EXPLORE
← Back to Explore
T1213.002

Sharepoint

Adversaries may leverage the SharePoint repository as a source to mine valuable information. SharePoint will often contain useful information for an adversary to learn about the structure and functionality of the internal network and systems. For example, the following is a list of example information that may hold potential value to an adversary and may also be found on SharePoint: * Policies, procedures, and standards * Physical / logical network diagrams * System architecture diagrams * Tech...

WindowsOffice Suite
4
Detections
2
Sources
6
Threat Actors

BY SOURCE

3elastic1splunk_escu

PROCEDURES (3)

Phish2 detections

Auto-extracted: 2 detections for phish

Powershell1 detections

Auto-extracted: 1 detections for powershell

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

DETECTIONS (4)