Windows Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Windows platform. The techniques below are known to target hosts running Microsoft Windows operating systems. The Matrix contains information for the Windows platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
10 techniques 10 techniques 19 techniques 14 techniques 35 techniques 16 techniques 27 techniques 9 techniques 15 techniques 18 techniques 8 techniques 14 techniques
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
10 techniques 10 techniques 19 techniques 14 techniques 35 techniques 16 techniques 27 techniques 9 techniques 15 techniques 18 techniques 8 techniques 14 techniques