Skip to content

Defense Evasion

The defense evasion tactic consists of techniques that are used by attackers to avoid detection and hide their malicious activity.

ID Name
MS-T813 Firewall and virtual networks configuration changes
MS-T808 Role-based access control permission
MS-T841 Storage data clone
MS-T831 Data transfer size limits
MS-T832 Automated exfiltration
MS-T810 Disable audit logs
MS-T811 Disable cloud workload protection
MS-T812 Private endpoint
MS-T833 Operations across geo replicas