Skip to main content
Role AvailabilityRead-OnlyInvestigatorAnalystManager
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. This dashboard includes the tactics and techniques to describe adversarial actions and behaviors. Techniques are specific actions an attacker might take, and tactics are phases of attacker behavior. See MITRE ATT&CK and Alarms List View for more information.
You can watch the How to improve threat detection and response with the MITRE ATT&CK framework customer training webcast on-demand to learn how to use MITRE ATT&CK within USM Anywhere.
Widgets in the MITRE ATT&CK Dashboard
WidgetDescription
MITRE ATT&CKTable with Tactics and Techniques, see Alarms List View for more information.
Command and Control Top AssetsThe command and control tactic represents how adversaries communicate with systems under their control within a target network.
Exfiltration Top AssetsExfiltration refers to techniques and attributes that result or aid in the adversary stealing files and information from a target network.
Privilege Escalation Top AssetsPrivilege escalation is the result of actions that allows an adversary to obtain a higher level of permissions on a system or network.
Lateral Movement Top AssetsLateral movement consists of techniques that enable an adversary to access and control remote systems on a network.
Credential Access Top AssetsCredential access represents techniques resulting in access to or control over system, domain, or service credentials.
Discovery Top AssetsDiscovery consists of techniques that allow the adversary to gain knowledge about the system and internal network.
Defense Evasion Top AssetsDefense evasion consists of techniques an adversary may use to evade detection or avoid other defenses.
Persistence Top AssetsPersistence is any access, action, or configuration change to a system that gives an adversary a persistent presence on that system.
Execution Top AssetsThe execution tactic represents techniques that result in execution of adversary-controlled code on a local or remote system.
Collection Top AssetsCollection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration.
Initial Access Top AssetsThe initial access tactic represents the vectors adversaries use to gain an initial foothold within a network.
I