Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

The Essential Guide to

MITRE ATT&CK Round 4


Enterprise Evaluation

This e-book provides a comparative look at how vendors performed


across various measures, with guidance on how to explore the results
further. We include key descriptions of MITRE’s testing methodology,
the tools MITRE Engenuity provides to help visualize and compare
results, and considerations for analysis to help you assess for yourself
which vendor best fits your organization’s endpoint security needs.
Introduction • 100% detection across all 19 steps in the
What was the motivation behind the
detection evaluation
Since 2018, the MITRE Engenuity ATT&CK® Eval-
• 98.2% technique level detection (107/109 ATT&CK evaluations?
uations have provided a controlled environment
substeps) • Vendors are using ATT&CK to articulate
for security vendors to essentially “test their their capabilities, but there is no neutral
• 98.2% analytics detections
wares” against attack methodologies inspired by authority to evaluate their claims.
real-world threats. • 98.2% Visibility (107/109 substeps)
What are the ATT&CK evaluations?
Focused on the technical ability to address known Evaluations Overview
• Open, transparent, and objective.
adversary behaviors, the evaluations provide In the last evaluation round, MITRE Engenuity Methodology and results are published
the opportunity to analyze endpoint detection featured attack scenarios that leveraged common openly and clearly.
and response (EDR) and extended detection and malware such as Carbanak. However, this year, • Evaluates both protection and detection
response (XDR) products against real-world MITRE Engenuity investigates how Sandworm efficacy. (Protection evaluation was
attack sequences. included starting in Round 3.)
Team and Wizard Spider abuse data encrypt-
ed for impact. As the final tactic of the MITRE • A compilation of the detections MITRE
For the fourth year running, Palo Alto Networks
Engenuity observes in response to
has emerged as one of the top-performing ven- ATT&CK framework, an impact tactic specifies an emulated adversary’s tactics and
dors in the MITRE Engenuity ATT&CK Evalua- how an attacker could cause damage, including techniques.
tions, blocking 100% of the tests in the protec- destroying or tampering with data, launching
tion evaluation and detecting 100% of the steps denial-of-service (DoS) attacks, and other tech- What aren’t the ATT&CK
in the detection evaluation. niques. evaluations?
• Not designed to address noise or false
At a high level, Cortex XDR® achieved the In the past, Sandworm has leveraged encryption
positives.
following against the tactics, techniques and for destroying data, perhaps most notably with
• Not meant to be a competitive analysis
procedures (TTPs) used by Wizard Spider and their NotPetya malware that disguised itself as
that produces a score.
Sandworm: ransomware. In Wizard Spider’s case, they have
• Not a ranking or rating of a vendor’s
• 100% block rate/prevention in the protection leveraged data encryption for ransomware, in- technology.
evaluation cluding the widely known Ryuk malware.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 2
The MITRE ATT&CK
Framework
• The MITRE ATT&CK
framework has become
the standard for how
the security world
communicates about
adversaries and their
techniques.
• ATT&CK stands for
Adversarial Tactics,
Techniques & Common
Knowledge.
• Provides detailed
information about all the
adversarial techniques.
• Details of threat groups
that have used these
techniques.
• Useful information
about how to detect and
mitigate these tactics and
techniques.

Figure 1: Understanding the MITRE ATT&CK Framework

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 3
For Round 4 of the MITRE Engenuity ATT&CK What’s Different This Year? high-quality detections and not generating un-
Evaluations, they tested an even larger field of This year’s evaluations are quite similar to last needed noise.
vendors (30) compared to the previous years, year’s, with one significant change to how the
providing further evidence of the importance MITRE Engenuity’s Approach
evaluations are “scored.” This year, each of
of third-party evaluations in the marketplace the 109 substeps in the detection evaluation is Focused on articulating how detections occur
for objective guidance around choosing security awarded only one detection type. In previous rather than assigning scores to vendor capabili-
solutions. years, it was possible to receive both a teleme- ties, MITRE Engenuity categorizes each detection
These evaluations assess participating vendors try detection and a general tactic or technique based on quality and precision. (See Detection
to identify areas for improvement, including up- detection type. Categories below for more details.) While MITRE
dating prevention, detection, and response rules Engenuity makes every effort to capture different
All of the detections were tallied up, and a total
that inform security policies. While this exercise detections, vendor capabilities may be able to
number of detections was identified on the
does not provide overall comparison scores or results page for each vendor. This led to several
ranking, it provides a vendor-agnostic summary MITRE Round 4 Technique Detections
vendors claiming they had the most effective
of the various methodologies employed by secu- Technique detections are the gold standard, providing the
product because they had the most combined full what, why, and how of an attack.
rity practitioners for identifying and preventing detections. In the real world, security analysts
sophisticated attack campaigns. Palo Alto Networks 97%
prefer high-quality detections without being
SentinelOne 93%
Testing 30 vendor participants, covering 19 accompanied by many less-clear detections. To
Microsoft 77%
separate test steps with 109 substeps on both address this concern, the test designers decided
CrowdStrike 71%
Windows® and Linux operating systems, the that this year there would be only one detection
evaluations pitted each vendor against the TTPs per substep, and the total detections number (Detections resulting from Configuration Changes excluded)

