Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0 User manual

Category
Software
Type
User manual

This manual is also suitable for

Symantec Ghost Imaging
Foundation
7.1
Symantec Ghost Imaging Foundation
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Documentation version 7.0
Legal Notice
Copyright © 2008 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Supports primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantecs maintenance offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization
Telephone and Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers automatic software upgrade protection
Global support that is available 24 hours a day, 7 days a week
Advanced features, including Account Management Services
For information about Symantecs Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support
information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
Product release level
Hardware information
Available memory, disk space, and NIC information
Operating system
Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and maintenance contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:
[email protected]Asia-Pacific and Japan
[email protected]Europe, Middle-East, and Africa
[email protected]North America and Latin America
Additional enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your
investment in Symantec products and to develop your knowledge, expertise, and
global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
Symantec Early Warning Solutions
These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.
Managed Security Services
Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused on
establishing and maintaining the integrity and availability of your IT resources.
Consulting Services
Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
Educational Services
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Technical Support ............................................................................................... 4
Chapter 1 Using Symantec Ghost as a stand-alone
program ........................................................................... 13
About Ghost.exe .......................................................................... 13
Using Ghost.exe on a stand-alone computer ...................................... 14
Starting Ghost.exe ........................................................................ 15
Using Ghost.exe with a mapped network drive ................................... 15
Establishing a peer-to-peer connection with Ghost.exe ........................ 16
About splitting images in a peer-to-peer operation ....................... 19
Creating a backup image file .......................................................... 19
Backing up a hard disk to an image file ....................................... 19
Backing up a partition to an image file ....................................... 21
Restoring from an image file .......................................................... 23
Restoring a hard disk from an image file .................................... 23
Restoring a partition from an image file ..................................... 25
Cloning disks and partitions ........................................................... 26
Cloning disk to disk ................................................................ 27
Cloning partition to partition ................................................... 28
Verifying integrity ....................................................................... 30
Adding switches to your Ghost.exe operation .................................... 30
Running Ghost32.exe in Windows ................................................... 31
Compatibility with Ghost.exe ................................................... 32
Chapter 2 Symantec Ghost support for image files and
disks ................................................................................. 33
About Symantec Ghost image files .................................................. 33
Image files and compression .......................................................... 34
Performance on a network ....................................................... 34
Image files and CRC32 .................................................................. 35
Image files and volume spanning .................................................... 36
Limitations on the image file size .............................................. 36
Size-limited image files ........................................................... 36
Spanned image files ................................................................ 36
Spanning across multiple volumes and limiting span sizes ............ 37
Contents
Restoring from a spanned image ............................................... 38
Image files and tape drives ............................................................. 38
Drives with BitLocker Drive Encryption ........................................... 39
Dynamic disks in Windows Vista/XP/2003/2000 ................................ 39
Support for Disk Drive Overlays (DDO) ............................................. 40
Hibernation and swap files ............................................................. 41
Backing up or migrating a server ..................................................... 42
Resolving SID and configuration issues ...................................... 42
Chapter 3 Modifying image file contents with Ghost
Explorer ........................................................................... 43
Using Ghost Explorer .................................................................... 43
Viewing image files and their properties ........................................... 44
Launching a file ........................................................................... 45
Extracting a file or directory from an image file ................................. 46
Modifying image files ................................................................... 46
Listing the contents of an image file ................................................ 47
About image file spans .................................................................. 47
Setting the default split options ...................................................... 48
Compiling an image file ................................................................. 48
Using Ghost Explorer from the command line ................................... 49
Using Ghost Explorer with long file names ................................. 50
Chapter 4 Running DeployAnywhere from the command
line .................................................................................... 51
Running DeployAnywhere from the command line ............................. 51
