Controlling access to the registry base

This protection type makes it possible to control specific applications’ access to keys and values in the registry base. As such, access to particularly sensitive keys can be protected, as they are a prime target of malicious programs.

EXAMPLE
To prevent a malware program from disabling Windows security tools via the registry base, you can protect their registry keys so that they can only be modified by legitimate Windows applications.

Every registry path can be a full path or contain the generic characters "?" and "*".