leveraged by the Wizard Spider and Sandworm would no longer be reported. This is a change we
Team threat groups. should all applaud MITRE Engenuity for making Figure 2: Technique detection among
leading EDR solutions
as it rewards security solutions for providing

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 4
detect procedures in ways that MITRE Engenuity compare the various levels of security efficacy In using the modern attack TTPs from groups
did not capture. For a detection to be included for by participating vendors, all aligned around a such as Wizard Spider and Sandworm (See
a given technique, it must apply to that technique common lexicon to ensure parity and continuity figure 1.) and emulating the attack scenarios in
specifically. For example, just because a detection across the evaluation. a controlled environment—the MITRE Engenu-
applies to one technique in a step or substep does ity-provided cyber range—solution providers
not mean it applies to all techniques of that step. can assess their performance and determine
“To provide transparency around
For proof of detection in each category, MITRE areas for improvement. The resulting perfor-
the ability of defensive solutions to
Engenuity requires that the proof be provided mance data can provide insights into solution
address the behaviors described in
to them, but they may not include all detection or product modifications and guide fine-tuning
ATT&CK and propel the enterprise se-
details in public results, particularly when those any steps that may have underperformed.
curity market forward, the Enterprise
details are sensitive.
Evaluations methodology was specif- Linked to Russia through TrickBot leaks, Wizard
To determine the appropriate category for a ically designed to be data-driven and Spider is a Russia-based cybercriminal group tied
detection, MITRE Engenuity reviews the screen- focus on this very specific topic.” to the operation of the TrickBot botnet, which
shot(s) provided, the notes taken during the –Frank Duff, Ex-Director of was initially used for targeting banking sites in
evaluation, the results of follow-up questions to ATT&CK Evaluations North America, Australia, and throughout Eu-
the vendor, and vendor feedback on draft results. rope. Due to the persistent nature of a botnet ar-
They also independently test procedures in a chitecture and continued malware development,
separate lab environment as well as review open So, how can the MITRE Engenuity ATT&CK TrickBot has infected over one million comput-
source tool detections and forensic artifacts. This evaluations help inform a defensive strategy for ing devices since its release in 2016. Starting in
testing informs what is considered to be a detec- solution providers like us? At Palo Alto Networks, August 2018, Wizard Spider—considered the
tion for each technique. participating in these evaluations allows us to be world’s first cyber-cartel—began conducting
tested by a neutral, unbiased third party, le- “big-game hunting” campaigns using Ryuk ran-
Using MITRE Engenuity to Help veraging current, real-life sophisticated attack somware which targeted larger organizations for
Evaluate EDR and XDR Solutions sequences that yield constructive insights into heavier ransoms, culminating in US$61 million
For organizations reviewing EDR and XDR solu- how we can build more effective detection and extorted between 2019 and 2020.
tions and vendors, the MITRE Engenuity results prevention solutions.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 5
Sandworm is attributed to Unit 74455 of the ping giant Maersk who claimed US$1.3 billion
Russian Main Intelligence Directorate (GRU) by in losses from computer repair and interrupted NotPetya took down systems
the U.S. Department of Justice. Sandworm’s most operations. In addition to orchestrating disrup- worldwide, including FedEx
notorious attacks include those against Ukrainian tive attacks on critical infrastructure, they’ve and shipping giant Maersk
electrical companies in 2015 and 2016 and in 2017 targeted government organizations and elections who claimed US$1.3 billion in
with the NotPetya attacks. NotPetya took down and public events such as the PyeongChang Win- losses from computer repair and
systems worldwide, including FedEx and ship- ter Olympics in 2018. interrupted operations.

