# T1069 - Permission Groups Discovery ## [Description from ATT&CK](https://attack.mitre.org/wiki/Technique/T1069)
Adversaries may attempt to find local system or domain-level groups and permissions settings. ### Windows Examples of commands that can list groups are## Atomic Tests - [Atomic Test #1 - Elevated group enumeration using net group](#atomic-test-1---elevated-group-enumeration-using-net-group)net group /domainandnet localgroupusing the [Net](https://attack.mitre.org/software/S0039) utility. ### Mac On Mac, this same thing can be accomplished with thedscacheutil -q groupfor the domain, ordscl . -list /Groupsfor local groups. ### Linux On Linux, local groups can be enumerated with thegroupscommand and domain groups via theldapsearchcommand. ### Office 365 and Azure AD With authenticated access there are several tools that can be used to find permissions groups. TheGet-MsolRolePowerShell cmdlet can be used to obtain roles and permissions groups for Exchange and Office 365 accounts.(Citation: Microsoft msrole)(Citation: GitHub Raindance) Azure CLI (AZ CLI) also provides an interface to obtain permissions groups with authenticated access to a domain. The commandaz ad user get-member-groupswill list groups associated to a user account.(Citation: Microsoft AZ CLI)(Citation: Black Hills Red Teaming MS AD Azure, 2018)