answersLogoWhite

0


Best Answer

The parent of each 64-bit registry node is the Image-Specific Node or ISN. The registry redirector transparently directs an application's registry access to the appropriate ISN subnode. Redirection subnodes in the registry tree are created automatically by the WOW64 component using the name Wow6432Node. As a result, it is essential not to name any registry key you create Wow6432Node.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

10y ago

The Wow6432 registry entry indicates that you're running a 64-bit version of
Windows.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the purpose of the Wow6432Node subkey in the Windows registry?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Information for a Device driver sound card would be stored under what registry subkey?

Hkey_local_machine


What is a category or division of information within a registry called?

Registry Contents • The Registry is hierarchical in structure - Made up of keys, subkeys, and entries • Registry key - A category or division of information within the Registry • Registry subkeys - A single key may contain one or more lower-level keys • Registry entry - A data parameter associated with a software or hardware characteristic under a key (or subkey)


Windows Vista Troubleshooting Wireless association failed due to an unknown reason Any solutions?

This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base: 322756 How to back up and restore the registry in WindowsTo resolve this issue, disable the DHCP BROADCAST flag in Windows Vista. To do this, follow these steps: # Click '''Start''', type regedit in the '''Start Search box, and then click '''regedit in the '''Programs list.'''''''''If you are prompted for an administrator password or for confirmation, type your password, or click '''Continue.''' # Locate and then click the following registry subkey: '''HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{GUID}'''In this registry path, click the '''(GUID) subkey that corresponds to the network adapter that is connected to the network.''' # On the '''Edit menu, point to '''New, and then click '''DWORD (32-bit) Value.''''''''' # In the '''New Value #1 box, type DhcpConnEnableBcastFlagToggle, and then press ENTER.''' # Right-click '''DhcpConnEnableBcastFlagToggle, and then click '''Modify.'''''' # In the '''Value data box, type 1, and then click '''OK.'''''' # Close Registry Editor.


What are the files that make up the registry on your system called?

While there are five main files that make up the registry each one of these file contain hundreds of files apiece. Almost any action you take, such as installing application software or hardware, will almost always result in a change in the registry. It is because of this that the amount of files in the registry is almost impossible to determine. Even trying to find the average files that would be in a given systems registry is next to worthless because the registry can vary so greatly in size that averages become worthless. Each of the five keys can have subkeys, and each subkey can have more subkeys as well as one or more values and then each of these can have a subkey and so on and so on. The only other thing about the registry that I feel I should mention is that working on it can with the single click of the mouse can severely damage your computer and working in the registry should only be done by a IT professional with the proper training and experience. If you choose to work on it yourself just make sure you back it up before altering or deleting any files or values found within.


Is it possible to show local area connection in system tray icon in Windows 98 like windows xp?

I went so far as to install 98 on a system at home just to check this out. I was unable to find an option that would let you display the icon for network connectivity in the system tray. So I would have to say there is no way to do this. Solution: 1: Create restore point. 2: take registry backup. 3: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters 4: Add the following registry entry to the Parameters subkey: Name: DisableDHCPMediaSense Data type: REG_DWORD (Boolean) Value: 1 5: Restart the computer.


Is there any way how to remove desktop item from Win Tab or Alt Tab switcher of Windows Vista?

You can make Vista's Alt-Tab option look like on XP, thus removing the Desktop item. To do this, follow this: Open Registry Editor by typing "regedit" in Vista's Start Menu search box and pressing Enter. In the Registry Editor, navigate to: HKEY_CURRENT_USER>> Software>> Microsoft>> Windows>> CurrentVersion>> Explorer In the Explorer folder ("subkey"), create a new DWORD value, named "AltTabSettings". (Right-click>> New>> DWORD (32-bit) Value) Double-click the newly created DWORD value, change it's value to "1" instead of "0", and choose "Hexadecimal". Press OK, and enjoy the classic Alt-Tab feature.


What are the hklm subkeys?

there are 5 subkey of HKLM .i.e. SAM. Security, Software, Hardware and System


Microsoft Office 2007 won't accept my product key What should I do?

Call Microsoft or go to this website-- http://support.microsoft.com/kb/823 570. if it is a preinstalled software, call the manufacturer of your computer... n i dunno what to do i just need the password!!!!!


Microsoft Word '07 crashes?