About the Adversaries


Wizard Spider Sandworm Team
Russia-based—Financially motivated Russia-based—Destructive threat group
Also known as: Also known as:
• MITRE ATT&CK Group ID: • ATT&CK Group ID: G0034
G0008 • Russia’s General Staff Main Intelligence Directorate (GRU) Main
• Grim Spider, UNC1878, Center for Special Technologies (GTsST) military unit 74455
TEMP.MixMaster • ELECTRUM, Telebots, IRON VIKING, BlackEnergy, Quedagh,
VOODOO BEAR
Known for:
• Conti ransomware Known for:
• TrickBot • 2015–2016 Attacks against Ukrainian electrical infrastructure
• Ryuk ransomware • 2017 NotPetya attacks
• CISA Alert: Ransomware • 2018 Olympic Destroyer South Korea
campaign against US hospitals • 2022 Linked to HermeticWiper

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 6
MITRE’s Wizard Spider/Sandworm
emulation at a glance:
• Detection evaluation had 19 attack
steps with 109 substeps
• Protection evaluation had 9 attack
Wizard Spider steps with 98 substeps
Sandworm • To view the in-scope techniques for the
Common Wizard Spider/Sandworm evaluation
in the ATT&CK Navigator, MITRE
provides the layer file available here.

Figure 3: The MITRE ATT&CK framework: Wizard Spider & Sandworm

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 7
MITRE Engenuity Round 4 Methodology
The Environment Wizard Spider/Sandworm Evaluation Environment
The evaluations were performed in the Microsoft Azure® cloud. There
were two organizations with separate networks and domains, with
Windows Defender disabled for certain portions of the evaluations.
The networks will contain domain-joined machines running Windows
Server 2019, Windows 10 Pro, and CentOS 7.9. The versions are as
follows:
• Windows Server 2019
» Publisher: MicrosoftWindowsServer
» Version: 1809
» SKU: 2019-Datacenter
• Windows 10 Pro
» Publisher: MicrosoftWindowsDesktop
» Version: 20h2
» SKU: 20h2-pro Figure 4: ATT&CK range–Azure network

• CentOS 7.9
Target Hosts:
» Publisher: Open Logic
» Windows Server 2019
» SKU: 7_9
» Windows 10
» Kernel: 3.10.0-1160.15.2.el7.x86_6
» CentOS 7.7

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 8
The evaluation focuses on articulating how detections occur rather detect procedures in ways that MITRE Engenuity did not capture.
than assigning scores to vendor capabilities.
Starting with the Wizard Spider and Sandworm evaluations, each
MITRE Engenuity organizes detections according to each substep (i.e., substep has a single detection category that represents the highest
implementation of a technique). For a detection to be included for a level of context provided to the analyst across all detections for
given substep, it must apply to the specific technique-under-test (i.e., that substep. For reference, the context provided by each detection
the detection must apply to the one technique associated with that category increases from left to right, with technique being the highest
substep, not other or all techniques of that step). For each detection, context within the detection category diagram. An image gallery
they require that proof/evidence be provided, but MITRE Engenuity will display evidence of the detection that generated that detection
may not include all detection details in public results, particularly when category for that substep as well as other relevant images from other
those details are sensitive. While MITRE Engenuity makes every effort detections associated with that substep. Data sources will be tied to
to capture all relevant detections, vendor capabilities may be able to each screenshot within the gallery.

Malicious
Malicious activity detected
activity detected with context
Malicious identifying the
with context
activity how
identifying the
detected
Activity why
reason
detected, no unknown
context
Missed
detection Technique
Tactic
General
Telemetry
None

Analytic coverage

Minimally processed data Enriched detection

Figure 5: Wizard Spider/Sandworm detection categories Figure 6: MITRE Engenuity detection categories

