Windows 10 Upgrade with Drivelock Disk Protection

Total Page:16

File Type:pdf, Size:1020Kb

Windows 10 Upgrade with Drivelock Disk Protection Technical Article Windows 10 Upgrade with DriveLock Disk Protection DriveLock SE 2017 Windows 10 Upgrade Contents 1 INTRODUCTION ................................................................................................................................................... 2 2 PREPARE THE WINDOWS 10 SETUP ..................................................................................................................... 2 2.1 PREREQUISITES ....................................................................................................................................................... 2 2.2 BASIC STEPS TO CREATE THE WINDOWS 10 SETUP .......................................................................................................... 2 2.3 OPTIONS FOR DLUPGPREP.EXE .................................................................................................................................. 3 3 RUN THE WINDOWS 10 UPGRADE ....................................................................................................................... 4 3.1 PREREQUISITES ....................................................................................................................................................... 4 3.2 BASIC STEPS TO UPGRADE WINDOWS 10 ..................................................................................................................... 4 4 RESTRICTIONS AND KNOWN ISSUES .................................................................................................................... 5 1 Windows 10 Upgrade 1 Introduction Technically an upgrade of Windows 10 to a new version – e.g. from Windows 10 Version 1511 to Windows 10 Version 1607 or to Version 1703 – does not differ to an upgrade of e.g. Windows 7 to Windows 8.1 or from Windows 8.1 to Windows 10. After starting the setup, the computer boots from a special installation environment to run the upgrade installation. This installation environment does not contain the DriveLock encryption driver and thus cannot connect the encrypted system disk. This causes the Windows 10 upgrade to fail. In order to upgrade a DriveLock encrypted Windows installation to a new version of Windows previously DriveLock installations had to decrypt the system disk, to run the windows upgrade and then to encrypt the system disk again. To help customers to keep the system disk protected while upgrading Windows 10, DriveLock has developed a tool to inject the DriveLock encryption Driver into the Windows 10 installation environment. Using this modified installation, the encrypted system disk can be accessed and Windows can continue the upgrade. 2 Prepare the Windows 10 Setup 2.1 Prerequisites Windows 10 Installation – a DVD, an ISO-file or a folder containing the complete setup (install.wim) for the Windows 10 version you want to upgrade to. DLFdeEd.sys – the DriveLock encryption driver – 32-bit or 64-bit – corresponding to the Windows 10 version you want to upgrade to. DLUpgPrep.exe – a command line tool to prepare the Windows 10 setup to load the DriveLock encryption driver in the Windows 10 installation environment. Download the DriveLock encryption driver and the DLUpgPrep tool from : http://download.drivelock.com/web/DLUpgPrep.zip 2.2 Basic steps to create the Windows 10 setup 1. Create a working folder on a local disk (NTFS required), e.g. C:\DLUpgPrep. 2. Extract DLUpgPrep.zip to that folder. 3. Assure that the original Windows 10 setup is available (insert DVD, mount the ISO) e.g. as drive letter D: 4. Open an administrative command window and navigate to C:\DLUpgPrep 5. Run DLUpgPrep.exe -index 1 -saveto W10 -files 64-bit -copyfrom D:\ 6. Wait (about 20 minutes) until the upgrade tool has finished its work with a successfully done message. The original setup files are copied from D:\ to C:\DLUpgPrep\W10. Then C:\DLUpgPrep\64-bit\DLFdeEd.sys is injected to the setup to be loaded, when Windows boots the installation environment. As a result, in folder W10 you get a Windows 10 setup, which can be used to upgrade to a Windows 10 version while the system disk is encrypted by DriveLock Disk Protection. 2 Windows 10 Upgrade 7. Copy the modified Windows installation in folder W10 to an installation media (USB-stick or DVD) or to a network share. 2.3 Options for DLUpgPrep.exe -help show the options -verbose print verbose information -index the index to the edition – the Windows setup may contain multiple editions of Windows 10, e.g. Windows 10 Home and Windows 10 Pro If omitted, available editions are printed and have to be entered at the command line. -saveto the path where the resulting Windows setup is stored -files the path, where DLFdeED.sys is found -copyfrom the path where the original Windows 10 setup files are copied from – omit, if the “saveto” folder already contains the appropriate Windows 10 setup Experts only: -mount the path, where the WIM is already mounted to (not with -saveto) -re_mount the path, where the recovery WIM is or shall be mounted to Example to modify a Windows 10 32-bit edition DLUpgPrep.exe -index 1 -saveto W10-32-bit -files 32-bit -copyfrom D:\ The DLFdeEd.sys is taken from folder 32-bit and the modified setup is stored in folder W10-32-bit. Example to modify a multiple version edition of windows 10 (e.g. Home and Pro) DLUpgPrep.exe -index 1 -saveto W10 -files 64-bit -copyfrom D:\ DLUpgPrep.exe -index 2 -saveto W10 -files 64-bit In the first step, the setup files are copied to folder W10 and the first edition is prepared with the DriveLock encryption driver. In the second step, the setup files already residing in folder W10 are reused and the second edition is prepared. If you omit the -index option, you will be asked for it, showing you the corresponding edition name. HINT: If you use the copyfrom option in the second step, the existing files in the saveto folder are replaced by the originals, you will lose the already prepared first edition. Example, if your working directory already contains the Windows setup in folder W10Enterprise and DLFdeEd.sys DLUpgPrep.exe -index 1 -saveto W10Enterprise Example for scripting experts, who want to use DLUpgPrep in own scripts, if the WIM is already mounted. DLUpgPrep.exe -mounted .