There have been a lot of queries regarding this topic, i figured it out that i answer it myself.There are two solutions,1. If you are using Hp printers, then go to Printers and faxes in control panel, and then change the default printer to other than the hp one. (this is because there is some unknown conflict between Msoffice and hp printer software, althought the problem has been reported to hp there is no update from hp yet)2. For those without hp printers follow this-FOR ALL THE MICROSOFT WORD 2007 CRASHES AFTER INSTALLING SERVICE PACK 1 OR AFTER INSTALLING ANY UPDATE THIS IS THE SIMPLE FIX TO FOLLOW :click 'run' , then type 'regedit'*- In registry editor expand the sub key under computer 'HKEY_CURRENT_USER' , then keep on expanding till " Software-Microsoft-Office-12.0-WordData".Now Under Word subkey Delete the data folder only ! That's It !Applies to following Operating Systems :Microsoft Windows 2000Microsoft Windows 2003Microsoft Windows XPMicrosoft Windows Vista andMicrosoft Windows 2008 Server.Caution ! I recommend you to take a registry backup first, incase if you require to restore the settings back. Using or modifying 'regedit' improperly can make your OS inoperable so please take care not to change any other system values in the registry editor.


How do you remove brontok virus?

Manual removal steps: Disconnect your computer from the network and disable file sharings, if any.Disable System Restore (for Windows XP/Windows Me only).For Windows XP:Click Start.Right-click My Computer, and then click Properties.Click the System Restore tab.Select "Turn off System Restore" or "Turn off System Restore on all drives" check box. Start your machine in Safe mode.How to start a computer in safe mode, pls refer to: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406?OpenDocument&src=sec_doc_namUpdate your Anti-virus software with the latest signature files and scan your computer withthe Anti-virus to detect the worm and delete any files detected as the worm by clicking the DELETE button.Delete the value from the registry.You need to back up the registry before making any changes to it. In correct changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only.How to make a backup of the Windows registry, pls refer at: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/199762382617?OpenDocument&src=sec_doc_namClick Start > Run. Type regedit Click OK.Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. You can used a tool to resolve this problem.Download this tool. Once downloaded, �right-click� the UnHookExec.inf file and click install. Then continue with the removal steps. http://securityresponse.symantec.com/avcenter/venc/data/tool.to.reset.shellopencommand.registry.keys.HTMLOther alternative way to enable registry, please refer to: http://www.patheticcockroach.com/mpam4/index.php?p=28Navigate to the subkey that was detected by the anti-virus and delete the value.Exit the Registry Editor.If you are still unable to open your registry, you may try the following steps.Boot up the infected computer, but do not login to the server, leave it at the login prompt.Start up another clean computer, worm-free computer which has an updated anti-virus software running and an active firewall running preventing all inbound connections.From the clean computer, start REGEDIT.EXE and click on File -> File -> Connect Network Registry. Connect to the infected computer.Modify the following values in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\NT\CurrentVersion\Winlogon to the following values:"Userinit" = "C:\WINNT\system32\userinit.exe," "Shell" = "Explorer.exe"(make sure that you enter the correct path to where Windows is installed. For example on NT4.0 it is WINNT)After completing the above steps, reboot the infected computer.Using the clean computer, map the C$ share and scan it using the up to date anti-virus to remove any infected files on the infected computer. Then, you should be able to boot to the computer and then follow Steps 6 - Steps 11.Run a full system scan using an updated version of Anti-virus software and delete any files detected as worm.Download and run a process management tool or process viewer to kill all worm processes running on the infected machine. The process management tool or the process viewer is available according to the machine's platform and can be downloaded free from the internet. For example users can download and use the following process viewer: http://www.sysinternals.com/Utilities/ProcessExplorer.HTMLDelete the scheduled tasks added by the worm. Click Start, and then click Control Panel. (In Windows XP, switch to Classic View.) In the Control Panel window, double click Scheduled Tasks. Right click the task icon and select Properties from pop-up menu. The properties of the task is displayed. Delete the task if the contents of the Run text box in the task pane matches the worm.Enable the System Restore (for Windows XP/Windows Me only).Re-scan your computer with an updated version of Anti-virus to confirm the computer is clean.Re-connect your computer to the network once confirmed clean.IMPROVED ANSWER WITH LINKS TO TOOLS (SOLVED BY A SENIOR IT SYSTEMS ADMIN) BY: Ian GardinerBrontok Virus Manual Removal InstructionsDisconnect your computer from the network and disable file sharings, if any exist on the PC.Disable System Restore (for Windows XP/Windows Me only).For Windows XP:Click Start.Right-click My Computer, and then click Properties.Click the System Restore tab.Select Turn off System Restore or Turn off System Restore on all drives check box.Start your machine in Safe mode. Reboot and repeatedly press F8. If you cannot boot into safe mode, you should still be able to get rid of the virus, however, safe mode is recommended.Update the anti-virus software for any latest updates.You will have to use the regedit function to