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 9
Detections captured that require detection category modifiers (e.g., • None: No data was made available within the capability related to
configuration change or delayed) will be separated within a substep’s the behavior under test that satisfies the assigned detection criteria.
results to clearly identify the different types of detections and allow There are no modifiers, notes, or screenshots included with a None.
users to more easily filter the results based on whether to include or • Telemetry: Minimally processed data collected by the capability
exclude these types of detections. To determine the appropriate cate- showing that event(s) occurred specific to the behavior under test
gory for a detection, MITRE Engenuity reviews the evidence provided, that satisfies the assigned detection criteria. Evidence must show
notes taken during the evaluation, results of follow-up questions to definitively that behavior occurred and be related to the execution
mechanism (did happen vs. may have happened). This data must be
the vendor, and vendor feedback on draft results. MITRE Engenuity
visible natively within the tool and can include data retrieved from
also independently tests procedures in a separate lab environment and
the endpoint.
reviews open source tool detections and forensic artifacts. This testing
informs what is considered to be a detection for each technique. • General: Processed data specifying that malicious/abnormal event(s)
occurred, with relation to the behavior under test. No or limited
After performing detection categorizations, MITRE Engenuity calibrates details are provided as to why the action was performed (tactic), or
the categories across all vendors to look for discrepancies and ensure details for how the action was performed (technique).
categories are applied consistently. The decision of what category to • Tactic: Processed data specifying ATT&CK Tactic or equivalent level
apply is ultimately based on human analysis and is therefore subject to of enrichment to the data collected by the capability. Gives the ana-
discretion and biases inherent in all human analysis, although MITRE lyst information on the potential intent of the activity or helps answer
Engenuity does make efforts to hedge against these biases by structur- the question “why this would be done.” To qualify as a detection,
ing analysis as described above. there must be more than a label on the event identifying the ATT&CK
Tactic, and it must clearly connect a tactic-level description with the
Detection Categories technique under-test.

• Not Applicable: Vendor did not have visibility on the system under • Technique: Processed data specifying ATT&CK Technique,
test. The vendor must state before the evaluation what systems they Sub-Technique, or equivalent level of enrichment to the data collect-
did not deploy a sensor on to enable Not Applicable to be in scope ed by the capability. Gives the analyst information on how the action
for relevant steps. was performed or helps answer the question “what was done”

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 10
(i.e., Accessibility Features or Credential Dumping). To qualify as a their needs. This approach allows end users of the results to determine
detection, there must be more than a label on the event identifying what they value most in a detection (e.g., some organizations may
the ATT&CK Technique ID (TID), and it must clearly connect a tech- want telemetry, while others would want Technique detection).
nique-level description with the technique under-test.
• Configuration Change: The configuration of the capability was
Protection Categories changed since the start of the evaluation. This may be done to show
additional data can be collected and/or processed. The Configuration
Protection categories were used to identify whether a protection was Change modifier may be applied with additional modifiers describing
encountered in the adversary emulation, and whether a user prompt the nature of the change, to include:
was required to confirm the blocking activity. Categories are subject to
» Data Sources—Changes made to collect new information by the
change, based on lessons learned from the evaluation. sensor.
• Not Applicable: Vendor did not deploy protection capabilities on the » Detection Logic—Changes made to data processing logic.
system under test. The vendor must state before the evaluation what
» UX—Changes related to the display of data that was already col-
systems they did not deploy a sensor on to enable Not Applicable to
lected but not visible to the user.
be in scope for relevant steps.
• Delayed: The detection is not immediately available to the analyst
• None: The technique under test was not blocked and/or the tech-
due to additional processing unavailable due to some factor that
nique was unsuccessful and there is no evidence provided to the
slows or defers its presentation to the user, for example subsequent
user that the capability blocked the activity.
or additional processing produces a detection for the activity. The
• Blocked: The technique under test was blocked and the user was Delayed category is not applied for normal automated data inges-
explicitly informed that the capability blocked the activity. tion and routine processing taking minimal time for data to appear
to the user, nor is it applied due to range or connectivity issues
Modifier Detection Types that are unrelated to the capability itself. The Delayed modifier will
MITRE Engenuity differentiates between types of detection to provide always be applied with modifiers describing more detail about the
more context around the capabilities a vendor offers in a way that nature of the delay.
allows end users to weigh, score, or rank the types of detection against

