EasyManua.ls Logo

Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0 - User Manual

Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0
189 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Symantec Ghost Imaging
Foundation
7.1

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0 and is the answer not in the manual?

Summary

Technical Support

Contacting Technical Support

Guidance on how to contact Symantec Technical Support for assistance with product features and functionality.

Using Symantec Ghost as a stand-alone program

About Ghost.exe

Introduction to Ghost.exe, a DOS-based program for copying disks or partitions and creating image files.

Using Ghost.exe on a stand-alone computer

Overview of the steps to start and run Ghost.exe on a standalone machine.

Establishing a peer-to-peer connection with Ghost.exe

Details on setting up peer-to-peer connections using LPT, USB, or TCP/IP for Ghost.exe operations.

Creating a backup image file

Instructions on creating backup image files of hard disks or partitions, including storage options.

Restoring from an image file

Procedures for restoring hard disks or partitions from previously created image files.

Cloning disks and partitions

Explains how to clone entire disks or specific partitions between computers or storage devices.

Running Ghost32.exe in Windows

Information on using the Win32 version of Ghost.exe to perform operations within a Windows environment.

Symantec Ghost support for image files and disks

About Symantec Ghost image files

Overview of Symantec Ghost image file formats and capabilities, including support for various image types.

Image files and compression

Details on data compression levels available for image files and their impact on operation speed.

Image files and volume spanning

How to split image files into segments or spans across multiple files or volumes.

Drives with BitLocker Drive Encryption

Information on Ghost's capabilities and limitations when working with drives protected by BitLocker Drive Encryption.

Modifying image file contents with Ghost Explorer

Using Ghost Explorer

Introduction to Ghost Explorer utility for viewing, altering, adding, and extracting files from Ghost image files.

Extracting a file or directory from an image file

Step-by-step guide to extract individual files or directories directly from a Ghost image file.

Compiling an image file

How to compile a Ghost image file to improve restore performance, especially after modifications.

Running DeployAnywhere from the command line

Running DeployAnywhere from the command line

Instructions for using the DeployAnywhere executable from the command line for retargeting images to different hardware.

Evaluating the target volume

How to evaluate a target volume to verify the availability of necessary drivers for DeployAnywhere.

Managing partitions using GDisk

About GDisk

Introduction to GDisk utility for creating, reinitializing, deleting, and wiping disk partitions.

Overview of the main command-line switches

Detailed explanation of GDisk's main command-line modes and switches for partition management.

Creating a partition

Guide on using the GDisk `create` command to create and format partitions with various parameters.

Deleting and wiping your disk

Procedures for deleting partitions or securely wiping an entire disk using GDisk commands.

Manipulating files and directories using OmniFS

About OmniFS

Introduction to OmniFS, a utility for manipulating files and directories on various file systems.

OmniFS operations

Lists and describes the supported OmniFS operations like Attrib, Copy, Rename, Delete, Dir, etc.

Using a script file

How to execute a series of OmniFS commands sequentially using a script file.

Editing registry keys and values using GhRegEdit

Using GhRegEdit

Instructions on running GhRegEdit from the command line or batch file to modify the registry.

Using GhostCasting to create and restore images

About GhostCasting

Overview of GhostCasting for efficient workstation migration and rollouts across multiple computers.

Preparing for GhostCasting

Steps to set up required software and hardware, including network adapters and IP settings for GhostCasting.

Creating an image file

Procedure to create an image file using GhostCast Server by starting a session and selecting disk or partition.

Restoring an image file onto client computers

Instructions for restoring an image file to multiple client computers via a GhostCast session.

Controlling the GhostCast session from the server

How to specify client disk/partition and define command-line options for GhostCasting tasks from the server.

Setting Auto Start parameters

Configuration options for automatically starting GhostCast sessions based on time or client count.

Controlling the amount of network bandwidth used

Methods to control network bandwidth usage during GhostCasting to avoid overloading the network.

GhostCasting from the command line

About running GhostCast Server from the command line

How to run the Symantec GhostCast Server from the command line using switches and batch files.

GhostCast Server command-line options

A list and explanation of command-line switches available for configuring the GhostCast Server.

GhostCasting and IP addresses

About using BOOTP;DHCP to assign IP addresses

Utilizing BOOTP or DHCP servers for automatic IP address assignment in GhostCasting scenarios.

Appendix A GDisk disk-wipe specifications

About GDisk disk-wipe specifications

Details on GDisk's secure disk-wiping function and its conformance to DoD standards.

Clearing, sanitizing, and viewing hard disks

Information on GDisk operations for clearing, sanitizing, and viewing hard disks according to NISPOM standards.

Appendix B Command-line switches

About Symantec Ghost switches

Overview of how Symantec Ghost command-line switches alter behavior and automate procedures.

Using the clone switch

Detailed explanation of the `-clone` switch syntax, modes, sources, and destinations for cloning operations.

Using the -CRC32 switch

How to use the `-CRC32` switch for file-by-file CRC checking and verification of image files.

Appendix C Ghost for Linux

Supported configurations

Information on Linux distributions, boot loaders, and filesystems supported by Symantec Ghost.

Appendix D Configuring firewalls

Symantec Ghost port configuration

Details on firewall ports required for Ghost Console and Console client communication.

Appendix E Troubleshooting

Ghost.exe errors messages

Information on common Ghost.exe error messages, their descriptions, and where to find more details.

Ghost.exe problems

Common issues and errors encountered when running Ghost.exe that may not produce specific error codes.

Symantec GhostCast errors

Specific solutions for common errors encountered during Symantec GhostCasting operations.

Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0 Specifications

General IconGeneral
BrandSymantec
ModelGHOST IMAGING FOUNDATION 7.1 - V1.0
CategorySoftware
LanguageEnglish

Related product manuals