You can configure svdriver with registry keys and optionally by configuring the values in the HKLM\SYSTEM\CurrentControlSet\Services\svdriver\Parameters registry key.
Configure svdriver with the following registry keys:
Registry Key | Type | Description |
---|---|---|
AllowInstallerModification | REG_DWORD | When the value is 0 , an end user is not allowed to modify, update, or uninstall an application, which is either installed on the base image or delivered as an application package, from Add or remove programs in the Control Panel.By default, the value of the registry key is When the value is For more information about the protection mechanism where an end user is not allowed to perform any of the operations on an application which is installed on the base or delivered as an application package, see Uninstalling Applications: This action is not allowed for application <application_name>. |
DriveLetterSettings | REG_DWORD | The value for DriveLetterSettings is in a hexadecimal format, and any number of flags might be combined to implement multiple parameters. |
EnableHookInjection | REG_DWORD | Use this parameter to allow or disallow injecting svhook**.dll to a process. By default, the value of EnableHookInjection is To determine which process svhook**.dll must be injected to, use the HookInjectionWhitelist parameter. To deactivate EnableHookInjection parameter, set the value to
Note: Any changes to
EnableHookInjection takes effect only after the agent computer reboots.
For more information about the HookInjectionWhitelist parameter, see the corresponding row for the parameter in this table. |
EnableRegValueMerging | REG_DWORD | If this value is 1, merge certain registry values such as AppInitDlls across volumes. This action is additive across the volumes. |
EnableShortFileName | REG_DWORD | For legacy AppStacks created earlier than App Volumes 2.3, set this parameter to 0 to deactivate DOS short names. |
HookInjectionWhitelist | REG_MULTI_SZ | App Volumes agent uses this parameter to determine the process to which svhook**.dll must be injected to.
Use the following syntax for this parameter:
<process_path> | <DLL_path> | <command-line_arguments>
Note:
<process_path>,
<DLL_path>, and
command-line_arguments support wildcard pattern matching.
Consider the following example:
*\svchost.exe | *\user32.dll | -netsvc*\svchost.exe is the process path, *\user32.dll is the DLL path, and -netsvc is the command-line argument. Both the process path and DLL path contain the wildcard character (*) for pattern matching. This usage indicates that svchost.exe process is run from any location in the file system and user32.dll located any where in the file system is loaded by the process. Here are some scenarios:
Note: Any changes to
HookInjectionWhitelist takes effect only after the agent computer reboots.
|
MinimizeReplication | REG_DWORD | Configure how changes are preserved in a writable volume. If this value is 1, only changes to data are preserved in a writable volume. If this value is 0, changes to data and file attributes (hidden, Read Only, and, so on) permissions are preserved in writable volume. |
ReorderTimeOutInSeconds | REG_DWORD | Configure the wait time for all volumes to be attached and processed based on Order Precedence set from within App Volumes Manager. The timeout value is in seconds. |