Impair Defenses

Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators.

Adversaries could also target event aggregation and analysis mechanisms, or otherwise disrupt these procedures by altering other system components.

References

Technique Information

ID: T1562
Aliases: T1562
Sub-techniques:
Tactics:
  • Defense Evasion
Platforms:
  • Windows
  • Office 365
  • IaaS
  • Linux
  • macOS
  • Containers
  • Amazon Web Services (AWS)
Created: 21 Feb 2020
Last Modified: 03 Jun 2025