EXPLORE
← Back to Explore
T1069

Permission Groups Discovery

Adversaries may attempt to discover group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of users in particular groups, and which users and groups have elevated permissions. Adversaries may attempt to discover group permission settings in many different ways. This data may provide the adversary with information about the compromised environment that can be used in follow-on activity and targeting.(Citation: C...

ContainersIaaSIdentity ProviderLinuxmacOSOffice SuiteSaaSWindows
24
Detections
3
Sources
6
Threat Actors

BY SOURCE

19elastic3sigma2splunk_escu

PROCEDURES (17)

Privilege3 detections

Auto-extracted: 3 detections for privilege

General Monitoring3 detections

Auto-extracted: 3 detections for general monitoring

Azure2 detections

Auto-extracted: 2 detections for azure

Powershell2 detections

Auto-extracted: 2 detections for powershell

Kubernetes2 detections

Auto-extracted: 2 detections for kubernetes

Service1 detections

Auto-extracted: 1 detections for service

Lateral1 detections

Auto-extracted: 1 detections for lateral

Privilege1 detections

Auto-extracted: 1 detections for privilege

Unusual1 detections

Auto-extracted: 1 detections for unusual

Unusual1 detections

Auto-extracted: 1 detections for unusual

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Credential1 detections

Auto-extracted: 1 detections for credential

Powershell1 detections

Auto-extracted: 1 detections for powershell

Lateral1 detections

Auto-extracted: 1 detections for lateral

Unusual1 detections

Auto-extracted: 1 detections for unusual

Credential1 detections

Auto-extracted: 1 detections for credential

Powershell1 detections

Auto-extracted: 1 detections for powershell

DETECTIONS (24)