Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Administrator or otherwise elevated access may provide better process details. Adversaries may use the information from Process Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
In Windows environments, adversaries could obtain details on running processes using the Tasklist utility via cmd or Get-Process
via PowerShell. Information about processes can also be extracted from the output of Native API calls such as CreateToolhelp32Snapshot
. In Mac and Linux, this is accomplished with the ps
command. Adversaries may also opt to enumerate processes via /proc
.
On network devices, Network Device CLI commands such as show processes
can be used to display current running processes.[1][2]
ID | Name | Description |
---|---|---|
S0065 | 4H RAT |
4H RAT has the capability to obtain a listing of running processes (including loaded modules).[3] |
S0045 | ADVSTORESHELL |
ADVSTORESHELL can list running processes.[4] |
S0331 | Agent Tesla |
Agent Tesla can list the current running processes on the system.[5] |
S1129 | Akira |
Akira verifies the deletion of volume shadow copies by checking for the existence of the process ID related to the process created to delete these items.[6] |
G0138 | Andariel |
Andariel has used |
S1133 | Apostle |
Apostle retrieves a list of all running processes on a victim host, and stops all services containing the string "sql," likely to propagate ransomware activity to database files.[8] |
S0622 | AppleSeed |
AppleSeed can enumerate the current process on a compromised host.[9] |
G0006 | APT1 |
APT1 gathered a list of running processes on the system using |
G0007 | APT28 |
An APT28 loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions.[11] |
G0022 | APT3 |
APT3 has a tool that can list out currently running processes.[12][13] |
G0067 | APT37 |
APT37's Freenki malware lists running processes using the Microsoft Windows API.[14] |
G0082 | APT38 |
APT38 leveraged Sysmon to understand the processes, services in the organization.[15] |
G1023 | APT5 |
APT5 has used Windows-based utilities to carry out tasks including tasklist.exe. [16] |
S0456 | Aria-body |
Aria-body has the ability to enumerate loaded modules for a process.[17]. |
S0373 | Astaroth |
Astaroth searches for different processes on the system.[18] |
S1087 | AsyncRAT |
AsyncRAT can examine running processes to determine if a debugger is present.[19] |
S0640 | Avaddon |
Avaddon has collected information about running processes.[20] |
S0473 | Avenger |
Avenger has the ability to use Tasklist to identify running processes.[21] |
S1053 | AvosLocker |
AvosLocker has discovered system processes by calling |
S0344 | Azorult |
Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot.[23][24] |
S0638 | Babuk |
Babuk has the ability to check running processes on a targeted system.[25][26][27] |
S0414 | BabyShark | |
S0093 | Backdoor.Oldrea |
Backdoor.Oldrea collects information about running processes.[29] |
S0031 | BACKSPACE |
BACKSPACE may collect information about running processes.[30] |
S0606 | Bad Rabbit |
Bad Rabbit can enumerate all running processes to compare hashes.[31] |
S1081 | BADHATCH |
BADHATCH can retrieve a list of running processes from a compromised machine.[32] |
S0239 | Bankshot |
Bankshot identifies processes and collects the process ids.[33] |
S0534 | Bazar |
Bazar can identity the current process on a compromised host.[34] |
S0127 | BBSRAT | |
S0017 | BISCUIT |
BISCUIT has a command to enumerate running processes and identify their owners.[36] |
S0268 | Bisonal |
Bisonal can obtain a list of running processes on the victim’s machine.[37][38][39] |
S0069 | BLACKCOFFEE |
BLACKCOFFEE has the capability to discover processes.[40] |
S0089 | BlackEnergy |
BlackEnergy has gathered a process list by using Tasklist.exe.[41][42][43] |
S0657 | BLUELIGHT |
BLUELIGHT can collect process filenames and SID authority level.[44] |
S0486 | Bonadan |
Bonadan can use the |
S0252 | Brave Prince |
Brave Prince lists the running processes.[46] |
S1063 | Brute Ratel C4 |
