You want to limit Ghost's capabilities so that your users do not have full access to Ghost features.
Limiting Ghost's capabilities for individual users requires creating a customized copy of the Ghost.exe file. When users run the customized Ghost.exe, they do not have access to features that you restricted. For instance, you can customize Ghost.exe so that it can restore image files, but not create image files, or so that it can create image files, but not restore image files.
To customize Ghost.exe to perform only specific types of cloning operations, use any text editor to modify the Switches line in the Ghost license file, Ghost.env, and then bind the license file to Ghost.exe.
To limit Ghost functions
To bind the license file to Ghost32.exe
When the user runs the new copy of Ghost32.exe, the user can perform only specific types of cloning operations.
To bind the license file to Ghost.exe
When the user runs the new copy of Ghost.exe, the user can perform only specific types of cloning operations.
To restore Ghost functions
The Switches line
The Switches line in the Ghost license file, Ghost.env, includes the parameters for permitting or limiting Ghost's functionality. Use any text editor to include a Switches line as the top line in the file, as in the following example:
Keynum : 002030
License : KRS1420365
MaxPCs : 25
Name : John Smith
Address1: XYZ Corp
Keycode : L8N6X75R3U0L9Z
Edit the Switches line to provide the values that are appropriate to your situation. The following table lists the available options and values.
|LOAD||Y or N||Controls whether Ghost can use the restore functions Image-to-Disk and Image-to-Partition.
Y allows Ghost to use the contents of an image file to write over the destination disk or partition. N prevents this operation.
|DUMP||Y or N||Controls whether Ghost can use the image-creation functions Disk-to-Image and Partition-to-Image.
Y allows Ghost to create an image of a disk or partition and save that image as a file. N prevents this operation.
|DISK||Y or N||Controls whether Ghost can use the dynamic-cloning functions Disk-to-Disk and Partition-to-Partition.
Y allows Ghost to copy one disk or partition directly to another, which results in writing over the destination disk or partition. N prevents this operation.
|WRITE||Y or N||Controls whether Ghost can write to a destination disk or partition when performing a LOAD operation. Using WRITE=N provides the same functionality as the command-line switch -FNW.
When you use LOAD=Y and WRITE=N, Ghost permits the user to choose the options for restoring an image file. The operation will appear to work, however, the operation completes quickly and the operation does not succeed because no data is written to the disk.
|PEER||Y or N||Controls whether Ghost can work over the following peer-to-peer connections: LPT, USB, and TCP/IP.
Y allows Ghost to perform cloning operations through an LPT, USB, or TCP/IP peer-to-peer network. N prevents the operation.
|TIMEOUT||Y or N||Controls whether Ghost can restore images that are old.
When TIMEOUT is set to Y, Ghost compares the current date to the date that the image file was created. If the number of days between those dates is larger than the value that is set for IMGTMO, Ghost does not restore the image.
When TIMEOUT is set to N, Ghost does not prevent the user from restoring older image files.
|IMGTMO||Number of Days||Specifies the acceptable age of an image file. When IMGTMO is used with TIMEOUT=Y, Ghost does not restore image files that are older than the specified number of days.
When used with TIMEOUT=N, the IMGTMO parameter has no effect on Ghost operations.
|IMGTMO=<# of days>|
|FPRNT||Y or N||When a user performs an Image-to-Disk, Image-to-Partition, Disk-to-Disk, or Partition-to-Partition operation, this switch controls whether Ghost stores additional (fingerprint) information on the destination disk or partition.
Y sets Ghost to store the information, and N sets Ghost to not store the information.
The information is:
For more information, see the document How to determine whether Ghost wrote to a disk or partition.
Examples of the Switches line:
This example configures the license file so that the user can write (load) a disk image onto a disk, writing over the previous data that was on the disk.
The user cannot write a partition image to a disk, cannot create disk or partition image files, and cannot perform a Disk-to-Disk or Partition-to-Partition operation.
In this example, the user appears to have the ability to write an image to a disk, writing over the existing data on the disk, but no data is actually written to the disk. The user can create an image file and save that image file to a disk.
In this example, the user can restore image files that are 15 days old or less. The user can also create image files. The user cannot perform a Disk-to-Disk or Partition-to-Partition operation.
When creating an image file, Ghost marks the source disk with a fingerprint, which provides information on the current operation. To examine that information after cloning, see the document How to determine whether Ghost wrote to a disk or partition.
In this example, the user cannot restore image files, regardless of their age. The user can create image files. The user cannot perform a Disk-to-Disk or Partition-to-Partition operation.
In this example, a company has 100 laptops in use by the sales staff. For fast system restoration by the users, each of the laptops has a CD disc that contains a copy of Ghost and an image file. To enable the users to use the CD disc for system restoration and not for other purposes, the IT administrator customizes Ghost.exe to allow only image restoration, and not image creation.
To accomplish this, the IT administrator uses the instructions To limit Ghost functions with the following notes:
In this example, Ghost is used as a backup tool. In this case, disabling the LOAD option prevents users from accidentally overwriting their local drive. With the following Switches line, the user can create image files but cannot restore image files. The user also cannot perform a Disk-to-Disk or Partition-to-Partition operation.
In this situation, the user could use Ghost Explorer to restore individual files and folders from the image file. The user cannot restore the image file unless they have a separate Ghost.exe file that permits restorations. Alternatively, the system administrator can restore the image file by using a different copy of the original Ghost.exe file, which has not been customized to prevent restorations.
To prevent Ghost from storing information about previous cloning operations on the disk, use the switch FPRINT=N to turn off the fingerprinting option:
Ghost license file
The Ghost license file, also known as the Ghost environment file, is a text file that provides information for the Ghost executable file. This information includes Ghost customization information and some Ghost licensing information. The licensing information cannot be altered.
The Ghost license file is Ghost.env. After you install Ghost, Ghost.env is available on your hard disk in the C:/Program Files/Symantec/Ghost folder.
In Symantec Ghost 7.0 and later, binding the license file to Ghost.exe is only necessary when you customize your copy of Ghost.exe, as in the procedure in this document, or when you replace your copy of Ghost.exe. Binding the license file to Ghost means to run Ghost.exe once from the same folder that the license file is in.
In Symantec Ghost 7.0 and later, Ghost automatically creates the license file, Ghost.env.
The license file includes:
For older Ghost versions, see the documents How To Create the Ghost License File and How to update Ghost 5.x to the latest version.
Using a license file that has a different name
In some situations, your license file may have a file name that is not Ghost.env. This happens when you use an older Ghost version, which is no longer supported, or when your Symantec sales representative provided you with a customized license file.
Customization of the Ghost license file affects Ghost functionality but does not affect how Ghost appears to the user. For instance, Ghost.exe does not include advanced customization options such as a means for displaying your company name in the Ghost user interface. For further information regarding advanced customization, contact your Symantec sales representative.
Subscribing will provide email updates when this Article is updated. Login is required to Subscribe
Thanks for your feedback. Let us know if you have additional comments below. (requires login)
This will clear the history and restart the chat.