diff --git a/README.md b/README.md index 10c27be..e23f1bc 100644 --- a/README.md +++ b/README.md @@ -14,7 +14,7 @@ The tool aims to allow security teams to easily account and track the impact of MITIG&TE is currently under development. Current coverage [here](https://mitre-attack.github.io/attack-navigator/enterprise/#layerURL=https://raw.githubusercontent.com/moullos/Mitigate/master/examples/Coverage.json). ## Quick Start and Example -If you would like to try MITIG&TE you can either compile it yourself (recommended) or use the precompiled files in [bin](./bin). For maximum effectiveness, consider running MITIG&TE as an administrator and specifying a user for the least privilege checks. Ideally, that user should have the same privileges as a typical end-user in your environment. By default, MITIG&TE performs the checks for the last logged-in user. When executed, MITIG&TE will pull the latest ATT&CK information and iterate over all the Windows techniques, pulling information on the mitigations defined for each one. +If you would like to try MITIG&TE you can either compile it yourself (recommended) or use the latest [released](./releases/latest) version. For maximum effectiveness, consider running MITIG&TE as an administrator and specifying a user for the least privilege checks. Ideally, that user should have the same privileges as a typical end-user in your environment. By default, MITIG&TE performs the checks for the last logged-in user. When executed, MITIG&TE will pull the latest ATT&CK information and iterate over all the Windows techniques, pulling information on the mitigations defined for each one. ``` Mitigate.exe -OutFile=results.json # Outputs findings into results.json Mitigate.exe -OutFile=results.json -UserName=user1 # Outputs findings into results.json and performs least privileges checks for user1