Brute Ratel C4 can enumerate all processes and locate specific process IDs (PIDs).[47] |
S1039 | Bumblebee |
Bumblebee can identify processes associated with analytical tools.[48][49][50] |
S0482 | Bundlore | |
C0015 | C0015 |
During C0015, the threat actors used the |
S0693 | CaddyWiper |
CaddyWiper can obtain a list of current processes.[53] |
S0351 | Cannon |
Cannon can obtain a list of processes running on the system.[54][55] |
S0030 | Carbanak | |
S0484 | Carberp | |
S0335 | Carbon | |
S0348 | Cardinal RAT |
Cardinal RAT contains watchdog functionality that ensures its process is always running, else spawns a new instance.[59] |
S0572 | Caterpillar WebShell |
Caterpillar WebShell can gather a list of processes running on the machine.[60] |
S0674 | CharmPower |
CharmPower has the ability to list running processes through the use of |
S0144 | ChChes |
ChChes collects its process identifier (PID) on the victim.[62] |
G0114 | Chimera | |
S1149 | CHIMNEYSWEEP |
CHIMNEYSWEEP can check if a process name contains "creensaver."[64] |
S0660 | Clambling | |
S0611 | Clop |
Clop can enumerate all processes on the victim's machine.[66] |
S1105 | COATHANGER |
COATHANGER will query running process information to determine subsequent program execution flow.[67] |
S0154 | Cobalt Strike |
Cobalt Strike's Beacon payload can collect information on process details.[68][69][70] |
S0244 | Comnie |
Comnie uses the |
S0575 | Conti |
Conti can enumerate through all open processes to search for any that have the string "sql" in their process name.[72] |
S0115 | Crimson | |
S0625 | Cuba |
Cuba can enumerate processes running on a victim's machine.[76] |
S1153 | Cuckoo Stealer |
Cuckoo Stealer can use |
S0687 | Cyclops Blink |
Cyclops Blink can enumerate the process it is currently running under.[78] |
S0497 | Dacls | |
S0334 | DarkComet |
DarkComet can list active processes running on the victim’s machine.[80] |
S1111 | DarkGate |
DarkGate performs various checks for running processes, including security software by looking for hard-coded process name values.[81] |
G0012 | Darkhotel |
Darkhotel malware can collect a list of running processes on a system.[82] |
S1066 | DarkTortilla |
DarkTortilla can enumerate a list of running processes on a compromised system.[83] |
G0009 | Deep Panda |
Deep Panda uses the Microsoft Tasklist utility to list processes running on systems.[84] |
S0021 | Derusbi | |
S0659 | Diavol |
Diavol has used |
S0600 | Doki | |
S0695 | Donut |
Donut includes subprojects that enumerate and identify information about Process Injection candidates.[89] |
S0472 | down_new |
down_new has the ability to list running processes on a compromised host.[21] |
S0694 | DRATzarus |
DRATzarus can enumerate and examine running processes to determine if a debugger is present.[90] |
S0567 | Dtrack | |
S0038 | Duqu |
The discovery modules used with Duqu can collect information on process details.[93] |
S1159 | DUSTTRAP | |
S0062 | DustySky |
DustySky collects information about running processes from victims.[95][96] |
G1006 | Earth Lusca |
Earth Lusca has used Tasklist to obtain information from a compromised host.[97] |
S0605 | EKANS |
EKANS looks for processes from a hard-coded list.[98][99][100] |
S0081 | Elise | |
S0064 | ELMER | |
S0367 | Emotet | |
S0363 | Empire |
Empire can find information about processes running on local and remote systems.[104][105] |
S0091 | Epic |
Epic uses the |
S0396 | EvilBunny |
EvilBunny has used EnumProcesses() to identify how many process are running in the environment.[108] |
S0512 | FatDuke | |
S0267 | FELIXROOT | |
S0355 | Final1stspy |
Final1stspy obtains a list of running processes.[111] |
S0182 | FinFisher |
FinFisher checks its parent process for indications that it is running in a sandbox setup.[112][113] |
S0696 | Flagpro |
Flagpro has been used to run the |
S0661 | FoggyWeb |
FoggyWeb's loader can enumerate all Common Language Runtimes (CLRs) and running Application Domains in the compromised AD FS server's |
S0503 | FrameworkPOS |
