From 901633f87361fdd7cefa437fe531e3a4d04bf7a3 Mon Sep 17 00:00:00 2001 From: WojciechLesicki Date: Mon, 31 Jan 2022 00:54:57 +0100 Subject: [PATCH] Removing auto_generated_guid --- atomics/T1098/T1098.yaml | 4 ---- 1 file changed, 4 deletions(-) diff --git a/atomics/T1098/T1098.yaml b/atomics/T1098/T1098.yaml index 474cef51..b615e766 100644 --- a/atomics/T1098/T1098.yaml +++ b/atomics/T1098/T1098.yaml @@ -129,7 +129,6 @@ atomic_tests: name: sh - name: Azure - adding user to Azure AD role - auto_generated_guid: description: | The adversarie want to add user to some Azure AD role. Threat actor may be interested primarily in highly privileged roles, e.g. Global Administrator, Application Administrator, @@ -195,7 +194,6 @@ atomic_tests: elevation_required: false - name: Azure - adding service principal to Azure AD role - auto_generated_guid: description: | The adversarie want to add service principal to some Azure AD role. Threat actor may be interested primarily in highly privileged roles, e.g. Global Administrator, Application Administrator, @@ -261,7 +259,6 @@ atomic_tests: elevation_required: false - name: Azure - adding user to Azure role in subscription - auto_generated_guid: description: | The adversarie want to add user to some Azure role, also called Azure resource role. Threat actor may be interested primarily in highly privileged roles, e.g. Owner, Contributor. @@ -339,7 +336,6 @@ atomic_tests: elevation_required: false - name: Azure - adding service principal to Azure role in subscription - auto_generated_guid: description: | The adversarie want to add service principal to some Azure role, also called Azure resource role. Threat actor may be interested primarily in highly privileged roles, e.g. Owner, Contributor.