Samsung MZ-5PA256C User Manual - Page 68

About network credentials, About running command files during a backup

Page 68 highlights

68 Backing up entire drives Defining a drive-based backup About network credentials If you are connecting to a computer on a network, you are required to enter the user name and password for network access, even if you have previously authenticated to the network. This is because the Norton Ghost 15.0 service runs as the local System account. When entering network credentials, the following rules apply: ■ If the computer you want to connect to is on a domain, you would enter the domain name, user name, and password. For example: domain\username ■ If you are connecting to a computer in a workgroup you would enter the remote computer name and user name. For example: remote_computer_name\username ■ If you have mapped a drive, you might be required to supply the user name and password at this dialog because the service runs in a different context and cannot recognize the mapped drive. By going to the Tools menu and selecting Options, you can set a default location, including network credentials. Then when you create future jobs, the dialog will default to the location you specified. Another option would be to create a specific "backup" user account for the enterprise and configure the Norton Ghost 15.0 service to use this account. About running command files during a backup You can use command files (.exe, .cmd, .bat) during a backup. You can use command files to integrate Norton Ghost with other backup routines that you might be running on the computer. You can also use command files to integrate with other applications that use a drive on the computer. Note: You cannot run command files that include a graphical user interface, such as notepad.exe. Running such command files will cause the backup job to fail. You can run a command file during any of the following stages during the creation of a recovery point: ■ Run before snapshot creation ■ Run after shapshot creation ■ Run after recovery point creation You can also specify the amount of time (in seconds) that a command file should be allowed to run.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213

About network credentials
If you are connecting to a computer on a network, you are required to enter the
user name and password for network access, even if you have previously
authenticated to the network. This is because the Norton Ghost 15.0 service runs
as the local System account.
When entering network credentials, the following rules apply:
If the computer you want to connect to is on a domain, you would enter the
domain name, user name, and password. For example: domain\username
If you are connecting to a computer in a workgroup you would enter the remote
computer name and user name. For example:
remote_computer_name\username
If you have mapped a drive, you might be required to supply the user name
and password at this dialog because the service runs in a different context and
cannot recognize the mapped drive.
By going to the Tools menu and selecting Options, you can set a default location,
including network credentials. Then when you create future jobs, the dialog will
default to the location you specified. Another option would be to create a specific
"backup" user account for the enterprise and configure the Norton Ghost 15.0
service to use this account.
About running command files during a backup
You can use command files (.exe, .cmd, .bat) during a backup. You can use command
files to integrate Norton Ghost with other backup routines that you might be
running on the computer. You can also use command files to integrate with other
applications that use a drive on the computer.
Note:
You cannot run command files that include a graphical user interface, such
as notepad.exe. Running such command files will cause the backup job to fail.
You can run a command file during any of the following stages during the creation
of a recovery point:
Run before snapshot creation
Run after shapshot creation
Run after recovery point creation
You can also specify the amount of time (in seconds) that a command file should
be allowed to run.
Backing up entire drives
Defining a drive-based backup
68