Critical Infrastructure Cybersecurity Framework
T1135Discovery2 Mitigations

Network Share Discovery

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather.

Description

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Limit Access to Resource Over NetworkOperating System Configuration

Quick Info

Technique ID
T1135
Tactic
Discovery
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.