Software Discovery
Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from [Software Discovery](https://attack.mitre.org/techniques/T1518) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Such software may be deployed widely across the environment for configuration management or security reaso...
BY SOURCE
PROCEDURES (10)
Auto-extracted: 3 detections for script execution monitoring
Auto-extracted: 3 detections for general monitoring
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for network connection monitoring
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for service monitoring
Auto-extracted: 1 detections for cloud monitoring
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for authentication monitoring