A protected execution agent installs itself within a file system manager on the
computer to control modifications to a protected execution environment by intercepting
I/O requests from applications. If an unauthorized application attempts to modify
the protected execution environment, the protected execution agent terminates the
original I/O request and creates a redirected I/O request that specifies a corresponding
directory path within an alternate environment. The requested I/O operation is
a carried out by the file system against the alternate environment. A configuration
utility is responsible for determining which installed applications are authorized
to change the protected execution environment. The configuration utility also establishes
a parent-child relationship between an unauthorized application that invokes or
"spawns" an authorized application, with the authorized child application being
considered unauthorized when performing processes on behalf of the unauthorized
parent application.