There was this MsConfig option that saved a boot log with all drivers loading sequence(as well as in safe mode the drivers were screen printed up to Windows 7). But nowadays I am not sure if this option still exists frankly. It used to save the log on C:/bootlog.log or something of this sort.
There are few startup layers in the registry saved as integers.
The ELAM from the antivirus is registered as the first most critical group (value 0) and errors in ELAM (as well as if another driver is called and it’s not stabled) leads to the dreaded inaccessible boot device error (because the kernel attempts to complete the boot process but it doesn’t have file system initialised).
The situation with Elam is very tricky. That power to be the 3rd/4th or whatever (very first in line) comes with responsibility.
The Comodo driver amongst others must contain one function that takes the info from kernel, processes the info and returns the verdict. There is no other way.
You've perfectly described the classic in-kernel security model, and you're right, in that specific architecture, there really is no other way for it to work. The kernel needs to explicitly call a trusted driver (
like ELAM) that is running at the same privilege level to get a verdict on other components.
However, modern security has introduced a fundamentally different approach that processes this information in another way, "
hypervisor-based security".
The "
Referee Outside the Ring" Model
Instead of having the security driver operate "
inside" the kernel (
Ring 0), this model places a hypervisor (
a thin layer of software) directly on the hardware, underneath the main operating system. This creates a more privileged layer, sometimes called "
Ring -1," from which to oversee the OS.
Here’s how the information processing is completely different:
Isolation
The security and validation logic is entirely isolated from the Windows kernel. The hypervisor controls the memory and hardware resources allocated to the main OS, acting as an impartial and untouchable referee.
Interception, Not Callback
In the ELAM model, the kernel makes a "
callback" to a function inside the Comodo driver. In the hypervisor model, there is no callback. Instead, the hypervisor "intercepts" the kernel's attempt to load any driver. It essentially pauses the OS, inspects the driver from the outside, and then decides whether to let the operation proceed.
External Verdict
The hypervisor makes the allow/block decision independently. If a driver is malicious or untrusted, the hypervisor simply refuses to let the OS execute it. The kernel doesn't get a "
verdict", the malicious operation is just stopped before it can even fully execute.
This is the principle behind technologies like "
Hypervisor-Protected Code Integrity (HVCI)" in modern Windows. It's a more robust security model because even if the entire OS kernel were compromised by malware, the malware would have no way to tamper with the hypervisor protecting it from underneath. It directly addresses the "
power comes with responsibility" issue you mentioned, by moving that ultimate power outside of the ring altogether.
In short, the hypervisor wouldn't allow any unauthorized process, including a malfunctioning part of Comodo's own software, to alter the protected HIPS rules. This architectural change moves the problem from "
How do we fix the bug causing the deletion?" to "
How do we make the rules impossible to delete in the first place?"
This is precisely why modern security platforms, including Windows itself, are increasingly relying on virtualization to protect their most critical components from both bugs and malicious attacks.
It's a difficult, expensive, and time-consuming path, but it is the correct engineering solution for this class of problem and aligns with the direction the entire cybersecurity industry is moving.