Software Deployment Tools
Adversaries may gain access to and use third-party software suites installed within an enterprise network.
Description
Adversaries may gain access to and use third-party software suites installed within an enterprise network.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Network SegmentationPrivileged Account Management
Quick Info
- Technique ID
- T1072
- Tactic
- Execution
- Mitigations
- 2
