Norton Ghost 14.0 Readme

About this readme

Carefully read the issues in this document before installing and using Norton Ghost™. This document contains important information that was discovered after the product was released to manufacturing.

Getting help while using Norton Ghost

To learn more about Norton Ghost, visit the new Help and Support page. Depending on which version and language of the product you have installed, the Help and Support page includes one-click access to more information, including the product help system, the product User's Guide, and access to the Symantec Knowledge Base where you can find troubleshooting information.

To access Help and Support

  1. Start Norton Ghost.

  2. On the Home page, click Help > Help and Support.

Known issues

The following section contains known issues that might affect the functionality of Norton Ghost. Please review each section carefully.

General issues

Items in this section are not specific to any one feature of the product. Please review them carefully.

  • Using a Windows 2000 FTP Server (IIS 5.0) as an Offsite Copy destination has been shown to fail. Some of the packets at the end of recovery point files are missing, making the recovery point unusable. Symantec recommends that you not use Windows 2000 FTP Server as an Offsite Copy destination.

  • When configuring a backup job to start a new recovery point set, be sure that you do not schedule the new set to start when the backup job is scheduled to create an incremental recovery point. If you do, the backup job scheduled to create the new recovery point set might not run as expected.

  • If your computer shares RAM with another device, such as your graphics card, then your computer might not meet the minimum RAM requirements for using one or more features of Norton Ghost. You should avoid sharing RAM if your computer only meets the minimum amount of RAM required by Norton Ghost.

    For example, the minimum RAM requirement for Symantec Recovery Disk is 512 MB. The entire RAM amount must be unshared and dedicated exclusively to Symantec Recovery Disk. If it is not dedicated and unshared, you may run out of memory when you restore recovery points or perform other tasks using Symantec Recovery Disk.

    Refer to the Norton Ghost User's Guide for minimum system requirements.

  • If you use Microsoft BitLocker to secure the data on a drive, consider the following key points:

    • LightsOut Restore does not work on BitLocked drives. Therefore, if you BitLock your system drive, you cannot recover the drive using LightsOut Restore.

    • You can back up a BitLocked drive and then restore it using the Symantec Recovery Disk CD (or a customized version of the Symantec Recovery Disk).

    • After restoring a BitLocked drive, you must set up BitLocking again because the drive is no longer BitLocked after it is recovered.

    • If you are concerned about securing the data on a drive (which is a common reason for using BitLocker), you can encrypt your recovery points as a way of securing the data contained in them.

    • If you are restoring a recovery point of a Windows Vista computer that contains data from a previously BitLocked drive to a new drive, you must have a recovery point of both the boot partition and the system partition.

      You must restore the boot partition first, and then restore the system partition second. This allows the boot configuration data (BCD, a new data store introduced with Windows Vista) to be updated so that your computer starts correctly.

  • When creating a customized Symantec Recovery Disk CD, you might receive the following error:

    file:\\windows\system32\winload.exe status: 0xc0000001 The selected entry could not be loaded because the application is missing or corrupted.

    This error is known to occur if your operating system resides on a drive that is formatted to FAT32.

    To resolve this issue, reset %TEMP% to point to a secondary drive that is formatted to NTFS and that has enough disk space to host temporary program files included in the SRD .iso file (approximately 400 to 600 MB, depending on the language being used). Then re-create a custom Symantec Recovery Disk.

  • Sometimes Windows incorrectly reports insufficient hard disk space when saving a recovery point to a Linux Samba share. To solve this issue, verify that Windows identifies the correct amount of space.

  • If you are running Japanese and English computers on the same network, Japanese computer names may appear garbled in the console.

  • Norton Ghost does not support computers that use the GRUB Boot Loader.

  • Norton Ghost does not support computers that use Fedora Core3 Ext2/Ext3 or Grub 2 boot managers.

  • Norton Ghost does not support writing to a shared CD drive on another computer.

  • If you use an Iomega REV drive to back up your system, you must download the correct REV driver from the Iomega Web site if you want to write to the drives. The REV driver that shipped on the REV drive CD is not compatible with Norton Ghost. The driver to download is rev_system_software-w32-x86-30345 (or the most recent version).

  • If you encounter failures in saving recovery points to your network, Symantec recommends that you set up network throttling. Backing up multiple computers at the same time to the same network location can limit the bandwidth on your network.

    See the Norton Ghost User's Guide for more details about network throttling.

  • Norton Ghost does not support dual boot or boot-strapping environments. If you want to manually edit your partition's boot.ini file, do the following:

    • Do not select the option to restart after a recovery point is restored.

    • Restore the recovery point.

    • From within Symantec Recovery Disk, choose Utilities > Edit boot.ini.

    • Make the needed changes, and then restart your computer.

  • If you restore a file or folder that is shared, the sharing permissions are not restored. You will have to manually reconfigure the sharing permissions.

  • If you are running Windows Vista and attempt to restore your system drive using recovery points that span multiple CDs or DVDs, you might encounter a known error. It appears that a conflict exists between Windows Vista and Gear CD/DVD drivers. To work around this issue, you should copy the required recovery points from CD or DVD to a second internal or external hard drive, and then restore your computer from the second drive.

  • Because Microsoft Virtual Server and Virtual PC do not support 64-bit guests, Norton Ghost does not support the conversion of a 64-bit system volume to VHD format. However, you can convert data volumes to VHD format.

  • If you are using a network location as your backup destination, make sure that you have provided a valid network user name and password. Norton Ghost frequently accesses the backup destination to verify that you have valid recovery points. If your network account is in a domain, common security procedures lock your account after a certain number of failed login attempts. If your login credentials are invalid, you could be locked out of your network account after multiple, failed attempts by Norton Ghost to access the backup destination.

