(P) Preparation 1. Ensure client software is fully patched 2. Perform routine inspections of controls/weapons 3. Verify that logging and alerting are enabled and configured 4. Make use of risk based ...
Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such as Outlook storage or cache files.