File tree 3 files changed +3
-3
lines changed
3 files changed +3
-3
lines changed Original file line number Diff line number Diff line change 10
10
Refer to NIST guidelines when creating password policies."
11
11
category : " Credential Access"
12
12
tactic : " Brute Force: Password Guessing"
13
- dataTypes : ["sample-data"]
13
+ dataTypes : ["sample-data", "generic" ]
14
14
reference :
15
15
- " https://attack.mitre.org/tactics/TA0006"
16
16
- " https://attack.mitre.org/techniques/T1110/001/"
Original file line number Diff line number Diff line change 13
13
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
14
14
category : " Defense Evasion"
15
15
tactic : " Clear Windows Event Logs"
16
- dataTypes : ["sample-data"]
16
+ dataTypes : ["sample-data", "generic" ]
17
17
reference :
18
18
- " https://attack.mitre.org/tactics/TA0005/"
19
19
- " https://attack.mitre.org/techniques/T1070/001/"
Original file line number Diff line number Diff line change 13
13
expected. Exceptions can be added to this rule to filter expected behavior."
14
14
category : " Transfer Data to Cloud Account"
15
15
tactic : " Exfiltration"
16
- dataTypes : ["sample-data"]
16
+ dataTypes : ["sample-data", "generic" ]
17
17
reference :
18
18
- " https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules"
19
19
- " https://attack.mitre.org/techniques/T1537/"
You can’t perform that action at this time.
0 commit comments