The sub-techniques beta is now live! Read the release blog post for more info.

Identify technology usage patterns

Technology usage patterns include identifying if users work offsite, connect remotely, or other possibly less restricted/secured access techniques. [1]

ID: T1264
Tactic: Technical Information Gathering
Version: 1.0
Created: 14 December 2017
Last Modified: 17 October 2018

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Physical observations, OSINT for remote access instructions, and other techniques are not detectable.

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: Determine if users work offsite, connect remotely, or other possibly less restricted/secured access techniques.

References

  1. Jason Ragland. (2010, January 18). Remotely Accessing Sensitive Resources. Retrieved March 5, 2017.