Defense Evasion
The defense evasion tactic consists of techniques that are used by attackers to avoid detection and hide their malicious activity.
| ID | Name |
|---|---|
| MS-T813 | Firewall and virtual networks configuration changes |
| MS-T808 | Role-based access control permission |
| MS-T841 | Storage data clone |
| MS-T831 | Data transfer size limits |
| MS-T832 | Automated exfiltration |
| MS-T810 | Disable audit logs |
| MS-T811 | Disable cloud workload protection |
| MS-T812 | Private endpoint |
| MS-T833 | Operations across geo replicas |