User Execution
An adversary may rely upon specific actions by a user in order to gain execution.
Description
An adversary may rely upon specific actions by a user in order to gain execution.
Available Mitigations
This technique can be mitigated using 4 documented security measures.
Antivirus/AntimalwareExecution PreventionRestrict Web-Based ContentUser Training
Quick Info
- Technique ID
- T1204
- Tactic
- Execution
- Sub-Techniques
- 5
- Mitigations
- 4
