Critical Infrastructure Cybersecurity Framework

Permission Groups Discovery

Adversaries may attempt to discover group and permission settings.

Description

Adversaries may attempt to discover group and permission settings.

Quick Info

Technique ID
T1069
Tactic
Discovery
Sub-Techniques
3
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.