FrameworkPOS can enumerate and exclude selected processes on a compromised host to speed execution of memory scraping.[116] |
C0001 | Frankenstein |
During Frankenstein, the threat actors used Empire to obtain a list of all running processes.[105] |
S0277 | FruitFly |
FruitFly has the ability to list processes on the system.[117] |
S1044 | FunnyDream |
FunnyDream has the ability to discover processes, including |
C0007 | FunnyDream |
During FunnyDream, the threat actors used Tasklist on targeted systems.[118] |
S0410 | Fysbis |
Fysbis can collect information about running processes.[119] |
G0047 | Gamaredon Group |
Gamaredon Group has used tools to enumerate processes on target hosts including Process Explorer.[120][121] |
S0666 | Gelsemium | |
S0049 | GeminiDuke |
GeminiDuke collects information on running processes and environment variables from the victim.[123] |
S0460 | Get2 |
Get2 has the ability to identify running processes on an infected host.[124] |
S0032 | gh0st RAT | |
S0249 | Gold Dragon |
Gold Dragon checks the running processes on the victim’s machine.[46] |
S0477 | Goopy |
Goopy has checked for the Google Updater process to ensure Goopy was loaded properly.[126] |
S0531 | Grandoreiro |
Grandoreiro can identify installed security tools based on process names.[127] |
S0237 | GravityRAT |
GravityRAT lists the running processes on the system.[128] |
G0125 | HAFNIUM | |
S0151 | HALFBAKED |
HALFBAKED can obtain information about running processes on the victim.[130] |
S0617 | HELLOKITTY |
HELLOKITTY can search for specific processes to terminate.[131] |
S0170 | Helminth |
Helminth has used Tasklist to get information on processes.[11] |
G1001 | HEXANE | |
S1027 | Heyoka Backdoor |
Heyoka Backdoor can gather process information.[133] |
G0126 | Higaisa |
Higaisa’s shellcode attempted to find the process ID of the current process.[134] |
S0431 | HotCroissant |
HotCroissant has the ability to list running processes on the infected host.[135] |
S0203 | Hydraq |
Hydraq creates a backdoor through which remote attackers can monitor processes.[136][137] |
S0278 | iKitten | |
S0434 | Imminent Monitor |
Imminent Monitor has a "Process Watcher" feature to monitor processes in case the client ever crashes or gets closed.[138] |
S1139 | INC Ransomware |
INC Ransomware can use the Microsoft Win32 Restart Manager to kill processes with a specific handle or that are accessing resources it wants to encrypt.[139] |
G0100 | Inception |
Inception has used a reconnaissance module to identify active processes and other associated loaded modules.[140] |
S1072 | Industroyer2 |
Industroyer2 has the ability to cyclically enumerate running processes such as PServiceControl.exe, PService_PDD.exe, and other targets supplied through a hardcoded configuration.[141] |
S0260 | InvisiMole |
InvisiMole can obtain a list of running processes.[142][143] |
S1132 | IPsec Helper |
IPsec Helper can identify the process it is currently running under and its number, and pass this back to a command and control node.[8] |
S0581 | IronNetInjector |
IronNetInjector can identify processes via C# methods such as |
S0015 | Ixeshe | |
S0528 | Javali |
Javali can monitor processes for open browsers and custom banking applications.[146] |
S0044 | JHUHUGIT |
JHUHUGIT obtains a list of running processes on the victim.[147][148] |
S0201 | JPIN | |
S0283 | jRAT | |
S0088 | Kasidet |
Kasidet has the ability to search for a given process name in processes currently running in the system.[151] |
S0265 | Kazuar |
Kazuar obtains a list of running processes through WMI querying and the |
G0004 | Ke3chang |
Ke3chang performs process discovery using |
S0271 | KEYMARBLE |
KEYMARBLE can obtain a list of running processes on the system.[155] |
S0607 | KillDisk | |
G0094 | Kimsuky |
Kimsuky can gather a list of all processes running on a victim's machine.[157] |
S0599 | Kinsing | |
S0162 | Komplex |
The OsInfo function in Komplex collects a running process list.[159] |
S0356 | KONNI |
KONNI has used the command |
S1075 | KOPILUWAK |
KOPILUWAK can enumerate current running processes on the targeted machine.[162] |
