Defense Evasion
The defense evasion tactic consists of techniques that are used by attackers to avoid detection and hide their malicious activity.
| ID | Name | 
|---|---|
| MS-T813 | Firewall and virtual networks configuration changes | 
| MS-T808 | Role-based access control permission | 
| MS-T841 | Storage data clone | 
| MS-T831 | Data transfer size limits | 
| MS-T832 | Automated exfiltration | 
| MS-T810 | Disable audit logs | 
| MS-T811 | Disable cloud workload protection | 
| MS-T812 | Private endpoint | 
| MS-T833 | Operations across geo replicas |