在未完全使用EWF保护的电脑上启用HORM.doc_第1页
在未完全使用EWF保护的电脑上启用HORM.doc_第2页
在未完全使用EWF保护的电脑上启用HORM.doc_第3页
在未完全使用EWF保护的电脑上启用HORM.doc_第4页
在未完全使用EWF保护的电脑上启用HORM.doc_第5页
免费预览已结束,剩余1页可下载查看

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Using HORM with unprotected volumes在未完全使用EWF保护的电脑上启用HORM,如仅保护系统盘如何使用HORM的解决方案!Case1:全保护Case2:部分保护HORM imposes the following restriction on volumes All volumes must be protected by EWF. OR All unprotected volumes must be dismounted before capturing the HORM state. Note 1: Volumes residing on removable devices are excluded from this restriction.Note 2: Boot and System volumes should not be dismounted. Hence they must always be protected by EWF when using HORM.In this article we will describe how HORM can be safely used with unprotected volumes. We shall also describe how these unprotected volumes can be used to store event logs and paging files.Case 1:If all volumes are protected by EWF, the steps to use HORM are straightforward Enable hibernation. o Powercfg.exe /h ON Enable EWF on all volumes. o Ewfmgr.exe /all /enable Activate HORM. o Ewfmgr.exe X: /activatehorm -where X: is any protected volume. Note that HORM is not a per volume feature. It applies to the entire OS. Modify the system to reach the desired state. Capture the HORM state by hibernating the system once. o Shutdown.exe /h Resume the machine. Beyond this point , each restart would cause the system to resume from the state captured in previous step. To deactivate HORM o Ewfmgr.exe X: /deactivatehorm -where X: is any protected volume To disable EWF on all volumes. o Ewfmgr.exe /all /disable In RAM REG mode an additional step is required Ewfmgr.exe C: /commit -where C: is the volume containing the OS Case 2:If you wish to leave one or more volumes unprotected, additional steps are required Enable hibernation o Powercfg.exe /h ON Enable EWF on all protected volumes o Ewfmgr.exe /all /enable Activate HORM o Ewfmgr.exe X: /activatehorm -where X: is any protected volume. Note that HORM is not a per volume feature. It applies to the entire OS. Modify the system to reach the desired state Deal with unprotected volumes o a. Stop applications and / or services that have open handles to the unprotected volumes. o b. Dismount unprotected volumes. (Details below) Capture the HORM state by hibernating the system o Shutdown.exe /h Resume the machine. Beyond this point, each restart would cause the system to resume from the state captured in previous step. Deal with unprotected volumes o a. Mount unprotected volumes (Details below) o b. Start applications and / or services that need these unprotected volumes. To deactivate HORM o Ewfmgr.exe X: /deactivatehorm -where X: is any protected volume To disable EWF o Ewfmgr.exe /all /disable In RAM REG mode an additional step is required Ewfmgr.exe C: /commit -where C: is the volume containing the OS Registering for power transitionsApplications can receive notification when specific power events occur. This is documented in MSDN. Specifically , PBT_APMRESUMESUSPEND indicates the system has resumed from a lower power state. This can be used to automatically trigger the actions needed post resume.Mounting and dismounting unprotected volumes Writing your own code - You can write your own application that makes use of the following FSCTLs to lock / unlock and mount / dismount volumes FSCTL_LOCK_VOLUME and FSCTL_UNLOCK_VOLUME FSCTL_DISMOUNT_VOLUME and FSCTL_MOUNT_VOLUME A detailed MSDN article dealing with this topic is available here. Using Mountvol.exe In WES 7, this utility can be found in the “Core File systems” package. It is a simple utility that lets you mount / dismount volumes. To lock and dismount a volume use the “/P” option. In the above example, we can lock and dismount F: by issuingMountvol.exe F: /PTo mount back a volume use the volume GUID identifier listed for each volume. In above example, we re-mount F: by issuing Mountvol.exe F: ?Volumefe0f21b6-e0c6-11de-be33-001aa0ebe436Dealing with applications that use unprotected volumesGeneral Guideline: Before dismounting a volume it is necessary to close all applications and/or services that may have open handles to files in this volume. You should start them again after the volume is mounted back. As an example, we will show how to deal with Windows Event Log service configured to store logs in an unprotected volume.Windows Event Log Service manages the event logging in Windows. It can be configured to store logs in any desired location by modifying the “Log Path”. If you have configured Event Logs to be stored in an unprotected volume, it is necessary to stop the Event Log service before dismounting the volume. Take a look at the properties of Event Log service; it has other services that depend on it. Specifically, the “Task Scheduler” service cannot be stopped by usual means. This prevents the Event Log service from being stopped on the fly.You will have to turn Task Scheduler service off by editing the registry. The” Task Scheduler” service is named “schedule”. Change the following value Key: HKLMSystemCurrentControlSetServicesScheduleValue: Start Value Type: REG_DWORDExisting value: 2 (AUTO). Change it to 4 (DISABLED). Restart the system for the change to take effect. Note that if you have applications that rely on task scheduler they will not work until it is re-enabled.Now you can cleanly turn off the Windows Event Log service. You can turn it back ON post resume after the unprotected volume has been mounted back.Using Page Files with HORMWhen using with EWF, paging Files must reside on unprotected volumes. This will avoid the problem of writes to paging files filling up the overlay. You can modify paging file location and size as shown below. However, having a paging file on an unprotected volume will not allow the volume to be dismounted. To work around this, enable paging files post resume. This must be done after mounting back the unprotected volumes. Note that on Windows 7, enabling a paging file takes effect immediately; it is not required to restart the system. Paging can also be enabled programmatically using the WMI class Win32_PageFileSetting. See below for a sample VB script that creates

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论