Critical Infrastructure Cybersecurity Framework

Log Enumeration

Adversaries may enumerate system and service logs to find useful data.

Description

Adversaries may enumerate system and service logs to find useful data.

Quick Info

Technique ID
T1654
Tactic
Discovery
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.