Find content with the MITRE ATT&CK-Driven Content Recommendation dashboard
Use MITRE ATT&CK to filter for the Splunk content related to MITRE ATT&CK techniques that are associated with many different threat groups.
Prerequisites
Configure the Data Inventory dashboard and Content Introspection. For more information, see Configure the products you have in your environment with the Data Inventory dashboard or Track active content in Splunk Security Essentials using Content Introspection.
Steps
- In Splunk Security Essentials, navigate to Security Content > MITRE ATT&CK-Driven Content Recommendation.
- In the Categories filter, click the issue category you're concerned with.
- (Optional) Adjust the filters for data availability and popularity.
A list of content recommendations appears based on your filters.
Find content to use in your ransomware defense with the Ransomware Content Browser | Gather events with the Risk-based Alerting dashboard |
This documentation applies to the following versions of Splunk® Security Essentials: 3.4.0, 3.5.0, 3.5.1, 3.6.0
Feedback submitted, thanks!