Samsung MZ-5PA256C User Manual - Page 141

Running a one-time virtual conversion

Page 141 highlights

Managing backup destinations 141 Running a one-time virtual conversion Use password Use AES encryption This option sets a password on the recovery point. Passwords can include standard characters, not extended characters, or symbols. (Use characters with an ASCII value of 128 or lower.) A user must type this password before they can restore a backup or view the contents of the recovery point. You can encrypt your recovery point data to add another level of protection to your recovery points. You can choose from the following encryption levels: ■ Low (8+ character password) ■ Medium (16+ character password) ■ High (32+ character password). 11 Click OK. 12 Click Next, review the options that you selected, and then click Finish. After the recovery points are safely copied, you can delete them from your computer. See "Deleting a recovery point set" on page 138. Running a one-time virtual conversion You can use Norton Ghost to convert recovery points of a physical computer to VMware Virtual Disk, Microsoft Virtual Disk, or a VMware ESX Server. Virtual disks are excellent for testing and evaluation purposes. The following platforms support virtual disks created from recovery points: ■ VMware Workstation 4, 5, and 6 ■ VMware ESX Server 3.0, 3.5, 3.5i, 4.0, and 4.0i ■ VMware Server 1 ■ Microsoft Virtual Server 2005 R2 and later ■ Microsoft Hyper-V 1.0 and 2.0 You can also create scheduled recovery point conversions to virtual disks. See "Defining a virtual conversion job" on page 147.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213

This option sets a password on the
recovery point. Passwords can include
standard characters, not extended
characters, or symbols. (Use characters
with an ASCII value of 128 or lower.)
A user must type this password before
they can restore a backup or view the
contents of the recovery point.
Use password
You can encrypt your recovery point data
to add another level of protection to your
recovery points.
You can choose from the following
encryption levels:
Low (8+ character password)
Medium (16+ character password)
High (32+ character password).
Use AES encryption
11
Click
OK
.
12
Click
Next
, review the options that you selected, and then click
Finish
.
After the recovery points are safely copied, you can delete them from your
computer.
See
Deleting a recovery point set
on page 138.
Running a one-time virtual conversion
You can use Norton Ghost to convert recovery points of a physical computer to
VMware Virtual Disk, Microsoft Virtual Disk, or a VMware ESX Server. Virtual
disks are excellent for testing and evaluation purposes.
The following platforms support virtual disks created from recovery points:
VMware Workstation 4, 5, and 6
VMware ESX Server 3.0, 3.5, 3.5i, 4.0, and 4.0i
VMware Server 1
Microsoft Virtual Server 2005 R2 and later
Microsoft Hyper-V 1.0 and 2.0
You can also create scheduled recovery point conversions to virtual disks.
See
Defining a virtual conversion job
on page 147.
141
Managing backup destinations
Running a one-time virtual conversion