Forum Discussion
Mitre information missing from incident
Greetings
I have a tough time getting the MITRE parsing to work for one of my integrations. It's a security platform that's sending incidents to Sentinel using CEF and they arrive into Log Analytics looking like this, it's been truncated for clarity etc.
Now, in the analytics rule under Alert Details I've tried different settings for the tactics and/or techniques using either the mitre_id column or mitre_name but none of those ever show up in the incident.
Does anyone have any pointers on how to get this to work?
/Fredrik
5 Replies
- Clive_WatsonBronze Contributor
The Columns have to be in the returned data from the Alert, so the drop down will show you whats there or the Column name will error (see red text), if its missing you will have to add an Entity first
- TheHoff70Brass Contributor
Maybe I misunderstand your answer but my initial post show what's seen by sentinel in the alert. In the analysis rule I've tried with with the column holding the Mitre ID or the Mitre name and neither work. The respective columns are visible and selectable without error in the analytics rule.
- Clive_WatsonBronze ContributorI showed the Alert Details to answer this: "Now, in the analytics rule under Alert Details I've tried different settings for the tactics and/or techniques" Are you not getting an error in that part of the Analytic setup? If no error, which sounds like your situation then, the Values should appear in the Alert Name or Description of the Alert.
So if we use this as and example
Alert from {{Mitre_id}}
Do you just get the "Alert from " part in the Name / Description? Or do you get nothing?
https://learn.microsoft.com/en-gb/azure/sentinel/customize-alert-details?tabs=azure#how-to-customize-alert-details