\mymnt –re_mounted .\mymntre DLUpgPrep expects the WIM to be mounted at .\mymnt and expects the recovery WIM either to be mounted to .\mymntre or will mount it to .\mymntre. If option -re_mounted is omitted, the default path .\mntre will be used. The -mounted option cannot be used in combination with the -saveto and the -index option. 3 Windows 10 Upgrade 3 Run the Windows 10 Upgrade 3.1 Prerequisites A DriveLock prepared Windows 10 setup – you may copy the setup directly to the target computer, run it from an USB-stick or DVD or from a network share. The Windows setup must match the Windows edition installed on the target computer – do not switch the edition, e.g. from Home to Pro or from Pro to Enterprise. The DriveLock version on the target computer must be DriveLock 7.6.16 or newer – upgrade DriveLock first, before you upgrade Windows 10. We strongly recommend to backup important data before you run the Windows 10 upgrade. 3.2 Basic steps to upgrade Windows 10 Basically, the upgrade of Windows 10 with DriveLock injected does not differ from the Windows 10 upgrade without DriveLock except, that when the upgrade reboots the computer (several times), you must first pass the DriveLock Pre Boot Authentication (PBA) before the upgrade will continue. For unattended upgrades, you may set the PBA to auto logon. 1. Set the PBA to auto logon for 3 reboots. Open an administrative command window and run for example DLFdeCmd enableautologon alice wonderland * 3 Automatically logs on user alice from domain wonderland for the next 3 reboots, the password will be entered at the command line. Replace alice and wonderland by the user and domain of your choice. 2. Save the registry parameters of the original DriveLock encryption driver. Open regedit.exe and export HKLM\SYSTEM\CurrentControlSet\Services\pded\Parameters to a file. 3. Start the Windows 10 setup 4. Select you want to keep files and apps (otherwise Windows will do a new installation and your data will be lost). 5. The computer will automatically reboot several times 6. After the upgrade is finished restart Windows to ensure auto logon is no longer active 7. Import the saved Paramaters into the registry again. 4 Windows 10 Upgrade 4 Restrictions and Known Issues Prepare the setup The Windows setup source must contain the windows installation as windows image (install.wim). Installation media created with the Microsoft Media Creation Tool contain an encrypted setup distribution file (install.esd) instead and cannot be modified by the DLUpgPrep tool. Some AV-Products block access to content of the DVD/ISO, e.g. to autorun.inf, and DLUpgPrep cannot copy the complete source. Disable real time scanning until DLUpgPrep finished working. Run DLUpgPrep in verbose mode to figure out the cause for any issues. Run the upgrade Encryption or decryption of disks must have completed. Do not upgrade, while a disk en-/decryption is running. There must be only one disk/partition, which contains the DriveLock EFS (e.g. C:\SECURDSK). Upgrading Windows 7 or Windows 8.1 to Windows 10 is not supported. A new installation of Windows on an encrypted disk is not supported. Sometimes the Windows 10 setup requests, to reboot the computer first. Reboot and start the setup again. Sometimes the Windows 10 setup requests an activation key. Then it will not do an
Recommended publications
  • Guide to Hardening Windows 10 Technical Guide
    NOVEMBER 2020 Guide to Hardening Windows 10 For Administrators, Developers and Office Workers TABLE OF CONTENTS Introduction .......................................................................................................................... 4 Prerequisites ............................................................................................................................ 4 User roles ................................................................................................................................. 4 EFI (BIOS) Configuration ...................................................................................................... 5 To be enabled: ......................................................................................................................... 5 To be disabled: ......................................................................................................................... 5 Windows Defender Firewall .................................................................................................. 6 Enable logging of dropped packets ............................................................................................. 6 Disable enforcement of local rules and disable notifications .......................................................... 7 Block outbound connections by default ....................................................................................... 8 Secure potentially vulnerable protocols ......................................................................................
