ConfigSafe - FDU School of the Arts

ConfigSafe
Version 2.0
ConfigSafe® User Guide
Version 2.0
Documentation for:
ConfigSafe Desktop Edition
ConfigSafe Network Edition Preload Client
76 Northeastern Blvd. Suite 34B
Nashua, N.H. 03062
603-889-3883 Fax 603-889-8822
http://www.imagine-lan.com
(C) 1996-1998 imagine LAN, Inc.
i
Copyright © 1996 –1998 imagine LAN, Inc.
All rights reserved. Printed in the U. S. A.
No part of this document may be copied or reproduced in any form
or by any means without the prior written consent of imagine LAN,
Inc.
imagine LAN, Inc. makes no warranties with respect to this documentation and disclaims any implied warranties of merchant ability, quality, and fitness for any particular purpose. The information
in this document is subject to change without notice. imagine LAN,
Inc. reserves the right to make revisions to this publication without obligation to notify any person or entity of any such changes.
ConfigSafe is a registered trademark of imagine LAN, Inc.
MS-DOS and Microsoft are registered trademarks and Windows is
a trademark of Microsoft Corporation. Novell is a registered trademark of Novell, Inc. Other product names mentioned herein are
used for identification purposes only and may be trademarks of
their respective companies.
ii
iii
Chapter 1: Introduction
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Uses for ConfigSafe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Tracking System Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Recovering a Working Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Backing Up System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Profiles . . . . . . . . . . . . .
Snapshots. . . . . . . . . . .
Snapshot Scheduling . .
On Demand Snapshots.
Manage Snapshots. . . .
Restore. . . . . . . . . . . . .
Undo . . . . . . . . . . . . . . .
Report . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.3
.3
.3
.3
.3
.3
.4
.4
Chapter 2: Installation and Security
Installation and Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
ConfigSafe Security Requirements for Windows NT . . . . . . . . . . . . . . . 8
Chapter 3: Viewing Configuration Changes
ConfigSafe Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Viewing File Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
File Changes Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
v
Viewing System Information Changes . . . . . . . . . . . . . . . . . . . . . . . . . . 12
System Information Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Viewing Drive Information Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Drive Information Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Viewing Directory Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Directory Information Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Viewing Registry Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Registry Information Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Viewing Asset Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Asset Information Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Asset Version Information Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Chapter 4: Creating System Snapshots
Creating System Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Create System Snapshot Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Managing System Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Manage Configuration Snapshots Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Autocheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Renaming a Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Deleting a Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Exporting a Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Export Options Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Importing a Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Select Snapshot File Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Setting A Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
vi
Scheduling Automatic Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Specifying the Maximum System Snapshots . . . . . . . . . . . . . . . . . . . . 27
Chapter 5: Configuration Profiles
Configuration Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Select Profile Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Selecting a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Renaming a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Editing a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Adding a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Asset Pattern Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Deleting a Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Chapter 6: Generating Reports
Report Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Generate Report Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Printing a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Viewing a Report Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Chapter 7: Restoring System Configurations
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Restore Configuration Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Undo the Configuration Restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Undo Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
vii
Chapter 8: imagine LAN, Inc.
About imagine LAN, Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
viii
ix
x
xi
xii
Chapter 1: Introduction
Introduction
Welcome to the ConfigSafe Users manual. This manual discusses
the installation and proper use of the ConfigSafe family of products.
ConfigSafe is available for Windows 95/98 and Windows NT platforms. This document will cover the general uses of ConfigSafe, and
when necessary, mentioning items specific to each Windows Operating System platform.
ConfigSafe is a comprehensive configuration tracking and recovery
tool for Windows PCs. ConfigSafe tracks changes users and applications make to the system Registry and configuration files, file
versions (including DLLs, EXEs, and drivers), system assets, system hardware, and network connections. More importantly, ConfigSafe restores a system to a previously working configuration in
just seconds.
ConfigSafe tracks changes to system settings by taking a snapshot
of the system. The snapshot is much like a backup of the system,
containing information about the Registry, configuration files, system asset files, directories, file versions, hardware, and more.
ConfigSafe uses the snapshots to:
• Identify changes users make to their configuration
• Restore the system to a working configuration
ConfigSafe lets you capture a snapshot of your system configuration at any time. You can also have ConfigSafe automatically capture a configuration snapshot at scheduled intervals. This snapshot
can be used as a starting point when examining changes to the
1
system. The snapshot can also be used to restore the system configuration to the state that it was in when the snapshot was captured.
ConfigSafe OEM customers can find information on ConfigSafe EZ in
the ConfigSafe Online Help.
Uses for ConfigSafe
Anyone running a Microsoft Windows environment can benefit
from the features of ConfigSafe.
Tracking System Changes
ConfigSafe tracks the changes made to a user’s system.
Specifically, ConfigSafe tracks changes to:
• the Registry
• system files (INI, bat)
• asset files
• directory structures
• system hardware
• network connections
Recovering a Working Configuration
In just seconds ConfigSafe can restore a system to a previously
working configuration.
Backing Up System Settings
Before a user decides to make changes to their system they can
now secure their existing settings by creating a snapshot. ConfigSafe will capture their current settings, allowing them the freedom to experiment with their system without fear that other applications will stop working, or worse, the system will not boot into
2
Windows.
Overview
ConfigSafe tracks changes to configuration information and can
restore your system to a previously working configuration in seconds.
