SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
![]() |
On Windows, the Tectia ConnectSecure installation creates the following registry keys:
HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\SSH Tectia Broker
HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\SSH Tectia Broker GUI
HKLM\SOFTWARE\SSH Communications Security\SSH Tectia
HKLM\SOFTWARE\SSH Communications Security\SSH Tectia Connector
HKLM\SOFTWARE\SSH Communications Security\SSH Tectia ConnectSecure
HKLM\SOFTWARE\Wow6432Node\SSH Communications Security\SSH Tectia (on x64 architecture, only)
HKLM\SOFTWARE\Wow6432Node\SSH Communications Security\SSH Tectia Connector (on x64 architecture, only)
HKLM\SOFTWARE\Wow6432Node\SSH Communications Security\SSH Tectia ConnectSecure (on x64 architecture, only)