Software Deployment Tools

Description

Adversaries may gain access to and use third-party software suites installed within an enterprise network, such as administration, monitoring, and deployment systems, to move laterally through the network. Access to a network-wide or enterprise-wide endpoint management software system may enable an adversary to reach and execute code on all connected systems.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Execution, Lateral Movement

Products Required: Tenable Identity Exposure