Matrices
Enterprise
Mobile
ICS
Tactics
Enterprise
Mobile
ICS
Techniques
Enterprise
Mobile
ICS
Defenses
Mitigations
Enterprise
Mobile
ICS
Assets
Detections
Detection Strategies
Analytics
Data Components
CTI
Groups
Software
Campaigns
Resources
Get Started
Learn More about ATT&CK
ATT&CKcon
ATT&CK Data & Tools
FAQ
Engage with ATT&CK
Version History
Updates
Legal & Branding
Benefactors
Blog
Search
ATT&CK v18 has been released! Check out the
blog post
or
changelog
for more information.
Home
Data Components
Protected Configuration
Protected Configuration
Device configuration options that are not typically utilized by benign applications
ID:
DC0115
Domains
: Mobile
Version
: 2.0
Created
: 13 March 2023
Last Modified
: 21 October 2025
Log Sources
Name
Channel
Application Vetting
None
Detection Strategy
ID
Name
Technique Detected
DET0623
Detection of Adversary-in-the-Middle
T1638
×
load more results