{
	"id": "4a3ce020-d83a-4d72-b0ff-7f4a6065a887",
	"created_at": "2026-04-06T00:12:33.012853Z",
	"updated_at": "2026-04-10T13:11:24.002341Z",
	"deleted_at": null,
	"sha1_hash": "989c4ff81fbb65641086a1318dd463c76948d302",
	"title": "Audit Registry",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29304,
	"plain_text": "Audit Registry\r\nBy Archiveddocs\r\nArchived: 2026-04-05 19:07:17 UTC\r\nApplies To: Windows 7, Windows Server 2008 R2\r\nThis security policy setting determines whether the operating system audits user attempts to access registry\r\nobjects. Audit events are only generated for objects that have configured system access control lists (SACLs)\r\nspecified, and only if the type of access requested (such as Write, Read, or Modify) and the account making the\r\nrequest match the settings in the SACL.\r\nIf success auditing is enabled, an audit entry is generated each time any account successfully accesses a registry\r\nobject that has a matching SACL. If failure auditing is enabled, an audit entry is generated each time any user\r\nunsuccessfully attempts to access a registry object that has a matching SACL.\r\nEvent volume: Low to medium, depending on how registry SACLs are configured\r\nDefault: Not configured\r\nIf this policy setting is configured, the following events are generated. The events appear on computers running\r\nWindows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista.\r\nEvent ID Event message\r\n4657 A registry value was modified.\r\n5039 A registry key was virtualized.\r\nSource: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd941614(v=ws.10)\r\nhttps://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd941614(v=ws.10)\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd941614(v=ws.10)"
	],
	"report_names": [
		"dd941614(v=ws.10)"
	],
	"threat_actors": [],
	"ts_created_at": 1775434353,
	"ts_updated_at": 1775826684,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/989c4ff81fbb65641086a1318dd463c76948d302.pdf",
		"text": "https://archive.orkl.eu/989c4ff81fbb65641086a1318dd463c76948d302.txt",
		"img": "https://archive.orkl.eu/989c4ff81fbb65641086a1318dd463c76948d302.jpg"
	}
}