For ease of operation, many users may be able to turn on the remote modification key function of the Windows 8 system, allowing users to remotely modify the relevant registry keys for Windows 8 systems to achieve efficient management purposes from anywhere in the network.
However, when the Windows 8 system has this feature turned on, it is easy to be scanned by a malicious user through professional tool detection, so that this feature may be secretly exploited, for example, a malicious user can remotely modify the registry key to add an attacker to a registry startup key to attack windows 8 The purpose of the system. To prevent the virus from using the tomato garden to attack the security of the local system, we may do the following to deny the remote modification of the key values:
First use the "win+x" shortcut, pop-up system Access shortcut menu, click the "Run" command, switch to the system to run the text box, enter the "gpedit.msc" command and return, open the computer company System Group Policy Editor.
From the list on the left of the editor, expand the Computer Configuration Windows Settings Security Settings Local Policy Security Options node to locate the network access: Remotely accessible registry path Group Policy under the target node, and then double-click the option to expand the Options Settings dialog box. Select the remote access registry path that is already open and press the Delete button to remove it cleanly, and then close the Target Group Policy Settings dialog box.
Second, reposition the mouse over the security Options node. Locate the network access: Remotely accessible registry path and Subpath Group Policy, and with the mouse double-click, in the Settings dialog box that appears, delete all the Open registry paths, and then refresh the system registry after confirming. In this way, a malicious user will not be able to attack the Windows 8 system remotely by modifying the registry key at a later date.