    [Show full text]
  • Metasys Server Installation and Upgrade Instructions Code No
    Metasys Server Installation and Upgrade Instructions Code No. LIT-12012162 Software Release 10.0 Issued April 15, 2019 Welcome.....................................................................................................................................3 Getting Started...........................................................................................................................3 Summary of Changes.........................................................................................................................4 Prerequisite Software Checklist for Installation and Upgrade.......................................................4 Recommended OS and SQL Server Combinations.........................................................................7 Upgrade Pre-Work Checklist..............................................................................................................8 Metasys Server Installation.....................................................................................................10 Installing Unified Metasys Server on Desktop Computer.............................................................10 Installing Unified Metasys Server on Server Computer................................................................12 Installing Unified Metasys Server and SCT on Desktop Computer.............................................14 Installing Unified Metasys Server and SCT on Server Computer................................................17 Installing a Split Metasys Server and SCT.....................................................................................20
    [Show full text]
  • Surface Hub 2S Admin Guide
    Surface Hub 2S Admin Guide Surface Hub 2S coming soon; Pre-release products shown; products and features subject to regulatory certification/approval, may change, and may vary by country/region. Surface Hub 2S has not yet been authorized under U.S. Federal Communications Commission (FCC) rules; actual sale and delivery is contingent on compliance with applicable FCC requirements. This documentation is an early release of the final documentation, which may be changed prior to final commercial release and is confidential and proprietary information of Microsoft Corporation. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. © 2019. Microsoft Corporation. All rights reserved Introduction .................................................................................................................................................. 1 Welcome to Surface Hub 2S ......................................................................................................................... 1 New User Experience and Features ........................................................................................................................ 1 Microsoft Teams ..................................................................................................................................................... 1 New form factor and hardware changes ................................................................................................................ 2 Surface
    [Show full text]
  • 3 Deployment Options
    Prior to the parties indicating final agreement by signing a Work Order, the information contained in this document represents the current view of CB5 Solutions, LLC on the issues discussed as of the date of publication and is subject to change. Furthermore, because CB5 must respond to changing market conditions, this document should not be interpreted as an invitation to contract or a commitment on the part of CB5. Changes to this document will be managed through a Change Management Process. CB5 MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of CB5 Solutions, LLC. CB5 may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from CB5, our provision of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The descriptions of other companies’ products in this document, if any, are provided only as a convenience to you. Any such references should not be considered an endorsement or support by CB5. CB5 cannot guarantee their accuracy, and the products may change over time. Also, the descriptions are intended as brief highlights to aid understanding, rather than as thorough coverage.
    [Show full text]
  • SECURITY ADVISORY Volume 2017-160
    Security Advisory | Volume 2017‐160 PRODUCT DESCRIPTION AFFECTED VERSIONS OTHER INFORMATION Microsoft Edge Remote Chakra Scripting Engine Memory Corruption Vulnerability - CVE-2017- Published - May 12, 2017 0223 CVE-2017-0223 Microsoft Edge Remote Chakra Scripting The Chakra JavaScript engine in Microsoft Edge on Windows 10 version 1703, does not properly CVSS - 7.5 Version(s): <=Windows Ver Engine Memory Corruption Vulnerability - render when handling objects in memory, making it prone to a remote code execution vulnerability. Vendor's Advisory - https://www.microsoft.com/en- 10. CVE-2017-0223 A remote attacker could exploit this issue to cause memory corruption and execute arbitrary code us/windows/microsoft-edge in the context of the current user. To exploit this issue the attacker would have to entice the victim http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017- to visit a maliciously crafted web site or to open a maliciously crafted file. 0223 Published - May 12, 2017 Linux Kernel 4.11.1 and Earlier Local DoS or Other Impact due to Use-After-Free Error - CVE-2017- CVE-CVE-2017-7487 Linux Kernel 4.11.1 and Earlier Local DoS 7487 CVSS - 7.2 or Other Impact due to Use-After-Free The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference Version(s): <=4.11.1 Vendor's Advisory - Error - CVE-2017-7487 counts, which allows local users to cause a denial of service (use-after-free) or possibly have http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017- unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
    [Show full text]
  • A How to for Windows Updates in Windows 10
    A How to for Windows Updates in Windows 10 Windows 10 includes a feature called Action Center. This is where you see notifications about the items needing attention on your PC, as well as a section with quick actions that you can initiate. You open the Action Center by clicking on its icon in the Notification area found at the extreme right end of the taskbar. Up to 13 different buttons are available, but many like Rotation lock, Airplane mode and Bluetooth will only appear on portable devices like laptops or tablets. To configure the Quick actions buttons on the Action Center, open the Settings app. To do this, you can either open the Action Center and click on the “All Settings” button. Most of the settings you'll want to change in Windows 10 are in All Settings section. or you can open the Start menu and click the “Settings” button on the lower-left side of the menu. Windows settings is organized into various categories: System, Devices, Network & Internet, Personalization, Apps, Accounts, Time & language, Ease of Access, Privacy, and Update & security. You click on a category to view and change more settings for that category. Settings in Windows 10 – alternatively use Win () + I key combination. The Settings app from Windows 10 holds almost all the settings governing the way your computer or device works. The traditional way of getting to one setting or to another is to open the appropriate settings category and browse through it until you find what you’re looking for. The Setting app from Windows 10 is very well organized, a lot better than the old Control Panel used to be.