remove a lot of infected/newly created values in the registry.Click Start>Run. Then type regedit, click OK. You will need to use Internet Explorer to download this file.Go to http://www.symantec.com/security_response/writeup.jsp?docid=2004-050614-0532-99 and download the UnHookExec.inf file at the bottom of the page. (you will have to download this file on another PC and save it on a drive and move it over to the infected PC)Once you have put this file onto the infected PC's Desktop, Right-click the file and click Install. You won't really notice anything happen, however, this will enable the regedit function.If the registry editor fails to open, the threat may have modified the registry to prevent it from opening. You can use a tool to resolve this problem:Once you can use the regedit function check to see if there is a scheduled task named A1 or something along those lines (scheduled to run at 5:08pm) in All Programs\Accessories\System Tools\Scheduled Tasks. If you can't reach that location try: Control Pannel in classic view and look for the Scheduled Tasks icon/folder. Delete the task. The tool can also be found at: http://www.kaer-media.org/penawar-brontok/Download.htmNext, before going ahead and deleting anything in the registry. You will need to use this German Brontok Removal toolClick on the link that says: PenawarB.exe and save the file.Double click the file, click RunIn the bottom right hand corner click the button that says: Percubaan Percuma!On the next screen click on the button on the left that says: Tidak mengapa, saya hendak cuba dahulu…On the next screen click the button that says: Scan sekarang!Once the tool has run it will show the location of all of the infected filesClick the button that says: Buang ! & Repair to delete the infected filesNote: This tool is free so when you click Repair it will delete all of the files except for 10 of them. For the remaining 10 you will have to take not of the infected files' locations and manually delete them. Also, if there are less than 10 files that are infected to begin with you will have to manually delete all of them.Once the file has been saved to the infected PC's DesktopOnce this is done follow the instructions below on deleting all other files and registry values. This step is very important and crucial to the final removal of the virus!The worm may use various methods to run automatically each time Windows starts. Automatic startup methods that the worm employs may include:Placing a copy of itself in the user's startup folder, i.e. %homepath%\Start Menu\Programs\Startup\Empty.pif. Delete the file.Adding a scheduled task to run %homepath%\Templates\A.kotnorB.com each day at 5:08 pm. Also check to see if there is a scheduled task named A1 or something along those lines in All Programs\Accessories\System Tools\Scheduled Tasks. If you can't reach that location try: Control Pannel in classic view and look for the Scheduled Tasks icon/folder. Delete the task.Adding a registry value: "Tok-Cirrhatus"With data: In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Delete the key.Adding registry value: "Bron-Spizaetus"with data: in subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Delete the key.Adding registry value: Shell with data: "explorer.exe " in registry subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinLogon. Delete the key.Modifies registry value: AlternateShell with data: in registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBootNote: the default setting for this key is "AlternateShell"="cmd.exe"Win32/Brontok may attempt to lower security settings by making the following changes:Prevents the user from accessing the Registry Editor by making the following registry edit:Adds value: DisableRegistryToolsWith data: 1In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System. Change the Data to 0.Prevents the display of files and folders with the 'hidden' attribute set:Adds value: HiddenWith data: 0In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.Prevents the display of Windows system files:Adds value: ShowSuperHiddenWith data: 0In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.Prevents the display of executable file extensions:Adds value: HideFileExtWith data: 1In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 0.Prevents access to the Folder Options menu:Adds value: NoFolderOptionsWith data: 1In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Change the Data to 0.Modifies the Windows HOSTS file to prevent access to certain Internet sites, the majority of which are antivirus or security-related.Attempts ping attacks against certain Web sites, presumably to launch a form of denial of service (DoS) attack.Terminates applications or restarts Windows when the title of the active window contains certain strings, many of which may be representative of antivirus or system tools that might ordinarily be used to detect or remove the worm.Overwrites the autoexec.bat file with the word "pause", causing systems that employ the autoexec.bat file to pause on bootup. Some variants of Win32/Brontok may modify the autoexec.bat in order to display a message during bootup.You will also want to go into msconfig. Start>Run, type msconfig. And disable any startup items (under the startup tab) that look suspicious; you may have to run an internet search to determine which are normal processes and which may be a threat. make sure the scheduled task is no longer theremake sure you can open regeditre-run the scanner for any infected files. If it finds anything delete them, restart the PC, and then re-run the scanner and delete files until nothing shows up again.Make sure the registry is back to normal and that you can view hidden files and folders.Once this has been done, restart the PC, and check over everything in the following order:


How do you remove brontok virus manually?

