

- Source Node
- Target Node
- Last Seen by BloodHound
- A description of the edge.
- Abuse Info: How red teamers can use the privilege of the edge to obtain their goals.
- Opsec Considerations: What red teamers should consider avoiding detection and thereby increasing operational security.
- References: Links to publicly available sources used to create the above information.