Remote Registry control

Posted on 2009-07-03
Last Modified: 2013-12-04
Today I discovered that by default in XP Pro remote registry control is enabled.It doesn't make any sense...According to my personal common sense,it's crazy to allow that and it must be turned off.
So how come MS people can't understand that...or there's something I don't know?
Question by:abrodski
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2

Author Comment

ID: 24771611
I think I found the reason...MS Windows Update...

Expert Comment

ID: 24771653
You have the ability to turn it off, but it's enabled by default for functionality with other programs.  It's something like why is the server service turned on?  Because some programs may need it, whether or not you use them or not.  Anyway, the remote registry service is dangerous, but it does require a user/pass to access it, and if that is compromised and they have remote access to your box, they can make registry changes just as easily as without it.  Have there been exploits for it?  Of course, but which service that gives remote access to you hasn't been exploited?

Expert Comment

ID: 24771718
We can look at the spooler service as well when you're working with printers over a network.  If connecting to a printer through the network, this service relies on remote registry to make those registry entries for you.  We also have remote assistance in where the person assisting you needs to make configuration changes that would write to a registry.  If he makes those changes, the remote assistance service will stop as it requires that remote registry service for it.  The network diagnostics tool, that's offered in Windows servers 200+, requires this as well.  There are several things, however a lot of them incorrectly do not list remote registry as a dependency.
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.


Author Comment

ID: 24773557
so it's better leave it on then?

Expert Comment

ID: 24773938
Well it all depends on what you're using the computer for.  If you're a simple home user, yeah turn it off.  If you plan on using remote services on your computer, then you'll want to turn it off as there's no use for it.  Just remember if you need remote access to your computer, to turn the service back on.

Accepted Solution

TurboBorland earned 500 total points
ID: 24773951
********Well it all depends on what you're using the computer for.  If you're a simple home user, yeah turn it off because you have no use for it.  If you plan on using remote services on your computer, then you'll want to keep the service enabled (do not turn have it set to manual as most things that use it will not turn it on for you like it should when this is set).  Just remember if you need remote access to your computer, to turn the service back on.

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question