ConfigSafe tracks changes to critical information about your system’s configuration using the following categories:
• File Information
• System Information
• Drive Information
• Directory Information
• Registry Information
• System Asset Information
Each information category is represented by an icon displayed on
the icon bar in the upper portion of the main screen. For each category, a comparison between two Snapshots or a Snapshot and
your current configuration can be viewed on the ConfigSafe main
screen.
Profiles
Profiles define the specific information (files, assets, directories,
and Registry keys) tracked for your system’s configuration. Default
profiles are provided by ConfigSafe, however, it is recommended
that the default profiles be customized to obtain the maximum
product benefit. Profiles can be customized/managed by the user
with the ConfigSafe Desktop Edition, by the ConfigSafe Network
Manager for ConfigSafe Network Edition LAN Clients, or by the Preload Manager for ConfigSafe Preload Clients. Note: Some LAN
Clients may be able to manage their own Profiles, if this option is
enabled by the ConfigSafe Network Manager.
3
Snapshots
Snapshots represent the periodic or on demand capturing of your
system’s configuration information (as previously defined in the
Profile). This information is captured and saved for use in comparing changes over time, or to restore your system to a specific configuration that has been previously captured in a Snapshot. Snapshots are typically labeled with a description and the date and
time of the capture.
Snapshot Scheduling
Snapshot Scheduling can be used to automatically perform Snapshots at periodic intervals such as daily, weekly, monthly, etc. This
helps to ensure that your most recent working configuration is
captured in a Snapshot for use by the Restore function – if your
system develops a problem.
On Demand Snapshots
On Demand Snapshots can be taken by the user at any time to
record the current system configuration. It is often helpful to take
a Snapshot before and after making any major changes to your
system. This type of Snapshot can be quite helpful if the change
doesn’t go well, as it enables you to quickly restore back to the
configuration that was working just prior to the attempted modification.
Manage Snapshots
Manage Snapshots enables you to rename, delete, export, and
import snapshots. Snapshot Scheduling can also be managed with
this function.
Restore
Restore allows you to select a previously taken Snapshot of your
system and return your system to that configuration. Use the
4
Restore feature if your system no longer functions properly, or if
you want to switch between specific configurations. Systems can
also be restored from MS-DOS Mode by running SOS.exe (the SOS
function is not currently available in the Windows NT environment).
Undo
Undo allows you to reverse the results of a Restore process and
return to the configuration in place just prior to using Restore.
Undo.exe can also be run from MS-DOS Mode in a Windows 95/98
environment.
Report
Report creates a comparison report of the configurations captured
in two different Snapshots or a comparison report of your current
configuration and a Snapshot. The report can be either printed or
viewed online.
5
6
Chapter 2: Installation and
Security
Installation and Setup
ConfigSafe is installed on each system to be monitored. Listed
below are the requirements and installation instructions for the
ConfigSafe software. ConfigSafe is easy to install, and even easier
to use.
System Requirements
ConfigSafe Requirements for Windows NT
• Microsoft Windows NT Operating System v3.51 or 4.0
• VGA Color Monitor
• 5 MB Disk Space
ConfigSafe Requirements for Windows 95/98
• Windows 95/98
• VGA Color Monitor
• 5 MB Disk Space
Installation
Note: ConfigSafe provides an Uninstall procedure when installed
into a Windows 95/98 or Windows NT 4.0 environment. There is no
7
automated Uninstall procedure when installing into a Windows NT
3.51 environment.
1. Run INSTALL.EXE
2. From the ConfigSafe installation diskette run the ConfigSafe Installation Utility: INSTALL.EXE
3. Follow the On-Screen instructions.
4. You may be asked to specify the following information:
5. Installation Directory: Provide the name of the directory
into which ConfigSafe should be installed.
6. Short Cut Options: ConfigSafe will install shortcuts on your
Windows Startup menu and Desktop. If queried, select the
desired installation options by marking the associated
check box.
7. Configuration Files: ConfigSafe tracks the important configuration files on your system, such as WIN.INI and
SYSTEM.INI. You may be asked to verify the initial location
of these files. In most cases you will want to take the
defaults provided by ConfigSafe.
8. Installation Complete
Upon completing the installation procedure, the required files will
be copied to your system, and the initial system snapshot will be
taken. The initial snapshot captures your system configuration.
From that point forward the system is monitored for changes. On
some systems, ConfigSafe will run itself after completing the
installation procedure.
ConfigSafe Security Requirements for
Windows NT
When running ConfigSafe in a Windows NT environment, the following privileges are required :
• “Back up files and directories privileges”
• “Managing and auditing security log”
8
• “Restore files and directories”
9
10
Chapter 3: Viewing
Configuration Changes
ConfigSafe Icons
The following icons are accessible from the ConfigSafe main window. Each icon represents a major piece of system information
tracked by ConfigSafe.
Viewing File Changes
The File Changes window displays changes made to configuration
files on your system. The information displayed represents
changes made to those files between the dates specified in the
Changes Starting and Changes Ending fields.
This window is the first window to display when you invoke the
ConfigSafe software. You can return to this window from other
ConfigSafe windows by clicking the File Changes icon in the icon
section of the window.
While viewing the File Changes window, you have the following
options:
Option
Description
Show Line Numbers
Show the line numbers for the file. This option is
not available when viewing initialization (.INI) files.
Show Only Changed Lines Show only the lines that have changed.
11
You specify how you want to view the information by clicking in
the box next to the option desired. A checkmark in the box indicates that the option is selected.
When viewing changes in initialization (.INI) files, the information
is displayed according to sections. The changes are listed by section names.
