Splunk Protocol Impersonation Weak Encryption Configuration
Protocol Impersonation
Protocol Impersonation
Disable or Modify Tools, Impair Defenses
Domain or Tenant Policy Modification, Group Policy Modification
Password Spraying, Brute Force
Account Manipulation