RegistryAccessPolicy Methods
Allows you to spot, analyze, and prohibit unwanted requests to the system registry.
Name | Description |
---|---|
Allow |
Enables the specified registry operation. |
Equals |
Determines whether the specified object instances are considered equal. Inherited from Object. |
Equals |
Determines whether the specified object is equal to the current object. Inherited from Object. |
Get |
Serves as the default hash function. Inherited from Object. |
Get |
Gets the Type of the current instance. Inherited from Object. |
Is |
Indicates whether the specified registry operation is allowed. |
Memberwise |
Creates a shallow copy of the current Object. Inherited from Object. |
Reference |
Determines whether the specified Object instances are the same instance. Inherited from Object. |
Suppress |
Suppresses all requests to the system registry. |
Suppress |
Suppresses read operations from the system registry. |
Suppress |
Suppresses requests to write to the system registry. |
Throw |
Throws an exception when the control accesses the system registry. |
Throw |
Throws an exception if a read/write request to the system registry fails. |
To |
Returns a string that represents the current object. Inherited from Object. |
See Also