|
| 1 | +--- |
| 2 | +title: View MITRE coverage for your organization from Microsoft Sentinel | Microsoft Docs |
| 3 | +description: Learn how to view coverage indicator in Microsoft Sentinel for MITRE tactics that are currently covered, and available to configure, for your organization. |
| 4 | +author: batamig |
| 5 | +ms.topic: how-to |
| 6 | +ms.date: 12/21/2021 |
| 7 | +ms.author: bagol |
| 8 | +--- |
| 9 | + |
| 10 | +# Understand security coverage by the MITRE ATT&CK® framework |
| 11 | + |
| 12 | +> [!IMPORTANT] |
| 13 | +> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability. |
| 14 | +> |
| 15 | +
|
| 16 | +[MITRE ATT&CK](https://attack.mitre.org/#) is a publicly accessible knowledge base of tactics and techniques that are commonly used by attackers, and is created and maintained by observing real-world observations. Many organizations use the MITRE ATT&CK knowledge base to develop specific threat models and methodologies that are used to verify security status in their environments. |
| 17 | + |
| 18 | +Microsoft Sentinel analyzes ingested data, not only to [detect threats](detect-threats-built-in.md) and help you [investigate](investigate-cases.md), but also to visualize the nature and coverage of your organization's security status. |
| 19 | + |
| 20 | +This article describes how to use the **MITRE** page in Microsoft Sentinel to view the detections already active in your workspace, and those available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework. |
| 21 | + |
| 22 | +:::image type="content" source="media/whats-new/mitre-coverage.png" alt-text="Screenshot of the MITRE coverage page with both active and simulated indicators selected."::: |
| 23 | + |
| 24 | +Microsoft Sentinel is currently aligned to The MITRE ATT&CK framework, version 9. |
| 25 | + |
| 26 | +## View current MITRE coverage |
| 27 | + |
| 28 | +In Microsoft Sentinel, in the **Threat management** menu on the left, select **MITRE**. By default, both currently active scheduled query and near real-time (NRT) rules are indicated in the coverage matrix. |
| 29 | + |
| 30 | +- **Use the legend at the top-right** to understand how many detections are currently active in your workspace for specific technique. |
| 31 | + |
| 32 | +- **Use the search bar at the top-left** to search for a specific technique in the matrix, using the technique name or ID, to view your organization's security status for the selected technique. |
| 33 | + |
| 34 | +- **Select a specific technique** in the matrix to view more details on the right. There, use the links to jump to any of the following locations: |
| 35 | + |
| 36 | + - Select **View technique details** for more information about the selected technique in the MITRE ATT&CK framework knowledge base. |
| 37 | + |
| 38 | + - Select links to any of the active items to jump to the relevant area in Microsoft Sentinel. |
| 39 | + |
| 40 | +## Simulate possible coverage with available detections |
| 41 | + |
| 42 | +In the MITRE coverage matrix, *simulated* coverage refers to detections that are available, but not currently configured, in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you. |
| 43 | + |
| 44 | +In Microsoft Sentinel, in the **General** menu on the left, select **MITRE**. |
| 45 | + |
| 46 | +Select items in the **Simulate** menu to simulate your organization's possible security status. |
| 47 | + |
| 48 | +- **Use the legend at the top-right** to understand how many detections, including analytics rule templates or hunting queries, are available for you to configure. |
| 49 | + |
| 50 | +- **Use the search bar at the top-left** to search for a specific technique in the matrix, using the technique name or ID, to view your organization's simulated security status for the selected technique. |
| 51 | + |
| 52 | +- **Select a specific technique** in the matrix to view more details on the right. There, use the links to jump to any of the following locations: |
| 53 | + |
| 54 | + - Select **View technique details** for more information about the selected technique in the MITRE ATT&CK framework knowledge base. |
| 55 | + |
| 56 | + - Select links to any of the simulation items to jump to the relevant area in Microsoft Sentinel. |
| 57 | + |
| 58 | + For example, select **Hunting queries** to jump to the **Hunting** page. There, you'll see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace. |
| 59 | + |
| 60 | +## Use the MITRE ATT&CK framework in analytics rules and incidents |
| 61 | + |
| 62 | +Having a scheduled rule with MITRE techniques applied running regularly in your Microsoft Sentinel workspace enhances the security status shown for your organization in the MITRE coverage matrix. |
| 63 | + |
| 64 | +- **Analytics rules**: |
| 65 | + |
| 66 | + - When configuring analytics rules, select specific MITRE techniques to apply to your rule. |
| 67 | + - When searching for analytics rules, filter the rules displayed by technique to find your rules quicker. |
| 68 | + |
| 69 | + For more information, see [Detect threats out-of-the-box](detect-threats-built-in.md) and [Create custom analytics rules to detect threats](detect-threats-custom.md). |
| 70 | + |
| 71 | +- **Incidents**: |
| 72 | + |
| 73 | + When incidents are created for alerts that are surfaced by rules with MITRE techniques configured, the techniques are also added to the incidents. |
| 74 | + |
| 75 | + For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md). |
| 76 | + |
| 77 | +- **Threat hunting**: |
| 78 | + |
| 79 | + - When creating a new hunting query, select the specific tactics and techniques to apply to your query. |
| 80 | + - When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right. |
| 81 | + - When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping. |
| 82 | + |
| 83 | + For more information, see [Hunt for threats with Microsoft Sentinel](hunting.md) and [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md). |
| 84 | + |
| 85 | +## Next steps |
| 86 | + |
| 87 | +For more information, see: |
| 88 | + |
| 89 | +- [MITRE | ATT&CK framework](https://attack.mitre.org/) |
| 90 | +- [MITRE ATT&CK for Industrial Control Systems](https://collaborate.mitre.org/attackics/index.php/Main_Page) |
0 commit comments