Evaluating the target volume ................................................... 52
Retargeting the image ............................................................. 53
Adding new drivers to the Ghost Deploy Anywhere driver
database ............................................................................... 53
Chapter 5 Managing partitions using GDisk ..................................... 55
About GDisk ................................................................................ 55
Running GDisk ...................................................................... 56
Overview of the main command-line switches ................................... 57
Online Help for command-line switches ..................................... 58
Switches common to all GDisk commands .................................. 58
Creating a partition ...................................................................... 61
Reinitializing the Master Boot Record .............................................. 63
Reinitializing GPT disks ................................................................ 64
Showing information about disks .................................................... 64
Contents8
Performing multiple GDisk operations using batch mode .................... 65
Deleting and wiping your disk ........................................................ 66
Wiping Host Protected Areas (HPA)/PARTIES ............................. 69
Confirming a disk wipe ............................................................ 70
Activating or deactivating a partition .............................................. 71
Hiding or unhiding a partition ........................................................ 71
Modifying the Windows 2000/XP boot menu ..................................... 72
Specifying the boot.ini path and file name .................................. 73
Displaying the list of current boot entries ................................... 73
Adding an entry to boot.ini ...................................................... 73
Removing an entry from boot.ini ............................................... 76
Setting the default boot option and timeout ................................ 76
Support for large hard-disks .......................................................... 76
Chapter 6 Manipulating files and directories using
OmniFS ............................................................................ 79
About OmniFS ............................................................................. 79
OmniFS operating environments .................................................... 80
Using OmniFS ............................................................................. 80
Access method switches .......................................................... 81
Accessing files and folders with names that contain spaces ............ 83
Listing drive identifiers ........................................................... 83
OmniFS operations ....................................................................... 84
Setting the attribute for a file ................................................... 84
Copying files and directories .................................................... 85
Renaming files and folders ....................................................... 85
Deleting a file ........................................................................ 86
Deleting a folder .................................................................... 86
Listing a folder ...................................................................... 86
Listing all volumes on a computer ............................................. 86
Listing the commands ............................................................. 87
Displaying the OmniFS version and copyright ............................. 87
Creating a directory ................................................................ 87
Using OmniFS to recover files ........................................................ 87
Using a script file ......................................................................... 89
OmniFS scenarios ........................................................................ 90
Using OmniFS from the command line ....................................... 90
Using OmniFS with a script file ................................................ 90
Using OmniFS with a batch file ................................................. 90
OmniFS error handling ................................................................. 91
Correcting the date and time .......................................................... 91
9Contents
Chapter 7 Editing registry keys and values using
GhRegEdit ....................................................................... 93
About GhRegEdit ......................................................................... 93
Using GhRegEdit .......................................................................... 94
Chapter 8 Using GhostCasting to create and restore
images ............................................................................ 101
About GhostCasting .................................................................... 101
Splitting images in a GhostCast operation ................................. 102
Preparing for GhostCasting .......................................................... 103
About creating the model computer ......................................... 103
Creating a GhostCast Server ......................................................... 103
Starting a GhostCast session ........................................................ 104
Creating an image file ................................................................. 105
Connecting a computer to a session ......................................... 105
Restoring an image file onto client computers ................................. 106
Controlling the GhostCast session from the server ............................ 108
Setting Auto Start parameters ...................................................... 111
Setting the data transfer mode ...................................................... 111
Controlling the amount of network bandwidth used .......................... 113
Viewing and changing GhostCast Server session options ................... 114
Running Ghost.exe on a client computer ......................................... 115
Chapter 9 GhostCasting from the command line .......................... 117
About running GhostCast Server from the command line ................... 117
Starting the GhostCast session ...................................................... 118
GhostCast Server command-line options ........................................ 118
