Query Registry

Description

Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementAdvanced Network ScanWindows machinesAuthenticated ScanSMBServices Registry ACL
Tenable Vulnerability ManagementAdvanced Network ScanWindows machinesAuthenticated ScanSMBAuto login

References

Windows Services Registry ACL

Microsoft Windows SMB Registry : Autologon Enabled

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Discovery

Technique: Query Registry