Notes
Values
Section
Registry
Class
See
Common sections.
Id
level
time
user_name
Executable
One of the required parameters. Use with key
operations (create, delete, rename, enumerate,
Registry key operation
keys
monitor, restore, read, replace, load). See Note
1.
Optional. Only for registry:rename when a key is
renamed. The target is the name of the key.
Registry key operation
dest_keys
One of the required parameters. Use with registry
value operations (delete, read, modify, create).
Registry key value operation
values
Optional. Only for registry:modify or
registry:create. See Note 2.
Registry key value operation.
New data of the value.
new_data
Deletes a registry key or value.
registry:delete
directives
Modifies the content of a registry value or the info
of a registry key.
registry:modify
Allows a registry key to be created.
registry:create
Modifies the permissions of a registry key.
registry:permissions
Obtains registry key information (number of
subkeys, etc), or gets the content of a registry
value.
registry:read
Enumerates a registry key, that is, gets the list of
all the key’s subkeys and values.
registry:enumerate
Requests to monitor a registry key.
registry:monitor
Restores a hive from file, like the regedit32 restore
function.
registry:restore
Restores a registry setting but only after a restart.
registry:replace
Loads registry keys or values from a file.
registry:load
Opens an existing registry key.
registry:open_existing_key
Renames a registry key.
registry:rename
Note 1
HKEY_LOCAL_MACHINE in a registry path is replaced by \REGISTRY\MACHINE\ and
CurrentControlSet is replaced by ControlSet. For example the registry value “abc” under registry
key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa is represented as
\REGISTRY\MACHINE\SYSTEM\\ControlSet\\Control\\Lsa\\abc.
Appendix A — Writing Custom Signatures and Exceptions
Windows custom signatures
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
118