Manual removal steps: Disconnect your computer from the network and disable file sharings, if any.Disable System Restore (for Windows XP/Windows Me only).For Windows XP:Click Start.Right-click My Computer, and then click Properties.Click the System Restore tab.Select "Turn off System Restore" or "Turn off System Restore on all drives" check box. Start your machine in Safe mode.How to start a computer in safe mode, pls refer to: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406?OpenDocument&src=sec_doc_namUpdate your Anti-virus software with the latest signature files and scan your computer withthe Anti-virus to detect the worm and delete any files detected as the worm by clicking the DELETE button.Delete the value from the registry.You need to back up the registry before making any changes to it. In correct changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only.How to make a backup of the Windows registry, pls refer at: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/199762382617?OpenDocument&src=sec_doc_namClick Start > Run. Type regedit Click OK.Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. You can used a tool to resolve this problem.Download this tool. Once downloaded, �right-click� the UnHookExec.inf file and click install. Then continue with the removal steps. http://securityresponse.symantec.com/avcenter/venc/data/tool.to.reset.shellopencommand.registry.keys.HTMLOther alternative way to enable registry, please refer to: http://www.patheticcockroach.com/mpam4/index.php?p=28Navigate to the subkey that was detected by the anti-virus and delete the value.Exit the Registry Editor.If you are still unable to open your registry, you may try the following steps.Boot up the infected computer, but do not login to the server, leave it at the login prompt.Start up another clean computer, worm-free computer which has an updated anti-virus software running and an active firewall running preventing all inbound connections.From the clean computer, start REGEDIT.EXE and click on File -> File -> Connect Network Registry. Connect to the infected computer.Modify the following values in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\NT\CurrentVersion\Winlogon to the following values:"Userinit" = "C:\WINNT\system32\userinit.exe," "Shell" = "Explorer.exe"(make sure that you enter the correct path to where Windows is installed. For example on NT4.0 it is WINNT)After completing the above steps, reboot the infected computer.Using the clean computer, map the C$ share and scan it using the up to date anti-virus to remove any infected files on the infected computer. Then, you should be able to boot to the computer and then follow Steps 6 - Steps 11.Run a full system scan using an updated version of Anti-virus software and delete any files detected as worm.Download and run a process management tool or process viewer to kill all worm processes running on the infected machine. The process management tool or the process viewer is available according to the machine's platform and can be downloaded free from the Internet. For example users can download and use the following process viewer: http://www.sysinternals.com/Utilities/ProcessExplorer.HTMLDelete the scheduled tasks added by the worm. Click Start, and then click Control Panel. (In Windows XP, switch to Classic View.) In the Control Panel window, double click Scheduled Tasks. Right click the task icon and select Properties from pop-up menu. The properties of the task is displayed. Delete the task if the contents of the Run text box in the task pane matches the worm.Enable the System Restore (for Windows XP/Windows Me only).Re-scan your computer with an updated version of Anti-virus to confirm the computer is clean.Re-connect your computer to the network once confirmed clean.IMPROVED ANSWER WITH LINKS TO TOOLS (SOLVED BY A SENIOR IT SYSTEMS ADMIN) BY: Ian GardinerBrontok Virus Manual Removal InstructionsDisconnect your computer from the network and disable file sharings, if any exist on the PC.Disable System Restore (for Windows XP/Windows Me only).For Windows XP:Click Start.Right-click My Computer, and then click Properties.Click the System Restore tab.Select Turn off System Restore or Turn off System Restore on all drives check box.Start your machine in Safe mode. Reboot and repeatedly press F8. If you cannot boot into safe mode, you should still be able to get rid of the virus, however, safe mode is recommended.Update the anti-virus software for any latest updates.You will have to use the regedit function to remove a lot of infected/newly created values in the registry.Click Start>Run. Then type regedit, click OK. You will need to use Internet Explorer to download this file.Go to http://www.symantec.com/security_response/writeup.jsp?docid=2004-050614-0532-99 and download the UnHookExec.inf file at the bottom of the page. (you will have to download this file on another PC and save it on a drive and move it over to the infected PC)Once you have put this file onto the infected PC's Desktop, Right-click the file and click Install. You won't really notice anything happen, however, this will enable the regedit function.If the registry editor fails to open, the threat may have modified the registry to prevent it from opening. You can use a tool to resolve this problem:Once you can use the regedit function check to see if there is a scheduled task named A1 or something along those lines (scheduled to run at 5:08pm) in All