Query Details
// Sentinel Alerts & MITRE ATT&CK Analysis // https://www.linkedin.com/posts/activity-7195301674301759488-rMQS/ // The Microsoft Sentinel MITRE ATT&CK (Preview) blade offers a comprehensive overview of all Sentinel detections aligned with the MITRE ATT&CK technique matrix. As a Security Operations Center (SOC) analyst overseeing analytic rules, are you aware of which MITRE Techniques are activated most frequently or infrequently? Running the subsequent KQL query will unveil the technique adversaries most commonly employ. Evaluate which techniques are triggered most or least often in comparison to your Microsoft Sentinel MITRE ATT&CK (preview) coverage. This analysis is crucial to determine if your analytic rules are sufficiently robust to identify these frequently used techniques. // KQL - Summarization of Techniques Triggered SecurityAlert | where TimeGenerated > ago(90d) | mv-expand todynamic(Techniques) | extend MitreAttackTechniques = tostring(Techniques) | where MitreAttackTechniques != "" | summarize Technique_Count=count() by MitreAttackTechniques | sort by Technique_Count desc
This KQL query is designed to help Security Operations Center (SOC) analysts understand which MITRE ATT&CK techniques are most frequently triggered by alerts in Microsoft Sentinel over the past 90 days. Here's a simple summary of what the query does:
This analysis helps SOC analysts determine which techniques are most and least frequently detected, allowing them to assess and improve their detection rules accordingly.

Steven Lim
Released: August 5, 2024
Tables
Keywords
Operators