Registry Parse Data Analysis
Windows Forensics Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
This playbook leverages the RegistryParse automation to perform registry analysis and extract forensic artifacts. The automation includes common registry objects to extract which are useful for analyzing registry, or a user provided registry path to parse.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsThis playbook does not use any integrations.
#
Scripts- RegistryParse
#
CommandsThis playbook does not use any commands.
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
RegistryFileEntryID | The entry ID for the registry file to parse. | Optional | |
RegistryData | The data to parse out of the registry and output to context, including Users LastLoggedOnUser MachineRunOnce MachineStartup Timezone USB "All" selects all the options and any default options | Optional | |
CustomRegistryPaths | Custom registry path to parse. | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
RegistryForensicData | The data parsed from registry. | string |