Registry Parse Data Analysis
This Playbook is part of the Windows Forensics Pack.#
Supported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
This playbook leverages the RegistryParse automation to perform registry analysis and extract forensic artifacts. The automation includes common registry objects to extract which are useful for analyzing registry, or a user provided registry path to parse.
Dependencies#
This playbook uses the following sub-playbooks, integrations, and scripts.
Sub-playbooks#
This playbook does not use any sub-playbooks.
Integrations#
This playbook does not use any integrations.
Scripts#
- RegistryParse
Commands#
This playbook does not use any commands.
Playbook Inputs#
| Name | Description | Default Value | Required | 
|---|---|---|---|
| RegistryFileEntryID | The entry ID for the registry file to parse. | Optional | |
| RegistryData | The data to parse out of the registry and output to context, including Users LastLoggedOnUser MachineRunOnce MachineStartup Timezone USB "All" selects all the options and any default options | Optional | |
| CustomRegistryPaths | Custom registry path to parse. | Optional | 
Playbook Outputs#
| Path | Description | Type | 
|---|---|---|
| RegistryForensicData | The data parsed from registry. | string | 
Playbook Image#