Programs\Accessories\System Tools\Scheduled Tasks. If you can't reach that location try: Control Pannel in classic view and look for the Scheduled Tasks icon/folder. Delete the task. The tool can also be found at: http://www.kaer-media.org/penawar-brontok/Download.htmNext, before going ahead and deleting anything in the registry. You will need to use this German Brontok Removal toolClick on the link that says: PenawarB.exe and save the file.Double click the file, click RunIn the bottom right hand corner click the button that says: Percubaan Percuma!On the next screen click on the button on the left that says: Tidak mengapa, saya hendak cuba dahulu…On the next screen click the button that says: Scan sekarang!Once the tool has run it will show the location of all of the infected filesClick the button that says: Buang ! & Repair to delete the infected filesNote: This tool is free so when you click Repair it will delete all of the files except for 10 of them. For the remaining 10 you will have to take not of the infected files' locations and manually delete them. Also, if there are less than 10 files that are infected to begin with you will have to manually delete all of them.Once the file has been saved to the infected PC's DesktopOnce this is done follow the instructions below on deleting all other files and registry values. This step is very important and crucial to the final removal of the virus!The worm may use various methods to run automatically each time Windows starts. Automatic startup methods that the worm employs may include:Placing a copy of itself in the user's startup folder, i.e. %homepath%\Start Menu\Programs\Startup\Empty.pif. Delete the file.Adding a scheduled task to run %homepath%\Templates\A.kotnorB.com each day at 5:08 pm. Also check to see if there is a scheduled task named A1 or something along those lines in All Programs\Accessories\System Tools\Scheduled Tasks. If you can't reach that location try: Control Pannel in classic view and look for the Scheduled Tasks icon/folder. Delete the task.Adding a registry value: "Tok-Cirrhatus"With data: In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Delete the key.Adding registry value: "Bron-Spizaetus"with data: in subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Delete the key.Adding registry value: Shell with data: "explorer.exe " in registry subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinLogon. Delete the key.Modifies registry value: AlternateShell with data: in registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBootNote: the default setting for this key is "AlternateShell"="cmd.exe"Win32/Brontok may attempt to lower security settings by making the following changes:Prevents the user from accessing the Registry Editor by making the following registry edit:Adds value: DisableRegistryToolsWith data: 1In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System. Change the Data to 0.Prevents the display of files and folders with the 'hidden' attribute set:Adds value: HiddenWith data: 0In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.Prevents the display of Windows system files:Adds value: ShowSuperHiddenWith data: 0In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.Prevents the display of executable file extensions:Adds value: HideFileExtWith data: 1In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 0.Prevents access to the Folder Options menu:Adds value: NoFolderOptionsWith data: 1In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Change the Data to 0.Modifies the Windows HOSTS file to prevent access to certain Internet sites, the majority of which are antivirus or security-related.Attempts ping attacks against certain Web sites, presumably to launch a form of denial of service (DoS) attack.Terminates applications or restarts Windows when the title of the active window contains certain strings, many of which may be representative of antivirus or system tools that might ordinarily be used to detect or remove the worm.Overwrites the autoexec.bat file with the word "pause", causing systems that employ the autoexec.bat file to pause on bootup. Some variants of Win32/Brontok may modify the autoexec.bat in order to display a message during bootup.You will also want to go into msconfig. Start>Run, type msconfig. And disable any startup items (under the startup tab) that look suspicious; you may have to run an internet search to determine which are normal processes and which may be a threat. make sure the scheduled task is no longer theremake sure you can open regeditre-run the scanner for any infected files. If it finds anything delete them, restart the PC, and then re-run the scanner and delete files until nothing shows up again.Make sure the registry is back to normal and that you can view hidden files and folders.Once this has been done, restart the PC, and check over everything in the following order:


What is netlogon?

The Netlogon subkey stores information for the Net Logon service. The Net Logon service verifies logon requests, and it registers, authenticates, and locates domain controllers. Also, to maintain backward compatibility, Net Logon manages replication of the user account database to back up domain controllers running Windows NT 4.0 and earlier. For Windows 2000, Net Logon manages replication only when replication involves servers running Windows NT 4.0 and earlier. Net Logon for Windows 2000 does not manage replication between two servers running Windows 2000.