Defense Evasion
The defense evasion tactic consists of techniques that are used by attackers to avoid detection and hide their malicious activity.
ID | Name |
---|---|
MS-T813 | Firewall and virtual networks configuration changes |
MS-T808 | Role-based access control permission |
MS-T841 | Storage data clone |
MS-T831 | Data transfer size limits |
MS-T832 | Automated exfiltration |
MS-T810 | Disable audit logs |
MS-T811 | Disable cloud workload protection |
MS-T812 | Private endpoint |
MS-T833 | Operations across geo replicas |