Skip to content

Commit ea5bad7

Browse files
authored
Merge pull request #50585 from KenMAG/main
Updated the MITRE ATT&CK module for Sentinel in Defender and Azure
2 parents eb13d4f + 4f9c7e1 commit ea5bad7

File tree

6 files changed

+61
-33
lines changed

6 files changed

+61
-33
lines changed

learn-pr/wwl-sci/what-is-threat-hunting-azure-sentinel/3a-explore-mitre-att-ck.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Explore MITRE ATT&CK
44
metadata:
55
title: Explore MITRE ATT&CK
66
description: "Explore MITRE ATT&CK"
7-
ms.date: 06/29/2022
8-
author: wwlpublish
7+
ms.date: 05/21/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
Lines changed: 55 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,66 +1,93 @@
1-
MITRE ATT&CK is a publicly accessible knowledge base of tactics and techniques that are commonly used by attackers, and is created and maintained by observing real-world observations. Many organizations use the MITRE ATT&CK knowledge base to develop specific threat models and methodologies that are used to verify security status in their environments.
1+
MITRE ATT&CK is a publicly accessible knowledge base of tactics, techniques, and procedures (TTP) that are commonly used by attackers, and is created and maintained by observing real-world observations. Many organizations use the MITRE ATT&CK knowledge base to develop specific threat models and methodologies that are used to verify security status in their environments.
22

33
Microsoft Sentinel analyzes ingested data, not only to detect threats and help you investigate, but also to visualize the nature and coverage of your organization's security status.
44

5-
6-
When developing a threat hunting hypothesis, it's critical to understand tactics and techniques you're searching for. The MITRE ATT&CK framework is used throughout Microsoft Sentinel.
7-
5+
When developing a threat hunting hypothesis, it's critical to understand the tactics (why), techniques (how), and procedures (implementations) you're searching for. The MITRE ATT&CK framework is used throughout Microsoft Sentinel.
86

97
Use the MITRE ATT&CK selection under Threat Management in Microsoft Sentinel to view the detections already active in your workspace, and those available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
108

11-
129
## View current MITRE coverage
13-
In Microsoft Sentinel, in the Threat management menu on the left, select MITRE. By default, both currently active scheduled query and near real-time (NRT) rules are indicated in the coverage matrix.
10+
11+
## [Defender portal](#tab/defender-portal)
12+
13+
In Microsoft Sentinel, in the [Defender portal](https://security.microsoft.com/), select the *Threat management* section of the navigation menu, select MITRE ATT&CK. By default, Active scheduled query, Active near real-time (NRT) rules, and Active anomaly query rules are indicated in the coverage matrix.
1414

1515
- **Use the legend at the top-right** to understand how many detections are currently active in your workspace for specific technique.
1616

17-
- **Use the search bar at the top-left** to search for a specific technique in the matrix, using the technique name or ID, to view your organization's security status for the selected technique.
17+
- **Use the search bar** at the top right to search for a specific technique in the matrix, using the technique name or ID, to view your organization's security status for the selected technique.
1818

19-
- **Select a specific technique** in the matrix to view more details on the right. There, use the links to jump to any of the following locations:
19+
- **Select a specific technique** in the top row of the matrix to view in the details pane on the right. There, use the links to jump to any of the following locations:
2020

21-
- Select View technique details for more information about the selected technique in the MITRE ATT&CK framework knowledge base.
21+
- Select *View full tactic or technique details* links for more information in the MITRE ATT&CK framework knowledge base.
2222

23-
- Select links to any of the active items to jump to the relevant area in Microsoft Sentinel.
23+
- Select links to any of the *Active coverage* rules to jump to the relevant area in Microsoft Sentinel.
24+
25+
- **View MITRE by threat scenarios** to view the coverage matrix by threat scenarios:
2426

25-
## Simulate possible coverage with available detections
27+
- Drag the **View MITRE by threat scenarios** slider to the right to view the coverage matrix by threat scenarios. The matrix is filtered to show only the techniques that are relevant to the selected scenario.
2628

27-
In the MITRE coverage matrix, simulated coverage refers to detections that are available, but not currently configured, in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you.
29+
:::image type="content" source="../media/mitre-threat-hunting-scenario.png" alt-text="Screenshot of the MITRE ATT&CK threat scenarios drop down menu." lightbox="../media/mitre-threat-hunting-scenario.png":::
30+
31+
## Simulate possible rules coverage
32+
33+
In the MITRE matrix, simulated coverage refers to detections that are available, but not currently configured, in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you.
34+
35+
> [!IMPORTANT]
36+
> If you have the *View MITRE by threat scenarios* slider enabled, and have selected a scenario, the Simulated rules (Product simulation) will be disabled.
37+
38+
- From the Microsoft Defender navigation menu, expand the Microsoft Sentinel section, and select *Threat management*, then select MITRE ATT&CK.
39+
40+
- Select items in the Simulated rules drop-down menu to simulate your organization's possible security status.
2841

29-
In Microsoft Sentinel, in the General menu on the left, select MITRE.
42+
- For example, select **Hunting queries**, and then select *Hunting queries* **View** link to jump to the Microsoft Sentinel Hunting page. There, you see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace.
3043