To View File Changes:
1. Click the File Changes icon. The File Changes window displays.
2. Select the file for which you want to view changes.
3. To view only changed lines, click in the box next to the
Show only changed lines option.
4. Notice that if you double-click on the file name, NotePad is
invoked displaying the contents of the file. Click the Exit
button when finished.
File Changes Window
Position the cursor on a region in the window to view detailed
information about that region.
Exit Button
Click here to exit the ConfigSafe software.
Snapshot Button
Click here to create a configuration snapshot. You can name the
snapshot and select the files to be included in the snapshot.
Manage Button
Click here to manage snapshot information. You can rename or
12
delete a snapshot, schedule automatic snapshots, and specify the
maximum number of snapshots you want on your system. You can
also export and import snapshots from the manage snapshot window.
Report Button
Click here to generate a report. You can select the information you
want to be included in the report and also select whether you
want to print the report or view it online.
Profile Button
Click here to select a configuration profile. You can add, rename,
or delete a profile as well as select the profile for current use.
Note: The Profile button is only available in the ConfigSafe Desktop Edition and in the ConfigSafe Network Edition.
Restore Button
Click here to select the configuration to be restored. You can select
the files to be included in the restoration.
When restoring the configuration, you need to specify if you want
to restart Windows or reboot your system once the files are
restored. If you do not specify this option and proceed with the
restoration, the files will be restored, but the restored configuration will not be in effect.
To protect your system from unintended or unauthorized restoration, you must enter a password to access the restore function.
This password can be set and re-set from the Manage Snapshot
screen by clicking on the Set Password button.
Undo Button
Click here to undo an earlier configuration restoration and return
the files to their original state. You can select the files to return to
their original state. You select the files in the Undo window.
13
Help Button
Provides context-sensitive online help.
Changes Starting
Select the start date from the drop-down list for the monitored
information.
Changes Ending
Select the end date from the drop-down list for the monitored
information.
Options
While viewing the File Information window, you can select to view
changes to the files by viewing only the lines that have changed.
You specify how you want to view the information by clicking in
the box next to the option desired. A checkmark in the box indicates that the option is selected.
When viewing changes in initialization (.INI) files, the information
is displayed by sections. The sections that contain changes are
expanded to show the changes made.
List of Files
Displays the files that are being monitored by ConfigSafe.
File Changes
The File Changes field identifies the actual changes made to the
file. This field uses the following conventions:
14
Convention
Description
Red Font (-)
Indicates the line was deleted. A minus sign (-) precedes deleted lines.
Blue Font (+)
Indicates the line was changed. A plus sign (+) precedes changed lines.
Green Font
Indicates the line was added. An arrow also precedes new lines.
View Previous Section/View Next Section
Click on these buttons to move to the previous or next change.
Viewing System Information Changes
The System Information window displays the changes made to the
system within the specified time.
To View System Changes:
1. Click the System Information icon. The System Information
window displays.
2. View the changes. Any changes made to the system information are displayed in green on the System Information
window.
System Information Window
Position the cursor on a region in the window to view detailed
information about that region.
Information Displayed - System Information Window
Any changes made to the basic system configuration are displayed
in green on the System Information window. This window lists
information such as:
• Coprocessor
15
• Base Memory
• Windows Version
• Processor Type
• Processor Vendor
Processor type will default to the processor class (486,586,686,
etc.) if the processor is a 486 or older class, or if the CPUID instruction returned a type that does not match the vendor’s currently
defined list of processor types.
Viewing Drive Information Changes
The Drive Information window displays the changes made to the
drive between the specified time period.
To View Drive Information Changes:
1. Click the Drive Information icon. The Drive Information
window displays.
2. View the changes. Any changes to drives are shown in
green.
Drive Information Window
Position the cursor on a region in the window to view detailed
information about that region.
Information Displayed - Drive Information Window
The Drive Information window displays the information for each
drive installed on your system. Drives that are no longer configured are shown in red. New drives that have been added are
shown in blue.
Viewing Directory Changes
The Directory Information window displays the changes made to
16
files in the directory between the specified time period.
To View Directory Changes:
1. Click the Directory information icon. The Directory Information window displays.
2. Select the directory you wish to analyze.
3. ConfigSafe monitors specific directories on your system,
such as the Windows and DOS directories. The list of directories monitored by ConfigSafe is listed in the upper Window of the main screen. Changes to files in those directories are listed in the Changes box, the lower window of the
main screen.
4. View the changes. Any changes to files in the directories
are displayed. Files that have been updated are displayed
in green, files which have been added are displayed in
blue, and files which have been deleted are in red.
Directory Information Window
The Directory Information displays the information for each directory, and the files included in that directory. Double click on any
directory name and the files in the directory are displayed.
Position the cursor on a region in the window to view detailed
information about that region.
List of Directories
Displays the directories that are being monitored by ConfigSafe.
17
File Changes
The File Changes field identifies the actual changes made to files in
the selected directory. This field uses the following conventions:
Convention
Description
Red Font (-)
Indicates the file was deleted. A minus sign (-) precedes deleted files.
Blue Font (+)
Indicates the file was added. A plus sign (+) precedes new files.
Green Font
Indicates the file has changed - the date, time, or
size is no longer the same. A green arrow appears
before the files that were changed.
Changed Lines Only
While viewing the File Changes field you have the option of having ConfigSafe show all files in a directory, or just those that have
been changed. If the Changed Lines Only field is marked, only
those files which have been added, deleted, or updated in the
specified time period, will be displayed.
