Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0, GHOST IMAGING FOUNDATION 7.1 User manual

  • Hello! I am an AI chatbot trained to assist you with the Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Symantec Ghost Imaging
Foundation
7.1
Symantec Ghost Imaging Foundation
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Documentation version 7.0
Legal Notice
Copyright © 2008 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Supports primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantecs maintenance offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization
Telephone and Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers automatic software upgrade protection
Global support that is available 24 hours a day, 7 days a week
Advanced features, including Account Management Services
For information about Symantecs Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support
information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
Product release level
Hardware information
Available memory, disk space, and NIC information
Operating system
Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and maintenance contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:
[email protected]Asia-Pacific and Japan
[email protected]Europe, Middle-East, and Africa
[email protected]North America and Latin America
Additional enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your
investment in Symantec products and to develop your knowledge, expertise, and
global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
Symantec Early Warning Solutions
These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.
Managed Security Services
Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused on
establishing and maintaining the integrity and availability of your IT resources.
Consulting Services
Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
Educational Services
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Technical Support ............................................................................................... 4
Chapter 1 Using Symantec Ghost as a stand-alone
program ........................................................................... 13
About Ghost.exe .......................................................................... 13
Using Ghost.exe on a stand-alone computer ...................................... 14
Starting Ghost.exe ........................................................................ 15
Using Ghost.exe with a mapped network drive ................................... 15
Establishing a peer-to-peer connection with Ghost.exe ........................ 16
About splitting images in a peer-to-peer operation ....................... 19
Creating a backup image file .......................................................... 19
Backing up a hard disk to an image file ....................................... 19
Backing up a partition to an image file ....................................... 21
Restoring from an image file .......................................................... 23
Restoring a hard disk from an image file .................................... 23
Restoring a partition from an image file ..................................... 25
Cloning disks and partitions ........................................................... 26
Cloning disk to disk ................................................................ 27
Cloning partition to partition ................................................... 28
Verifying integrity ....................................................................... 30
Adding switches to your Ghost.exe operation .................................... 30
Running Ghost32.exe in Windows ................................................... 31
Compatibility with Ghost.exe ................................................... 32
Chapter 2 Symantec Ghost support for image files and
disks ................................................................................. 33
About Symantec Ghost image files .................................................. 33
Image files and compression .......................................................... 34
Performance on a network ....................................................... 34
Image files and CRC32 .................................................................. 35
Image files and volume spanning .................................................... 36
Limitations on the image file size .............................................. 36
Size-limited image files ........................................................... 36
Spanned image files ................................................................ 36
Spanning across multiple volumes and limiting span sizes ............ 37
Contents
Restoring from a spanned image ............................................... 38
Image files and tape drives ............................................................. 38
Drives with BitLocker Drive Encryption ........................................... 39
Dynamic disks in Windows Vista/XP/2003/2000 ................................ 39
Support for Disk Drive Overlays (DDO) ............................................. 40
Hibernation and swap files ............................................................. 41
Backing up or migrating a server ..................................................... 42
Resolving SID and configuration issues ...................................... 42
Chapter 3 Modifying image file contents with Ghost
Explorer ........................................................................... 43
Using Ghost Explorer .................................................................... 43
Viewing image files and their properties ........................................... 44
Launching a file ........................................................................... 45
Extracting a file or directory from an image file ................................. 46
Modifying image files ................................................................... 46
Listing the contents of an image file ................................................ 47
About image file spans .................................................................. 47
Setting the default split options ...................................................... 48
Compiling an image file ................................................................. 48
Using Ghost Explorer from the command line ................................... 49
Using Ghost Explorer with long file names ................................. 50
Chapter 4 Running DeployAnywhere from the command
line .................................................................................... 51
