
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
Sentinel ATT&CK aims to simplify the rapid deployment of a threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel. Overview Sentinel ATT&CK provides the following tools: * An ARM template to automatically deploy Sentinel ATT&CK to your Azure environment * A Sysmon configuration file compatible with Azure Sentinel and mapped to specific ATT&CK techniques * A Sysmon log parser mapped against the OSSEM data model * 117 ready-to-use Kusto detection rules covering 156 ATT&CK techniques * A Sysmon threat hunting workbook inspired by the Threat Hunting App for Splunk to help simplify threat hunts * A Terraform script to provision a lab to test Sentinel ATT&CK Comprehensive guidance to help you use the materials in this repository Usage Head over to the WIKI to learn how to deploy and run Sentinel ATT&CK. A copy of the DEF CON 27 cloud village presentation introducing Sentinel ATT&CK can be found here and here. Contributing As this repository is constantly being updated and worked on, if you spot any problems we warmly welcome pull requests or submissions on
Common questions about Sentinel ATT&CK including features, pricing, alternatives, and user reviews.
Sentinel ATT&CK is A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel. It is a Security Operations solution designed to help security teams with MITRE Attack, Sysmon.
Sentinel ATT&CK is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/BlueTeamLabs/sentinel-attack/ for download and installation instructions.
Popular alternatives to Sentinel ATT&CK include:
Compare all Sentinel ATT&CK alternatives at https://cybersectools.com/alternatives/sentinel-attandck
Sentinel ATT&CK is for security teams and organizations that need MITRE Attack, Sysmon. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
AI agent that autonomously validates threat hunt hypotheses across enterprise data