:

To enable DCOM:

  1. From the Start menu, click Run.

    For Windows Vista, if the Run option is not visible, do the following:

    • Right-click the Start button, and click Properties.

    • On the Start Menu tab, click Customize.

    • Scroll down and check Run command.

    • Click OK.

  2. Enter dcomcnfg.exe, and then press Enter.

  3. In the tree on the left, double-click Component Services, and then double-click Computers.

  4. Right-click My Computer, and then select Properties.

  5. Click the Default Properties tab, and then select the Enable Distributed COM on this Computer check box.

  6. Click OK to save the settings.

Third-party code

Portions of this product include third-party licensed code as provided below.

Portions Copyright © 2003, Dr. Brian Gladman (brg@gladman.me.uk), Worcester, UK. All rights reserved.

License terms

The free distribution and use of this software in both source and binary form is allowed (with or without changes) provided that:

  • Distributions of this source code include the above copyright notice, this list of conditions and the following disclaimer;

  • Distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other associated materials;

  • The copyright holder's name is not used to endorse products built using this software without specific written permission.

ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above.

DISCLAIMER - This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose.

About Windows Vista manifests

The following table lists applications that have been tested on Windows Vista by Symantec but are provided by third-party software vendors and do not include embedded Windows Vista manifests:

Copyright notification

Copyright © 2007, Symantec Corporation. All rights reserved. Symantec, LiveState, Norton, and Norton Ghost are trademarks or registered trademarks of Symantec Corporation. All other brand or product names are trademarks or registered trademarks of their respective owners.