Skip to main content
MITRE ATT&CK Report
Updated over 3 weeks ago

About the MITRE ATT&CK Report

The MITRE ATT&CK interactive dashboard aligns vulnerabilities and risk management to the MITRE ATT&CK matrix to help implement a best practices approach to prioritization and mitigation. The widgets in this report map vulnerabilities in your environment to specific MITRE Tactics and Techniques using your preferred criteria and filters. You can drill into vulnerability details within the reports to learn more and take immediate action.

Use the "Filters" pane on the right to focus your report. Click on a specific data element to filter the entire report or to access more data, and hover over a widget for more actions and information.

Before you dive in

First, cover the Reports (Analytics) Filters and Data Drilling to learn about the expected behavior of the trends and presented data.


Widgets and trends

Findings (Instances) by ATT&CK Tactic and Risk Level

Count of the findings (instances) by ATT&CK Tactic, stacked by Risk Level. Click on a tactic or a stack to narrow down the list of data.

Findings (Instances) by ATT&CK Tactic & Technique

The count of findings (instances) distributed by Tactics and Techniques. Hover over an element in the matrix to view the Max Risk and count of unique vulnerabilities. Expand a technique to view a breakdown of the findings (instances) by Business Group. Use the filters throughout the report to narrow down the data.

Click on an element in the matrix table cells to filter the other widgets and focus on the correlated data.

Click a Business Group to filter the other widgets and focus on the correlated data.

Detailed List of Unique Vulnerabilities

Dynamic list of unique vulnerabilities that respectively responds to selecting other data elements in the other widgets. Click on the vulnerability hyperlink for more details and to take remediation actions.

This list of unique vulnerabilities displays risks in the statuses “Vulnerable” and “In Progress” only. It doesn’t display vulnerabilities in the “Ignored” status or in Exception Requests.

Sources With Highest Asset Count

A chart of the top 5 sources by the highest asset count. Unique asset identification is determined by ״Asset ID״ per source. An asset that exists in two or more sources is counted once in each source (for example, in a CMDB source and a scanner source).

Source is a connector type. If you have two connectors using the same scanner or CMDB, they are represented under the same source on the chart.

Operating Systems With the Highest Asset Count

A chart of the top 5 Operating Systems by the highest unique asset count. Asset uniqueness is determined by “Asset ID“.

Assets by Type

Count of the assets in the environment by asset type.

Assets by Business Group

Count of assets in the environment by Business Groups.


Reports (Analytics) FAQ and Data Validation

Read our Reports (Analytics) FAQ and Data Validation article here.

Did this answer your question?