Running DeployAnywhere from the command line ............................. 51
Evaluating the target volume ................................................... 52
Retargeting the image ............................................................. 53
Adding new drivers to the Ghost Deploy Anywhere driver
database ............................................................................... 53
Chapter 5 Managing partitions using GDisk ..................................... 55
About GDisk ................................................................................ 55
Running GDisk ...................................................................... 56
Overview of the main command-line switches ................................... 57
Online Help for command-line switches ..................................... 58
Switches common to all GDisk commands .................................. 58
Creating a partition ...................................................................... 61
Reinitializing the Master Boot Record .............................................. 63
Reinitializing GPT disks ................................................................ 64
Showing information about disks .................................................... 64
Contents8
Performing multiple GDisk operations using batch mode .................... 65
Deleting and wiping your disk ........................................................ 66
Wiping Host Protected Areas (HPA)/PARTIES ............................. 69
Confirming a disk wipe ............................................................ 70
Activating or deactivating a partition .............................................. 71
Hiding or unhiding a partition ........................................................ 71
Modifying the Windows 2000/XP boot menu ..................................... 72
Specifying the boot.ini path and file name .................................. 73
Displaying the list of current boot entries ................................... 73
Adding an entry to boot.ini ...................................................... 73
Removing an entry from boot.ini ............................................... 76
Setting the default boot option and timeout ................................ 76
Support for large hard-disks .......................................................... 76
Chapter 6 Manipulating files and directories using
OmniFS ............................................................................ 79
About OmniFS ............................................................................. 79
OmniFS operating environments .................................................... 80
Using OmniFS ............................................................................. 80
Access method switches .......................................................... 81
Accessing files and folders with names that contain spaces ............ 83
Listing drive identifiers ........................................................... 83
OmniFS operations ....................................................................... 84
Setting the attribute for a file ................................................... 84
Copying files and directories .................................................... 85
Renaming files and folders ....................................................... 85
Deleting a file ........................................................................ 86
Deleting a folder .................................................................... 86
Listing a folder ...................................................................... 86
Listing all volumes on a computer ............................................. 86
Listing the commands ............................................................. 87
Displaying the OmniFS version and copyright ............................. 87
Creating a directory ................................................................ 87
Using OmniFS to recover files ........................................................ 87
Using a script file ......................................................................... 89
OmniFS scenarios ........................................................................ 90
Using OmniFS from the command line ....................................... 90
Using OmniFS with a script file ................................................ 90
Using OmniFS with a batch file ................................................. 90
OmniFS error handling ................................................................. 91
Correcting the date and time .......................................................... 91
9Contents
Chapter 7 Editing registry keys and values using
GhRegEdit ....................................................................... 93
About GhRegEdit ......................................................................... 93
Using GhRegEdit .......................................................................... 94
Chapter 8 Using GhostCasting to create and restore
images ............................................................................ 101
About GhostCasting .................................................................... 101
Splitting images in a GhostCast operation ................................. 102
Preparing for GhostCasting .......................................................... 103
About creating the model computer ......................................... 103
Creating a GhostCast Server ......................................................... 103
Starting a GhostCast session ........................................................ 104
Creating an image file ................................................................. 105
Connecting a computer to a session ......................................... 105
Restoring an image file onto client computers ................................. 106
Controlling the GhostCast session from the server ............................ 108
Setting Auto Start parameters ...................................................... 111
Setting the data transfer mode ...................................................... 111
Controlling the amount of network bandwidth used .......................... 113
Viewing and changing GhostCast Server session options ................... 114
Running Ghost.exe on a client computer ......................................... 115
Chapter 9 GhostCasting from the command line .......................... 117
About running GhostCast Server from the command line ................... 117
Starting the GhostCast session ...................................................... 118
GhostCast Server command-line options ........................................ 118