  • If you want to use a dynamic disk as your backup destination, you should run the Symantec Recovery Disk to see if the dynamic disk is accessible. You must have access to the recovery points stored in your backup destination in order to recover your computer.

Installation issues

Items in this section relate to issues found with installing Norton Ghost.

  • Norton Ghost requires approximately 250 to 300 MB of hard disk space. If your system drive (typically, C) is low on disk space and you select an alternate drive to install Norton Ghost to, approximately 30 MB of disk space is still required on your system drive. If your system drive is dangerously low on disk space (less than 100 MB), you should first free up more space before installing Norton Ghost.

  • If you are upgrading to a support pack release using a CD you created from an .iso file, you might receive a message to "insert disk 1". If you receive this message, copy the contents of the CD to a location on your hard drive and run the installation from there.

  • After installing Norton Ghost, you are prompted to reboot your computer. Rebooting your computer is necessary in order to install and activate the system drivers, symsnap.sys and v2imount.sys.

  • The following files are temporary shortcuts and icons created by MSI:

    (Windows XP) <system_drive_letter>:\WINDOWS\Installer\{guid_number}\

    • _F2526B23_3845_44C8_A4C5_5D43FF9A707F

    • 1033.MST

    • ARPPRODUCTICON.exe

    • ImageBrowser_32_digit_number.exe

    • NewShortcut12_32_digit_number.exe

    • SecurityV2i_32_digit_number.EXE

  • The Norton Ghost install disables the Windows Last Access Time setting. This setting is used to record the date and time when files are accessed. However, this setting significantly slows down backup jobs that have search engine support enabled.

    Note:

    On Windows Vista, this setting is already disabled by default.

    If you depend on Last Access Time and can accept its effect on the speed of backup jobs that have search engine support enabled, you can use the following set of parameters at installation time to ensure that Last Access Time is left enabled. You must run this command from within the \Install folder on the product CD.

    The easiest way to run the install with these parameter settings is from the Windows Run command:

To leave Last Access Time enabled

  1. On the Windows taskbar, click Start > Run, and then type the following command:

    setup.exe /s /v"/qn DMFILEACCESS=1"

  2. Click OK.

Uninstallation issues

This section contains issues discovered when uninstalling Norton Ghost.

  • When you uninstall Norton Ghost, LiveUpdate remains installed on your computer. If you want to uninstall LiveUpdate, refer to your operating system's documentation for information about how to remove applications.

  • The following is a list of folders containing files that remain on a computer following an uninstall of the software. If you want, you can manually delete these files inside the specified folder; however, it is not necessary to remove them.

    If you uninstall Norton Ghost, the capicom.dll file might still appear in the system directory. This is a shared .dll file that is used to perform LiveUpdate for all Symantec products. If you have multiple Symantec products on your computer, or if it is unclear whether the file is needed, you can leave it there. Or if you are certain that the file is not longer needed, you can delete it.

  • If you uninstall any earlier version of this product, you might encounter a problem with the virtual volume driver. Uninstall and reinstall Norton Ghost. If this does not correct the issue, you may need to call Symantec Technical Support for assistance in correcting the product's registry entries.

  • You can manually remove the following folder when uninstalling Norton Ghost:

    • system_drive_letter:\Documents and Settings\Administrator\Application Data\IsolatedStorage.

      The IsolatedStorage folder contains folders and several .xml and .dat files. These files are used by the Microsoft .NET Framework application to store window sizes, locations, and so forth.

      Warning:

      You should determine whether other applications are using the IsolatedStorage folder before removing it.

  • Windows Registry entries created by the install include the following:

    • HKEY_USERS\.DEFAULT\Software\Symantec

    • HKEY_USERS\S-1-5-21-1409082233-1275210071-1801674531-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu\Programs\Norton Ghost

  • The following is a list of files that are installed outside the default folder location where the software is installed. All of these files are removed during an uninstall of the software.

    (Windows XP) <system_drive_letter>:\WINDOWS\system32

    • GEARAspi.dll

LightsOut Restore

If you are using LightsOut Restore, consider the following known issues:

Remote management

If you are using the one-to-one management feature, review the following key points:

To enable DCOM:

  1. From the Start menu, click Run.

    For Windows Vista, if the Run option is not visible, do the following:

    • Right-click the Start button, and click Properties.

    • On the Start Menu tab, click Customize.

    • Scroll down and check Run command.

    • Click OK.

  2. Enter dcomcnfg.exe, and then press Enter.

  3. In the tree on the left, double-click Component Services, and then double-click Computers.

  4. Right-click My Computer, and then select Properties.

  5. Click the Default Properties tab, and then select the Enable Distributed COM on this Computer check box.

  6. Click OK to save the settings.

Third-party code

Portions of this product include third-party licensed code as provided below.

Copyright © 2003, Dr. Brian Gladman (brg@gladman.me.uk), Worcester, UK. All rights reserved.

License terms

The free distribution and use of this software in both source and binary form is allowed (with or without changes) provided that:

  • Distributions of this source code include the above copyright notice, this list of conditions and the following disclaimer;

  • Distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other associated materials;

  • The copyright holder's name is not used to endorse products built using this software without specific written permission.

ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above.

DISCLAIMER - This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose.

About Windows Vista manifests

The following table lists applications that have been tested on Windows Vista by Symantec but are provided by third-party software vendors and do not include embedded Windows Vista manifests:

Copyright notification

Copyright © 2008, Symantec Corporation.

All rights reserved.

Symantec, LiveState, Norton, and Norton Ghost are trademarks or registered trademarks of Symantec Corporation. All other brand or product names are trademarks or registered trademarks of their respective owners.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.  Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.