C0035 | KV Botnet Activity |
Scripts associated with KV Botnet Activity initial deployment can identify processes related to security tools and other botnet families for follow-on disabling during installation.[163] |
S0236 | Kwampirs |
Kwampirs collects a list of running services with the command |
S1160 | Latrodectus |
Latrodectus can enumerate running processes including process grandchildren on targeted hosts.[165][166][167] |
G0032 | Lazarus Group |
Several Lazarus Group malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by Lazarus Group also gathers process times.[168][169][170][171][79][172] |
S0211 | Linfo |
Linfo creates a backdoor through which remote attackers can retrieve a list of running processes.[173] |
S0681 | Lizar |
Lizar has a plugin designed to obtain a list of processes.[174][175] |
S0582 | LookBack | |
S0451 | LoudMiner |
LoudMiner used the |
S0532 | Lucifer |
Lucifer can identify the process that owns remote connections.[178] |
S1141 | LunarWeb |
LunarWeb has used shell commands to list running processes.[179] |
S0409 | Machete |
Machete has a component to check for running processes to look for web browsers.[180] |
S1016 | MacMa | |
S1048 | macOS.OSAMiner |
macOS.OSAMiner has used |
S1060 | Mafalda | |
G0059 | Magic Hound |
Magic Hound malware can list running processes.[184] |
S0652 | MarkiRAT |
MarkiRAT can search for different processes on a system.[185] |
S0449 | Maze | |
S1059 | metaMain |
metaMain can enumerate the processes that run on the platform.[183][187] |
S0455 | Metamorfo |
Metamorfo has performed process name checks and has monitored applications.[188] |
S0688 | Meteor |
Meteor can check if a specific process is running, such as Kaspersky's |
S1146 | MgBot |
MgBot includes a module for establishing a process watchdog for itself, identifying if the MgBot process is still running.[190] |
S1122 | Mispadu |
Mispadu can enumerate the running processes on a compromised host.[191] |
S0079 | MobileOrder |
MobileOrder has a command to upload information about all running processes to its C2 server.[192] |
G0021 | Molerats |
Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.[95] |
S0149 | MoonWind |
MoonWind has a command to return a list of running processes.[193] |
S0256 | Mosquito | |
G0069 | MuddyWater |
MuddyWater has used malware to obtain a list of running processes on the system.[195][196] |
G0129 | Mustang Panda |
Mustang Panda has used |
S0247 | NavRAT | |
S0630 | Nebulae | |
S0034 | NETEAGLE | |
S0198 | NETWIRE | |
S1090 | NightClub |
NightClub has the ability to use |
S1147 | Nightdoor |
Nightdoor can collect information on installed applications via Windows registry keys, as well as collecting information on running processes.[202] |
S1100 | Ninja | |
S0385 | njRAT |
njRAT can search a list of running processes for Tr.exe.[205] |
S1107 | NKAbuse |
NKAbuse will check victim systems to ensure only one copy of the malware is running.[206] |
S0644 | ObliqueRAT |
ObliqueRAT can check for blocklisted process names on a compromised host.[207] |
S0346 | OceanSalt |
OceanSalt can collect the name and ID for every process running on the system.[208] |
G0049 | OilRig | |
C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors used the |
C0006 | Operation Honeybee |
During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using |
C0014 | Operation Wocao |
During Operation Wocao, the threat actors used |
S0229 | Orz | |
S1017 | OutSteel |
OutSteel can identify running processes on a compromised host.[214] |
S0626 | P8RAT |
P8RAT can check for specific processes associated with virtual environments.[215] |
S0664 | Pandora | |
S0208 | Pasam |
Pasam creates a backdoor through which remote attackers can retrieve lists of running processes.[217] |
S1050 | PcShare |
PcShare can obtain a list of running processes on a compromised host.[118] |
S0517 | Pillowmint |
Pillowmint can iterate through running processes every six seconds collecting a list of processes to capture from later.[218] |
S0501 | PipeMon |
PipeMon can iterate over the running processes to find a suitable injection target.[219] |