    [Show full text]
  • Mcafee Policy Auditor Content Update V1183
    2016-Apr-14 McAfee Policy Auditor Content Update Summary Product / Version Content Version McAfee Policy Auditor 6.x 1183 New Checks Oval ID Title oval:com.mcafee.oval.common:def:2485596 Google Chrome Security Update 49.0.2623.108 for Windows oval:com.mcafee.oval.common:def:2485690 APSB16-10 Vulnerability Security Update 21.0.0.213 for Adobe Flash Player oval:com.mcafee.oval.common:def:2485692 APSB16-10 Vulnerability Security Update 18.0.0.343 for Adobe Flash Player oval:com.mcafee.oval.common:def:2485712 Google Chrome Security Update 49.0.2623.108 for Windows oval:com.mcafee.oval.gen:def:356458 MS16-050 Security Update for Adobe Flash Player for Windows Server 2012 R2 (KB3154132) oval:com.mcafee.oval.gen:def:356459 MS16-050 Security Update for Adobe Flash Player for Windows Server 2012 (KB3154132) oval:com.mcafee.oval.gen:def:356460 MS16-050 Security Update for Adobe Flash Player for Windows 8.1 for x64-based Systems (KB3154132) oval:com.mcafee.oval.gen:def:356461 MS16-050 Security Update for Adobe Flash Player for Windows 8.1 (KB3154132) oval:com.mcafee.oval.gen:def:356462 MS16-050 Security Update for Adobe Flash Player for Windows 10 (KB3154132) oval:com.mcafee.oval.gen:def:356463 MS16-050 Security Update for Adobe Flash Player for Windows 10 for x64-based Systems (KB3154132) oval:com.mcafee.oval.gen:def:356464 MS16-050 Security Update for Adobe Flash Player for Windows 10 Version 1511 (KB3154132) oval:com.mcafee.oval.gen:def:356465 MS16-050 Security Update for Adobe Flash Player for Windows 10 Version 1511 for x64-based Systems (KB3154132)
    [Show full text]
  • Windows 10 What to Do Now
    WINDOWS 10 WHAT TO DO NOW ARRAYA SOLUTIONS Educating, Engaging, and Elevating IT since 1999 Chuck Kiessling Director, Cloud and Workspace Solutions AGENDA Why are we here? What is your story? What are some key items to help your journey? Changes to Desktop Security WaaS: Servicing your Security Needs INTRODUCTIONS Chuck Kiessling Director, Cloud and Modern Workspace Practice [email protected] Twitter: @CKiessling WHAT IS YOUR INTEREST IN THIS SESSION? Windows and Office Active ConfigMgr Directory Windows Exchange Server SharePoint On-premises Legacy devices Modern devices Windows 7 Windows 10 Office Office 365 Active Directory + Azure Active Directory ConfigMgr + Microsoft Intune Windows Defender + Microsoft Threat Protection Cloud-connect what you have today What is your Digital Transformation Story? WHAT YOU CAN DO TO PROTECT YOUR BUSINESS WITH WINDOWS 10 WINDOWS 10 IS THE MOST SECURE WINDOWS EVER Device safeguards Threat resistance Identity protection Information security Threat detection and response *For the supported lifetime of the device THE MICROSOFT INTELLIGENT SECURITY GRAPH 450B monthly authentications Cyber threat intelligence collected 200+ global from unparalleled security cloud consumer and commercial information sources services Billions of data points Detect threats before they do damage +1B Windows Powered by machine learning and 18+ billion devices Bing web updated human intelligence pages scanned 400B e-mails analyzed THE MOST SECURITY, BUILT IN Where do these data points come from? WINDOWS 10: THE
    [Show full text]
  • KACE® Systems Management Appliance 11.0 Patching Catalog
    KACE® Systems Management Appliance 11.0 Patching Catalog: Supported Operating Systems and Applications Table of Contents Patching matrix........................................................................................................................................ 3 Operating systems........................................................................................................................... 3 Applications...................................................................................................................................... 5 About us.................................................................................................................................................20 Technical support resources......................................................................................................... 