Registry access monitoring rules are applied in the order in which they are listed in the Registry access monitoring rules block.
To create and configure a registry access monitoring rule using the Application Console:
The Registry Access Monitoring window appears.
Avoid using supported masks for the root keys, when creating the rules.
If you specify only a root key, such as HKEY_CURRENT_USER, or a root key with a mask for all child keys, such as HKEY_CURRENT_USER\*, a vast number of notifications about addressing the specified child keys is generated, which results in the system performance issues.
If you specify a root key, such as HKEY_CURRENT_USER, or a root key with a mask for all child keys, such as HKEY_CURRENT_USER\*, and select the Block operations according to the rules mode, the system is not able to read or change the keys required for OS functioning and fails to respond.
The Registry value rule window opens.
By default, Kaspersky Embedded Systems Security for Windows treats all users not on the trusted user list as untrusted, and generates Critical events for them. For trusted users, statistics are compiled.
The configured registry access monitoring rule is displayed in the Registry Access Monitoring block of the Registry access monitoring rules window.