I was wondering if it may be possible to index and monitor the special EFI File System (AKA ESP) partition, without assigning a drive letter to it.
Normally, it does not get a drive letter assigned, it's protected from browsing in Windows Explorer, it's FAT32 and around 100MB in size.
The reason I'm asking this is because it may help detect a malicious rootkit which would modify or create files there.
Would it be possible to index it and search within it using its unique volume name instead of a drive letter?
I know I can get a list of volume DeviceIDs using, for example, powershell:
Code: Select all
gcim win32_volume | FT -property Label,DriveLetter,DeviceID,SystemVolume,Capacity,Freespace,FileSystem
Thanks.