Splunk Enterprise Security

Enterprise Security - Mitre Metrics

gazoscreek
Path Finder

When I configure a correlation search with an Annotation of MiTRE ATT&CK and create a notable, I don't see any evidence of the Annotation in the notable. 

 

gazoscreek_0-1639068279261.png

Anyone have any ideas how I can search my platform to report on triggered notables by Mitre Attack?

 

 

sidoyle_
Explorer

I'm scratching my head over the same issue, i am new to Splunk and still finding my way around. Did you ever solve this problem ?

0 Karma
Get Updates on the Splunk Community!

Demo Day: Strengthen Your SOC with Splunk Enterprise Security 8.1

Today’s threat landscape is more complex than ever. Security operation centers (SOCs) are overwhelmed with ...

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...