Adversaries may attempt to get a listing of security tools that are installed on the system and their configurations. This may include security related system features (such as a built-in firewall or anti-spyware) as well as third-party security software.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
1