Skip to main content
Applies to BloodHound Enterprise and CE For information on the abuse scenario of the property, see AllowedToAct.

Abuse Info

See the AllowedToAct edge section for abuse info

Opsec Considerations

See the AllowedToAct edge section for opsec considerations

Edge Schema

Source: User, Group, Computer
Destination: Computer
Traversable: Yes

References

I