S0254 | PLAINTEE |
PLAINTEE performs the |
G1040 | Play |
Play has used the information stealer Grixba to check for a list of security processes.[221] |
S0435 | PLEAD |
PLEAD has the ability to list processes on the compromised host.[222] |
S0013 | PlugX |
PlugX has a module to list the processes running on a machine.[223] |
S0428 | PoetRAT | |
S0216 | POORAIM | |
G0033 | Poseidon Group |
After compromising a victim, Poseidon Group lists all running processes.[226] |
S0139 | PowerDuke |
PowerDuke has a command to list the victim's processes.[227] |
S0441 | PowerShower |
PowerShower has the ability to deploy a reconnaissance module to retrieve a list of the active processes.[228] |
S0194 | PowerSploit |
PowerSploit's |
S0393 | PowerStallion |
PowerStallion has been used to monitor process lists.[231] |
S0223 | POWERSTATS |
POWERSTATS has used |
S0184 | POWRUNER |
POWRUNER may collect process information by running |
S0238 | Proxysvc | |
S0192 | Pupy |
Pupy can list the running processes and get the process ID and parent process’s ID.[234] |
S0650 | QakBot | |
S0629 | RainyDay | |
S0458 | Ramsay |
Ramsay can gather a list of running processes by using Tasklist.[236] |
S1130 | Raspberry Robin |
Raspberry Robin can identify processes running on the victim machine, such as security software, during execution.[237][238] |
S0241 | RATANKBA | |
S0662 | RCSession | |
S0125 | Remsec | |
S0448 | Rising Sun |
Rising Sun can enumerate all running processes and process information on an infected machine.[243] |
G0106 | Rocke |
Rocke can detect a running process's PID on the infected machine.[244] |
S0270 | RogueRobin |
RogueRobin checks the running processes for evidence it may be running in a sandbox environment. It specifically enumerates processes for Wireshark and Sysinternals.[245] |
S0240 | ROKRAT |
ROKRAT can list the current running processes on the system.[246][247] |
S1078 | RotaJakiro |
RotaJakiro can monitor the |
S1073 | Royal |
Royal can use |
S0148 | RTM |
RTM can obtain information about process integrity levels.[250] |
S0446 | Ryuk |
Ryuk has called |
S1018 | Saint Bot |
Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process name |
S1085 | Sardonic |
Sardonic has the ability to execute the |
S0461 | SDBbot |
SDBbot can enumerate a list of running processes on a compromised machine.[253] |
S0345 | Seasalt | |
S0596 | ShadowPad |
ShadowPad has collected the PID of a malicious process.[254] |
S0445 | ShimRatReporter |
ShimRatReporter listed all running processes on the machine.[255] |
S0063 | SHOTPUT | |
G0121 | Sidewinder |
Sidewinder has used tools to identify running processes on the victim's machine.[257] |
S0692 | SILENTTRINITY |
SILENTTRINITY can enumerate processes, including properties to determine if they have the Common Language Runtime (CLR) loaded.[258] |
S0468 | Skidmap |
Skidmap has monitored critical processes to ensure resiliency.[259] |
S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has enumerated processes by ID, name, or privileges.[260] |
S1124 | SocGholish |
SocGholish can list processes on targeted hosts.[261] |
S0273 | Socksbot | |
S0627 | SodaMaster |
SodaMaster can search a list of running processes.[215] |
C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 used multiple command-line utilities to enumerate running processes.[263][264][265] |
S0615 | SombRAT |
SombRAT can use the |
S0516 | SoreFang |
SoreFang can enumerate processes on a victim machine through use of Tasklist.[268] |
G0038 | Stealth Falcon |
Stealth Falcon malware gathers a list of running processes.[269] |
S0142 | StreamEx | |
S0491 | StrongPity |
StrongPity can determine if a user is logged in by checking to see if explorer.exe is running.[271] |
S0559 | SUNBURST |
SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.[272] |
S0562 | SUNSPOT |
SUNSPOT monitored running processes for instances of |
S1064 | SVCReady |
SVCReady can collect a list of running processes from an infected host.[274] |
S0018 | Sykipot |
Sykipot may gather a list of running processes by running |
