64-bit processes on 64-bit
Windows OS (x64)
32-bit processes on 64-bit
Windows OS (x64)
32-bit processes on 32-bit
Windows OS (x32)
Directives
7
2K8
V
2K3
XP
7
2K8
V
2K3
XP
7
2K8
V
2K3
XP
registry:
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
read
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
delete
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
modify
x
x
x
permissions
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
enumerate
x
x
x
monitor
x
x
x
restore
x
x
x
replace
x
x
x
x
x
x
x
x
x
load
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
open_existing_key
x
x
x
x
x
x
x
x
x
rename
Class Services
64-bit processes on 64-bit
Windows OS (x64)
32-bit processes on 64-bit
Windows OS (x64)
32-bit processes on 32-bit
Windows OS (x32)
Directives
7
2K8
V
2K3
XP
7
2K8
V
2K3
XP
7
2K8
V
2K3
XP
services:
x
x
start
x
x
stop
x
x
pause
x
x
continue
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
startup
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
profile_enable
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
profile_disable
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
logon
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
create
x
x
x
x
delete
Class SQL
64-bit processes on 64-bit
Windows OS (x64)
32-bit processes on 64-bit
Windows OS (x64)
32-bit processes on 32-bit
Windows OS (x32)
Directives
7
2K8
V
2K3
XP
7
2K8
V
2K3
XP
7
2K8
V
2K3
XP
sql:
x
x
x
x
x
x
x
x
x
request
Appendix A — Writing Custom Signatures and Exceptions
Windows custom signatures
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
126