Category Archives: Backup/Restore

WinGet Foils MTPW Sneaky Update

MTPW is the mostly excellent MiniTool Partition Wizard, which I’ve used and recommended for managing disk layouts on Windows for years. I just got bitten for MTPW v13.5 by what I call a “sneaky update” — a move from v13.0 to v13.5 that includes the company’s companion ShadowMaker image backup tool along with MTPW unless you read its update screens closely and carefully. When I followed the update on one laptop (X380) with another (X12Hybrid), I observed that WinGet foils MTPW sneaky update. Let me explain…

Why I  Say: WinGet Foils MTPW Sneaky Update

After I ran the app-based MTPW update, I found it had installed ShadowMake as well as MTPW itself. You can see the “Trial” screen came up with 0 days remaining for use, which makes it:

  • worthless for those who want to try the program out for free
  • require immediately purchase of a Pro version to use
  • earn my ire by installing itself as part of a different update
  • force me to delete an app I never wanted in the first place

Immediately after I’d been bitten by this sneaky update, I saw MTPW pop up in WinGet on  the X12Hybrid. “Hmmm,” I wondered to myself, “Will this also try to sneak MTSM onto this machine?” Nope! It did what it said it would do: updated only MTPW. That’s why I’m glad I tried it on that other machine, and can now warn readers that if they’re using MTPW, they need to use the built-in update carefully to avoid MTSM. Or, like me, they can use WinGet instead and skip all the drama.

Yeah, I know. I should’ve read the install screens more carefully when running the in-app upgrade utility. My rejoinder: MiniTool shouldn’t make it so easy for MTWM to appear on my machine as part of its MTPW update. It’s neither what I expected nor wanted. ‘Nuff said!

Facebooklinkedin
Facebooklinkedin

Hasleo Backup Suite (Free) Handles ARM PCs

At the end of yesterday’s hopefully thrilling episode, I said I’d follow up on my experiences with Hasleo Backup Suite. I got it installed on the Lenovo ThinkPad T14s (a Snapdragon X based ARM PC). I’m pleased to report it works as it should. Not only did I make and restore a backup, I also built — and successfully booted into — the program’s emergency disk. So far, looks like the Hasleo Backup Suite (Free) handles ARM PCs just fine. As you can see from its tools menu above, it even includes boot menu placement, image handling of all kinds, MBR and VSS repairs, and more. Good-oh!

Proving Hasleo Backup Suite (Free) Handles ARM PCs

How do I get from saying “it looks like Hasleo works” to asserting that the program actually, definitely does the job? That’s going to take time and repeat experience. I’m setting up a daily backup schedule. I’ll be messing around with its other tools and facilities on an ongoing basis. If something is wonky, that will probably clue me in.

I do have one additional piece of positive evidence about Hasleo, however. User Stigg at ElevenForum.com started a long-running and active thread (33 pages, 645 posts) on July 8, 2023 entitled Hasleo Backup Suite. He reports on “extensive testing of Hasleo Backup Suite over the past months” and opines that “it’s looking very promising.” Subsequent long-term traffic and interactions on the thread bear that out.

Indeed, I am coming around to the idea that Hasleo Backup Suite (Free) is a worthy successor to Macrium Reflect 8 (Free), which is no longer being updated (nor works with ARM PCs — one must purchase a license for Reflect X to gain awesome ARM access). I’ll say this, though: Reflect X is at least twice as fast at backups and restores as Hasleo, so those for whom time is money might want to ante up anyway. ‘Nuff said.

Facebooklinkedin
Facebooklinkedin

Another ARM Boot Boondoggle

Right. So I’m in the process of covering my ARM PC assets to prevent further boot and BCD issues. One important tool in that coverage is backup/restore. Alas, I’m learning that most such toolsets — including all of the free ones I try to use by preference — don’t work (or work well) with ARM PCs. Yesterday, in fact, I got caught in another ARM boot boondoggle. Indeed, it produced the dread STOP error message “INACCESSIBLE_BOOT_DEVICE” (0X0000007B). Let me explain…

Recovering from Another ARM Boot Boondoggle

Here’s the deal: most of the free backup/restore toolsets — including AIOMEI Backupper, EaseUS ToDo, Paragon Backup and Recovery Free, Cobian Backup and so forth — don’t work (or work well) with ARM-based PCs. What caused the boot error yesterday was EaseUs ToDo, which injects additional drivers into the Windows boot process. Not only does that not work on ARM PCs, but the program offers no warnings, nor informs users that proceeding with install results in an unusable system.

