Local Groups
Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group. Commands such as <code>net localgroup</code> of the [Net](https://attack.mitre.org/software/S0039) utility, <code>dscl . -list...
BY SOURCE
PROCEDURES (25)
Auto-extracted: 3 detections for process creation monitoring
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for lateral
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for wmi
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for file monitoring
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for wmi