Esc
Evict
Definition
The eviction tactic is used to remove an adversary from a computer network.
Techniques
There are 12 techniques in this category, Evict.
Name | ID | Definition | Synonyms |
---|---|---|---|
Credential Eviction | D3-CE | Credential Eviction techniques disable or remove compromised credentials from a computer network. | |
- Account Locking | D3-AL | The process of temporarily disabling user accounts on a system or domain. | |
- Authentication Cache Invalidation | D3-ANCI | Removing tokens or credentials from an authentication cache to prevent further user associated account accesses. | |
- Credential Revoking | D3-CR | Deleting a set of credentials permanently to prevent them from being used to authenticate. | |
File Eviction | D3-FEV | File eviction techniques evict files from system storage. | |
- File Removal | D3-FR | The file removal technique deletes malicious artifacts or programs from a computer system. | File Deletion |
- Email Removal | D3-ER | The email removal technique deletes email files from system storage. | Email Deletion |
Process Eviction | D3-PE | Process eviction techniques terminate or remove running process. | |
- Process Suspension | D3-PS | Suspending a running process on a computer system. | |
- Process Termination | D3-PT | Terminating a running application process on a computer system. | |
- Host Shutdown | D3-HS | Initiating a host's shutdown sequence to terminate all running processes. | |
- Host Reboot | D3-HR | Initiating a host's reboot sequence to terminate all running processes. |
D3FEND™
A knowledge graph of cybersecurity countermeasures