Free Download

Free Forensic USB Write Blocker Evidence Preservation Tool

Free registry-level USB write protection for Windows. One-click activation preserves evidence integrity during forensic imaging. Built by CISSP, ISSAP and ISSMP certified forensic examiners. No license required.

Sherlock USB Write Blocker is a free Windows utility that prevents write operations to USB storage devices by setting the WriteProtect registry value under StorageDevicePolicies. Forensic examiners use it to preserve evidence integrity and maintain chain of custody during USB device acquisition and imaging.

Mechanism

How Sherlock USB Write Blocker Works

Sherlock USB Write Blocker modifies a single Windows registry value to enforce read-only access on all USB storage devices. The tool targets the registry path HKLM\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies\WriteProtect. When this value is set to 1, Windows mounts every newly inserted USB mass storage device in read-only mode. No data can be written to the device, no files can be modified and no metadata can be altered.

The protection takes effect on the next USB device insertion. This means you must enable write protection before plugging in the suspect device. Once protection is active, Windows blocks all write operations at the operating system level. The device remains fully readable for forensic imaging and file browsing.

To disable protection, click the toggle again. The tool sets WriteProtect back to 0 and USB devices inserted afterward mount with normal read-write access. The interface displays the current protection state at all times so you always know whether writes are blocked.

Technical Details

Registry Path
HKLM\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
Registry Value
WriteProtect (DWORD). Value of 1 enables read-only mode. Value of 0 restores normal read-write access.
Scope
Applies to all USB mass storage class devices including flash drives, external hard drives and USB-connected memory card readers.
Activation
Takes effect on the next USB device insertion. Already-mounted devices are not affected until ejected and reinserted.
Admin Privileges
Required. Modifying HKLM registry keys requires administrator elevation. The tool prompts for UAC consent on launch.
SHA256 Verification
Published SHA256 hash for download integrity verification. Confirm the installer has not been tampered with before execution.

Evidence Integrity

Why Forensic Examiners Need Write Blocking

Write blocking is a foundational requirement in digital forensics. When a USB device is connected to a Windows computer without write protection, the operating system can modify the device in ways that compromise evidentiary value. Windows may update access timestamps, create Recycle Bin metadata, write System Volume Information folders or trigger autorun processes. Any of these modifications can alter the hash value of the original evidence and undermine its admissibility in court.

Evidence Integrity

Forensic evidence must remain unaltered from the moment of seizure through final presentation in court. Write blocking ensures that no bits are changed on the suspect device during examination. The forensic image hash will match the original device hash, proving the evidence has not been tampered with. Standards from NIST CFTT and SWGDE require demonstrable write protection during evidence acquisition.

Chain of Custody

Chain of custody documentation must account for every interaction with evidence. Using a write blocker provides a documented control that proves no modifications occurred during your examination. Defense attorneys routinely challenge digital evidence by questioning whether proper handling procedures were followed. A write blocker eliminates the most common attack vector against digital evidence authenticity.

Court Admissibility

Courts in the United States, Canada and most common law jurisdictions expect forensic examiners to use write blocking during evidence acquisition. The Daubert standard requires that forensic methods follow accepted practices in the field. Write blocking is a universally accepted practice. Failure to use write protection can result in evidence being excluded, case dismissal or expert testimony being challenged under cross-examination.

Compare

Hardware vs Software Write Blockers

FeatureSherlock USB Write Blocker (Software)Hardware Write Blocker (Tableau/CRU)
Protection levelOperating system (registry)Hardware controller
CostFree$200 to $500+
Court acceptanceAccepted in many jurisdictionsGold standard
PortabilitySoftware only, no hardware neededRequires physical device
USB supportAll USB mass storageAll USB mass storage
SATA/IDE supportNoYes (model dependent)
Bypass riskPossible via admin access or malwareNo software bypass possible
Setup timeOne clickPhysical connection required
NIST CFTT testedNoYes (select models)

When to Use Each Approach

Hardware write blockers from Tableau (now OpenText) and CRU provide the strongest forensic guarantee because they operate below the operating system level. No software exploit or malware can bypass a hardware write blocker. For criminal cases, litigation with high financial stakes or any matter where evidence may face aggressive legal challenge, a hardware write blocker is the recommended approach. Sherlock USB Write Blocker fills a different role: immediate write protection when a hardware blocker is unavailable, for preliminary triage in the field, for incident response situations where speed matters or for training and education environments. Many examiners use both: software write blocking for initial triage and hardware write blocking for formal acquisition.

Procedure

Recommended Forensic Acquisition Procedure

Follow this step-by-step procedure when using Sherlock USB Write Blocker for forensic USB device acquisition. Document each step in your case notes.