“Good thing I’ve got the Lenovo USB Recovery Key,” I thought to myself. At least I knew how to dig myself out of this mess. As far as I can tell, only the Hasleo Backup Suite Free and Macrium Reflect X (free trial, but pay for real use) offer backup/restore and rescue media capabilities that work on ARM-based PCs. Go figure!

One Reflect X License Left…

I just checked my Macrium Reflect account, and I’ve got one X license left. Right now, I have two ARM laptops here at Chez Tittel. I think I’ll give Hasleo a try on the Lenovo ThinkPad T14s. Shoot! I know from repeated use that the Lenovo USB Recovery Key will bail me out of any trouble I might get myself into.

Stay tuned: I’ll let you know how this adventure continues. It’s started to get interesting. And I mean more interesting than I’d hoped or expected. Sigh.

Facebooklinkedin
Facebooklinkedin

Digging Into Lenovo Digital Download Recovery Service

On Monday, I was finally able to interact with the Lenovo Digitial Download Recovery Service (DDRS). I used it, with the company’s USB Recovery Creator tool, to create a UFD to reinstall the factory image onto my munged ThinkPad T14s laptop (ARM-based). Having now used it with amazement and appreciation, I’m digging into DDRS to better understand what it is and how it works.

More about Lenovo Digital Download Recovery Service

About a year ago, I tried to use this tool and got nowhere. One must place a “digital work order” with Lenovo, based on the Serial Number for the affected unit, for it to build a corresponding image that then works with the USB Recovery Creator tool. Earlier, I couldn’t get this to work for some odd reason or another. This time, all went swimmingly.

I did have to boot into the UEFI to obtain the system’s serial number. With that string in hand, however, I was able to place my order. Then when I ran the tool, it created the recovery UFD I would use to rebuilt the T14s. That took about 40 minutes to complete. As you can see in the following screenshot (from WizTree) this stuff falls into a 32 GB (FAT32) partition, of which 18 GB is actually occupied

This FAT32 partition contains 18GB of files, mostly image stuff.
[Click screencap for full-sized view]

In the RECOVERY folder, you’ll find an image file named M11A16AUS.WIM (appears at left in preceding screencap). It’s the customized recovery image that the tool will use to reinstall a factory fresh Windows 11 on the laptop. Let’s call it the “factory image.”

But There’s More to Do: Before, During & After

The whole recovery process is built around a massive and complicated set of scripts (mostly PowerShell). Here’s a 10,000-ft view of what happens next, over about a 100 minute time span:

  • Download and build media: Lenovo USB Recovery Creator tool downloads around 20 GB of recovery files to a USB drive (I used a modestly speedy full-sized Mushkin 64GB USB 3.0 device).
  • Boot from USB: with recovery media inserted, Secure Boot disabled, and F12 run to choose the drive as the boot source, the laptop passes control to the UFD.
  • Launch Recovery Environment: system boots into the Lenovo customer recovery shell built around WinPE with a variety of Lenovo tools and utilities further at its disposal. At this stage, the user confirms recovery, which wipes existing C:/boot/system drive contents.
  • Reformat and Restore: Recovery tool repartitions the internal (C:) drive, then deploys the factory image, complete with Windows, Lenovo device drivers, and Lenovo apps (e.g. Vantage).
  • System Boot and OOBE: The system reboots six times during the previous activities, and shows itself running a complex and convoluted unattend.xml install. After the final reboot, the laptop goes into the out-of-box-experience typical of a clean Windows install, but one based (in this case) on the Lenovo custom image.

Where Windows Wound Up

At that point I installed pending WU items and found the machine running Windows 11 25H2 Build 26200.7171. This is actually one build newer (thanks to an intervening Patch Tuesday) than ran on this PC before my ill-fated attempt to upgrade to Insider Preview for the Dev Channel.

Interestingly, Secure Boot and BitLocker are both turned off for the running image. I believe that makes it safe for me to attempt another Insider Preview upgrade to Dev Channel. This time, I’m going to make sure I have a current image backup with working recovery media first. That’s much faster than using the Lenovo Recovery UFD.

Next week, I’ve asked for an interview with the Lenovo engineers who built the DDRS and the Recovery Tool. That should shed further light on this amazing environment and toolset. I’ll share that info in a future blog post. Stay tuned, and Happy Thanksgiving (for those who celebrate same).

