> @Mr. Lundgren: Thank you for the hint, I will look into it.
With my current design I do not need to open process handles at dispatch
level. I am interested in excluding things at process level, so I do not
care about impersonating threads.
@Mr. Newcomer: This filter is not for a security product, it is for
debugging / monitoring purposes and I’m trying to cut down on the amount
of operations filtered.
If this is for your own internal use and will never be a product, you have
more degrees of freedom in what you do.
Most services run under special IDs, such as LocalSystem, or an account
for the backup administrator, etc. Rarely does a service get logged in
from the account of the logged-in user; I’d say this is so rare that any
additional filtering/reporting either (a) does not impact performance
enough to matter and (b) if it does happen, you probably care.
A debugging or monitoring component like this is typically accompanied by
a user app that displays, logs, or otherwise reacts to what is being
recorded. If this app is run by the user, it can record the sid of its
caller and then filter based on this sid. If the sid is not set, then you
have the option of either not doing any monitoring until the responding
app is started or recording all events to kernel buffers up to some limit,
then recycling the oldest buffer so that when the app is finally run, it
delivers back all the buffered events that match the sid handed down.
Thus, you don’t have to worry about the definition of “normal process”.
NTDEV is sponsored by OSR
OSR is HIRING!! See http://www.osr.com/careers
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at
http://www.osronline.com/page.cfm?name=ListServer