Skip to content

Commit b554959

Browse files
authored
Merge pull request #183492 from batamig/mitre-support
MITRE support
2 parents aaeeb4d + 7951384 commit b554959

File tree

4 files changed

+105
-0
lines changed

4 files changed

+105
-0
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -147,6 +147,8 @@
147147
href: resource-context-rbac.md
148148
- name: Migrate to Microsoft Sentinel
149149
href: migration.md
150+
- name: Understand MITRE ATT&CK coverage
151+
href: mitre-coverage.md
150152
- name: Manage Microsoft Sentinel content
151153
items:
152154
- name: Discover and deploy out-of-the-box content
751 KB
Loading

articles/sentinel/mitre-coverage.md

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
---
2+
title: View MITRE coverage for your organization from Microsoft Sentinel | Microsoft Docs
3+
description: Learn how to view coverage indicator in Microsoft Sentinel for MITRE tactics that are currently covered, and available to configure, for your organization.
4+
author: batamig
5+
ms.topic: how-to
6+
ms.date: 12/21/2021
7+
ms.author: bagol
8+
---
9+
10+
# Understand security coverage by the MITRE ATT&CK® framework
11+
12+
> [!IMPORTANT]
13+
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
14+
>
15+
16+
[MITRE ATT&CK](https://attack.mitre.org/#) is a publicly accessible knowledge base of tactics and techniques that are commonly used by attackers, and is created and maintained by observing real-world observations. Many organizations use the MITRE ATT&CK knowledge base to develop specific threat models and methodologies that are used to verify security status in their environments.
17+
18+
Microsoft Sentinel analyzes ingested data, not only to [detect threats](detect-threats-built-in.md) and help you [investigate](investigate-cases.md), but also to visualize the nature and coverage of your organization's security status.
19+
20+
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the detections already active in your workspace, and those available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
21+
22+
:::image type="content" source="media/whats-new/mitre-coverage.png" alt-text="Screenshot of the MITRE coverage page with both active and simulated indicators selected.":::
23+
24+
Microsoft Sentinel is currently aligned to The MITRE ATT&CK framework, version 9.
25+
26+
## View current MITRE coverage
27+
28+
In Microsoft Sentinel, in the **Threat management** menu on the left, select **MITRE**. By default, both currently active scheduled query and near real-time (NRT) rules are indicated in the coverage matrix.
29+
30+
- **Use the legend at the top-right** to understand how many detections are currently active in your workspace for specific technique.
31+
32+
- **Use the search bar at the top-left** to search for a specific technique in the matrix, using the technique name or ID, to view your organization's security status for the selected technique.
33+
34+
- **Select a specific technique** in the matrix to view more details on the right. There, use the links to jump to any of the following locations:
35+
36+
- Select **View technique details** for more information about the selected technique in the MITRE ATT&CK framework knowledge base.
37+
38+
- Select links to any of the active items to jump to the relevant area in Microsoft Sentinel.
39+
40+
## Simulate possible coverage with available detections
41+
42+
In the MITRE coverage matrix, *simulated* coverage refers to detections that are available, but not currently configured, in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you.
43+
44+
In Microsoft Sentinel, in the **General** menu on the left, select **MITRE**.
45+
46+
Select items in the **Simulate** menu to simulate your organization's possible security status.
47+
48+
- **Use the legend at the top-right** to understand how many detections, including analytics rule templates or hunting queries, are available for you to configure.
49+
50+
- **Use the search bar at the top-left** to search for a specific technique in the matrix, using the technique name or ID, to view your organization's simulated security status for the selected technique.
51+
52+
- **Select a specific technique** in the matrix to view more details on the right. There, use the links to jump to any of the following locations:
53+
54+
- Select **View technique details** for more information about the selected technique in the MITRE ATT&CK framework knowledge base.
55+
56+
- Select links to any of the simulation items to jump to the relevant area in Microsoft Sentinel.
57+
58+
For example, select **Hunting queries** to jump to the **Hunting** page. There, you'll see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace.
59+
60+
## Use the MITRE ATT&CK framework in analytics rules and incidents
61+
62+
Having a scheduled rule with MITRE techniques applied running regularly in your Microsoft Sentinel workspace enhances the security status shown for your organization in the MITRE coverage matrix.
63+
64+
- **Analytics rules**:
65+
66+
- When configuring analytics rules, select specific MITRE techniques to apply to your rule.
67+
- When searching for analytics rules, filter the rules displayed by technique to find your rules quicker.
68+
69+
For more information, see [Detect threats out-of-the-box](detect-threats-built-in.md) and [Create custom analytics rules to detect threats](detect-threats-custom.md).
70+
71+
- **Incidents**:
72+
73+
When incidents are created for alerts that are surfaced by rules with MITRE techniques configured, the techniques are also added to the incidents.
74+
75+
For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md).
76+
77+
- **Threat hunting**:
78+
79+
- When creating a new hunting query, select the specific tactics and techniques to apply to your query.
80+
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right.
81+
- When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
82+
83+
For more information, see [Hunt for threats with Microsoft Sentinel](hunting.md) and [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md).
84+
85+
## Next steps
86+
87+
For more information, see:
88+
89+
- [MITRE | ATT&CK framework](https://attack.mitre.org/)
90+
- [MITRE ATT&CK for Industrial Control Systems](https://collaborate.mitre.org/attackics/index.php/Main_Page)

articles/sentinel/whats-new.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,21 @@ If you're looking for items older than six months, you'll find them in the [Arch
2929
3030
## February 2022
3131

32+
- [View MITRE support coverage (Public preview)](#view-mitre-support-coverage-public-preview)
3233
- [View Azure Purview data in Microsoft Sentinel](#view-azure-purview-data-in-microsoft-sentinel-public-preview)
3334
- [Manually run playbooks based on the incident trigger (Public preview)](#manually-run-playbooks-based-on-the-incident-trigger-public-preview)
35+
36+
### View MITRE support coverage (Public preview)
37+
38+
Microsoft Sentinel now provides a new **MITRE** page, which highlights the MITRE tactic and technique coverage you currently have, and can configure, for your organization.
39+
40+
Select items from the **Active** and **Simulated** menus at the top of the page to view the detections currently active in your workspace, and the simulated detections available for you to configure.
41+
42+
For example:
43+
44+
:::image type="content" source="media/whats-new/mitre-coverage.png" alt-text="Screenshot of the MITRE coverage page with both active and simulated indicators selected.":::
45+
46+
For more information, see [Understand security coverage by the MITRE ATT&CK® framework](mitre-coverage.md).
3447
- [Search across long time spans in large datasets (public preview)](#search-across-long-time-spans-in-large-datasets-public-preview)
3548
- [Restore archived logs from search (public preview)](#restore-archived-logs-from-search-public-preview)
3649

0 commit comments

Comments
 (0)