KillChainIntent Struct
Definition
Important
Some information relates to prerelease product that may be substantially modified before it’s released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents.
public readonly struct KillChainIntent : IEquatable<Azure.ResourceManager.SecurityCenter.Models.KillChainIntent>
type KillChainIntent = struct
Public Structure KillChainIntent
Implements IEquatable(Of KillChainIntent)
- Inheritance
-
KillChainIntent
- Implements
Constructors
KillChainIntent(String) |
Initializes a new instance of KillChainIntent. |
Properties
Collection |
Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. |
CommandAndControl |
The command and control tactic represents how adversaries communicate with systems under their control within a target network. |
CredentialAccess |
Credential access represents techniques resulting in access to or control over system, domain, or service credentials that are used within an enterprise environment. |
DefenseEvasion |
Defense evasion consists of techniques an adversary may use to evade detection or avoid other defenses. |
Discovery |
Discovery consists of techniques that allow the adversary to gain knowledge about the system and internal network. |
Execution |
The execution tactic represents techniques that result in execution of adversary-controlled code on a local or remote system. |
Exfiltration |
Exfiltration refers to techniques and attributes that result or aid in the adversary removing files and information from a target network. |
Exploitation |
Exploitation is the stage where an attacker manages to get a foothold on the attacked resource. This stage is relevant for compute hosts and resources such as user accounts, certificates etc. |
Impact |
Impact events primarily try to directly reduce the availability or integrity of a system, service, or network; including manipulation of data to impact a business or operational process. |
InitialAccess |
InitialAccess is the stage where an attacker manages to get foothold on the attacked resource. |
LateralMovement |
Lateral movement consists of techniques that enable an adversary to access and control remote systems on a network and could, but does not necessarily, include execution of tools on remote systems. |
Persistence |
Persistence is any access, action, or configuration change to a system that gives a threat actor a persistent presence on that system. |
PreAttack |
PreAttack could be either an attempt to access a certain resource regardless of a malicious intent, or a failed attempt to gain access to a target system to gather information prior to exploitation. This step is usually detected as an attempt, originating from outside the network, to scan the target system and find a way in. Further details on the PreAttack stage can be read in MITRE Pre-Att&ck matrix. |
PrivilegeEscalation |
Privilege escalation is the result of actions that allow an adversary to obtain a higher level of permissions on a system or network. |
Probing |
Probing could be either an attempt to access a certain resource regardless of a malicious intent, or a failed attempt to gain access to a target system to gather information prior to exploitation. |
Unknown |
Unknown. |
Methods
Equals(KillChainIntent) |
Indicates whether the current object is equal to another object of the same type. |
ToString() |
Returns the fully qualified type name of this instance. |
Operators
Equality(KillChainIntent, KillChainIntent) |
Determines if two KillChainIntent values are the same. |
Implicit(String to KillChainIntent) |
Converts a string to a KillChainIntent. |
Inequality(KillChainIntent, KillChainIntent) |
Determines if two KillChainIntent values are not the same. |