View Previous Section/View Next Section
Click on these buttons to move to the previous or next file which
has been changed in the directory.
Viewing Registry Changes
The Registry Information window displays the changes made to
the Windows Registry between the specified time period. This feature helps track any changes to the system registry by Windows
itself, or by an application.
To View Registry Changes:
1. Click the Registry Information icon. The Registry Information window displays. The upper box contains a list of
18
Registry keys that are being monitored by ConfigSafe. The
lower window displays the actual changes to those registry keys.
2. Select the key you wish to analyze. After you select the
key you want to analyze, any changes made to registry
entries in that key, or its subkeys, display in the lower
window.
3. View the changes. Any changes to registry keys or their
values are displayed. Values that have been changed are
displayed in green. New values and keys are displayed in
blue. Deleted keys and values are displayed in red.
Registry Information Window
Position the cursor on a region in the window to view detailed
information about that region.
The Registry Information window has two main fields, the Registry
Key List field, and the Registry Changes field. Select the key in the
Registry Key List, and changes to that Registry Key, or its subkeys, are displayed in the Registry Changes field.
Registry Key List
Displays the Registry keys that ConfigSafe monitors.
19
Registry Changes
The Registry Changes field identifies the changes to the selected
Registry key and its subkeys. This field uses the following conventions:
Convention
Description
Red Font (-)
Indicates the Registry Key or Value was deleted. A
minus sign (-) precedes the deleted registry key or
value. This indicates the specified value or key is
not contained in the later snapshot, but was in the
earlier snapshot to which it is compared.
Blue Font (+)
Indicates the Registry Key or Value was added. A
plus sign (+) precedes the new entry.
Green Font (green arrow) Indicates the Registry Key or Value has changed.
The old and new values for the Registry Key or
Value display. A green arrow precedes the changed
lines.
Changed Lines Only
While viewing the Registry Changes field you have the option of
having ConfigSafe show all the Registry keys and values, or just
those that have been changed. If the Changed Lines Only field is
marked, only those keys or values which have been added, deleted, or updated in the specified time period, will be displayed.
View Previous Section/View Next Section
Click on these buttons to move to the previous or next Registry
key or value which has changed.
Viewing Asset Changes
The Asset Information window displays the changes made to files
in the selected Asset pattern between the specified time period.
Asset patterns can be specified by using a directory hierarchy or a
20
wildcard path. This defines specific groups of files to be tracked
and, if desired, archived for use if a Restore is required.
Some examples of Asset patterns are:
C:\My Documents
This Asset pattern tracks all files within the My Documents folder (and all files in its subdirectories) on
the C drive.
C:\Windows\*.sys
This Asset pattern tracks all files with the .sys
extension that are located in the Windows folder of
the C drive.
C:\Windows\s*m\*.dll
This Asset pattern tracks all files with the .dll extension that are located in folders beginning with “s”
and ending with “m”, within the Windows folder of
the C drive.
To View Asset Changes:
1. Click the Asset information icon. The Asset Information
window displays.
2. Select the Asset pattern you wish to analyze. After you
select the Asset pattern you want to analyze, any changes
made to files in that Asset pattern display in the lower
window.
3. View the changes. Any changes to files are displayed.
Files that have been changed are displayed in green. New
files are displayed in blue. Deleted files are displayed in
red.
Asset Information Window
The Asset Information window displays the information for each
Asset pattern, and the files included in that Asset pattern. Double
click on any Asset pattern name and the files in the Asset pattern
are displayed.
Position the cursor on a region in the window to view detailed
information about that region.
21
Asset Pattern List
Displays the Asset patterns (by complete directory or wildcard)
that ConfigSafe monitors. For example: “D:\webpage\*.html” is an
Asset pattern that will track changes to all files with the .html
extension that are located in the webpage folder on the D drive.
Archived Assets Icon
The archived assets icon displays when the selected Asset
pattern has the Archive Selected Assets switch enabled.
Asset Version Information Icon
The asset version information icon is displayed unless the
selected Asset pattern has the Ignore File Version Info switch
enabled. System performance during the retrieval of information
from the live system can be significantly improved with the Ignore
File Version Info switch enabled.
Asset Changes
The Asset Changes field identifies the changes to the selected
Asset pattern files. This field uses the following conventions:
Convention
Description
Red Font (-)
Indicates the file was deleted. A minus sign (-) precedes the deleted file.
Blue Font (+)
Indicates the file was added. A plus sign (+) precedes new files.
Green Font
Indicates the file has changed - the date, time, or
size is no longer the same. A green arrow appears
before the files that were changed.
Changed Lines Only
While viewing the Asset Changes field you have the option of having ConfigSafe show all files in an Asset pattern, or just those that
have been changed. If the Changed Lines Only field is marked, only
those files which have been added, deleted, or updated in the
22
specified time period, will be displayed.
View Previous Section/View Next Section
Click on these buttons to move to the previous or next file which
has been changed in the Asset pattern.
23
24
Chapter 4: Creating System
Snapshots
Creating System Snapshots
A system snapshot captures the configuration of your system at a
specific moment. Your configuration information includes system
files, and hardware configuration, file versions, network connections, directory structures, Registry information, and asset information.
You create system snapshots using the Create System Snapshot
window.
To Create a System Snapshot:
1. Click the Snapshot button. The Create System Snapshot
window displays.