S0242 | SynAck | |
S0464 | SYSCON |
SYSCON has the ability to use Tasklist to list running processes.[278] |
S0663 | SysUpdate |
SysUpdate can collect information about running processes.[279] |
S0011 | Taidoor |
Taidoor can use |
S0586 | TAINTEDSCRIBE |
TAINTEDSCRIBE can execute |
S0467 | TajMahal |
TajMahal has the ability to identify running processes and associated plugins on an infected host.[282] |
S0057 | Tasklist |
Tasklist can be used to discover processes running on a system.[283] |
G0139 | TeamTNT |
TeamTNT has searched for rival malware and removes it if found.[284] TeamTNT has also searched for running processes containing the strings aliyun or liyun to identify machines running Alibaba Cloud Security tools.[285] |
S0595 | ThiefQuest |
ThiefQuest obtains a list of running processes using the function |
G1022 | ToddyCat |
ToddyCat has run |
S0266 | TrickBot |
TrickBot uses module networkDll for process list discovery.[287][288] |
S0094 | Trojan.Karagany |
Trojan.Karagany can use Tasklist to collect a list of running tasks.[29][289] |
G0081 | Tropic Trooper |
Tropic Trooper is capable of enumerating the running processes on the system using |
S0436 | TSCookie |
TSCookie has the ability to list processes on the infected host.[292] |
G0010 | Turla |
Turla surveys a system upon check-in to discover running processes using the |
S0333 | UBoatRAT | |
S0022 | Uroburos |
Uroburos can use its |
S0386 | Ursnif |
Ursnif has gathered information about running processes.[295][296] |
S0452 | USBferry |
USBferry can use |
S0476 | Valak |
Valak has the ability to enumerate running processes on a compromised host.[297] |
S0257 | VERMIN |
VERMIN can get a list of the processes and running tasks on the system.[298] |
S0180 | Volgmer | |
G1017 | Volt Typhoon |
Volt Typhoon has enumerated running processes on targeted systems including through the use of Tasklist.[300][301][302] |
S0670 | WarzoneRAT |
WarzoneRAT can obtain a list of processes on a compromised host.[303] |
S0579 | Waterbear |
Waterbear can identify the process for a specific security product.[304] |
G0112 | Windshift |
Windshift has used malware to enumerate active processes.[305] |
S0219 | WINERACK | |
S0059 | WinMM |
WinMM sets a WH_CBT Windows hook to collect information on process creation.[306] |
S0141 | Winnti for Windows |
Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.[307] |
G0044 | Winnti Group |
Winnti Group looked for a specific process running on infected servers.[308] |
S1065 | Woody RAT |
Woody RAT can call |
S0161 | XAgentOSX |
XAgentOSX contains the getProcessList function to run |
S0248 | yty |
yty gets an output of running processes using the |
S0251 | Zebrocy |
Zebrocy uses the |
S0330 | Zeus Panda |
Zeus Panda checks for running processes on the victim’s machine.[315] |
S1114 | ZIPLINE |
ZIPLINE can identify running processes and their names.[316] |
S0672 | Zox | |
S0412 | ZxShell |
ZxShell has a command, ps, to obtain a listing of processes on the system.[318] |
S1013 | ZxxZ |
ZxxZ has created a snapshot of running processes using |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments for actions that may attempt to get information about running processes on a system. |
DS0009 | Process | OS API Execution |
Monitor for API calls may attempt to get information about running processes on a system. |
Process Creation |
Monitor for newly executed processes that may attempt to get information about running processes on a system. To be effective in deciphering malicious and benign activity, the full command line is essential. Similarly, having information about the parent process can help with making decisions and tuning to an environment. Because these commands are built in, they may be run frequently by power users or even by normal users. Thus, an analytic looking at this information should have well-defined white- or blacklists, and should consider looking at an anomaly detection approach, so that this information can be learned dynamically.Within the built-in Windows Commands:
Analytic 1 - Host Discovery Commands
|