I've been reading several topics on this board about how NIS tamper protection can corrupt Windows System Restore and can stop it from working properly.
I note that the suggested workaround is to turn tamper protection off *before* making a restore point. But I see a fundamental flaw in this approach as the whole point of system restore is to help restore from short-term *unexpected* problems. Turning tamper protection off prior to making a restore point is no use if the problem you were looking to system restore to help you with has already occurred!
So, there seems to be a stark choice to be made. Either turn tamper protection off altogether and let system restore do its thing OR turn system restore off altogether for the aforementioned reason. This seems like a poor choice to have to make. On the one hand Symantec are advising its consumers to use tamper protection but in so doing are effectively rendering system restore unusable in the way it was intended to be utilised.
I was wondering how big a risk it is to turn off tamper protection. There is very little information available on this point. And also, would adding a password to NIS2009 go some way to helping prevent the NIS2009 software from being 'tampered with'? Or could this just be bypassed anyway? Thanks in advance.