Monday, January 7, 2008

File System Filter Driver Test Strategy











The purpose of this Post is to define the software
testing scope and purpose for the File System Filter driver. This document will
not include any test steps rather it will focus on the strategy and objectives
of testing tasks.


Filter Driver
Functional Requirements:



  • To
    provide file mangling/unmangling to untrusted files.


Filter Driver
Behavioral Pre-Conditions:



  • A file
    is indicated as untrusted by having a GreenFrame around the file icon.

  • Applications
    launched in the untrusted environment will have a GreenFrame around the
    application window.

  • Accessing
    a trusted document from an untrusted “file open” window will open a
    Read-Only copy of the file inside the untrusted environment.

  • Trusted
    files will not be able to open Untrusted files.
    They will receive access denied.


 


Client
Configurations/Environment:



  • Microsoft
    Windows Versions


    • WXP,
      WXP SP1

    • W2K
      SP3, W2K SP4


  • Microsoft
    Office Suite


    • Office
      XP

    • Office
      2K


  • 3rd
    party applications


    • Winzip
      9.0

    • Adobe
      Acrobat, Acrobat Reader 6.0



 


Test Strategy:


 




  • Verify
    opening an untrusted file launches the application in the untrusted
    environment.


    • Application
      window will have a GreenFrame around it indicating the file application
      is running in the untrusted environment.



 



  • Verify
    the user is able to perform the following functions on both local and
    network drives:


    • style='mso-spacerun:yes'> Edit and save an untrusted file


      • File
        will remain as untrusted after making changes to the file.


    • Cut
      and Paste untrusted files from one location to another


      • File
        will remain as untrusted in it’s new location


    • Copy
      and Paste untrusted file from one location to another.


      • File
        will remain as untrusted in both locations.


    • Drag
      & Drop untrusted files from one location to another.


      • File
        will remain as untrusted in its new location.


    • Rename
      an untrusted file.


      • File
        will remain as untrusted after renaming the file.


    • Delete
      an untrusted file.


      • Untrusted
        file will be placed inside the Recycling bin.




 



  • Verify
    Guarded files no longer exists


    • Files
      with !!gb in the name should never appear as
      untrusted files.

    • Selecting
      “Remove Access Restriction” from the context menu immediately makes a
      file trusted.



 



  • Verify
    after removing GreenBorder Protection from an untrusted file, all access
    to this file is handled in the trusted environment.


    • File
      icon no longer has GB frame around it.

    • “Remove
      Access Restriction” verb from context menu is grayed out.

    • Content
      can be accessed by non-gb clients




 




  • Verify
    an untrusted file cannot be viewed correctly with GB disabled.


    • User
      will see mangled content when GB is disabled.