Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Symmetry Access Control |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
APC |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ASUPIM |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Load Balancer |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Kiteworks |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AirWatch |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Alert Logic |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AWS Bastion |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
AWS CloudTrail |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
AWS CloudWatch |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
AWS GuardDuty |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AppSense Application Manager |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Arbor |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Armis |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AssetView |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Atlassian BitBucket |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BOTsink |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Auth0 |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Axway SFTP |
|
T1012 - Query Registry T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BIND |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Barracuda Firewall |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BeyondTrust PasswordSafe |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
BeyondTrust PowerBroker |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
BeyondTrust Privilege Management |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
BeyondTrust Privileged Identity |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Bitdefender |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Bitdefender GravityZone |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BlackBerry Protect |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BlueCat Networks Adonis |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
BlueCat Networks DHCP |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Box Cloud Content Management |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Bromium Secure Platform |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1484 - Group Policy Modification |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CA Privileged Access Manager Server Control |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CDS |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cato Cloud |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Centrify Authentication Service |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098 - Account Manipulation T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Centrify Infrastructure Services |
|
T1210 - Exploitation of Remote Services |
|
Centrify Zero Trust Privilege Services |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Check Point Endpoint Security |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Check Point NGFW |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Check Point Security Gateway |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Check Point Threat Prevention |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cimtrak |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ACI |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
AnyConnect |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Cisco |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cisco ACS |
|
T1078 - Valid Accounts T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cisco ADC |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cisco Adaptive Security Appliance |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Cisco Advance Malware Protection (AMP) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cisco Airespace |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cisco Call Manager |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cisco CloudLock |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cisco Console |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cisco Firepower |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cisco ISE |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cisco Meraki MX appliances |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cisco NPE |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Cisco Secure Endpoint |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cisco Secure Network Analytics |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cisco TACACS |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Duo Access Security |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1210 - Exploitation of Remote Services |
|
IronPort Email |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Proxy Umbrella |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Citrix Endpoint Management |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Citrix Netscaler |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Clearsense |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cloud Application |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cloudflare CDN |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Cloudflare Insights |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cloudflare WAF |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Phishme |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cognitas CrossLink |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Falcon |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CyberArk Endpoint Privilege Management |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
CyberArk Vault |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098 - Account Manipulation T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1210 - Exploitation of Remote Services T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Privileged Session Manager |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Privileged Threat Analytics |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Failsafe |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Darktrace Enterprise Immune System |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Dell EMC Isilon |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
One Identity Manager |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation |
|
RSA Authentication Manager |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Digital Arts i-FILTER for Business |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Digital Guardian Endpoint Protection |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Digital Guardian Network DLP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Dropbox |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
DTEX InTERCEPT |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EMP |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ESET Endpoint Security |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EdgeWave iPrism |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Egnyte |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EnSilo |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EndPoint |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Epic SIEM |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Exabeam Advanced Analytics |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Exabeam DL |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Reveal(x) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Zebra wireless LAN management |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BIG-IP DNS |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
F5 Advanced Web Application Firewall (WAF) |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
F5 BIG-IP |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
F5 BIG-IP Access Policy Manager (APM) |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
F5 BIG-IP Advanced Firewall Module (AFM) |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
F5 BIG-IP Application Security Manager (ASM) |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FTP |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Fidelis Network |
|
T1210 - Exploitation of Remote Services |
|
Fidelis XPS |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FireEye Email Gateway |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
FireEye Endpoint Security (CM) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
FireEye Endpoint Security (HX) |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1087 - Account Discovery T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
FireEye Helix |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
FireEye Network Security (Helix) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
FireEye Network Security (NX) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Forcepoint CASB |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Forcepoint DLP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Forescout CounterACT |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FortiAuthenticator |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Fortinet Enterprise Firewall |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Fortinet UTM |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Fortinet VPN |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GTBInspector |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Gamma |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Gemalto MFA |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GitHub |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GoAnywhere MFT |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GCP Squid Proxy |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
|
Google Drive |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Aruba Mobility Master |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Aruba Wireless controller |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
HP Comware |
|
T1210 - Exploitation of Remote Services |
|
HP SafeCom |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Print Server |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
HashiCorp Vault |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Powertech Identity Access Manager (BoKs) |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Hornet Email |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Unified Security Gateway |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IBM DB2 |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
IBM Sterling B2B Integrator |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1210 - Exploitation of Remote Services |
|
Infosphere Guardium |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Proventia Network IPS |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ICPAM |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IMSS |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IXIA ThreatArmor |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Illumio |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Imperva SecureSphere |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Imprivata |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Infoblox |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IPswitch MoveIt |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
MoveIt DMZ |
|
T1012 - Query Registry T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1210 - Exploitation of Remote Services T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Johnson Controls P2000 |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Juniper Networks Pulse Secure |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Juniper SRX |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Juniper VPN |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Kaspersky AV |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Kaspersky Endpoint Security for Business |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Kemp LoadMaster |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Load Balancer |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LEAP |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LanScope Cat |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LastPass |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Lastline |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OnGuard |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SSH |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
RemotelyAnywhere |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Lumension |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Lyrix |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Malwarebytes Endpoint Protection |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Malwarebytes Incident Response |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
MasterSAM PAM |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
McAfee DLP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
McAfee Email Protection |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
McAfee Endpoint Security |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1087 - Account Discovery T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
