Anti-Forensics
Account Misuse
Clear Browser Artifacts
Clear Email Artifacts
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Modify Windows Registry
Network Obfuscation
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Stalling
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Virtualization
Windows System Time Modification
- ID: AF028.004
- Created: 06th October 2025
- Updated: 08th October 2025
- Contributor: The ITM Team
Powering Off Devices
The subject deliberately powers off corporate devices to obstruct remote forensic acquisition, containment, or monitoring. This tactic prevents endpoint detection and response (EDR) tools, disk imaging systems, and memory capture utilities from executing, delaying evidence collection and hindering response actions.
Often triggered by awareness of investigative scrutiny, powering down devices can result in the loss of volatile data and disruption of containment workflows. The tactic is especially effective in environments reliant on real-time telemetry or remote tooling.
This activity could be considered an anti-forensics technique, especially when the device is powered off during periods where the subject is expected to be working.