2. Enter a descriptive name for the snapshot. The snapshot
includes information for the files, registry, assets, software, hardware, and network connection changes. It is
also a good idea to add a descriptive title that specifies
the contents of the snapshot. For example, a descriptive
title you might enter could be “Before Word for Windows
Was Installed” meaning that you created the snapshot
before you installed Word for Windows on your system.
3. Click the OK button to create the snapshot.
25
Create System Snapshot Window
Position the cursor on a region in the window to view detailed
information about that region.
Description Field
Indicates the description that will be assigned to the system snapshot. When ConfigSafe snapshots your system, it keeps a record of
the configuration files, system hardware, network connections, file
versions, assets, and Registry information. The description field
allows you to assign a descriptive name to the system snapshot,
such as: “Before Installing Word for Windows.” Later, when referring to the snapshot, you will have an indication of why the system snapshot was taken.
OK Button
Click here to perform the task and return to the previous window.
Cancel Button
Click here to exit this window without saving any of the changes
made.
Managing System Snapshots
Once you create the system snapshot, you may want to delete the
snapshot or rename it. You can manage the system snapshots from
the Manage Configuration Snapshots window.
26
Manage Configuration Snapshots Window
Position the cursor on a region in the window to view detailed
information about that region.
NOTE: Some of the fields displayed here may not be available in
your version of ConfigSafe. ConfigSafe is customized by each vendor to their particular requirements — enabling and disabling certain fields. If you need the advanced features provided by these
fields, you must purchase the ConfigSafe Desktop Edition or the
ConfigSafe Network Edition. Contact your reseller for more information.
Rename Button
Click here to enter a different name for the selected configuration
snapshot.
Delete Button
Click here to delete the selected configuration snapshot. The original system snapshot may not be deleted — it is protected by ConfigSafe.
Export Button
Click here to export the selected configuration snapshot.
Import Button
Click here to import a configuration snapshot.
Set Password Button
Click here to set or re-set a password to access the Restore function.
Snapshots
Identifies a list of system snapshots currently retained by Con-
27
figSafe. To rename or delete a snapshot from the recorded history,
first select a configuration snapshot from this list. Then, select the
desired action.
Snapshots that have been imported or generated through snapshot scheduling are indicated with the following icons:
- Imported Snapshot
- Scheduled Snapshot
Scheduled Snapshots
When working with snapshots, you can perform the following functions:
• Select the profile to use when creating scheduled snapshots. Note: this function is only available in the ConfigSafe Desktop Edition and the ConfigSafe Network Edition.
• Enable scheduled snapshots
• Schedule automatic snapshot intervals
Profiles
You can select the configuration profile for which scheduled snapshots will be created. Note: this function is only available in the
ConfigSafe Desktop Edition and the ConfigSafe Network Edition.
Enable Scheduled Snapshots
You can schedule snapshots so that they occur automatically.
Automatic Snapshot Intervals
You can schedule snapshots to occur at the following intervals:
28
Button
Description
Daily
Capture the information once a day.
Weekly
Capture the information once a week.
Monthly
Capture the information once a month.
At Window Startup
Capture the information when Windows is invoked.
Scheduled snapshots are not dependent on system startup. The “At
Windows Startup” option will take a snapshot at startup and
every 24 hours thereafter, provided the user is logged onto the
console.
Autocheck
The ConfigSafe Snapshot Scheduling function creates a background
task called Autocheck that displays a taskbar entry. To allow the
ConfigSafe background task to run without creating a taskbar
entry, set the following switch in the CFGSAFE.INI file.
[CFGSAFE]
AutochkTimer=0
The default value is 24, so if the switch does not exist or is set to
something other than 0, the taskbar entry will be created. The
CFGSAFE.INI file is located in the directory that contains the ConfigSafe program.
Maximum Snapshots to Save
In this field, you can specify the maximum snapshots to retain on
your system.
For example, if you specify that you want to create a snapshot
daily, and you specify that you want to retain only 7 snapshot files
on your system, ConfigSafe will delete the least recent file when
the 8th snapshot is taken. Again, the original system snapshot
cannot be deleted, it is protected by ConfigSafe.
29
Renaming a Snapshot
You can rename a snapshot should you desire to change the information in the title. For example, you could alter the title to include
the date if you did not initially include that information. Or you can
enter a more descriptive file name if you choose.
To Rename a Snapshot:
1. Click the Manage button. The Manage Configuration Snapshot window displays.
2. Click on the name of the snapshot that you want to
rename.
3. Click the Rename button. The Snapshot Description dialog
box displays.
4. Enter the new name of the snapshot.
5. Click the OK button.
The Manage Configuration Snapshots window displays with the
newly named snapshot.
Deleting a Snapshot
You can delete a snapshot when the information contained within
the snapshot is no longer of importance.
To Delete a Snapshot:
1. Click the Manage button. The Manage Configuration Snapshot window displays.
2. Click on the name of the snapshot that you want to delete.
3. Click the Delete button.
4. Confirm that this is the file you want to delete when
prompted. The Manage Configuration Snapshot window
displays with the selected file deleted from the list of files.
5. Click the OK button.
30
Exporting a Snapshot
You can export a snapshot when you wish to save the snapshot
information outside of the ConfigSafe application. Note: Asset
archiving is not currently included in exported snapshots.
