Operating System ConfigurationApplication Developer GuidanceActive Directory ConfigurationVulnerability ScanningUser TrainingUser Account ManagementThreat Intelligence ProgramSSL/TLS InspectionRestrict Web-Based ContentRestrict File and Directory PermissionsRestrict Registry PermissionPrivileged Process IntegrityPrivileged Account ManagementPassword PoliciesRemote Data StorageNetwork SegmentationNetwork Intrusion PreventionMulti-factor AuthenticationLimit Software InstallationLimit Hardware InstallationLimit Access to Resource Over NetworkAccount Use PoliciesFilter Network TrafficExecution PreventionEnvironment Variable PermissionsBehavior Prevention on EndpointEncrypt Sensitive InformationDisable or Remove Feature or ProgramCredential Access ProtectionRestrict Library LoadingCode SigningBoot IntegrityAuditApplication Isolation and SandboxingAntivirus/AntimalwareExploit ProtectionUpdate SoftwareUser Account ControlData BackupSoftware Configuration
type
type
label
ATTACK Mitigation