Command-line option examples using GhostCast Server .............. 119
Chapter 10 GhostCasting and IP addresses ...................................... 123
About IP addresses for GhostCasting .............................................. 123
Locally specified IP addresses ....................................................... 123
Examples of Wattcp.cfg client configuration files ....................... 124
About using BOOTP/DHCP to assign IP addresses ............................. 124
BOOTP/DHCP automatically defined IP address ......................... 124
Appendix A GDisk disk-wipe specifications ....................................... 125
About GDisk disk-wipe specifications ............................................. 125
Clearing, sanitizing, and viewing hard disks .................................... 125
About completeness of coverage .................................................... 127
Contents10
Determining disk size .................................................................. 129
Appendix B Command-line switches ................................................... 131
About Symantec Ghost switches .................................................... 131
Listing command-line switches ............................................... 132
Command-line switches ............................................................... 132
Accessing files ........................................................................... 148
Using the clone switch ................................................................ 148
Defining the type of clone command ........................................ 149
Setting a source for the clone switch ........................................ 151
Setting a destination for the clone switch .................................. 152
Setting a destination size for the clone switch ............................ 154
Examples of clone switch usage ............................................... 154
Batch file example ................................................................ 156
Using the -CRC32 switch .............................................................. 157
Examples of -CRC32 usage ..................................................... 158
Files not checked with CRC ..................................................... 159
About numbering the Virtual Partition ........................................... 159
Appendix C Ghost for Linux ................................................................... 161
Supported configurations ............................................................ 161
Supported Linux distributions for cloning ................................. 164
Supported Linux distributions for running Ghost ............................. 165
Symantec Ghost utility support ..................................................... 165
Appendix D Configuring firewalls ......................................................... 167
Symantec Ghost port configuration ............................................... 167
Appendix E Troubleshooting ................................................................. 171
Ghost.exe errors messages ........................................................... 171
Ghost.exe problems .................................................................... 172
Vista volume containing system restore points .......................... 173
Starting from a PXE image on a Dell Dimension 8100
computer ...................................................................... 173
About using Ghost with NTFS files .......................................... 173
Symantec GhostCast errors .......................................................... 175
Symantec Ghost and legacy network cards ...................................... 177
Problems running Symantec Ghost ................................................ 177
Cloning Windows 2000/XP computers ...................................... 177
Vista partition restore ........................................................... 177
Joining client computers to Active Directory Domains ................. 177
11Contents
Cannot start from drive A ...................................................... 178
Windows blue screen ............................................................ 178
Missing hibernation file ......................................................... 178
About cancelling a Ghost.exe operation .................................... 179
Index ................................................................................................................... 181
Contents12
Using Symantec Ghost as a
stand-alone program
This chapter includes the following topics:
About Ghost.exe
Using Ghost.exe on a stand-alone computer
Starting Ghost.exe
Using Ghost.exe with a mapped network drive
Establishing a peer-to-peer connection with Ghost.exe
Creating a backup image file
Restoring from an image file
Cloning disks and partitions
Verifying integrity
Adding switches to your Ghost.exe operation
Running Ghost32.exe in Windows
About Ghost.exe
Ghost.exe is a stand-alone program run within DOS that lets you copy disks or
partitions from one computer to another. You can use Ghost to create image files
and restore them.
1
Chapter
Note: For Ghost32, VMDK images are supported for all normal operations, and
PQI and V2I images are supported as a source (but not as a destination) in all
cloning operations. You must have v2DiskLib.dll in the same directory as
Ghost32.exe.
The information about Ghost.exe is also true for Ghost for Linux, with the following
limitations:
Direct writing to CD or tape is not supported.
Peer to peer connections over printer cable or USB cable are not supported.
Using Ghost.exe on a stand-alone computer
The following is an overview of how to start and run Ghost.exe.
Note: Ghost.exe does not fit on a single floppy disk. Ghost.exe is concatenated on
a RAM drive in DOS and executed from the RAM drive. The concatenation is
transparent.
To use Ghost.exe on a stand-alone computer
1
Start Ghost.exe.
See Starting Ghost.exe on page 15.
Add command-line switches, if necessary.
See About Symantec Ghost switches on page 131.
2
If necessary, establish a peer-to-peer connection.
See Establishing a peer-to-peer connection with Ghost.exe on page 16.
3
Select the Ghost.exe operation:
Disk or partition to image file
Disk or partition from image file
Disk to disk
Partition to partition
Check image or disk
4
Do one of the following:
Select the source hard disk or partitions.
Select the image file.
Using Symantec Ghost as a stand-alone program
Using Ghost.exe on a stand-alone computer
14
5
Do one of the following for operations other than checking an image:
Select the destination hard disk or partition.
