Critical Infrastructure Cybersecurity Framework
T1112Defense Evasion1 Mitigations

Modify Registry

Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques.

Description

Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Restrict Registry Permissions

Quick Info

Technique ID
T1112
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.