You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Note:** The application will fallback to not showing any panels that rely on prerequisite visualizations if they are missing.
24
28
25
29
## What does it look like ?
26
30
27
31
The Main dashboard gives you an overview of the simulations run, users, hosts, MITRE ATT&CK tactics and techniques, tests executed and potential mapping with analytic stories.
The second dashboard (Navigator) shows all the available Atomic Red tests and their potential mappings to security content. The reason we categorize those as "potential" is because the mapping is simply made based on the MITRE tactic referenced in the test and the security content. This does not necessarily mean that a specific Atomic Red Test will trigger a particular detection. This is where you should read more on what ATT&CK is all about and how the Splunk [Security Content](https://research.splunk.com) maps to it. :)
32
-
35
+
The second dashboard (Navigator) shows all the available Atomic Red tests and their potential mappings to security content. The reason we categorize those as "potential" is because the mapping is simply made based on the MITRE technique/subtechnique referenced in the test and the security content. This does not necessarily mean that a specific Atomic Red Test will trigger a particular detection. This is where you should read more on what ATT&CK is all about and how the Splunk [Security Content](https://research.splunk.com) maps to it. :)
The 3rd dashboard allows you to search for potential Splunk Security Detections, Atomic Red Tests or determine PurpleSharp support for one or more MITRE Att&ck Technique/Subtechnique.
40
+
41
+

42
+
36
43
Finally there is a dashboard made with Splunk dashboards - Beta which looks nice but still in beta !
<p>In order for this panel to show properly, please install the SanKey visualization available <ahref="https://splunkbase.splunk.com/app/3112/">here</a></p>
298
+
<p>In order for this panel to show properly, please install the SanKey visualization available <ahref="https://splunkbase.splunk.com/app/3112/">here</a>
299
+
</p>
297
300
</html>
298
301
</panel>
299
302
</row>
@@ -402,9 +405,9 @@
402
405
| search mitre_id!="None"
403
406
| mvexpand mitre_id
404
407
| rename mitre_id as mitre_technique]
405
-
| stats dc(name) by name, mitre_technique, displayapp
406
-
| table name, mitre_technique, displayapp
407
-
| rename name as "Detection", mitre_technique as "Att&ck Technique", displayapp as "Source"
408
+
| stats dc(name) by name, mitre_technique, analytic_story, displayapp
<p>In order for this panel to show properly, please install the Parallel Coordinates visualization available <ahref="https://splunkbase.splunk.com/app/3137">here</a>
0 commit comments