Facebooklinkedin
Facebooklinkedin

Bitlocker Boot Loop Finally Broken

After at least half-a-dozen failed attempts to build bootable media for the ThinkPad T14s ARM laptop, I finally put a usable UFD together. The secrets? First, I used the Lenovo Digital Download Recovery Service (DDRS) and its associated USB Recovery Creator Tool.  Second, it built me a UFD that actually booted up on the T14s on another ARM laptop (an ASUS Zenbook A14). With the BitLocker boot loop finally broken, the Lenovo Recovery Media successfully reinstalled Windows 11. It was a long, wild and sometimes harrowing ride!

How Was BitLocker Boot Loop Finally Broken?

Because the .wim files for Windows 11 were so huge, I’d been formatting the repair UFD using NTFS. That was apparently not working on the T14s. The Lenovo tool built a UFD using FAT32, and assigned no drive letter to its repair partition. Because the basic Windows 11 .wim files exceed 4GB in size, that means it did some juggling work to create a boot.wim of about 700K, and a Recovery WIM of just under 3.9GB. And then it went through the most complex unattend.xml I’ve ever seen go by on-screen, with no less than six (6!) reboots to get the recovery image installed, updated and ready to run. It took about 100 minutes to grind through its process. Color me impressed.

I had tried using various other tools to fix things on my own, but none of them produced a working and bootable UFD from which to run the Windows installer. I believe all of them foundered either on the use of NTFS. complex partition structures, or lack of complete ARM support:

  • MCT (Media Creation Tool): doesn’t work properly on ARM PCs right now, and cannot generate ARM installation media
  • Ventoy: The UFD could boot initially and select the correct ISO for hand-off, but would not boot into that mounted image. Here, because the Ventoy partition is formatted NTFS, I’m presuming that caused the problems.
  • Rufus: I told Rufus to use NFTS, not realizing this could stymie proper booting into its runtime environment.

One More Thing…

I also learned that ARM PCs want fast, standard UFDs as boot media. Me, I’m fond of those tiny micro-UFDs (in this case, Mushkin Atom devices). Turns out they work fine on Intel and AMD; on ARM, not so much. I ended up using a Mushkin full-size USB 3.0 MKNUFDVP64GB device (or half of it, rather, because its FAT32 partition maxed out at 32GB). It did the job, though, so I’m glad.

This has been one of my wilder, woolier adventures in Windows-World lately. First, I had to find the right medium. Then I had to use the right format. And finally, I had to use the right tool. Only then could I reinstall Windows and put the T14s back into service. Sheesh!

Facebooklinkedin
Facebooklinkedin

VSS Delivers New Windows 11 Point-in-Time Restore

It’s been a long time coming, and long time gone. Back in the Windows 7 era (public release: July 2009) it included a Backup and Restore utility for image backups. Indeed, it persists to this day in Control Panel in both Windows 10 and 11 as Backup and Restore (Windows 7). Starting with Build 26220.7271, Windows 11 regains a built-in image-based backup. It is explicitly more granular, faster and light-weight, better integrated, more reliable, and fully automated than other Windows options. To say that VSS delivers new Windows 11 point-in-time restore implies those foregoing qualities. But it also means that MS offers a much more potent restore tool than the Windows Backup app.

Digging into VSS Delivers New Windows 11 Point-in-Time Restore

Let’s explore the advantages of Point-in-Time restore vis-a-vis the old Windows 7 image backup utility and the Restore Point facility available through Control Panel > System Properties > System Protection:

  • Granularity
    • Windows 7 image backup: Restores the entire system image (.vhd) — all or nothing.
    • Classic restore points protect system files, registry settings, drivers and installed programs, does not back up personal files.
    • Point‑in‑time restore: Rolls back only system state, drivers, or updates to a chosen snapshot, leaving user files intact.
  • Speed & Convenience
    • Image backup required large storage space and long write times.
    • Classic restore points work more like a mini reinstall with multiple reboots with typical times of 10-30 minutes.
    • Point-in-time restore points are lightweight, created automatically before updates or app installs, and apply quickly (5-15 minutes).
  • Integration
    • Image backup was a standalone utility buried in Control Panel.
    • Restore points work through the Control Panel based System Restore utility.
    • Point‑in‑time restore is integrated with Windows Update, Recovery Settings, and System Restore, making it seamless for non‑technical users.
  • Reliability
    • Image backup often failed if the destination disk wasn’t large enough or if VSS writers conflicted.
    • Classic restore points may fail for lack of disk space or VSS writer conflicts.
    • Restore points use VSS snapshots but are optimized for consistency and modern storage stacks.
  • User Experience
    • Image backup required planning, external drives, and manual scheduling.
    • Using classic restore points is a manual process, requires identifying and selecting items.
    • Point‑in‑time restore happens automatically in the background, with minimal user intervention.