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 11
Cortex XDR vs. Wizard Spider and Sandworm: Our Results
Focused on analyzing how detections occur rath- third-party data to stop sophisticated attacks.
er than assigning scores to vendor capabilities, As evidenced by our leading results in the MITRE Cortex XDR achieved high
MITRE Engenuity categorizes each detection and Engenuity ATT&CK Evaluations for four years performance in protection,
capture and then organizes detections according running, Cortex XDR achieved high performance detection, and visibility—the
to each attack technique. Techniques may have in protection, detection, and visibility—the pillars for a holistic and best-in-
more than one detection if a security solution pillars for a holistic and best-in-class endpoint class endpoint security solution.
detects a technique in different ways. Notably, security solution.
this year, they have decided to record only the
Cortex XDR provides increased detection fidelity
highest-quality detection for each attack substep.
with behavioral analytics and machine learning.
Each vendor participating was given a “visibili- It collects and stitches together a broad set of
ty” score, which represents the number of attack data, including logs from Cortex XDR endpoints,
substeps (out of 109) where the corresponding Next-Generation Firewalls, Prisma® Access,
solution was able to show any evidence of the identity providers, and much more. Cortex XDR
attack substep. This includes telemetry detec- builds a profile of expected user behavior to
tions (those that provided minimal processing of pinpoint unusual behavior indicative of an attack.
the data collected) and higher-quality detections Behavioral analytics applies machine learning
that leveraged analytics to process the collected and statistical analysis to rich data to uncover
data and provide insight into the purpose and attacker tactics and techniques with fewer false
method of the attack. positives than traditional detection rules.
Because Cortex XDR combines protection, ana-
The Cortex XDR Difference–the Data
lytics detection, and visibility, anomalous behav-
Doesn’t Lie
ior is precisely identified, expediting the triage
As the industry’s first XDR platform, Cortex process and reducing dwell time and subsequent
XDR® integrates endpoint, network, cloud, and lateral movement within a network.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 12
Accurate Detection Is Needed for
Complete Remediation

In the early days of the MITRE Engenuity Enterprise 4 Evaluation: Technique Detections
Evaluations, vendors focused on visibility or
coverage as a measure of success. With the
attention these evaluations have provided
and the increased capabilities the cyberthreat
landscape has mandated, visibility has largely
become table stakes for these evaluations, and
the focus should now be on providing high-
quality detections. As noted above, technique
detections provide complete insight into not
only why an adversary is performing an action
but how they are performing it. This level of
detail is necessary for defenders to understand
the full scope of an attack and completely
remediate the threat.

All of Cortex XDR’s detections were


Technique detections, the highest
quality possible. Figure 7: Palo Alto Networks stands alone, providing the most technique detections in the
evaluation. Note: detections resulting from config changes excluded.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 13
Protection Is the First Line of Defense
Accurate prevention is critical in an EDR solu-
tion, as it prevents the adversary from gaining a Enterprise 4 Evaluation: Protection Efficacy
foothold and significantly reduces the burden on
defenders to remediate attacks. This frees up time
for analysts to engage in threat hunting. Detailed
detection provides complete visibility into the
attack sequence, delivering the right context to
pinpoint anomalous activity that warrants fur-
ther investigation. Visibility is the foundation of
prevention and detection, but visibility alone often
amounts to just noise. Each step in the protection
evaluation had multiple substeps that the adversary
took to achieve their goal. In total, there were 109
substeps spanning the 9 attack tests. Of these 109
substeps, 98 of these consisted of actions that were
deemed as “Blockable” under the MITRE Preven-
tion evaluation; the remaining substeps consisted
of actions which would not be considered blockable
under the evaluation, and for which blocking would
adversely affect evaluation results. Each of the 98
blockable substeps consisted of a specific malicious
action that furthered the attackers’ objectives and
represents negative impact to the organization. Figure 8: Cortex XDR blocked 100% of the protection steps and 99% of all 98
Therefore, it is advantageous to accurately block AS substeps.
MANY of these substeps as possible.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 14
Figure 10: Combined protections and detections graph with all protection substeps included, and detections resulting from configuration
changes excluded

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 15
Enterprise 4 Evaluation: Analytic Coverage (configuration changes not counted)

Figure 11: Several vendors claim to have the best results in this year’s evaluation based on analytic coverage. When
detections resulting from configuration changes are excluded, Cortex XDR is unbeaten in analytic coverage.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 16
Enterprise 4 Evaluation: Visibility (configuration changes not counted)

