McAfee HISCDE-AB-IA Product Guide - Page 118

key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa is represented

Page 118 highlights

Appendix A - Writing Custom Signatures and Exceptions Windows custom signatures Section Class Id level time user_name Executable keys dest_keys values new_data directives Values Registry See Common sections. Notes Registry key operation Registry key operation Registry key value operation Registry key value operation. New data of the value. registry:delete registry:modify registry:create registry:permissions registry:read registry:enumerate registry:monitor registry:restore registry:replace registry:load registry:open_existing_key registry:rename One of the required parameters. Use with key operations (create, delete, rename, enumerate, monitor, restore, read, replace, load). See Note 1. Optional. Only for registry:rename when a key is renamed. The target is the name of the key. One of the required parameters. Use with registry value operations (delete, read, modify, create). Optional. Only for registry:modify or registry:create. See Note 2. Deletes a registry key or value. Modifies the content of a registry value or the info of a registry key. Allows a registry key to be created. Modifies the permissions of a registry key. Obtains registry key information (number of subkeys, etc), or gets the content of a registry value. Enumerates a registry key, that is, gets the list of all the key's subkeys and values. Requests to monitor a registry key. Restores a hive from file, like the regedit32 restore function. Restores a registry setting but only after a restart. Loads registry keys or values from a file. Opens an existing registry key. Renames a registry key. Note 1 HKEY_LOCAL_MACHINE in a registry path is replaced by \REGISTRY\MACHINE\ and CurrentControlSet is replaced by ControlSet. For example the registry value "abc" under registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa is represented as \REGISTRY\MACHINE\SYSTEM\\ControlSet\\Control\\Lsa\\abc. 118 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Notes
Values
Section
Registry
Class
See
Common sections
.
Id
level
time
user_name
Executable
One of the required parameters. Use with key
operations (create, delete, rename, enumerate,
Registry key operation
keys
monitor, restore, read, replace, load). See Note
1.
Optional. Only for registry:rename when a key is
renamed. The target is the name of the key.
Registry key operation
dest_keys
One of the required parameters. Use with registry
value operations (delete, read, modify, create).
Registry key value operation
values
Optional. Only for registry:modify or
registry:create. See Note 2.
Registry key value operation.
New data of the value.
new_data
Deletes a registry key or value.
registry:delete
directives
Modifies the content of a registry value or the info
of a registry key.
registry:modify
Allows a registry key to be created.
registry:create
Modifies the permissions of a registry key.
registry:permissions
Obtains registry key information (number of
subkeys, etc), or gets the content of a registry
value.
registry:read
Enumerates a registry key, that is, gets the list of
all the key’s subkeys and values.
registry:enumerate
Requests to monitor a registry key.
registry:monitor
Restores a hive from file, like the regedit32 restore
function.
registry:restore
Restores a registry setting but only after a restart.
registry:replace
Loads registry keys or values from a file.
registry:load
Opens an existing registry key.
registry:open_existing_key
Renames a registry key.
registry:rename
Note 1
HKEY_LOCAL_MACHINE in a registry path is replaced by \REGISTRY\MACHINE\ and
CurrentControlSet is replaced by ControlSet. For example the registry value “abc” under registry
key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa is represented as
\REGISTRY\MACHINE\SYSTEM\\ControlSet\\Control\\Lsa\\abc.
Appendix A — Writing Custom Signatures and Exceptions
Windows custom signatures
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
118