Splunk Enterprise Security

Enterprise Security - Mitre Metrics

gazoscreek
Path Finder

When I configure a correlation search with an Annotation of MiTRE ATT&CK and create a notable, I don't see any evidence of the Annotation in the notable. 

 

gazoscreek_0-1639068279261.png

Anyone have any ideas how I can search my platform to report on triggered notables by Mitre Attack?

 

 

sidoyle_
Explorer

I'm scratching my head over the same issue, i am new to Splunk and still finding my way around. Did you ever solve this problem ?

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...