The svdriver component of App Volumes agent is used for the virtualization of volumes into the OS. You can configure this component with registry keys at HKLM\SYSTEM\CurrentControlSet\Services\svdriver\Parameters.
Parameters for configuring svdriver
Registry Key | Type | Description |
---|---|---|
AllowInstallerModification | REG_DWORD | When the value is 0 , an end user is not allowed to modify, update, or uninstall an application, which is either installed on the base image or delivered as an application package, from Add or remove programs in the Control Panel.By default, the value of the registry key is When the value is For more information about the protection mechanism where an end user is not allowed to perform any of the operations on an application which is installed on the base or delivered as an application package, see Uninstalling Applications: This action is not allowed for application <application_name>. |
DriveLetterSettings | REG_DWORD | The value for DriveLetterSettings is in a hexadecimal format, and any number of flags might be combined to implement multiple parameters. |
EnableHookInjection | REG_DWORD | To allow or disallow injecting svhook**.dll to a process, you can use this parameter. By default, the value of EnableHookInjection is To determine which process svhook**.dll must be injected to, use the HookInjectionWhitelist parameter. To deactivate EnableHookInjection parameter, set the value to
Note: Any changes to
EnableHookInjection takes effect only after the agent computer reboots.
For more information about the HookInjectionWhitelist parameter, see the corresponding row for the parameter in this table. |
EnableRegValueMerging | REG_DWORD | If this value is 1, merge certain registry values such as AppInitDlls across volumes. This action is additive across the volumes. |
EnableShortFileName | REG_DWORD | For legacy AppStacks created earlier than App Volumes 2.3, set this parameter to 0 to deactivate DOS short names. |
HookInjectionWhitelist | REG_MULTI_SZ | App Volumes agent uses this parameter to determine the process to which svhook**.dll must be injected to.
Use the following syntax for this parameter:
<process_path> | <DLL_path> | <command-line_arguments>
Note:
<process_path>,
<DLL_path>, and
command-line_arguments support wildcard pattern matching.
Consider the following example:
*\svchost.exe | *\user32.dll | -netsvc*\svchost.exe is the process path, *\user32.dll is the DLL path, and -netsvc is the command-line argument. Both the process path and DLL path contain the wildcard character (*) for pattern matching. This usage indicates that svchost.exe process is run from any location in the file system and user32.dll located any where in the file system is loaded by the process. Here are some scenarios:
Note: Any changes to
HookInjectionWhitelist takes effect only after the agent computer reboots.
|
Driver Letter Settings
By default, a drive letter is not assigned to either application packages or Writable Volumes. In such a scenario, a volume can be accessed using a system path. Most modern applications are compatible with this behavior, but some applications might require a drive letter to access program or application files. An administrator can assign a drive letter using the disk management console. App Volumes can hide this drive from Windows Explorer using the DriveLetterSettings, an svdriver parameter.
To assign a specific drive letter to a Writable Volume, you can use the DriveLetterSettings parameter.
Value | Description |
---|---|
0x0000008 | DRIVELETTER_HIDE_WRITABLE. Hide drive letter for Writable Volumes. |
0x0000004 | DRIVELETTER_HIDE_READONLY. Hide drive letter for AppStack volumes. |
0x0000010 | DRIVELETTER_ASSIGN_WRITABLE. A Writable Volume can be assigned a drive letter. App Volumes agent assigns any available drive letter, starting from Administrators can assign a specific drive letter to a Writable Volume using the svservice parameter, DriveLetter. For more information about this parameter, see Configuration of svservice. |