EXPLORE
← Back to Explore
T1592.004

Client Configurations

Adversaries may gather information about the victim's client configurations that can be used during targeting. Information about client configurations may include a variety of details and settings, including operating system/version, virtualization, architecture (ex: 32 or 64 bit), language, and/or time zone. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: listening ports, server ban...

PRE
3
Detections
1
Sources
1
Threat Actors

BY SOURCE

3sigma

PROCEDURES (1)

Process Creation Monitoring3 detections

Auto-extracted: 3 detections for process creation monitoring

THREAT ACTORS (1)

DETECTIONS (3)