McAfee Enterprise Security Manager |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
McAfee IDPS |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
McAfee NSM |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1087 - Account Discovery T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
McAfee Network Security Platform (IPS) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
McAfee Solidifier |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Skyhigh Networks CASB |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Advanced Threat Analytics (ATA) |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
AppLocker |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Exchange |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Microsoft Advanced Threat Protection |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Microsoft Azure |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1210 - Exploitation of Remote Services T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Microsoft Azure AD Identity Protection |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Microsoft Azure Active Directory |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Microsoft Azure Advanced Threat Protection |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Microsoft Azure Security Center |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1087 - Account Discovery T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
Microsoft Cloud App Security (MCAS) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Microsoft Defender ATP |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Microsoft DirectAccess |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Microsoft Graph |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Microsoft Office 365 |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1210 - Exploitation of Remote Services T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Microsoft OneDrive |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Microsoft ScanMail |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Microsoft Sysmon |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Microsoft Windows |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098 - Account Manipulation T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1210 - Exploitation of Remote Services T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1484 - Group Policy Modification T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Web Application Proxy |
|
T1210 - Exploitation of Remote Services |
|
Windows Defender |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Mimecast Email Security |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
MobileIron |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Morphisec EPTP |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
N3K |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NCP |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NNT ChangeTracker |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Namespace rDirectory |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NetApp |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NetDocs |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Netskope Security Cloud |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Netwrix Auditor |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Nexthink |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
eDirectory |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OSSEC |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ObserveIT |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Okta Adaptive MFA |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Onapsis |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OneLogin |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OpenDJ LDAP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Oracle Access Manager |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Oracle DB |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Oracle Solaris |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Osirium |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cortex XDR |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
GlobalProtect |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Magnifier |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
NGFW |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Palo Alto Aperture |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Traps |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
WildFire |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Password Manager Pro |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Phantom |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Ping Identity |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
PingOne |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
PostgreSQL |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Pro.File DMS |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ObserveIT |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Proofpoint CASB |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Proofpoint DLP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Proofpoint TAP/POD |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Change Auditor |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
RSA |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
RSA DLP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
SecurID |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
RangerAudit |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
InsightVM |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Nexpose |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Ricoh |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SAP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SFTP |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SSL Open VPN |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Data Protection Suite (DPS) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FAM |
|
T1078 - Valid Accounts |
|
IdentityNow |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
SecurityIQ |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Salesforce |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NGAF |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Secure Computing SafeWord |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Secure Envoy |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SecureLink |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SentinelOne |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ServiceNow |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Silverfort |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ClientView |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Snort |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Sonicwall |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Sophos Endpoint Protection |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Sophos SafeGuard |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Splunk Stream |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Swipes |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Swivel |
|
T1003 - OS Credential Dumping T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Sybase |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Symantec Advanced Threat Protection |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Symantec Brightmail |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Symantec CloudSOC |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Symantec Critical System Protection |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation T1210 - Exploitation of Remote Services |
|
Symantec DLP |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1210 - Exploitation of Remote Services |
|
Symantec EDR |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1210 - Exploitation of Remote Services |
|
Symantec Email Security.cloud |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
Symantec Endpoint Protection |
|
T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1087 - Account Discovery T1210 - Exploitation of Remote Services T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
Symantec Managed Security Services |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Symantec VIP |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Symantec WSS |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Endpoint Platform |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Teradata RDBMS |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Thycotic Secret Server |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
TrapX |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Apex One |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Cloud App Security |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Deep Discovery Email Inspector |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Deep Discovery Inspector |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Deep Security Agent |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
OfficeScan |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
TippingPoint NGIPS |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Trend Micro |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Tripwire Enterprise |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SecureTrack |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CCURE Building Management System |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Auditbeat |
|
T1012 - Query Registry T1056.004 - T1056.004 T1070.004 - Indicator Removal on Host: File Deletion T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1547.006 - T1547.006 T1560 - Archive Collected Data |
|
Unix |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1210 - Exploitation of Remote Services T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Unix Auditd |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1210 - Exploitation of Remote Services T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Unix Privilege Management |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Carbon Black |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Carbon Black EDR |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
VMWare ID Manager (VIDM) |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
VMware Carbon Black App Control |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1078 - Valid Accounts T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
VMware Carbon Black Cloud Endpoint Standard |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.002 - Remote Services: SMB/Windows Admin Shares T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
VMware Carbon Black EDR |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
VMware ESXi |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
VMware VCenter |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
VMware View |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Data Security Platform |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Vectra Cognito Detect |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Vormetric |
|
T1003 - OS Credential Dumping T1021.002 - Remote Services: SMB/Windows Admin Shares T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts T1087 - Account Discovery T1098 - Account Manipulation |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Watchguard |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Weblogin |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Xceedium |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Xerox |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Zeek Network Security Monitor |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1210 - Exploitation of Remote Services T1484 - Group Policy Modification |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Zlock |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Zscaler Internet Access |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery |
|
Zscaler Private Access |
|
T1003 - OS Credential Dumping T1012 - Query Registry T1016 - System Network Configuration Discovery T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1047 - Windows Management Instrumentation T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1056.004 - T1056.004 T1057 - Process Discovery T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1068 - Exploitation for Privilege Escalation T1070.004 - Indicator Removal on Host: File Deletion T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1543.003 - Create or Modify System Process: Windows Service T1547.006 - T1547.006 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1560 - Archive Collected Data T1574.002 - Hijack Execution Flow: DLL Side-Loading |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
iManage |
|
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SonarG |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1078 - Valid Accounts T1087 - Account Discovery |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
oVirt |
|
T1021.002 - Remote Services: SMB/Windows Admin Shares T1087 - Account Discovery T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|