User manual SYMANTEC NORTON GHOST

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual SYMANTEC NORTON GHOST. We hope that this SYMANTEC NORTON GHOST user guide will be useful to you.

Lastmanuals help download the user guide SYMANTEC NORTON GHOST.


Mode d'emploi SYMANTEC NORTON GHOST
Download
Manual abstract: user guide SYMANTEC NORTON GHOST

Detailed instructions for use are in the User's Guide.

[. . . ] Norton GhostTM Norton Ghost User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 8. 0 Legal Notice Copyright © 2008 Symantec Corporation. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Symantec, the Symantec Logo, LiveUpdate, Symantec pcAnywhere, Symantec Backup Exec, Norton, Symantec NetBackup, and Symantec Backup Exec Restore Anyware are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U. S. [. . . ] You then have a recovery point to use to recover your data should your computer become affected by the latest threat. Note: If your computer is not online, then it is not susceptible to online threats. But if you connect your computer to the Internet at any time, it becomes vulnerable. You do not have to enable or disable Symantec ThreatCon Response when you go on or off line. It simply works if you are online, but does nothing if you are off line. Table 8-1 Threat Level Level 1 Level 2 Norton Ghost ThreatCon levels Description No discernable security threats exist. Security threats could occur, although no specific threats have been known to occur. Running and managing backup jobs Editing a backup schedule 89 Table 8-1 Threat Level Level 3 Level 4 Norton Ghost ThreatCon levels (continued) Description An isolated security threat is in progress. Extreme global security threats are in progress. For more information about Symantec ThreatCon, visit http://www. symantec. com. To configure Symantec ThreatCon Response 1 2 3 4 On the Home or Tasks page, click Run or Manage Backups. Select the backup you want to edit, and then click Change Schedule. Click ThreatCon Response under Event Triggers. From the drop-down list, select the threat level that when met or exceeded should start your backup job, and then click OK. Note: Level 1 of Symantec ThreatCon indicates that there are no threats. Because level 1 suggests no threats, it is not an option in the drop-down list. However, you can disable Symantec ThreatCon Reponse by choosing the first option. See "To disable Symantec ThreatCon Response" on page 89. To disable Symantec ThreatCon Response 1 2 3 4 On the Home or Tasks page, click Run or Manage Backups. Select the backup you want to edit, and then click Change Schedule. Click ThreatCon Response under Event Triggers. From the drop-down list, select Do Not Monitor - Disable, and then click OK. Editing a backup schedule You can edit any of the schedule properties for a defined backup to adjust the date and time. To edit a backup schedule 1 2 On the Home page, click Run or Manage Backups. Select a backup to edit. 90 Running and managing backup jobs Turning off a backup job 3 4 Click Change Schedule. Make changes to the schedule, and then click OK. Turning off a backup job You can turn off a backup and re-enable it later. [. . . ] This option is not available if you do not have Google Desktop installed. Install Google Desktop, and then repeat this procedure. 5 1 2 Click OK to install the Google Plugin. To enable search engine support for a backup job Start Norton Ghost. Do one of the following: Edit an existing backup job and check Enable search engine support for Google Desktop and Backup Exec Retrieve on the Options page of the wizard. Define a new backup job and check Enable search engine support for Google Desktop and Backup Exec Retrieve on the Options page of the wizard. Recovering files using Google Desktop's Search Desktop feature If you have correctly set up and enabled support for Google Desktop, you can search recovery points to located and recover files using Google Desktop. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SYMANTEC NORTON GHOST

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual SYMANTEC NORTON GHOST will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag