EXPLORE
← Back to Explore
T1072

Software Deployment Tools

Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network. Configuration management and software deployment applications may be used in an enterprise network or cloud environment for routine administration purposes. These systems may also be integrated into CI/CD pipelines. Examples of such solutions include: SCCM, HBSS, Altiris, AWS Systems Manager, Microsoft Intune, Azure Arc, and GCP Deployment ...

LinuxmacOSNetwork DevicesSaaSWindows
13
Detections
3
Sources
6
Threat Actors

BY SOURCE

5splunk_escu4elastic4sigma

PROCEDURES (11)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Remote2 detections

Auto-extracted: 2 detections for remote

Remote1 detections

Auto-extracted: 1 detections for remote

Remote1 detections

Auto-extracted: 1 detections for remote

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

Lateral1 detections

Auto-extracted: 1 detections for lateral

Process Creation Monitoring1 detections

Auto-extracted: 1 detections for process creation monitoring

Credential1 detections

Auto-extracted: 1 detections for credential

Credential1 detections

Auto-extracted: 1 detections for credential

Lateral1 detections

Auto-extracted: 1 detections for lateral

Lateral1 detections

Auto-extracted: 1 detections for lateral

DETECTIONS (13)