Splunk Enterprise Security

Security Essentials not showing/mapping MITRE & cyber kill chain

AcePilot
Engager

 

When using Pplunks  security essentials :  MITRE ATT&CK Framework  we are lacking a significant amount of alerts.  we used to have around 1500 in active and 300 ish on needs data; however, overnight drop to the 200 mark total (between active and needs data) .  The following troubleshooting steps have been taken 

1. updated content with the "force update under system configuration".

AcePilot_3-1719607403751.png

2. verify communication to the urls (yes it can connect)

3. uninstall and reinstall current SSE version, this cleared the data mapping upon installed it showed  enabled 0-active-0- missing data 1715:

AcePilot_4-1719607774116.png

after the weekend it dropped to 0-8-195 

AcePilot_5-1719607848374.png

 

 

4. After i rebuilt the data inventory  it looked as such:
AcePilot_1-1719606928966.png

 

Here are some SS of the security content:

 

1. shows content 

AcePilot_2-1719607265279.png

2. drop down shows 12 mitre attack platforms but the dropdown is all 0;s

AcePilot_0-1719606146985.png

 

3.  Some times the data sources would show a filter of none. with 1300+  items, like the item below 134,  and sometimes it just doesnt appear. 

 

AcePilot_6-1719608171975.png

 

4. MITRE map missing from the  configuration tags 

AcePilot_7-1719608450133.png

 

 



 

 

 

0 Karma
Get Updates on the Splunk Community!

Customer Experience | Splunk 2024: New Onboarding Resources

In 2023, we were routinely reminded that the digital world is ever-evolving and susceptible to new ...

Celebrate CX Day with Splunk: Take our interactive quiz, join our LinkedIn Live ...

Today and every day, Splunk celebrates the importance of customer experience throughout our product, ...

How to Get Started with Splunk Data Management Pipeline Builders (Edge Processor & ...

If you want to gain full control over your growing data volumes, check out Splunk’s Data Management pipeline ...