Remote Registry Key Modifications

Description

This search monitors for remote modifications to registry keys.

   Help

Remote Registry Key Modifications Help

To successfully implement this search, you must populate the Endpoint data model. This is typically populated via endpoint detection-and-response product, such as Carbon Black, or endpoint data sources, such as Sysmon. The data used for this search is typically generated via logs that report reads and writes to the registry. Deprecated because I don't think the logic is right.

   Search

Open in Search