T1069 Permission Groups Discovery Mappings

Adversaries may attempt to find group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of users in particular groups, and which users and groups have elevated permissions.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
azure_defender_for_resource_manager Azure Defender for Resource Manager technique_scores T1069 Permission Groups Discovery
Comments
This control may alert on Azure domain cloud groups discovery activity but may not provide alerts for other account types or undocumented exploitation toolkits. Consequently, its Coverage score is Minimal resulting in an overall Minimal score.
References
azure_sentinel Azure Sentinel technique_scores T1069 Permission Groups Discovery
Comments
This control provides minimal coverage for one of this technique's sub-techniques and only minimal coverage for its procedure examples, resulting in an overall score of Minimal.
References
microsoft_defender_for_identity Microsoft Defender for Identity technique_scores T1069 Permission Groups Discovery
Comments
This control provides significant detection for one of this technique's sub-techniques, while not providing any detection for the remaining, resulting in a Minimal score.
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1069.003 Cloud Groups 1
T1069.002 Domain Groups 2
T1069.001 Local Groups 1