Command-line option examples using GhostCast Server .............. 119
Chapter 10 GhostCasting and IP addresses ...................................... 123
About IP addresses for GhostCasting .............................................. 123
Locally specified IP addresses ....................................................... 123
Examples of Wattcp.cfg client configuration files ....................... 124
About using BOOTP/DHCP to assign IP addresses ............................. 124
BOOTP/DHCP automatically defined IP address ......................... 124
Appendix A GDisk disk-wipe specifications ....................................... 125
About GDisk disk-wipe specifications ............................................. 125
Clearing, sanitizing, and viewing hard disks .................................... 125
About completeness of coverage .................................................... 127
Contents10
Determining disk size .................................................................. 129
Appendix B Command-line switches ................................................... 131
About Symantec Ghost switches .................................................... 131
Listing command-line switches ............................................... 132
Command-line switches ............................................................... 132
Accessing files ........................................................................... 148
Using the clone switch ................................................................ 148
Defining the type of clone command ........................................ 149
Setting a source for the clone switch ........................................ 151
Setting a destination for the clone switch .................................. 152
Setting a destination size for the clone switch ............................ 154
Examples of clone switch usage ............................................... 154
Batch file example ................................................................ 156
Using the -CRC32 switch .............................................................. 157
Examples of -CRC32 usage ..................................................... 158
Files not checked with CRC ..................................................... 159
About numbering the Virtual Partition ........................................... 159
Appendix C Ghost for Linux ................................................................... 161
Supported configurations ............................................................ 161
Supported Linux distributions for cloning ................................. 164
Supported Linux distributions for running Ghost ............................. 165
Symantec Ghost utility support ..................................................... 165
Appendix D Configuring firewalls ......................................................... 167
Symantec Ghost port configuration ............................................... 167
Appendix E Troubleshooting ................................................................. 171
Ghost.exe errors messages ........................................................... 171
Ghost.exe problems .................................................................... 172
Vista volume containing system restore points .......................... 173
Starting from a PXE image on a Dell Dimension 8100
computer ...................................................................... 173
About using Ghost with NTFS files .......................................... 173
Symantec GhostCast errors .......................................................... 175
Symantec Ghost and legacy network cards ...................................... 177
Problems running Symantec Ghost ................................................ 177
Cloning Windows 2000/XP computers ...................................... 177
Vista partition restore ........................................................... 177
Joining client computers to Active Directory Domains ................. 177
11Contents
Cannot start from drive A ...................................................... 178
Windows blue screen ............................................................ 178
Missing hibernation file ......................................................... 178
About cancelling a Ghost.exe operation .................................... 179
Index ................................................................................................................... 181
Contents12
Using Symantec Ghost as a
stand-alone program
This chapter includes the following topics:
About Ghost.exe
Using Ghost.exe on a stand-alone computer
Starting Ghost.exe
Using Ghost.exe with a mapped network drive
Establishing a peer-to-peer connection with Ghost.exe
Creating a backup image file
Restoring from an image file
Cloning disks and partitions
Verifying integrity
Adding switches to your Ghost.exe operation
Running Ghost32.exe in Windows
About Ghost.exe
Ghost.exe is a stand-alone program run within DOS that lets you copy disks or
partitions from one computer to another. You can use Ghost to create image files
and restore them.
1
Chapter
Note: For Ghost32, VMDK images are supported for all normal operations, and
PQI and V2I images are supported as a source (but not as a destination) in all
cloning operations. You must have v2DiskLib.dll in the same directory as
Ghost32.exe.
The information about Ghost.exe is also true for Ghost for Linux, with the following
limitations:
Direct writing to CD or tape is not supported.
Peer to peer connections over printer cable or USB cable are not supported.
Using Ghost.exe on a stand-alone computer
The following is an overview of how to start and run Ghost.exe.
Note: Ghost.exe does not fit on a single floppy disk. Ghost.exe is concatenated on
a RAM drive in DOS and executed from the RAM drive. The concatenation is
transparent.
To use Ghost.exe on a stand-alone computer
1
Start Ghost.exe.
See Starting Ghost.exe on page 15.
Add command-line switches, if necessary.
See About Symantec Ghost switches on page 131.
2
If necessary, establish a peer-to-peer connection.
See Establishing a peer-to-peer connection with Ghost.exe on page 16.
3
Select the Ghost.exe operation:
Disk or partition to image file
Disk or partition from image file
Disk to disk
Partition to partition
Check image or disk
4
Do one of the following:
Select the source hard disk or partitions.
Select the image file.
Using Symantec Ghost as a stand-alone program
Using Ghost.exe on a stand-alone computer
14
5
Do one of the following for operations other than checking an image:
Select the destination hard disk or partition.
