Re: HonorDrivePolicy not fully functional
Thanks. It's still at least few months away.
Before posting, please read how to report bug or request support effectively.
Bug reports without an attached log file are usually useless.
NoViewOnDrive as we want to update WinSCP to the latest version, because of "CVE-2024-31497".
NoViewOnDrive in the next release of WinSCP if possible
C:\, D:\, Y:\). Access has been blocked through the Windows Explorer and/or "File Open/Save"-, "Browse for folder"- and/or "Commander"-like dialogs of applications. Users are allowed to browse other drives, like their homedrive, from Windows Explorer and/or applications.
NoViewOnDrive in the next release of WinSCP.
NoDrives could not be visited was never by purpose. It was just an unintended side effect.
NoViewOnDrive, if there's a demand for it. But what's the point? The user can visit the drive using other application or commandline.
NoDrives was defined, WinSCP respected this setting and didn't show the drives that were set in the policy in the internal explorer. This setting just hides the drives, but as you mentioned, it didn't prevent a user from typing the drive into a Windows Explorer page to view the data. I have mentioned the addition of the NoViewOnDrive in order to let you know that there is such a drive policy setting that can also prevent the ability of a user to bypass the restriction by typing the drive letter.
NoViewOnDrive as well?
NoViewOnDrive until now. And you haven't mentioned it so far yet either. So this is not about NoDrives at all, right? WinSCP does not follow NoViewOnDrive.
NoViewOnDrive in addition to NoDrives, when you will type the drive letter through Explorer, Windows will block the operation with a message that it is not allowed for the user.
NoDrives and the title of it is "Prevents users from using My Computer to gain access to the content of selected drives".
NoDrives registry value, the drive is still accessible in the Explorer.
C drive while in the other server WinSCP allows to select C drive through the commander interface although the GPO prevents it. I can see that when using WinSCP browsing options, the GPO settings are respected and the user cannot browse the folders in the local drive that the GPO prevents access to (C). I have checked the registry settings for WinSCP in both servers and didn't notice a change that can affect the described behavior. Can you update if there are other settings that can be checked to find out the difference in the behavior between the 2 serves? Note that the settings are not saved to file but only to the registry.
IEDriveInfo.pas in the addition of the function TDriveInfo.OverrideDrivePolicy and the change in the logic of the function TDriveInfo.ReadDriveBasicStatus might be related to the behavioral change.
NoDrives policy does not make the drives inaccessible. It just makes them hidden.
HonorDrivePolicy = (REG_DWORD) 1 should hide drives that are supposed to be hidden and not accessible by GPO. When WinSCP is launched, the dropdown box for the left and right Commander panes indeed do not show any of the hidden drives. Unfortunately, hidden drives are still accessible through Left > Go To > Open Directory/Bookmark..., in the following dialog "Open Directory" it is possible to type the drive letter of a hidden drive in the dropdown box "Open directory" (e.g. C:\, D:\), then click "OK" and the contents of the hidden drive is shown in the left Commander pane. The same goes for Right > Go To > Directory/Bookmark.... When the application is closed and restarted, all the supposedly hidden drives are selectable in the dropdown box for the left and right Commander panes. The drives become hidden again, when a different drive is selected which normally is not hidden to the user and only when the application is restarted.