{"id":33776,"date":"2016-11-28T09:00:37","date_gmt":"2016-11-28T17:00:37","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=33776"},"modified":"2023-06-23T09:51:55","modified_gmt":"2023-06-23T16:51:55","slug":"disrupting-the-kill-chain","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/11\/28\/disrupting-the-kill-chain\/","title":{"rendered":"Disrupting the kill chain"},"content":{"rendered":"

This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group.<\/em><\/p>\n

The cyber kill chain describes the typical workflow, including techniques, tactics, and procedures or TTPs, used by attackers to infiltrate an organization\u2019s networks and systems.  The Microsoft Global Incident Response and Recovery (GIRR) Team and Enterprise Threat Detection Service, Microsoft\u2019s managed cyber threat detection service, identify and respond to thousands of targeted attacks per year.  Based on our experience, the image below illustrates how most targeted cyber intrusions occur today.<\/p>\n

The initial attack typically includes the following steps:<\/p>\n