Alert Rules Dashboards

LP_Mitre Attack Analytics Overview

This dashboard consists of the following widgets:

Widget Name

Description

Triggered Attack Tactics

The count of tactics that the attacker may use to perform an attack. The tactics are Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration and Impact.

Triggered Attack Tactics - Timetrend

A time trend for the attack tactics that the attacker used to perform an attack.

Mitre Att&ck Matrix

An ATT&CK chart, a heatmap describing the attacks carried out in a system in the form of attack tactics, techniques and procedures defined by MITRE.

Top Recurring Attacks

The most recurring attacks, their attack category and the count of attacks. For example, Console History Discover Detected is an attack, Collection is its attack category and the attack occurred three times.

Top Users by Attack Tactics

The top users based on attack tactics.

Top Hosts in Attack

The count of top hosts by attack category.

Adding the Alert Rules Dashboard

  1. Go to Settings >> Knowledge Base from the navigation bar and click Dashboards.

  2. Select VENDOR DASHBOARD from the drop-down.

  3. Click Add from Actions.

Dashboard

Adding the Alert Rules Dashboard

  1. Click Choose Repos.

Alert Rules Selecting Repos Panel

Selecting Repos

  1. Select the repo and click Done.

Alert Rules Selecting Repos Panel

Selecting Repos

  1. Click Ok.

Confirmation for Repo

Confirmation for Repo

You can find the Alert Rules dashboard under Dashboards.

Alert Rules Dashboard

Alert Rules Dashboard

Ransomware Analytics Dashboard

Alert Rules Dashboard

Ransomware Analytics Dashboard

Alert Rules Dashboard


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support