ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: PR006
  • Created: 25th May 2024
  • Updated: 23rd October 2025
  • MITRE ATT&CK®: T1518.001
  • Contributor: The ITM Team

Security Software Enumeration

A subject attempts to identify security software or other surveillance software/services on a target system. 

Subsections (4)

ID Name Description
PR006.003Security Enumeration via File System

A subject attempts to identify security software on a target system by looking through the file system to identify relevant directories or files.

PR006.004Security Enumeration via Network Activity

A subject attempts to identify security software by monitoring network traffic.

PR006.002Security Enumeration via Running Processes

A subject observes running processes on the target system in an attempt to identify any security agents or software that is running.

PR006.001Security Enumeration via Windows Registry

A subject attempts to identify security software through keys and values within the Windows registry.