Select the image file.
Warning: Make sure that you select the correct destination. The destination
disk is completely overwritten with no chance of recovering any data.
6
Complete the Ghost.exe operation.
Starting Ghost.exe
Ghost.exe is a DOS-based application that runs in DOS mode outside of Windows.
You cannot run Ghost.exe within Windows Vista/XP/2000, Linux, OS/2, or other
non-DOS operating systems. You can run Ghost.exe on a non-DOS operating
system by using a Ghost boot package. The Ghost boot package lets you start the
computer in DOS.
To start Ghost.exe
Do one of the following:
At the DOS prompt, type the following command:
progra~1\symantec \ghost\ghost.exe
Start the computer in
DOS mode.
After the first DOS boot disk loads you are prompted to insert
the second Ghost boot disk. Ghost starts automatically.
You can create a DOS boot disk on a computer that is running
Windows or DOS. Additional DOS drivers might be required
to runGhost.exe. If you cannot access some hardware or
network resources, such as a CD-R/RW drive, you can use
the Ghost Boot Wizard to create a boot disk that contains the
necessary drivers.
Use a DOS boot disk to
start the computer.
When the computer starts Ghost starts automatically.
You can use the Ghost Boot Wizard to create a DOS boot
package.
Use a DOS boot
package to start the
computer.
Using Ghost.exe with a mapped network drive
When you access a mapped network drive you must be aware of the following:
15Using Symantec Ghost as a stand-alone program
Starting Ghost.exe
You must use a mapped network boot package created from the Ghost Boot
Wizard.
If the boot package contains Ghost.exe then you cannot save the package to a
floppy disk set. You can save the package to a USB flash drive or an ISO image.
If you run Ghost.exe from any location other than A: then you must reset the
environment variable to the correct location of Wattcp.cfg before you start
Ghost.
DOS drivers cannot handle large files over a mapped network drive. Therefore,
Ghost sets a 2 GB split limit when writing to a mapped network drive. Before
you access a large image file over a mapped network drive you should split the
image file into spans that are no greater than 2 GB.
See About image file spans on page 47.
If you have restarted the computer with a boot package that does not contain
Ghost. exe then the computer restarts to a command prompt, for example D:\.
You must reset the Wattcp environment variable to D:\net\wattcp.cfg. You can
then start Ghost.exe from the mapped network drive.
If you have restarted the computer with a boot package that contains Ghost.exe
then Ghost starts after the computer has restarted. If GhostCasting or peer-to-peer
services are not available from the menu then ensure that Ghost is reading a
Wattcp.cfg that has SHARE_MODE=1. Exit Ghost and then at the command prompt,
reset the Wattcp environment variable. For example, if you are at the command
prompt D:\, then reset the Wattcp environment variable to D:\net\wattcp.cfg,
ensuring that D:\net\wattcp.cfg has SHARE_MODE=1. You can then restart Ghost
from either D:\ or from a mapped network drive.
To reset the environment variable to the correct location of Wattcp.cfg
1
On the command line, type the following:
set wattcp=<drive>\net\wattcp.cfg
2
Press Enter.
Establishing a peer-to-peer connection with Ghost.exe
Note: The Linux version of Ghost supports peer to peer connections over TCP
only. It does not support LPT or USB connections.
If you are using an LPT, USB, or TCP peer-to-peer connection, then you must set
up the connection between computers before a clone, backup, or restore operation.
The computers must be physically connected using one of the following:
Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
16
A parallel connection cableLPT
A USB 1.1 cableUSB
A network connectionTCP peer-to-peer
In a peer-to-peer operation, one computer is designated the master computer,
and the other is designated the slave computer.
Table 1-1 describes the possible Ghost.exe processes and the master/slave
relationships that exist within these processes.
