Critical Infrastructure Cybersecurity Framework
T1547Persistence3 Mitigations

Boot or Logon Autostart Execution

Adversaries may configure system settings to automatically execute a program during system boot or logon.

Description

Adversaries may configure system settings to automatically execute a program during system boot or logon.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Privileged Account ManagementRestrict File and Directory PermissionsRestrict Registry Permissions

Quick Info

Technique ID
T1547
Sub-Techniques
14
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.