JIll--
Since there is a perception out there that Win RE is one convenient location
where MSFT recovery tools reside, have you all (Desmond Lee's team) tested
in volume that it's main mechanism "Startup Repair" has a high failure rate,
and while Backup that you've showcased on your blog by linking to Videos
from TechED and other places including the Beta chat on it is much
appreciated, in the real world a high percentage of people will continue to
resist using backup mechanisms, as nice a job as Vista teams and the One
Care Live team have done with Backup this time around. As you know the NT
Backup driven MS Backup derived from Veritas in Windows XP did a rather poor
job and did not backup well to media. It's been made very user friendly now
and that's a huge plus, but many people still unfortunately will not backup
because some people seem to see burning DVDs as the bogey man if you take
all Windows users.
That's even a more compelling reason for more components of Win RE to work.
One of those components was Fabrikant or Deep Freeze technology and know one
I talk to at MSFT who is not at Redmond has a clue as to why you all axed it
or even what it was. Can you find out? Do you know? It was written about
a lot on the ezines a year before the Beta started.
Also there have been some great posts on this group Jill as to how to confer
protection for the volume shadow copy restore points on a dual boot when one
switches to another boot by using Bit Locker. MSFT seems not to have picked
up on this tip at all.
For example --these posts:
Re: system restore--Bitlocker confer's protection for VSS restore
Sunday, July 16, 2006 11:08 PM
"Turning off Bitlocker" without choosing the decrypt option only
turns off the authentication process- encryption is still on and
all new files are encrypted also. Your restore points will not
be deleted so long as Vista stays encrypted- regardless if
Bitlocker's authentication is turned off.
Haven't encountered any problems with encryption on. You
don't notice (I haven't) anything being different. Of course,
you won't be able to see Vista from XP. It will show a drive
letter and if you click on that drive letter it will tell you that it
is an unformatted volume. Leave it alone. ;-)
I apologize, I should have told you this earlier- make sure you
print/write out the password or save it someplace other than Vista.
Some folks have reported that BitLocker is not reading the encrypt
key from some USB thumb drives. An MVP in the vista.security group
has said this will be improved by RC1. I have not experienced that
problem. If BitLocker can not read your USB drive and you don't
have your password- you are screwed. Pardon my language.
Recently, I have turned off the authentication at boot-up.
It's funny, I stopped using System Restore in XP a long time ago.
Found it to be unreliable and that it slowed down a computer. But
I wanted to really test it out this time and give it a chance. I've used
it twice and all went well. It is my understanding that SR in Vista is
much improved over XP. Of course, since I dual boot, the only way to
test SR is to protect my restore points. I just happened to stumble onto
the fact that BitLocker kept those restore points from being deleted.
There were some at Microsoft who said it wouldn't matter if BitLocker
was on and the drive was encrypted, the restore points would still be
deleted. Well, I knew what I saw. After, many tests- BitLocker does
protect the restore points- can't delete what you can't see. Which
makes perfect sense. I don't know why some said it shouldn't be
that way. I even asked specifically before I used Bitlocker if encryption
would protect those restore points, I was told no. Trust me, it works.
Let me/us know how it turns out.
Take care,
Michael
____________
Chad;
Also Jill--
Microsoft Vista team writers/community PMs like yourself also have have yet
to post any substantive or any other
information on System Restore or Win RE on Technet or MSDN with about 25
days to go before you RTM Vista, bring in the tents, the bands, the kegs and
the parties celebrating it.
Your blog "The Filling Cabinet" (one of two of yours) did post a chat and a
little information from Dan Stevenson on Volume Shadow and System Restore.
It's a very good source of info and people should check it out:
Jill's Blog
On VSS and System Restore
http://209.34.241.68/filecab/archive/2006/09/01/452845.aspx
Jill's Blog "The Filing Cabinet"
http://209.34.241.68/filecab/default.aspx
Jill's "Ck Your Disks"
Addressing privacy and security concerns about Shadow Copies in Windows
Vista
I asked one of our program managers, Dan Stevenson, to address the questions
we've received about security and privacy and the Shadow Copy feature (aka
Previous Versions) in Windows Vista. Below Dan describes how shadow copies
work and provides ways to help increase the security and privacy of deleted
files. For a brief overview of this functionality, see the Windows Vista
website's section on Backup.
-----------------------
If you turn on volume shadow copies on your volume (which is the default for
Windows Vista), Windows will track changes made to that volume at the block
level.
A shadow copy is a previous version of a file, which is "reconstituted" by
applying in reverse all the accumulated block-level changes to that file.
If you delete a file on the "live" volume, then those "changes" (deleting
the blocks) are tracked by Windows, and you can later restore the shadow
copy of the file. Earlier shadow copies may also still be available; volume
shadow copies are maintained on a space-available basis, with the oldest
being deleted to create room for newer ones. In Windows Vista, a maximum of
15% of the disk is set aside for maintaining shadow copies.
There are two ways to encrypt your data in Windows Vista: using Encrypting
File System (EFS) and using Bitlocker Drive Encryption. Both of these
features are limited to the Premium or Business editions of Windows Vista.
EFS protects your files from access by other users. If you encrypt a file
using EFS, then any subsequent shadow copies of the file will also be
encrypted. Note that since encryption generally involves changing every
block in the file, you won't get the same space-saving benefits from
changing just a small part of a file which you would get with a
non-encrypted file.
If the entire volume is encrypted using BitLocker, then everything,
including the shadow copies, is encrypted. This volume-level encryption
protects files from unauthorized external access, such as from a Linux boot
disk.
--Dan Stevenson
Thanks very much for taking the time to help sort these out. As you know
MSFT rarely if ever participates on the public Vista sites. Daryl Gorter
has posted briefly about 3 times in the past 15 months. If MSFT is
acknowledging the interaction of Bit Locker and System Restore and VSS in
Vista, I'm not sure where they are doing that. I haven't found it.
CH