Table 1-1
Master and slave computers
SlaveMasterAction
Computer containing
destination disk
Computer containing
source disk
Disk-to-disk clone
Computer receiving
destination image file
Computer containing
source disk
Back up disk to image file
Computer containing
source image file
Computer containing
destination disk
Restore disk from image file
Computer containing
destination partition
Computer containing
source partition
Partition-to-partition clone
Computer receiving
destination image file
Computer containing
source partition
Back up partition to image file
Computer containing
source image file
Computer containing
destination partition
Restore partition from image file
Select which computer is the master (the computer from which you control the
connection) and which is the slave (the other computer participating in the
connection). All operator input must occur on the master computer.
You must have two Ghost boot packages with which to start both the master and
slave computers. You can create the boot packages using the Ghost Boot Wizard.
Note: You must create both boot packages in the same version of Symantec Ghost.
You cannot use one boot disk that was created in Symantec Ghost 8.0 and one
boot disk that was created in Symantec Ghost 11.5 in the same task.
17Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
To establish a peer-to-peer connection with Ghost.exe
1
Do one of the following:
On the master computer, insert the first Ghost boot disk into the floppy
disk drive, and then restart the computer.
Repeat this step on the slave computer.
Restart the master computer and the slave computer by using the Ghost
boot package.
2
If you are using a floppy disk set, then, when prompted, insert the second
Ghost boot disk into the floppy disk drives of the master computer and the
slave computer.
Ghost.exe starts automatically.
3
On the slave computer, on the main menu, do one of the following:
Click Peer to peer > USB > Slave to start the computer
as the slave computer.
USB connection
Click Peer to peer > LPT > Slave to start the computer
as the slave computer.
LPT connection
Click Peer to peer > TCP/IP > Slave to start the
computer as the slave computer.
Make note of the IP address that is displayed in the
Slave Connect dialog box.
TCP/IP connection
4
On the master computer, on the main menu, do one of the following:
Click Peerto peer >USB >Master to start the computer
as the master computer.
USB connection
Click Peerto peer >LPT > Master to start the computer
as the master computer.
LPT connection
Click Peer to peer > TCP/IP > Master to start the
computer as the master computer.
Type the IP address that is displayed on the slave
computer.
TCP/IP connection
Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
18
About splitting images in a peer-to-peer operation
When you perform a peer-to-peer operation, an image is split when it reaches 2
GB in size unless you have set the split size to another value using the -split
command switch. If this switch is explicitly set to 0, the image does not split.
See About Symantec Ghost switches on page 131.
Creating a backup image file
You can create a backup of a hard disk or one or more partitions.
The backup is saved as an image file, which you can store on the following:
Second hard disk
Second partition on your hard disk (partition backup only)
LS120 Superdisk, JAZ, or ZIP disk
CD-R/RW or DVD-R/RW/+R/+RW
FireWire hard disk
USB 1.1/2.0 hard disk
Tape
Locally mapped network file server
Another computer using a peer-to-peer connection
Compression may affect the speed of your operation. When you select a
compression level, Ghost.exe estimates the amount of space available for the
destination image file. If there is insufficient space, Ghost.exe prompts you to
enable spanning of image files.
Backing up a hard disk to an image file
When you back up a hard disk, a copy of the entire disk is saved as an image file.
19Using Symantec Ghost as a stand-alone program
Creating a backup image file
To back up a disk to an image file
1
On the Ghost.exe main menu, do one of the following:
Click Local > Disk > To Image.Local
Click Disk > To Image.Peer-to-peer connection
2
In the Source Drive dialog box, select the source disk.
The Source Drive dialog box shows details of every disk that Ghost.exe finds
on the local computer.
3
In the File Locator dialog box, type the image file destination and name.
4
In the Image file description dialog box, type a description of the image file.
You can modify this description on the Console or in Ghost Explorer.
5
Click Save.
6
When you are prompted to select the compression level, select one of the
following:
For no compressionNo
For low compressionFast
For high compressionHigh
See Image files and compression on page 34.
7
In the Compress Image dialog box, select a compression option.
8
If Ghost detects that there is not enough space for the image file, you are
prompted to enable spanning.
9
Check the details and ensure that the correct options are selected.
Using Symantec Ghost as a stand-alone program
Creating a backup image file
20
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189

Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0 User manual

Category
Software
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI