NoteThe Integrity Monitoring module scans for unexpected changes to directories, registry values, registry keys, services, processes, installed software, ports, groups, users, files, and the WQL query statement on agents. To enable and configure Integrity Monitoring, see Set up integrity monitoring.
|
The RegistryKeySet tag describes a set keys in the registry (Windows only).
Tag Attributes
These are XML attributes of the tag itself, as opposed to the attributes of the Entity
monitored by Integrity Monitoring Rules.
Attribute
|
Description
|
Required
|
Default Value
|
Allowed Values
|
base
|
Sets the base key of the RegistryKeySet. Everything else in the tag is relative to
this key. The base must begin with one of the following registry branch names:
|
Yes
|
N/A
|
String values resolving to syntactically valid registry key path
|
NoteThe agent runs as a service using the Local System account, so
HKEY_CURRENT_USERis meaningless. The HKCU branch of the registry is only valid for an interactive logged-on user, and it is specific to that user. In a Windows terminal server environment or on Windows XP and Vista with "fast user switching" enabled, several different users could be logged on simultaneously. Because of this, the agent will say that any rule with HKEY_CURRENT_USERis a compile error. |
There are several subkeys under
HKEY_USERSthat are named using the numeric form of the Windows user account ID. When a user logs on, one of those subkeys is mapped to HKCU during the user's logon session.
TipRules are allowed to use
HKEY_USERSin their base to monitor per-user registry items. However, those rules could match many entries. The ...\Software\Classesbranch is very large, especially under HKLM, so try to avoid rules that will need to traverse all of Software\Classes. |
Entity Set Attributes
These are the attributes of the Entity that can be monitored by Integrity Monitoring
Rules.
- Owner
- Group
- Permissions
- LastModified ("LastWriteTime" in Windows registry terminology)
- Class
- SecurityDescriptorSize
Short Hand Attributes
- STANDARD: Group, Owner, Permissions, LastModified
Meaning of "Key"
Registry Keys are stored hierarchically in the registry, much like directories in
a file system. For the purpose of this language the "key path" to a key is considered
to look like the path to a directory. For example the "key path" to the "Deep Security
Agent" key of the agent would be:
HKEY_LOCAL_MACHINE\SOFTWARE\Trend Micro\Deep Security Agent
The "key" value for includes and excludes for the RegistryValueSet is matched against
the key path. This is a hierarchical pattern, with sections of the pattern separated
by "/" matched against sections of the key path separated by "".
Sub Elements
- Include
- Exclude
See Integrity monitoring rules language for a general description of include for their allowed attributes and sub elements.