Select the image file.
Warning: Make sure that you select the correct destination. The destination
disk is completely overwritten with no chance of recovering any data.
6
Complete the Ghost.exe operation.
Starting Ghost.exe
Ghost.exe is a DOS-based application that runs in DOS mode outside of Windows.
You cannot run Ghost.exe within Windows Vista/XP/2000, Linux, OS/2, or other
non-DOS operating systems. You can run Ghost.exe on a non-DOS operating
system by using a Ghost boot package. The Ghost boot package lets you start the
computer in DOS.
To start Ghost.exe
Do one of the following:
At the DOS prompt, type the following command:
progra~1\symantec \ghost\ghost.exe
Start the computer in
DOS mode.
After the first DOS boot disk loads you are prompted to insert
the second Ghost boot disk. Ghost starts automatically.
You can create a DOS boot disk on a computer that is running
Windows or DOS. Additional DOS drivers might be required
to runGhost.exe. If you cannot access some hardware or
network resources, such as a CD-R/RW drive, you can use
the Ghost Boot Wizard to create a boot disk that contains the
necessary drivers.
Use a DOS boot disk to
start the computer.
When the computer starts Ghost starts automatically.
You can use the Ghost Boot Wizard to create a DOS boot
package.
Use a DOS boot
package to start the
computer.
Using Ghost.exe with a mapped network drive
When you access a mapped network drive you must be aware of the following:
15Using Symantec Ghost as a stand-alone program
Starting Ghost.exe
You must use a mapped network boot package created from the Ghost Boot
Wizard.
If the boot package contains Ghost.exe then you cannot save the package to a
floppy disk set. You can save the package to a USB flash drive or an ISO image.
If you run Ghost.exe from any location other than A: then you must reset the
environment variable to the correct location of Wattcp.cfg before you start
Ghost.
DOS drivers cannot handle large files over a mapped network drive. Therefore,
Ghost sets a 2 GB split limit when writing to a mapped network drive. Before
you access a large image file over a mapped network drive you should split the
image file into spans that are no greater than 2 GB.
See About image file spans on page 47.
If you have restarted the computer with a boot package that does not contain
Ghost. exe then the computer restarts to a command prompt, for example D:\.
You must reset the Wattcp environment variable to D:\net\wattcp.cfg. You can
then start Ghost.exe from the mapped network drive.
If you have restarted the computer with a boot package that contains Ghost.exe
then Ghost starts after the computer has restarted. If GhostCasting or peer-to-peer
services are not available from the menu then ensure that Ghost is reading a
Wattcp.cfg that has SHARE_MODE=1. Exit Ghost and then at the command prompt,
reset the Wattcp environment variable. For example, if you are at the command
prompt D:\, then reset the Wattcp environment variable to D:\net\wattcp.cfg,
ensuring that D:\net\wattcp.cfg has SHARE_MODE=1. You can then restart Ghost
from either D:\ or from a mapped network drive.
To reset the environment variable to the correct location of Wattcp.cfg
1
On the command line, type the following:
set wattcp=<drive>\net\wattcp.cfg
2
Press Enter.
Establishing a peer-to-peer connection with Ghost.exe
Note: The Linux version of Ghost supports peer to peer connections over TCP
only. It does not support LPT or USB connections.
If you are using an LPT, USB, or TCP peer-to-peer connection, then you must set
up the connection between computers before a clone, backup, or restore operation.
The computers must be physically connected using one of the following:
Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
16
A parallel connection cableLPT
A USB 1.1 cableUSB
A network connectionTCP peer-to-peer
In a peer-to-peer operation, one computer is designated the master computer,
and the other is designated the slave computer.
Table 1-1 describes the possible Ghost.exe processes and the master/slave
relationships that exist within these processes.
