Remove or deny access to unnecessary and potentially vulnerable software to prevent abuse by adversaries.
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1557 | 中间人攻击 |
Disable legacy network protocols that may be used to intercept network traffic if applicable, especially those that are not needed within an environment. |
|
| .001 | LLMNR/NBT-NS Poisoning and SMB Relay |
Disable LLMNR and NetBIOS in local computer security settings or by group policy if they are not needed within an environment. [1] |
||
| .002 | ARP Cache Poisoning |
Consider disabling updating the ARP cache on gratuitous ARP replies. |
||
| Enterprise | T1595 | .003 | 主动扫描: Wordlist Scanning |
Remove or disable access to any systems, resources, and infrastructure that are not explicitly required to be available externally. |
| Enterprise | T1546 | .002 | 事件触发执行: Screensaver |
Use Group Policy to disable screensavers if they are unnecessary.[2] |
| .014 | 事件触发执行: Emond |
Consider disabling emond by removing the Launch Daemon plist file. |
||
| Enterprise | T1555 | .004 | 从密码存储中获取凭证: Windows Credential Manager |
Consider enabling the "Network access: Do not allow storage of passwords and credentials for network authentication" setting that will prevent network credentials from being stored by the Credential Manager.[3] |
| Enterprise | T1137 | 办公应用启动 |
Follow Office macro security best practices suitable for your environment. Disable Office VBA macros from executing. Disable Office add-ins. If they are required, follow best practices for securing them by requiring them to be signed and disabling user notification for allowing add-ins. For some add-ins types (WLL, VBA) additional mitigation is likely required as disabling add-ins in the Office Trust Center does not disable WLL nor does it prevent VBA code from executing. [4] |
|
| .001 | Office Template Macros |
Follow Office macro security best practices suitable for your environment. Disable Office VBA macros from executing. Disable Office add-ins. If they are required, follow best practices for securing them by requiring them to be signed and disabling user notification for allowing add-ins. For some add-ins types (WLL, VBA) additional mitigation is likely required as disabling add-ins in the Office Trust Center does not disable WLL nor does it prevent VBA code from executing. [4] |
||
| Enterprise | T1127 | 可信开发者工具代理执行 |
Specific developer utilities may not be necessary within a given environment and should be removed if not used. |
|
| .001 | MSBuild |
MSBuild.exe may not be necessary within an environment and should be removed if not being used. |
||
| .002 | ClickOnce |
Disable ClickOnce installations from the internet using the following registry key: ClickOnce may not be necessary within an environment and should be disabled if not being used. |
||
| Enterprise | T1547 | .007 | 启动或登录自动启动执行: Re-opened Applications |
This feature can be disabled entirely with the following terminal command: |
| Enterprise | T1059 | 命令与脚本解释器 |
Disable or remove any unnecessary or unused shells or interpreters. |
|
| .001 | PowerShell |
It may be possible to remove PowerShell from systems when not needed, but a review should be performed to assess the impact to an environment, since it could be in use for many legitimate purposes and administrative functions. Disable/restrict the WinRM Service to help prevent uses of PowerShell for remote execution. |
||
| .005 | Visual Basic |
Turn off or restrict access to unneeded VB components. |
||
| .007 | JavaScript |
Turn off or restrict access to unneeded scripting components. |
||
| Enterprise | T1133 | 外部远程服务 |
Disable or block remotely available services that may be unnecessary. |
|
| Enterprise | T1562 | .010 | 妨碍防御: Downgrade Attack |
Consider removing previous versions of tools that are unnecessary to the environment when possible. |
| Enterprise | T1609 | 容器管理命令 |
Remove unnecessary tools and software from containers. |
|
| Enterprise | T1505 | 服务器软件组件 |
Consider disabling software components from servers when possible to prevent abuse by adversaries.[7] |
|
| .003 | Web Shell |
Consider disabling functions from web technologies such as PHP’s |
||
| Enterprise | T1552 | .005 | 未加密凭证: Cloud Instance Metadata API |
Disable unnecessary metadata services and restrict or disable insecure versions of metadata services that are in use to prevent adversary access.[8] |
| Enterprise | T1221 | 模板注入 |
Consider disabling Microsoft Office macros/active content to prevent the execution of malicious payloads in documents [9], though this setting may not mitigate the Forced Authentication use for this technique. |
|
| Enterprise | T1205 | 流量激活 |
Disable Wake-on-LAN if it is not needed within an environment. |
|
| Enterprise | T1114 | .003 | 电子邮件收集: Email Forwarding Rule |
Consider disabling external email forwarding.[10] |
| Enterprise | T1649 | 窃取或伪造身份认证证书 |
Consider disabling old/dangerous authentication protocols (e.g. NTLM), as well as unnecessary certificate features, such as potentially vulnerable AD CS web and other enrollment server roles.[11] |
|
| Enterprise | T1218 | 系统二进制代理执行 |
Many native binaries may not be necessary within a given environment. |
|
| .003 | CMSTP |
CMSTP.exe may not be necessary within a given environment (unless using it for VPN connection installation). |
||
| .004 | InstallUtil |
InstallUtil may not be necessary within a given environment. |
||
| .005 | Mshta |
Mshta.exe may not be necessary within a given environment since its functionality is tied to older versions of Internet Explorer that have reached end of life. |
||
| .007 | Msiexec |
Consider disabling the |
||
| .008 | Odbcconf |
