Kaspersky Embedded Systems Security 3.x

Creating and configuring a registry access monitoring rule

October 25, 2023

ID 223006

Registry access monitoring rules are applied in the order in which they are listed in the Registry access monitoring rules block.

To create and configure a registry access monitoring rule using the Web Plug-in:

  1. In the main window of the Kaspersky Security Center Web Console, select DevicesPolicies & profiles.
  2. Click the policy name you want to configure.
  3. In the <Policy name> window that opens select the Application settings tab.
  4. Select the System Inspection section.
  5. In the Registry Access Monitor subsection, click the Settings button.

    The Registry Access Monitor opens on the Registry Access Monitor settings tab.

  6. In the Registry access monitoring rules block, click the Add button.

    The Registry Access Monitoring rule window appears.

  7. In the Monitor registry access for a scope field, enter a path using a supported mask.

    Avoid using supported masks for the root keys, when creating the rules.
    If you specify only a root key, such as HKEY_CURRENT_USER, or a root key with a mask for all child keys, such as HKEY_CURRENT_USER\*, a vast number of notifications about addressing the specified child keys is generated, which results in the system performance issues.
    If you specify a root key, such as HKEY_CURRENT_USER, or a root key with a mask for all child keys, such as HKEY_CURRENT_USER\*, and select the Block operations according to the rules mode, the system is not able to read or change the keys required for OS functioning and fails to respond.

  8. On the Actions tab for the selected monitoring scope, configure the list of actions as needed.
  9. Specify the registry values that the rule will monitor:
    1. On the Controlled values tab, click the Add button.

      The Registry value rule window opens.

    2. In the corresponding field, enter a registry value mask.
    3. In the Controlled operations block, select which actions performed with the registry value will be monitored by the rule.
    4. Click the OK button to save the changes.
  10. If necessary, specify trusted users:
    1. On the Trusted users tab, click the Add button.
    2. Enter the User name or click Set SID for the group Everyone, to define users authorized to perform the selected actions.
    3. Click the OK button to save the changes.

    By default, Kaspersky Embedded Systems Security for Windows treats all users not on the trusted user list as untrusted, and generates Critical events for them. For trusted users, statistics are compiled.

  11. In the Registry Access Monitoring rule window, click the OK button to save the changes.

The configured registry access monitoring rule is displayed in the Registry Access Monitor block of the Registry access monitoring rules window.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.