Automated Collection
Once established within a system or network, an adversary may use automated techniques for collecting internal data.
Description
Once established within a system or network, an adversary may use automated techniques for collecting internal data.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Encrypt Sensitive InformationRemote Data Storage
Quick Info
- Technique ID
- T1119
- Tactic
- Collection
- Mitigations
- 2
