← Back to Explore
T1654
Log Enumeration
Adversaries may enumerate system and service logs to find useful data. These logs may highlight various types of valuable insights for an adversary, such as user authentication records ([Account Discovery](https://attack.mitre.org/techniques/T1087)), security or vulnerable software ([Software Discovery](https://attack.mitre.org/techniques/T1518)), or hosts within a compromised network ([Remote System Discovery](https://attack.mitre.org/techniques/T1018)). Host binaries may be leveraged to colle...
ESXiIaaSLinuxmacOSWindows
1
Detections
1
Sources
5
Threat Actors
BY SOURCE
1splunk_escu
PROCEDURES (1)
General Monitoring1 detections
Auto-extracted: 1 detections for general monitoring