tactics
A list of categories of attacks by which to classify the rule. Possible values are Collection
, CommandAndControl
, CredentialAccess
, DefenseEvasion
, Discovery
, Execution
, Exfiltration
, Impact
, ImpairProcessControl
, InhibitResponseFunction
, InitialAccess
, LateralMovement
, Persistence
, PreAttack
, PrivilegeEscalation
, Reconnaissance
and ResourceDevelopment
.