MITRE ATT&CK Technique
Discovery T1615
Description

Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in domain objects that can be manipulated or used to blend in the environment. Group Policy allows for centralized management of user and computer settings in Active Directory (AD). Group policy objects (GPOs) are containers for group policy settings made up of files stored within a predictable network path `\<DOMAIN>\SYSVOL\<DOMAIN>\Policies\`.(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016) Adversaries may use commands such as <code>gpresult</code> or various publicly available PowerShell functions, such as <code>Get-DomainGPO</code> and <code>Get-DomainGPOLocalGroup</code>, to gather information on Group Policy settings.(Citation: Microsoft gpresult)(Citation: Github PowerShell Empire) Adversaries may use this information to shape follow-on behaviors, including determining potential attack paths within the target network as well as opportunities to manipulate Group Policy settings (i.e. [Domain or Tenant Policy Modification](https://attack.mitre.org/techniques/T1484)) for their benefit.

Supported Platforms
Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2021-08-06T13:10:12.916Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may gather information on Group Policy settings '
                'to identify paths for privilege escalation, security measures '
                'applied within a domain, and to discover patterns in domain '
                'objects that can be manipulated or used to blend in the '
                'environment. Group Policy allows for centralized management '
                'of user and computer settings in Active Directory (AD). Group '
                'policy objects (GPOs) are containers for group policy '
                'settings made up of files stored within a predictable network '
                'path `\\<DOMAIN>\\SYSVOL\\<DOMAIN>\\Policies\\`.(Citation: '
                'TechNet Group Policy Basics)(Citation: ADSecurity GPO '
                'Persistence 2016)\n'
                '\n'
                'Adversaries may use commands such as <code>gpresult</code> or '
                'various publicly available PowerShell functions, such as '
                '<code>Get-DomainGPO</code> and '
                '<code>Get-DomainGPOLocalGroup</code>, to gather information '
                'on Group Policy settings.(Citation: Microsoft '
                'gpresult)(Citation: Github PowerShell Empire) Adversaries may '
                'use this information to shape follow-on behaviors, including '
                'determining potential attack paths within the target network '
                'as well as opportunities to manipulate Group Policy settings '
                '(i.e. [Domain or Tenant Policy '
                'Modification](https://attack.mitre.org/techniques/T1484)) for '
                'their benefit.',
 'external_references': [{'external_id': 'T1615',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1615'},
                         {'description': 'Metcalf, S. (2016, March 14). Sneaky '
                                         'Active Directory Persistence #17: '
                                         'Group Policy. Retrieved March 5, '
                                         '2019.',
                          'source_name': 'ADSecurity GPO Persistence 2016',
                          'url': 'https://adsecurity.org/?p=2716'},
                         {'description': 'Microsoft. (2017, October 16). '
                                         'gpresult. Retrieved August 6, 2021.',
                          'source_name': 'Microsoft gpresult',
                          'url': 'https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult'},
                         {'description': 'Schroeder, W., Warner, J., Nelson, '
                                         'M. (n.d.). Github PowerShellEmpire. '
                                         'Retrieved April 28, 2016.',
                          'source_name': 'Github PowerShell Empire',
                          'url': 'https://github.com/PowerShellEmpire/Empire'},
                         {'description': 'srachui. (2012, February 13). Group '
                                         'Policy Basics – Part 1: '
                                         'Understanding the Structure of a '
                                         'Group Policy Object. Retrieved March '
                                         '5, 2019.',
                          'source_name': 'TechNet Group Policy Basics',
                          'url': 'https://blogs.technet.microsoft.com/musings_of_a_technical_tam/2012/02/13/group-policy-basics-part-1-understanding-the-structure-of-a-group-policy-object/'}],
 'id': 'attack-pattern--1b20efbf-8063-4fc3-a07d-b575318a301b',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'discovery'}],
 'modified': '2025-10-24T17:48:28.148Z',
 'name': 'Group Policy Discovery',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Ted Samuels, Rapid7',
                          'Jonhnathan Ribeiro, 3CORESec, @_w0rk3r'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': False,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Windows'],
 'x_mitre_version': '1.1'}
Quick Actions
Related Threat Actors (2)
threeam
Medium

Turla
High