TECHNIQUES
- Home
- Techniques
- PRE-ATT&CK
- Identify technology usage patterns
Identify technology usage patterns
Technology usage patterns include identifying if users work offsite, connect remotely, or other possibly less restricted/secured access techniques. [1]
ID: T1264
Sub-techniques:
No sub-techniques
Tactic:
Technical Information Gathering
Version: 1.0
Created: 14 December 2017
Last Modified: 17 October 2018
Detection
Detectable by Common Defenses (Yes/No/Partial): No
Explanation: Physical observations, OSINT for remote access instructions, and other techniques are not detectable.
Difficulty for the Adversary
Easy for the Adversary (Yes/No): Yes
Explanation: Determine if users work offsite, connect remotely, or other possibly less restricted/secured access techniques.
References
- Jason Ragland. (2010, January 18). Remotely Accessing Sensitive Resources. Retrieved March 5, 2017.
×