Need help mapping MITRE Tactics and Techniques from Azure Sentinel

TravisOC
Giga Guru

Hi Community,

 

We’re currently implementing Security Incident Response (SIR) for a customer using the Microsoft Azure Sentinel integration. They’re looking to include MITRE ATT&CK information (Tactics and Techniques) in their Security Incidents; however, they do not appear to be licensed for the full Threat Intelligence suite. We do see raw data from Sentinel that includes both the Tactics and Techniques (T-numbers), and we also have the Technique Extraction Rules table (part of Threat Intelligence common, which ships with SIR).

 

Is there a way to bring this MITRE data into Security Incidents without having the full TI plugin/license? Any insights or best practices on how to accomplish this would be greatly appreciated!

 

Thanks in advance!

6 REPLIES 6

Pooja P
Tera Contributor

Hi @Dhruv Gupta1 , we have TI plugin activated at our instance , and need the same requirement .

Kindly help us with the steps.

 

Thanks ,

Pooja

AJ_UK
Tera Contributor

Hi Travis,

See if note I have put in this post helps. I have got it working without any extra coding:
https://www.servicenow.com/community/secops-forum/auto-technique-extraction-rule-for-azure-sentinel/...

AJ