Session Shield
Session shield which permanently stores all modifications into the User Layer. Without doing so, all modifications of settings, software, or Windows, are temporary only, and will be discarded once the ECA is powered off or reboot.
Total size availaility will be half of the amount of the RAM.

Activate Session Shield
All setting/files in the ‘C:\’ will be protected. All setting/files will be return to its original state after reboot the ECA.
1. Click on ‘Activate’

Click ‘Change Settings’ to save the setting

Click ‘Restart’ to reboot ECA and apply the setting.

Type Restart then click ‘Restart’ button

Once the Session Shield successfully activated, the Session shield information shown as below:

Deactivate Session Shield
All setting/files in the ‘C:\’ will not be protected. All files setting will be permanently written.
Click on 'Deactivate'

Click Change Settings to save the setting.

Click Restart to reboot ECA, and apply the setting.

Type Restart then click Restart button.

Exclusion List
All paths below will not be affected when Session Shield is activated. The data destined to these paths will be able to pass-through and written permanently:
C:\Program Files (x86)\GSF\ecaOS\ProcessMonitor\log
C:\Program Files (x86)\GSF\ecaOS\ProcessMonitor\settings.conf
C:\Program Files (x86)\GSF\ecaOS\ProcessMonitor\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\Activation\log
C:\Program Files (x86)\GSF\ecaOS\Services\Activation\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\Activation\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\AuthKey\log
C:\Program Files (x86)\GSF\ecaOS\Services\AuthKey\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\AuthKey\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\AuthOtp\log
C:\Program Files (x86)\GSF\ecaOS\Services\AuthOtp\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\AuthOtp\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\HB2Gateway\log
C:\Program Files (x86)\GSF\ecaOS\Services\HB2Gateway\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\HB2Gateway\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\Log\log
C:\Program Files (x86)\GSF\ecaOS\Services\Log\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\Log\settings.conf.bak
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\DATA
C:\Program Files (x86)\GSF\ecaOS\Services\Machine\log
C:\Program Files (x86)\GSF\ecaOS\Services\Machine\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\Machine\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\WindowsServiceMonitor\log
C:\Program Files (x86)\GSF\ecaOS\Services\WindowsServiceMonitor\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\WindowsServiceMonitor\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\SessionShield\log
C:\Program Files (x86)\GSF\ecaOS\Services\SessionShield\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\SessionShield\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\CPUMonitor\log
C:\Program Files (x86)\GSF\ecaOS\Services\CPUMonitor\Db
C:\Program Files (x86)\GSF\ecaOS\Services\CPUMonitor\appsettings.cpu_activity.json
C:\Program Files (x86)\GSF\ecaOS\Services\MemoryMonitor\log
C:\Program Files (x86)\GSF\ecaOS\Services\MemoryMonitor\Db
C:\Program Files (x86)\GSF\ecaOS\Services\MemoryMonitor\appsettings.memory_activity.json
C:\Program Files (x86)\GSF\ecaOS\Services\NetworkMonitor\log
C:\Program Files (x86)\GSF\ecaOS\Services\NetworkMonitor\Db
C:\Program Files (x86)\GSF\ecaOS\Services\NetworkMonitor\appsettings.network_activity.json
C:\Program Files (x86)\GSF\ecaOS\Services\DiskMonitor\log
C:\Program Files (x86)\GSF\ecaOS\Services\DiskMonitor\Db
C:\Program Files (x86)\GSF\ecaOS\Services\DiskMonitor\appsettings.disk_activity.json
C:\Program Files (x86)\GSF\ecaOS\Services\DiskHealth\log
C:\Program Files (x86)\GSF\ecaOS\Services\DiskHealth\Db
C:\Program Files (x86)\GSF\ecaOS\Services\DiskHealth\appsettings.disk_health.json
C:\Program Files (x86)\GSF\ecaOS\Services\Support\log
C:\Program Files (x86)\GSF\ecaOS\Services\Support\Db
C:\Program Files (x86)\GSF\ecaOS\Services\Support\appsettings.support.json
C:\Program Files (x86)\GSF\ecaOS\Services\DiskGuard\log
C:\Program Files (x86)\GSF\ecaOS\Services\DiskGuard\Db
C:\Program Files (x86)\GSF\ecaOS\Services\Notifier\log
C:\Program Files (x86)\GSF\ecaOS\Services\Notifier\Db
C:\Program Files (x86)\GSF\ecaOS\Services\Dashboard\log
C:\Program Files (x86)\GSF\ecaOS\Services\Dashboard\Db
C:\Program Files (x86)\GSF\ecaOS\Services\Dashboard\appsettings.json
C:\Windows\System32\config\systemprofile\AppData\Roaming\.smartlogic
C:\Program Files\Windows Defender
C:\ProgramData\Microsoft\Windows Defender
C:\Windows\WindowsUpdate.log
C:\Windows\System32\winevt\Logs
C:\Windows\Logs
C:\Windows\assembly
C:\Windows\SoftwareDistribution
C:\Windows\MEMORY.DMP
C:\Users\localadmin\Desktop
C:\Users\localadmin\Documents
C:\Users\localadmin\Downloads
C:\Users\localadmin\Music
C:\Users\localadmin\Pictures
C:\Users\localadmin\Videos
C:\Program Files (x86)\GSF\ecaOS\ApplicationMonitor\log
C:\Program Files (x86)\GSF\ecaOS\ApplicationMonitor\settings.conf
C:\Program Files (x86)\GSF\ecaOS\ApplicationMonitor\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\Support\settings.conf
C:\Program Files (x86)\GSF\ecaOS\Services\Support\settings.conf.bak
C:\Program Files (x86)\GSF\ecaOS\Services\Support\TrueBlue\log
C:\Program Files (x86)\GSF\ecaOS\Services\Support\TrueBlue\Db
C:\Program Files (x86)\Google\Chrome Remote Desktop
C:\ProgramData\Google\Chrome Remote Desktop
Add Exclusion Files or Folder
New files or folder can be added in the Exclusion List will be allowed to be written permanently when the ‘Session Shield’ is activated.
Click ‘Add Exclusion‘ to add new file/folder

Type or paste the new files/folder path to be included. Then, click Exclude.


Delete Exclusion Files or Folder
Tick the check box which files/folder to be delete from the exclusion list and click ‘Delete Selected’.

Click Delete Exclusion to confirm the operation

Add Registry Keys
Allow to be written permanently when the 'Shield' is activated.
click Add Exclusion to add registry keys

Type or paste the registry key to be included. Then, click Exclude.

Delete Exclusion Registry Key
Tick the check box which registry key to be deleted from the exclusion list. Them, click Delete Selected.

Click Delete Exclusion to confirm the operation

Status: Warning
Session shield status will turn to ‘Warning’ state when the amount of memory space used exceeds 80% of total space.

Status: Critical
Session shield status will turn to ‘Critical state when the amount of memory space used exceeds 90% of total space. The ECA will be start the counter and restart in few minutes.

Last updated