Figure 12: Visibility is the foundation for preventions and detections. Cortex XDR was unbeaten in attack visibility
when detections resulting from configuration changes were excluded.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 17
About Configuration Changes while including detections achieved in the do-
over resulting from a configuration change. It is In the real world, an attacker
MITRE Engenuity allows for solution providers
important to note there is no limit to what can be doesn’t give you a second chance
to have a “do-over” if a step in the evaluations
changed when making a configuration change, at preventing a breach by allowing
did not produce the desired detection. These
and there is also no commitment from the vendor a configuration change.
do-overs are called “configuration changes.”
This allows security vendors to improve their to include these changes in their production code.
detection against a technique they did not detect Examples of configuration changes include:
with their initial configuration. Therefore, a • A new rule is created, a pre-existing rule en-
configuration change is simply a detection that abled, or sensitivities (e.g., block lists) changed
was made possible because a change was made to to successfully trigger during a retest. These
garner a better result. MITRE Engenuity provides would be labeled with the modifier “Configu-
this opportunity for vendors to have the chance ration Change-Detection Logic.”
to validate how changes to the solution may im- • Data showing account creation is collected on
prove security efficacy. the backend but not displayed to the end user
by default. The vendor changes a backend set-
While we understand and appreciate the intent
ting to allow telemetry on account creation to
for configuration changes in these evaluations,
be displayed in the user interface, so a detec-
we feel it is more realistic to exclude detections
tion of telemetry and “Configuration Change-
directly resulting from a configuration change UX” would be given for the Create Account
when comparing results. Unfortunately, many technique.
vendors are touting industry-leading results

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 18
Enterprise 4 Evaluation: Vendor Config Changes

Figure 13: Number of configuration changes per vendor in the Round 4 evaluations

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 19
The Numbers Don’t Tell the Whole Story These ATT&CK Evaluation results reveal our dedication to preventing
every possible threat and providing accurate and detailed detections of all
When examining the MITRE Engenuity results, it’s important to look at
adversarial activity to ensure our customers are kept safe from the most
the product screenshots to get a better sense of the story being told to
determined adversaries.
the security analyst.

Day 1 (Wizard Spider): Cortex XDR groups all malicious activity into a Day 2 (Sandworm): Cortex XDR provides detailed technique-level
single incident, clearly correlating all malicious activity, abnormal behav- detections which identify what the adversary was trying to accomplish
ior, and malware detections. Additionally, this incident grouping pro- and precisely how they were going about it.
vides the analyst with a unified record of all actions recorded during the
incident, allowing the analyst to focus on the investigation rather than
organizing data and details from separate, ungrouped events.

Cortex by Palo Alto Networks | The Essential Guide to MITRE ATT&CK Round 4 20
More About MITRE About the MITRE options to improve their network defense. MITRE

ATT&CK and Engenuity ATT&CK Engenuity makes the methodology and resulting
data publicly available so other organizations
Cortex XDR Evaluations may benefit and conduct their own analysis and
If you’re interested in learning more about the MITRE Engenuity ATT&CK Evaluations are paid interpretation. The evaluations do not provide
attack scenarios emulated in this evaluation and for by vendors and are intended to help vendors rankings or endorsements.
how Cortex XDR performed, we have a variety of and end users better understand a product’s ca- For further information on the ATT&CK frame-
resources available on demand: pabilities in relation to MITRE’s publicly accessi- work, visit MITRE.org. Check out the ATT&CK
• All about our results in under three minutes. ble ATT&CK® framework. MITRE developed and Navigator tool to help you navigate, annotate,
Watch the video. maintains the ATT&CK knowledge base, which and visualize ATT&CK techniques.
is based on real-world reporting of adversary
• View our on-demand webinar. Dissecting the
2022 MITRE Engenuity ATT&CK Evaluations. tactics and techniques. ATT&CK is freely available
and is widely used by defenders in industry and
• Visit our webpage and read our 2022 MITRE
government to find gaps in visibility, defensive
Engenuity ATT&CK Evaluations Results blog
for more information. tools, and processes as they evaluate and select

3000 Tannery Way © 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered t­ rademark of Palo Alto Networks. A
Santa Clara, CA 95054 list of our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html.
All other marks mentioned herein may be trademarks of their respective companies.
Main: +1.408.753.4000 cortex_ebook_mitre-att&ck-evaluation-round4_050422
Sales: +1.866.320.4788
Support: +1.866.898.9087

www.paloaltonetworks.com

You might also like