Samsung MZ-5PA064B User Manual - Page 68
About network credentials, About running command files during a backup
View all Samsung MZ-5PA064B manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 68 highlights
68 Backing up entire drives Defining a drive-based backup About network credentials If you are connecting to a computer on a network, you are required to enter the user name and password for network access, even if you have previously authenticated to the network. This is because the Norton Ghost 15.0 service runs as the local System account. When entering network credentials, the following rules apply: ■ If the computer you want to connect to is on a domain, you would enter the domain name, user name, and password. For example: domain\username ■ If you are connecting to a computer in a workgroup you would enter the remote computer name and user name. For example: remote_computer_name\username ■ If you have mapped a drive, you might be required to supply the user name and password at this dialog because the service runs in a different context and cannot recognize the mapped drive. By going to the Tools menu and selecting Options, you can set a default location, including network credentials. Then when you create future jobs, the dialog will default to the location you specified. Another option would be to create a specific "backup" user account for the enterprise and configure the Norton Ghost 15.0 service to use this account. About running command files during a backup You can use command files (.exe, .cmd, .bat) during a backup. You can use command files to integrate Norton Ghost with other backup routines that you might be running on the computer. You can also use command files to integrate with other applications that use a drive on the computer. Note: You cannot run command files that include a graphical user interface, such as notepad.exe. Running such command files will cause the backup job to fail. You can run a command file during any of the following stages during the creation of a recovery point: ■ Run before snapshot creation ■ Run after shapshot creation ■ Run after recovery point creation You can also specify the amount of time (in seconds) that a command file should be allowed to run.