20 Legal notices..................................................................................................................................20 KACE Systems Management Appliance 11.0 Patching Catalog: Supported Operating Systems and Applications 2 Patching matrix This document contains the most recent list of supported applications and operating systems in the KACE Patch Catalog. The content of this matrix was compiled in March 2021. Operating systems Platform Publisher Operating System (OS) OS Architecture Edition Mac Apple Computer, Inc. macOS Catalina 10.15 ALL x86_64 Mac Apple Computer, Inc. macOS High Sierra 10.13 ALL x86_64 Mac Apple Computer, Inc. macOS Mojave 10.14 ALL x86_64 Mac Apple
    [Show full text]
  • Administrator Guide
    Administrator Guide HP ThinUpdate © Copyright 2016, 2017 HP Development Company, L.P. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Fifth Edition: November 2017 First Edition: February 2016 Document Part Number: 849856-005 User input syntax key Text that you must enter into a user interface is indicated by fixed-width font. Item Description Text without brackets or braces Items you must type exactly as shown <Text inside angle brackets> A placeholder for a value you must provide; omit the brackets [Text inside square brackets] Optional items; omit the brackets {Text inside braces} A set of items from which you must choose only one; omit the braces | A separator for items from which you must choose only one; omit the vertical bar ... Items that can or must repeat; omit the ellipsis iii iv User input syntax key Table of contents 1 Getting started ............................................................................................................................................. 1 Supported operating systems ............................................................................................................................... 1 Downloading and installing HP ThinUpdate .........................................................................................................
    [Show full text]
  • Release Notes 7.9.6
    Release Notes 7.9.6 © 2019 DriveLock SE Release Notes Table of Contents Part I Introduction 3 1 Document Conventions 3 2 DriveLock Documentation 3 Part II System Requirements 5 1 DriveLock Agent 5 2 DriveLock Management Console and Control Center 5 3 DriveLock Enterprise Service 5 Part III Supported Platforms 7 Part IV Version History 9 1 DriveLock 7.9.6 9 2 DriveLock 7.9.4 10 3 DriveLock 7.9.2 10 Part V Known Issues 12 1 Quickstart Setup Wizard 12 2 Installation of Management Components Using Group Policy 12 3 DriveLock Device Scanner 12 4 Manual Updates 13 5 Self Service unlock 13 6 DriveLock iOS and iTunes 13 7 Windows Portable Devices (WPD) 13 8 DriveLock Disk Protection 13 9 DriveLock File Protection and Microsoft OneDrive 15 10 BitLocker Management 15 11 Antivirus 16 Part VI Test Installation and Upgrade 17 1 DriveLock Evaluation 17 2 Updating DriveLock Components 17 General Issues 17 Updating DriveLock Disk Protection 17 Release Notes 7.9.6 2 © 2019 DriveLock SE Introduction 1 Introduction This document contains important information about the new version of DriveLock and changes from previous DriveLock versions. The DriveLock Release Notes also describes changes and additions to DriveLock that were made after the documentation was completed. This and other documentation can be found on our online help page www.drivelock.help. 1.1 Document Conventions Throughout this document the following conventions and symbols are used to emphasize important points that you should read carefully, or menus, items or buttons that you need to click or select.
    [Show full text]
  • Microsoft Windows FIPS 140 Validation Security Policy Document
    Windows Resume Security Policy Document Microsoft Windows FIPS 140 Validation Microsoft Windows 10 (Creators Update, Fall Creators Update) Non-Proprietary Security Policy Document Document Information Version Number 1.03 Updated On May 24, 2018 © 2018 Microsoft. All Rights Reserved Page 1 of 20 This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision). Windows Resume Security Policy Document The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2018 Microsoft Corporation.
    [Show full text]