Hunt with MITRE ATT&CK techniques using refreshed hunting dashboard

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Tech Community.

Hunting Dashboard Refresh

Now in GA, a refreshed hunting query experience helps you find undetected threats more quickly and with more precision. Hunting queries are now mapped to MITRE ATT&CK techniques and sub-techniques. This helps you identify which behaviors are present and your overall MITRE coverage for hunting.  You can run all your queries at once, then filter on MITRE techniques and queries that had significant changes in the last 24 to 48 hours.  This makes it much easier to zero in on the most promising leads for hunting.

 

Hunt for specific MITRE ATT&CK techniques

Our users have told us repeatedly how important MITRE ATT&CK techniques are to identifying which specific kinds of malicious activity are present in their environments.  It also provides a framework to measure how many malicious behaviors can be identified, and where improvements can be made.  

 

To respond to this need, we are mapping our built-in hunting queries with MITRE ATT&CK techniques and sub-techniques. With this capability, when one of the mapped hunting queries generates results, you know specifically which MITRE ATT&CK techniques may be active in your environment.

BenNick_0-1635281921920.png

Also, now in preview, you can map your custom hunting queries to MITRE ATT&CK techniques and sub-techniques. See preview details here.

 

Create a full MITRE coverage map for your built-in and custom hunting queries.

These new capabilities enable you to enumerate the full list of techniques covered by your hunting queries.  This is especially useful for identifying gaps and seeing progress as you create new custom queries and install hunting queries from solutions and Azure Sentinel’s GitHub community.

 

Hunting queries as starting points for authoring analytics

Along your MITRE ATT&CK technique journey you may find that you have hunting query coverage for a technique for which you don’t have analytic coverage. In these cases, you can use a hunting query as an initial starting point to develop a new analytic rule.  By refining the query and filtering out noise, you can develop high fidelity detections.

 

Run all your hunting queries at once, or just a few to focus on specific behaviors over time

We have restored the “Run all queries” capability to the hunting dashboard, enabling you to run as many hunting queries as you want at one time to get a full view of all the potentially malicious behaviors that you have queries for.

 

Alternatively, you can run a selected subset of queries, such as for a recent attack campaign. This is especially useful when you want to run queries over a large set of data or a long time period.

BenNick_1-1635282026673.png

 

See which MITRE tactics are present in your environment at a glance

We updated the MITRE ATT&CK tactic bar to show only the tactics related to the queries selected by your filters.

BenNick_2-1635282053005.png

Want to quickly see which tactics may be active in your environment? Run all queries, then filter by queries with results. The new tactic bar updates to show only tactics with query result counts. 

 

Identify spikes in potentially malicious activity

Want to identify spikes in activity between the last 24 and 48 hours? Filter on the results delta or results delta percent fields to show queries with notable changes in result counts. This helps you zero on the queries most likely to help you find evidence of malicious activity.

BenNick_3-1635282095024.png

 

 

Further Reading

 

 

 

 

REMEMBER: these articles are REPUBLISHED. Your best bet to get a reply is to follow the link at the top of the post to the ORIGINAL post! BUT you're more than welcome to start discussions here:

This site uses Akismet to reduce spam. Learn how your comment data is processed.