To Export a Snapshot:
1. Click the Manage button. The Manage Configuration Snapshot window displays.
2. Click on the name of the snapshot that you want to export.
3. Click the Export button. The Export Options window displays.
4. Enter a description for the exported snapshot.
5. Select the information to be included in the exported snapshot by clicking the information boxes. A checkmark indicates that the information will be included in the exported
snapshot.
6. Click the OK button. The Save Snapshot As window displays.
7. Enter the Save In location and File Name of the exported
snapshot.
8. Click the OK button.
Export Options Window
Position the cursor on a region in the window to view detailed
information about that region.
Importing a Snapshot
You can import a snapshot when you wish to retrieve snapshot
information from outside of the ConfigSafe application. Note: Asset
archiving is not currently included in imported snapshots.
31
To Import a Snapshot:
1. Click the Manage button. The Manage Configuration Snapshot window displays.
2. Click the Import button. The Select Snapshot File window
displays.
3. Enter the File Name of the imported snapshot.
4. Click the Open button.
5. The imported snapshot will display in the Snapshots listbox.
Select Snapshot File Window
Position the cursor on a region in the window to view detailed
information about that region.
Setting A Password
You can set or re-set a password to access the Restore function.
To Set (or re-set) a Password:
1. Click the Set Password button.
2. Enter your old password (leave blank if none has been
previously set).
3. Click the OK button.
4. Enter the new password.
5. Click the OK button.
6. Confirm the new password.
7. Click the OK button.
Scheduling Automatic Snapshots
You can schedule snapshots so that they occur automatically.
32
Note: This feature may not be enabled by your vendor. If you wish
to schedule automatic snapshots, you must purchase the ConfigSafe Desktop Edition or the ConfigSafe Network Edition.
Your choices are to capture the information:
Button
Description
Daily
Capture the information once a day.
Weekly
Capture the information once a week.
Monthly
Capture the information once a month.
At Window Startup
Capture the information when Windows is invoked.
To Schedule Automatic Snapshots:
1. Click the Manage button from any ConfigSafe window. The
Manage Configuration Snapshot window displays.
2. Click the Profiles button. Note: this button is only available
in the ConfigSafe Desktop Edition and the ConfigSafe Network Edition. Select the profile for snapshot scheduling.
3. Click in the check box next to the Enabled Scheduled
Snapshot option. A checkmark indicates that the option is
enabled.
4. Select the button next to the time interval that specifies
when you would like snapshots to be created.
5. Click the OK button.
Specifying the Maximum System Snapshots
You can specify how many snapshot files you would like to keep
on your system. ConfigSafe will delete the files once you exceed
the specified number.
For example, if you specify that you want to create a snapshot
daily, and you specify that you want to retain only seven snapshot
files on your system, ConfigSafe will delete the least recent file
33
when the eighth snapshot is taken.
You specify the maximum snapshots to save from the Manage Configuration Snapshots window in the following field:
Keep in mind that each system snapshot uses approximately
320Kb. You should therefore limit your snapshots by the amount of
disk space you wish to provide.
To Specify the Maximum Snapshots to Save:
1. Click the Manage button. The Manage Configuration Snapshot window displays.
2. Enter the maximum number of snapshot files you want to
keep on your system.
3. Click the OK button.
34
Chapter 5: Configuration
Profiles
Configuration Profiles
A configuration profile details the specific configuration files, directories, registry keys, and assets to be captured when generating a
snapshot. The default configuration profile is called “system snapshot” and is generated upon installation of ConfigSafe.
ConfigSafe provides the capability to define multiple configuration
profiles. A list of profiles is displayed in the Select Profile window.
Note: the ability to add, delete, and edit profiles is only available
in the ConfigSafe Desktop Edition and the ConfigSafe Network Edition. The ability to edit existing profiles is available in the ConfigSafe Preload Manager.
Select Profile Window
Position the cursor on a region in the window to view detailed
information about that region.
Configuration Profiles Box
Lists the names of the profiles that have been created. Highlighted profile name indicates the profile currently in use.
35
OK Button
Click here to perform the task and return to the previous window.
Cancel Button
Click here to exit this window without saving any of the changes
made.
Rename Profile Button
Click here to enter a different name for the selected configuration
profile.
Edit Profile Button
Click here to edit an existing configuration profile.
Add Profile Button
Click here to add a new configuration profile.
Delete Profile Button
Click here to delete the selected configuration profile. The original
system snapshot profile may not be deleted — it is protected by
ConfigSafe.
Selecting a Profile
You can select a configuration profile to be used by ConfigSafe to
snapshot the system.
To Select a Profile:
1. Click the Profile button. The Select Profile window displays.
2. Click on the name of the profile that you want to select.
3. Click the OK button.
36
The ConfigSafe main screen is displayed with information for the
newly selected profile.
Renaming a Profile
You can rename a profile should you desire to change the information in the title.
To Rename a Profile:
1. Click the Profile button. The Select Profile window displays.
2. Click on the name of the profile that you want to rename.
3. Click the Rename Profile button. The Modify Configuration
Profile dialog box displays.
4. Enter the new name of the profile.
5. Click the OK button.
The Select Profile window displays with the newly named profile.
Editing a Profile
You may change the attributes (configuration files, directories,
registry keys, and assets) of an existing configuration profile. It is
recommended that a snapshot be taken after any changes are
made to a configuration profile.
To Edit a Profile:
1. Click the Profile button. The Select Profile window displays.
2. Click the Edit Profile button. The Modify Configuration Profile dialog box displays.
3. Edit the name of the profile, if desired.
4. Click the File Changes icon.
5. Click the Plus Sign button to add new files to the list. Click
the Minus Sign button to delete files from the list.