Odbcconf.exe may not be necessary within a given environment. |
||
| .009 | Regsvcs/Regasm |
Regsvcs and Regasm may not be necessary within a given environment. |
||
| .012 | Verclsid |
Consider removing verclsid.exe if it is not necessary within a given environment. |
||
| .013 | Mavinject |
Consider removing mavinject.exe if Microsoft App-V is not used within a given environment. |
||
| .014 | MMC |
MMC may not be necessary within a given environment since it is primarily used by system administrators, not regular users or clients. |
||
| .015 | Electron Applications |
Remove or deny access to unnecessary and potentially vulnerable software and features to prevent abuse by adversaries. Many native binaries may not be necessary within a given environment: for example, consider disabling the Node.js integration in all renderers that display remote content to protect users by limiting adversaries’ power to plant malicious JavaScript within Electron applications.[13] |
||
| Enterprise | T1046 | 网络服务发现 |
Ensure that unnecessary ports and services are closed to prevent risk of discovery and potential exploitation. |
|
| Enterprise | T1098 | 账号操控 |
Remove unnecessary and potentially abusable authentication and authorization mechanisms where possible. |
|
| .001 | Additional Cloud Credentials |
Remove unnecessary and potentially abusable authentication mechanisms where possible. For example, in Entra ID environments, disable the app password feature unless explicitly required. |
||
| .002 | Additional Email Delegate Permissions |
If email delegation is not required, disable it. In Google Workspace this can be accomplished through the Google Admin console.[14] |
||
| .004 | SSH Authorized Keys |
Disable SSH if it is not necessary on a host or restrict SSH access for specific users/groups using |
||
| Enterprise | T1559 | 进程间通信 |
Registry keys specific to Microsoft Office feature control security can be set to disable automatic DDE/OLE execution. [15][16][17] Microsoft also created, and enabled by default, Registry keys to completely disable DDE execution in Word and Excel.[18] |
|
| .002 | Dynamic Data Exchange |
Registry keys specific to Microsoft Office feature control security can be set to disable automatic DDE/OLE execution. [15][16][17] Microsoft also created, and enabled by default, Registry keys to completely disable DDE execution in Word and Excel.[18] |
||
| Enterprise | T1021 | 远程服务 |
If remote services, such as the ability to make direct connections to cloud virtual machines, are not required, disable these connection types where feasible. |
|
| .001 | Remote Desktop Protocol |
Disable the RDP service if it is unnecessary. |
||
| .003 | Distributed Component Object Model |
Consider disabling DCOM through Dcomcnfg.exe.[19] |
||
| .004 | SSH |
Disable the SSH daemon on systems that do not require it. For macOS ensure Remote Login is disabled under Sharing Preferences.[20] |
||
| .005 | VNC |
Uninstall any VNC server software where not required. |
||
| .006 | Windows Remote Management |
Disable the WinRM service. |
||
| .008 | Direct Cloud VM Connections |
If direct virtual machine connections are not required for administrative use, disable these connection types where feasible. |
||
| Enterprise | T1563 | 远程服务会话劫持 |
Disable the remote service (ex: SSH, RDP, etc.) if it is unnecessary. |
|
| .001 | SSH Hijacking |
Ensure that agent forwarding is disabled on systems that do not explicitly require this feature to prevent misuse. [21] |
||
| .002 | RDP Hijacking |
Disable the RDP service if it is unnecessary. |
||
| Enterprise | T1210 | 远程服务漏洞利用 |
Minimize available services to only those that are necessary. |
|
| Enterprise | T1219 | 远程访问软件 |
Consider disabling unnecessary remote connection functionality, including both unapproved software installations and specific features built into supported applications. |
|
| Enterprise | T1611 | 逃逸至主机 |
Remove unnecessary tools and software from containers. |
|
| Enterprise | T1011 | 通过其他网络介质渗出 |
Disable WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel in local computer security settings or by group policy if it is not needed within an environment. |
|
| .001 | Exfiltration Over Bluetooth |
Disable Bluetooth in local computer security settings or by group policy if it is not needed within an environment. |
||
| Enterprise | T1091 | 通过可移动媒体复制 |
Disable Autorun if it is unnecessary. [22] Disallow or restrict removable media at an organizational policy level if it is not required for business operations. [23] |
|
| Enterprise | T1092 | 通过可移动媒体通信 |
Disable Autoruns if it is unnecessary.[22] |
|
| Enterprise | T1052 | 通过物理介质渗出 |
Disable Autorun if it is unnecessary. [22] Disallow or restrict removable media at an organizational policy level if they are not required for business operations. [23] |
|
| .001 | Exfiltration over USB |
Disable Autorun if it is unnecessary. [22] Disallow or restrict removable media at an organizational policy level if they are not required for business operations. [23] |
||
| Enterprise | T1564 | .006 | 隐藏伪装: Run Virtual Instance |
Disable Hyper-V if not necessary within a given environment. |
| .007 | 隐藏伪装: VBA Stomping |
Turn off or restrict access to unneeded VB components.[24] |
||
| Enterprise | T1553 | .005 | 颠覆信任控制: Mark-of-the-Web Bypass |
Consider disabling auto-mounting of disk image files (i.e., .iso, .img, .vhd, and .vhdx). This can be achieved by modifying the Registry values related to the Windows Explorer file associations in order to disable the automatic Explorer "Mount and Burn" dialog for these file extensions. Note: this will not deactivate the mount functionality itself.[25] |