Esc
Restore Configuration
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, .
Privilege Escalation
Abuse Elevation Control Mechanism
Boot or Logon Autostart Execution
Access Token Manipulation
Boot or Logon Initialization Scripts
Event Triggered Execution
Hijack Execution Flow
Domain or Tenant Policy Modification
Impact
Inhibit System Recovery
Discovery
Cloud Service Dashboard
System Location Discovery
Software Discovery
Cloud Service Discovery
Group Policy Discovery
Persistence
Office Application Startup
Boot or Logon Autostart Execution
Boot or Logon Initialization Scripts
Event Triggered Execution
Modify Authentication Process
Hijack Execution Flow
Credential Access
Modify Authentication Process
Unsecured Credentials
Defense Evasion
Abuse Elevation Control Mechanism
System Binary Proxy Execution
Impair Defenses
Access Token Manipulation
Modify Authentication Process
Modify Cloud Compute Infrastructure
Hijack Execution Flow
Modify Cloud Resource Hierarchy
Hide Artifacts
File and Directory Permissions Modification
Subvert Trust Controls
Domain or Tenant Policy Modification
References
All
Guideline
The following references were used to develop the Restore Configuration knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Cybersecurity Incident & Vulnerability Response Playbooks
Reference Type: Guideline Organization: Cybersecurity and Infrastructure Security Agency Author: Cybersecurity and Infrastructure Security Agency