But Wait…There’s More!

Indeed, all four of my favorite (and free, except for Macrium) backup utilities also work atop a VSS foundation. That means Macrium Reflect (no longer free), EaseUS ToDo Backup, AOMEI Backupper and MiniTool ShadowMaker all use VSS to provide shadow copies that it may use itself (or use that very MS service) to operate on Winodws images for file and system backups.

I’m tickled to see this capability show up on my X380 Yoga for 26220.7271. If it’s still on gradual rollout, you may be tickled to see it show up on a test PC or VM, too. Enjoy!


Facebooklinkedin
Facebooklinkedin

Escaping BitLocker Recovery Loop Poses Problems

Apparently, ARM64 compatibility issues can bite in unexpected — and time-consuming — ways. Yesterday, I decided to upgrade the ThinkPad T14s that Lenovo has loaned me to Beta build 26220.7262.  Bad move! Instead of rebooting to the post-GUI installer after the first reboot, I found myself stuck in a boot loop around BitLocker recovery. I’d enter the key, get it confirmed as correct, then circle right back to the initial BootLocker Recovery screen. Safe to say that escaping BitLocker Recovery loop poses problems on this otherwise spiffy little laptop.

Escaping BitLocker Recovery Loop Poses Problems, But…

Indeed, I spent most of the afternoon trying to build and run a suitable bootable UFD from which to re-install Windows 11 on the T14s. Here’s what I learned along the way:

  • One shouldn’t use miniUFDs for bootable media on ARM PCs: they’re too slow
  • The port matters when trying to boot from a UFD
  • It’s necessary to turn Secure Boot off in UEFI before you can boot from a UFD
  • Rufus has problems with building bootable media for UFDs on ARM PCs
  • I couldn’t get Ventoy to mount and run the ISO I painstakingly built via UUPDump to run setup.exe, either

Long story short: it’s incredibly challenging to repair an ARM PC with low-level problems (like my BitLocker Recovery loop) using only Intel and AMD x64 PCs. For the moment, I’m stuck!

What’s Next? Tune in Tomorrow for Pt2

In reading Windows news this morning, I learned that Best Buy is offering Asus Zenbook A14 Snapdragon X laptops for US$550. Further, they’ll give me US$250 to trade in my X380 Yoga. That means, with tax and such, I’ll get another Snapdragon X laptop for Chez Tittel for under US$400. I’m going out to pick it up later today, or tomorrow morning.

Hopefully, I’ll be able to build bootable media for the T14s that actually works using the same architecture to built the tools that I must then run. We’ll see. In the meantime, I’m distressed and amazed that previously dead easy tasks — e.g. building and using recovery media for Windows repair — has completely failed here at Chez Tittel. THIS is the kind of unpleasant surprise that pops up here in Windows-World. Hopefully, I’ll be able to weather that storm. Sigh.

 

Facebooklinkedin
Facebooklinkedin

Update Gotcha Highlights BitLocker Key Backup

Recent updates have triggered news and warnings that some PCs will request a BitLocker key upon restart. Reports from Windows Latest and Neowin confirm that KB5066835 (Win11) and KB5066791 (Win10) trigger such behavior for Windows Enterprise and Microsoft 365 Business editions. Apparently, as Copilot says of this issue “Intel-based PCs with Modern Standby are most susceptible.” But this update gotcha highlights BitLocker key backup and recovery techniques for all Windows users. Let me tell you about that…

New Update Gotcha Highlights BitLocker
Key Backup and Recovery

The easiest way to backup and use a BitLocker recovery key is to type Bitlocker into Settings, then select the resulting “Manage BitLocker” item that pops up. This takes you to the Control Panel pane for BitLocker Drive Encryption shown above, where you can click the entry labeled “Back up your recovery key.”