  1. Enable Write Protection. Launch Sherlock USB Write Blocker with administrator privileges. Click Enable Protection. The tool sets WriteProtect to 1 in the registry. Confirm the status indicator shows protection is active. Do not insert the suspect device until this step is complete.
  2. Confirm Protection Status. Verify the application displays an active protection state. Optionally confirm by opening Registry Editor and navigating to HKLM\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies. The WriteProtect value should read 1. Screenshot this confirmation for your case file.
  3. Insert the Suspect USB Device. Plug the suspect device into a USB port. Windows will detect and mount the device in read-only mode. You will be able to browse files and read data but all write operations will be blocked by the operating system.
  4. Verify the Device is Listed. Open Windows Explorer or Disk Management and confirm the suspect device appears. Verify you can browse its contents. Attempt to create a test file on the device to confirm write operations are blocked. Document the device serial number, capacity and filesystem type.
  5. Acquire the Forensic Image. Use your forensic imaging tool (FTK Imager, dd, Guymager or similar) to create a bit-for-bit image of the suspect device. Calculate and record the hash (MD5 and SHA256) of both the source device and the acquired image. The hashes must match to confirm evidence integrity.

Limitations

Known Limitations

Sherlock USB Write Blocker provides effective software-level write protection but has limitations that forensic examiners must understand before relying on it in casework.

New Insertions Only
Write protection applies only to USB devices inserted after protection is enabled. Drives that are already mounted when you activate the tool retain their current read-write state. You must eject and reinsert any connected device for protection to take effect.
Software-Level Protection
The registry-based approach operates at the Windows kernel level. While effective under normal conditions, it is theoretically possible for a rootkit or kernel-level exploit to bypass this protection. Hardware write blockers provide a stronger guarantee because they operate below the operating system. For criminal cases or high-stakes litigation, use a hardware write blocker.
USB Mass Storage Only
This tool blocks writes to USB mass storage class devices only. It does not affect USB devices using other protocols such as MTP (Media Transfer Protocol) used by many smartphones or PTP (Picture Transfer Protocol) used by cameras in certain modes.
Windows Only
The StorageDevicePolicies registry key is a Windows-specific mechanism. This tool does not work on macOS or Linux. For those platforms, use mount options (mount -o ro) or a hardware write blocker.
Requires Admin Privileges
Modifying the HKLM registry hive requires administrator access. The tool will prompt for UAC elevation on launch. It cannot run under a standard user account.

Use Cases

Who Uses Sherlock USB Write Blocker

Forensic Examiners

Digital forensic professionals use write blocking as standard practice during evidence acquisition. Sherlock USB Write Blocker provides immediate protection for field triage when a hardware blocker is unavailable or impractical.

Law Enforcement

Police and federal investigators seize USB devices during search warrants and investigations. Write blocking ensures evidentiary value is preserved from the moment of seizure through courtroom presentation.

IT Administrators

System administrators use write blocking to safely examine USB devices found in corporate environments. Investigate potential data exfiltration or malware delivery without risking modification of the original device.

Incident Responders

DFIR teams responding to security incidents need to preserve USB evidence quickly. Software write blocking provides immediate protection during the critical first hours of an incident response engagement.

Download

Get Sherlock USB Write Blocker

Version 1.0 for Windows 10/11 (64-bit). Single executable. No license required.

File
sherlock-usb-blocker.exe
SHA256
ed9c357b7a5303112bf807c438ae6b4d7a69d28a3f0f6ea9698fe756b6858644
Version
1.0
Platform
Windows 10/11 (64-bit)
Price
Free. No trial period. No feature restrictions.

Questions

USB Write Blocker FAQ

What is a USB write blocker?
A USB write blocker prevents any data from being written to a USB storage device. It ensures the contents of the device remain unmodified during forensic examination. This preserves evidence integrity and maintains chain of custody for court admissibility.
How does Sherlock USB Write Blocker work?
Sherlock USB Write Blocker sets the WriteProtect value to 1 in the Windows registry at HKLM\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies. This instructs Windows to mount all newly inserted USB storage devices in read-only mode. The change takes effect on the next USB device insertion.
Is a software write blocker admissible in court?
Software write blockers are accepted in many jurisdictions when proper procedure is documented. However, hardware write blockers from manufacturers like Tableau and CRU provide a stronger forensic guarantee because they operate at the hardware level. For high-stakes cases, use a hardware write blocker or combine both methods.
Does it work on already-mounted drives?
No. The registry-level write protection only applies to newly inserted USB devices. Drives that are already mounted when protection is enabled retain their current read-write state until they are ejected and reinserted.
Is Sherlock USB Write Blocker free?
Yes. Sherlock USB Write Blocker is completely free with no trial period, no feature restrictions and no license required. Download and use it without limitations.

Get Started

Download Sherlock USB Write Blocker

Free forensic USB write blocker built by CISSP, ISSAP and ISSMP certified forensic professionals. Need a full forensic examination or incident response? Contact our team.

Since 2006CISSP, ISSAP, ISSMP certified604.229.1994

Sherlock USB Write Blocker is provided for lawful forensic use only. Ensure compliance with your jurisdiction's evidence handling requirements. Terms of Service

Download

Enter your details to download. We will send you update notifications for new versions.