Table 1-1
Master and slave computers
SlaveMasterAction
Computer containing
destination disk
Computer containing
source disk
Disk-to-disk clone
Computer receiving
destination image file
Computer containing
source disk
Back up disk to image file
Computer containing
source image file
Computer containing
destination disk
Restore disk from image file
Computer containing
destination partition
Computer containing
source partition
Partition-to-partition clone
Computer receiving
destination image file
Computer containing
source partition
Back up partition to image file
Computer containing
source image file
Computer containing
destination partition
Restore partition from image file
Select which computer is the master (the computer from which you control the
connection) and which is the slave (the other computer participating in the
connection). All operator input must occur on the master computer.
You must have two Ghost boot packages with which to start both the master and
slave computers. You can create the boot packages using the Ghost Boot Wizard.
Note: You must create both boot packages in the same version of Symantec Ghost.
You cannot use one boot disk that was created in Symantec Ghost 8.0 and one
boot disk that was created in Symantec Ghost 11.5 in the same task.
17Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
To establish a peer-to-peer connection with Ghost.exe
1
Do one of the following:
On the master computer, insert the first Ghost boot disk into the floppy
disk drive, and then restart the computer.
Repeat this step on the slave computer.
Restart the master computer and the slave computer by using the Ghost
boot package.
2
If you are using a floppy disk set, then, when prompted, insert the second
Ghost boot disk into the floppy disk drives of the master computer and the
slave computer.
Ghost.exe starts automatically.
3
On the slave computer, on the main menu, do one of the following:
Click Peer to peer > USB > Slave to start the computer
as the slave computer.
USB connection
Click Peer to peer > LPT > Slave to start the computer
as the slave computer.
LPT connection
Click Peer to peer > TCP/IP > Slave to start the
computer as the slave computer.
Make note of the IP address that is displayed in the
Slave Connect dialog box.
TCP/IP connection
4
On the master computer, on the main menu, do one of the following:
Click Peerto peer >USB >Master to start the computer
as the master computer.
USB connection
Click Peerto peer >LPT > Master to start the computer
as the master computer.
LPT connection
Click Peer to peer > TCP/IP > Master to start the
computer as the master computer.
Type the IP address that is displayed on the slave
computer.
TCP/IP connection
Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
18
About splitting images in a peer-to-peer operation
When you perform a peer-to-peer operation, an image is split when it reaches 2
GB in size unless you have set the split size to another value using the -split
command switch. If this switch is explicitly set to 0, the image does not split.
See About Symantec Ghost switches on page 131.
Creating a backup image file
You can create a backup of a hard disk or one or more partitions.
The backup is saved as an image file, which you can store on the following:
Second hard disk
Second partition on your hard disk (partition backup only)
LS120 Superdisk, JAZ, or ZIP disk
CD-R/RW or DVD-R/RW/+R/+RW
FireWire hard disk
USB 1.1/2.0 hard disk
Tape
Locally mapped network file server
Another computer using a peer-to-peer connection
Compression may affect the speed of your operation. When you select a
compression level, Ghost.exe estimates the amount of space available for the
destination image file. If there is insufficient space, Ghost.exe prompts you to
enable spanning of image files.
Backing up a hard disk to an image file
When you back up a hard disk, a copy of the entire disk is saved as an image file.
19Using Symantec Ghost as a stand-alone program
Creating a backup image file
To back up a disk to an image file
1
On the Ghost.exe main menu, do one of the following:
Click Local > Disk > To Image.Local
Click Disk > To Image.Peer-to-peer connection
2
In the Source Drive dialog box, select the source disk.
The Source Drive dialog box shows details of every disk that Ghost.exe finds
on the local computer.
3
In the File Locator dialog box, type the image file destination and name.
4
In the Image file description dialog box, type a description of the image file.
You can modify this description on the Console or in Ghost Explorer.
5
Click Save.
6
When you are prompted to select the compression level, select one of the
following:
For no compressionNo
For low compressionFast
For high compressionHigh
See Image files and compression on page 34.
7
In the Compress Image dialog box, select a compression option.
8
If Ghost detects that there is not enough space for the image file, you are
prompted to enable spanning.
9
Check the details and ensure that the correct options are selected.
Using Symantec Ghost as a stand-alone program
Creating a backup image file
20
/