Remote Registry Key Modifications


This search monitors for remote modifications to registry keys.


Remote Registry Key Modifications Help

To successfully implement this search, you must populate the Endpoint data model. This is typically populated via endpoint detection-and-response product, such as Carbon Black, or endpoint data sources, such as Sysmon. The data used for this search is typically generated via logs that report reads and writes to the registry. Deprecated because I don't think the logic is right.


Open in Search