Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain.

Tactics
TA0004 TA0005

Sub-technique of
T1484


See: MITRE ATT&CK