Permission Groups Discovery
Adversaries may attempt to discover group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of users in particular groups, and which users and groups have elevated permissions. Adversaries may attempt to discover group permission settings in many different ways. This data may provide the adversary with information about the compromised environment that can be used in follow-on activity and targeting.(Citation: C...
BY SOURCE
PROCEDURES (17)
Auto-extracted: 3 detections for privilege
Auto-extracted: 3 detections for general monitoring
Auto-extracted: 2 detections for azure
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for kubernetes
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for powershell