| Asset Tracking |
None |
None |
| Monitor for Updates |
None |
None |
| Prohibited Traffic Allowed or Protocol Mismatch |
Proxy, Multi-hop Proxy |
Command And Control |
| Router and Infrastructure Security |
Hardware Additions, Automated Exfiltration, Network Denial of Service, Traffic Duplication |
Initial Access |
| Splunk Vulnerabilities |
Drive-by Compromise |
Initial Access |
| Use of Cleartext Protocols |
None |
None |
| Windows Attack Surface Reduction |
Spearphishing Attachment, Spearphishing Link, Command and Scripting Interpreter |
Initial Access |