Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain.
Sub-technique of
T1484
See: MITRE ATT&CK
Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain.
Sub-technique of
T1484
See: MITRE ATT&CK
1 item with this tag.