Asset Tracking |
None |
None |
Monitor for Updates |
None |
None |
Prohibited Traffic Allowed or Protocol Mismatch |
Proxy, Multi-hop Proxy |
Command And Control |
Router and Infrastructure Security |
Hardware Additions, Automated Exfiltration, Network Denial of Service, Traffic Duplication |
Initial Access |
Splunk Vulnerabilities |
Drive-by Compromise |
Initial Access |
Use of Cleartext Protocols |
None |
None |
Windows Attack Surface Reduction |
Spearphishing Attachment, Spearphishing Link, Command and Scripting Interpreter |
Initial Access |