Resulting options read:

  • Save to your Microsoft account
  • Save to a USB flash drive
  • Save to a file
  • Print the recovery key

As something of a belt-and-suspenders guy, I usually save to a file named <machine-name>blrk.txt AND I print a copy that I stick in a folder in my filing cabinet labeled “PC Recovery Stuff.” Saving to a file means loss of access to its drives and backups could stymie recovery in some circumstances, so I like to have the hard copy as a fallback.

Of course, you can also register your PCs into your MSA (Microsoft Account) and get it online as well. The URL for that specific purpose is https://account.microsoft.com/devices/recoverykey. I’ve pretty much got that memorized because I do use it multiple times a year, every year, like clockwork.

Here in Windows-World, if you use BitLocker it’s wise to ensure you can access the recovery key when and as you need it. The techniques I’ve described will get you where you need to go, should that need arise. Cheers!

Facebooklinkedin
Facebooklinkedin

Disappearing Box Downloads Cause Consternation

OK, so I’m working for a client on a big project. Part of the effort is to read, review and report on a collection of around 200 PDF files. Total on-disk footprint for these files is pretty big (~0.5 GB) so it’s outside the boundaries of easy transfer via email. The client uses Box.com instead, and makes a set of folders available to me through shared access to them and their contents. Two days ago, I went to start working through some of those files, only to find them MIA on my local SSD. These disappearing Box downloads cause consternation, and forced me to download them again. What’s up?

When Disappearing Box Downloads Cause Consternation Then?

When I called my client to ask for info, she explained their retention policy is to delete all box items 30 days after posting. She was as surprised as I was that my local copies had disappeared, but not at all surprised about their shared online sources. It seems that ownership of shared files can sometimes cause them to disappear from local drives when their online “parent files” do likewise.

I can see in the Box admin console that the first set of downloads (dated September 9) did indeed go though. You can see I downloaded over 250 items on that day, as I grabbed the various folders whose contents I needed to read and act upon. I also reset Ownership on those files from read-only (as defined in the Box download apparently) and gave myself full rights to the whole folder hierarchy.

I’m hoping this will be enough to prevent their online timeout from affecting their local presence on my primary data drive (a nice, big 4TB Samsung 990 EVO Plus NVMe SSD). Just to be absolutely safe, I also saved copies of the ZIP files that Box produces on a UFD which I’ll keep disconnected from the Internet. Hopefully, that will provide a failsafe backup should the new set of files somehow disappear again when yesterday’s 30-day timer runs out on October 18.

Here in Windows-World, things can — and do — get strange sometimes. I hope I’ve done due diligence to keep those files around this time. We’ll see…

Facebooklinkedin
Facebooklinkedin

Win10 Boot Follies Galore

Here’s my situation. I’m still running the old i7Skylake with its 2015 vintage Asrock Z170 motherboard. That machine is running Windows 10 Enterprise. Thus, it’s not eligible for the ESU (Extended Security Updates) offer from MS to keep that machine alive for another year. “No problem,” I thought, “I’ll just clean install Windows 10 Pro, and take up the offer that way…” Instead, I’m dealing with Win10 boot follies galore, unable to boot to USB media to replace the current Windows image. It’s been heartbreaking…

Describing Win10 Boot Follies Galore

Copilot agrees that something is hinky with the UEFI on the Z170, and it’s preventing the PC from booting off a USB flash drive. So far, I’ve:

  • Turned off Fast Boot in UEFI, and discovered that toggling CSM (the compatibility support module that supports both MBR and GPT partitioning schemes) kills UEFI completely for UEFI version P7.60. Turns out that’s a known gotcha.
  • Built rescue and install disks on 8GB media to avoid FAT32 issues (using the usually reliable Media Creation Tool, and the still more dependable Macrium Rescue Media Builder)
  • Run those UFDs from USB 2.0 ports, on the off-chance that USB 3.x isn’t working for boot

So far, nothing has worked to install a different Windows 10 version on this PC. But I have a plan…

Bring Out the Heavy Guns

When all else fails while installing Windows, I’ve observed that disconnecting all non-boot drives, and replacing the boot media with a completely blank drive will sometimes work. I’ve got a 1TB Crucial T705 NVMe that I’ll prep in that way, and give it a try. IMO, it has a good chance of getting me over this hump.

I won’t have time to do this until the weekend. Stay tuned: I’ll follow up on Monday with a report on that experience. I’ve been bit on the hindquarters many times in Windows-World, but this bite kind of stings…

Facebooklinkedin
Facebooklinkedin