Rules: Windows Query Registry
Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.
Detail | Value |
---|---|
Type | Templated Match |
Category | Discovery |
Apply Risk to Entities | device_hostname, device_ip, user_username |
Signal Name | Query Registry |
Summary Expression | Detected a query against the Windows Registry on the following host: {{device_hostname}} |
Score/Severity | Static: 1 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0007, _mitreAttackTechnique:T1012 |
- CrowdStrike - FDR
- CrowdStrike - Falcon
- Cylance - Protect
- Microsoft - Azure
- Microsoft - Office 365
- Microsoft - Windows
- VMware - Carbon Black Cloud
Origin | Field |
---|---|
Normalized Schema | commandLine |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | listMatches |
Normalized Schema | user_username |