6. Click the Directories Information icon. Existing directories
37
are displayed in the Directories list box.
7. Click the Plus Sign button to add new directories to the
list. Click the Minus Sign button to delete directories from
the list.
8. Click the Registry Information icon. Existing registry keys
are displayed in the Registry Keys list box.
9. Click the Plus Sign button to add new registry keys to the
list. Click the Minus Sign button to delete registry keys
from the list.
10. Click the Asset Information icon. Existing Asset patterns
are displayed in the Asset pattern list box.
11. Click the Plus Sign button to add new Asset patterns to the
list. Check the Archive Selected Assets box if archiving is
desired. Check the Ignore File Version Info box if you prefer not to track version information. Click the Minus Sign
button to delete Asset patterns from the list.
12. Click the OK button.
Adding a Profile
You can add a new configuration profile should you desire to snapshot information that is different from the “system snapshot” profile.
To Add a Profile:
1. Click the Profile button. The Select Profile window displays.
2. Click the Add Profile button. The Create Configuration Profile dialog box displays.
3. Enter the name of the new profile.
4. Click the File Changes icon.
5. Click the Plus Sign button to add new files to the list. Click
the Minus Sign button to delete files from the list.
6. Click the Directories Information icon. Default directories
38
are displayed in the Directories list box.
7. Click the Plus Sign button to add new directories to the
list. Click the Minus Sign button to delete directories from
the list.
8. Click the Registry Information icon. Default registry keys
are displayed in the Registry Keys list box.
9. Click the Plus Sign button to add new registry keys to the
list. Click the Minus Sign button to delete registry keys
from the list.
10. Click the Asset Information icon. Default Asset patterns
are displayed in the Asset pattern list box.
11. Click the Plus Sign button to add new Asset patterns to the
list. Check the Archive Selected Assets box if archiving is
desired. Check the Ignore File Version Info box if you prefer not to track version information. Click the Minus Sign
button to delete Asset patterns from the list.
12. Click the OK button.
Asset Pattern Examples
Some examples of Asset patterns are:
C:\My Documents
This Asset pattern tracks all files within the My Documents folder (and all files in its subdirectories) on
the C drive.
C:\Windows\*.sys
This Asset pattern tracks all files with the .sys
extension that are located in the Windows folder of
the C drive.
C:\Windows\s*m\*.dll
This Asset pattern tracks all files with the .dll extension that are located in folders beginning with “s”
and ending with “m”, within the Windows folder of
the C drive.
39
Deleting a Profile
You can delete a profile when the information contained within the
profile is no longer of importance.
To Delete a Profile:
1. Click the Profile button. The Select Profile window displays.
2. Click on the name of the profile that you want to delete.
3. Click the Delete Profile button.
4. Confirm that this is the file you want to delete when
prompted. The Select Profile window displays with the
selected file deleted from the list of profile.
5. Click the OK button.
40
41
42
Chapter 6: Generating
Reports
Report Options
You can generate reports that list configuration changes from the
dates specified in the Changes Starting and Changes Ending fields.
You have the option of including the following information in the
report:
• File change information
• System information
• Drive information
• Directory information
• Registry information
• Asset Information
You select the information to be included in the report from the
Generate Report Window.
When you create a report, you have the following options:
• Send the output to a printer
• View the report online
43
Generate Report Window
Position the cursor on a region in the window to view detailed
information about that region.
Print Report
Click here to print the report listing the changes to the configuration.
Printer Setup
Click here to set the printing options of your printer to which you
will send the report.
View Report
View the report of the changes to the configuration online.
Report Information
Click in the box next to the option to select the information to be
included in the report. A checkmark in the box indicates that this
information is to be included.
Printing a Report
You can print the report once you specify the options that the
report is to include.
To Print a Report:
1. Click the Report button. The Generate Report window displays.
2. Select the information that the report is to contain.
3. Click in the box next to the option to select the option. A
checkmark in the box indicates that this information is to
be included.
44
4. If you have not already done so, set up the printer information. If the printer information is correct, proceed to
step number 4.
A.
Click the Printer Setup button. A standard print
setup dialog box displays.
B.
Select the appropriate printing options.
C.
Click the OK button.
5. Click the Print Report button. The report is generated and
printed on the printer specified in the printer setup information.
6. Click the OK button when finished.
Viewing a Report Online
Rather than sending the output to a printer, you can view the
information online. When you view a report online, Notepad is
invoked and will display the report. You can then cut and paste
information from Notepad or edit the report before you print it.
To View a Report Online:
1. Click the Report button. The Generate Report window displays.
2. Select the information that the report is to contain.
3. Click in the box next to the option to select the option. A
checkmark in the box indicates that this information is to
be included.
4. Click the View Report button. The report displays online.
5. Select Exit from the File pull-down menu when you have
finished viewing the report.
6. Click the OK button.
45
46
47
48
Chapter 7: Restoring System
Configurations
Overview
One of the most powerful features of ConfigSafe is the ability to
restore your system to a previous configuration in just seconds.
For example, perhaps you suddenly begin having problems trying
to print a document. You know the system printed without a problem just last Wednesday. Now, you can restore your system to
that previously working configuration in just seconds.
