T1021.006 - Windows Remote Management

Sub-technique
Tactics:
Lateral Movement
Platforms:
Windows
Detection:
Not specified
Description:
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.

WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the `winrm` command or by any number of programs such as PowerShell.(Citation: Jacobsen 2014) WinRM can be used as a method of remotely interacting with [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047).(Citation: MSDN WMI)
Metadata
MITRE ID: T1021.006
STIX ID: attack-pattern--60d0c01d-e2bf-...
Platforms: Windows
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00