31-
Select items in the Simulate menu to simulate your organization's possible security status.
44+
## [Azure portal](#tab/azure-portal)
3245

33-
- **Use the legend at the top-right** to understand how many detections, including analytics rule templates or hunting queries, are available for you to configure.
46+
In Microsoft Sentinel, in the [Azure portal](https://portal.azure.com/), select the *Threat management* section of the navigation menu, then select **MITRE ATT&CK (Preview)**. By default, Active scheduled query, Active near real-time (NRT) rules, and Active anomaly query rules are indicated in the coverage matrix.
3447

35-
- **Use the search bar at the top-left** to search for a specific technique in the matrix, using the technique name or ID, to view your organization's simulated security status for the selected technique.
48+
- **Use the legend at the top-right** to understand how many detections are currently active in your workspace for specific technique.
49+
50+
- **Use the search bar** At the top-left to search for a specific technique in the matrix, using the technique name or ID, to view your organization's security status for the selected technique.
3651

3752
- **Select a specific technique** in the matrix to view more details on the right. There, use the links to jump to any of the following locations:
3853

39-
- Select View technique details for more information about the selected technique in the MITRE ATT&CK framework knowledge base.
54+
- Select *View full tactic or technique details* links for more information in the MITRE ATT&CK framework knowledge base.
55+
56+
- Select links to any of the *Active coverage* rules to jump to the relevant area in Microsoft Sentinel.
57+
58+
## Simulate rule detections
59+
60+
In the MITRE coverage matrix, simulated coverage refers to detections that are available, but not currently configured, in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you.
61+
62+
- In Microsoft Sentinel, select the *Threat management* section of the navigation menu, select MITRE ATT&CK.
63+
64+
- Select items in the Simulated rules drop-down menu to simulate your organization's possible security status.
65+
66+
- For example, select **Hunting queries**, and then select *Hunting queries* **View** link to jump to the Microsoft Sentinel Hunting page. There, you see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace.
4067

41-
- Select links to any of the simulation items to jump to the relevant area in Microsoft Sentinel.
68+
:::image type="content" source="../media/mitre-simulated-rules.png" alt-text="Screenshot of the MITRE ATT&CK simulated rule coverage." lightbox="../media/mitre-simulated-rules.png":::
4269

43-
For example, select Hunting queries to jump to the Hunting page. There, you'll see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace.
70+
---
4471

4572
## Use the MITRE ATT&CK framework in analytics rules and incidents
4673

47-
Having a scheduled rule with MITRE techniques applied running regularly in your Microsoft Sentinel workspace enhances the security status shown for your organization in the MITRE coverage matrix.
74+
Having a scheduled analytical rule with MITRE techniques applied running regularly in your Microsoft Sentinel workspace enhances the security status shown for your organization in the MITRE coverage matrix.
4875

4976
- **Analytics rules:**
5077

51-
- When configuring analytics rules, select specific MITRE techniques to apply to your rule.
52-
- When searching for analytics rules, filter the rules displayed by technique to find your rules quicker.
53-
78+
- When configuring analytics rules, select specific MITRE techniques to apply to your rule.
79+
- When searching for analytics rules, filter the rules displayed by technique to find your rules quicker.
80+
81+
image type="content" source="../media/mitre-analytic-rule-technique.png" alt-text="Screenshot of the MITRE ATT&CK analytics rules configuration." lightbox="../media/mitre-analytic-rule-technique.png":::
82+
5483
- **Incidents:**
5584

5685
When incidents are created for alerts that are surfaced by rules with MITRE techniques configured, the techniques are also added to the incidents.
5786

58-
5987
- **Threat hunting:**
6088

61-
- When creating a new hunting query, select the specific tactics and techniques to apply to your query.
62-
63-
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right.
89+
- When creating a new hunting query, select the specific tactics and techniques to apply to your query.
6490

65-
- When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
91+
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right.
6692

93+
- When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.

learn-pr/wwl-sci/what-is-threat-hunting-azure-sentinel/index.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ uid: learn.wwl.what-is-threat-hunting-azure-sentinel
33
metadata:
44
title: Explain threat hunting concepts in Microsoft Sentinel
55
description: "Explain threat hunting concepts in Microsoft Sentinel"
6-
ms.date: 06/29/2022
7-
author: wwlpublish
6+
ms.date: 05/21/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
1111
title: Explain threat hunting concepts in Microsoft Sentinel
1212
summary: Learn the threat hunting process in Microsoft Sentinel.
1313
abstract: |
14-
Upon completion of this module, the learner will be able to:
14+
Upon completion of this module, the learner is able to:
1515
- Describe threat hunting concepts for use with Microsoft Sentinel
1616
- Define a threat hunting hypothesis for use in Microsoft Sentinel
1717
prerequisites: |
@@ -23,6 +23,7 @@ roles:
2323
- security-operations-analyst
2424
products:
2525
- azure
26+
- defender-xdr
2627
- microsoft-sentinel
2728
subjects:
2829
- security
221 KB
Loading
691 KB
Loading
510 KB
Loading

0 commit comments

Comments
 (0)