Simply run ConfigSafe and from the Restore Configuration window,
you can select the previous configuration to be restored. If you
deselect a file from the list of files, it will not be restored. Select
the Restore button from any of the ConfigSafe windows. You will
see the Restore Configuration window.
When restoring the configuration, you need to specify if you want
to restart Windows or reboot your system once the files, archived
assets, and Registry are restored. If you do not specify this option
and proceed with the restoration, the files, archived assets, and
Registry will be restored, but the restored configuration will not be
in effect.
To protect your system from unintended or unauthorized restoration, you must enter a password to access the restore function.
This password can be set and re-set from the Manage Snapshot
screen by clicking on the Set Password button.
49
Note: If you choose to restore the Registry, the only option is to
reboot your system.
To Restore a Configuration from Windows:
1. Click the Restore button.
2. Enter your password, then click the OK button. You will
see the Restore Configuration window.
3. Select the configuration to be restored from the dropdown list. The files associated with this configuration are
listed in the file list. Verify the files you wish to have
restored are selected. Users should also verify the list of
Registry keys selected and Assets selected if they wish to
restore the total system configuration.
4. Click on the file names, Assets, and Registry keys to be
included in the restoration and select the Restore button.
ConfigSafe will verify you wish to restore your system.
5. Select the action ConfigSafe should take after restoring
your system. If you want Windows to be started after the
restoration, click on the Restart Windows button. Otherwise, select the Continue button and ConfigSafe will
restore your system, and then return to Windows.
Note: ConfigSafe requires that you reboot your system after restoring the system Registry.
To Restore a Configuration from DOS: (SOS is not available for Windows NT environments)
1. From the CFGSAFE directory, run the SOS utility. Note: the
SOS utility does not currently restore archived assets. You
will see the ConfigSafe S.O.S Utility Main Screen.
2. Select the configuration to be restored from the dropdown list. The SOS utility is specifically designed for helping you when your system won’t run Windows 95/98. SOS
restores all of the configuration files and registry entries of
any previous configuration.
3. Select ENTER to RESTORE. Upon restoring your configuration files, the ConfigSafe SOS utility will ask you to reboot
50
your system.
Restore Configuration Window
Position the cursor on a region in the window to view detailed
information about that region.
Snapshots
Select the snapshot to which you want your system restored.
List of Files
The list of files which ConfigSafe has available for restoration. By
default, all files are highlighted. Verify the files you wish to restore
are highlighted, and select the restore option.
List of Registry Keys
The list of Registry keys which ConfigSafe has available for
restoration. By default, all keys are highlighted. Verify the keys
you wish to restore are highlighted, and select the restore option.
List of Asset Files
The list of archived Asset files that ConfigSafe has available for
restoration. By default, all files that have changed are highlighted.
Verify the archived Asset files you wish to restore are highlighted,
and select the restore option.
Asset Legend
The icons displayed in the Asset Legend are used to describe how
the Restore process will handle each file in the List of Asset Files
box. Each Asset File is preceded by one of the icons shown in the
Asset Legend, which indicate that the file will be added, deleted,
or replaced.
51
Undo the Configuration Restoration
If you restore your system using ConfigSafe, and your system is no
better than before, don’t panic. Use the UNDO feature to return
back to the system configuration that was in place before you
attempted your last restore. Keep in mind, ConfigSafe can only
UNDO a single level of restores.
The Undo feature allows you to undo an earlier configuration
restoration and return the files to their original state. You can
select the files to return to their original state. You select the files
in the Undo window.
To Undo the Configuration Restoration:
1. Click the Undo button. You will see the Undo window. The
files, archived Assets, and Registry keys associated with
this configuration are listed. The default is that all of the
files, archived Assets, and Registry keys are selected.
2. Click on the file names, archived Assets, or Registry keys
to deselect those that you do not want to be returned to
their original state.
3. If you want Windows to be started after the restore is
undone, click on the Restart Windows button. Or, click the
continue button to undo the restoration.
Undo Window
Position the cursor on a region in the window to view detailed
information about that region.
To UNDO a Configuration from DOS: (DOS UNDO is not available for
Windows NT environments)
1. From the CFGSAFE directory, run the UNDO utility. You will
see the ConfigSafe UNDO Utility Main Screen.
2. Select ENTER to UNDO the RESTORE. Upon restoring your
configuration files, the ConfigSafe UNDO utility will ask
52
you to reboot your system.
53
54
Chapter 8: imagine LAN, Inc.
About imagine LAN, Inc.
ConfigSafe is developed by imagine LAN, Inc. Dedicated to providing support tools for today’s complex multi-vendor configurations,
imagine LAN, Inc. was founded in 1992. The product line includes
the ConfigSafe Desktop Edition, ConfigSafe Network Edition Preload Client, ConfigSafe Network Edition LAN Client, ConfigSafe Network Edition Preload Manager, ConfigSafe Network Edition Standard Manager, and ConfigSafe Network Edition Professional Manager. ConfigSafe products are available through resellers and
directly from imagine LAN, Inc.
imagine LAN, Inc. is headquartered at 76 Northeastern Blvd. Suite
34B, Nashua, N.H. 03062, and can be contacted at 1-800-372-9776
(U.S.), 603-889-3883, or sales@imagelan.com. The web site is
http://www.imagine-lan.com.
1-800-372-9776 // 603-889-3883
Fax 603-889-8822
76 Northeastern Blvd. Suite 34B
Nashua, N.H. 03062
603-889-3883 Fax 603-889-8822
http://www.imagine-lan.com
55
56