Documentation
ThreatEyeThreatEye User GuideDownload PDF
Mitre Attack
The Mitre Attack widget shows you the number of findings in the various categories used to attack/infiltrate your environment. Click a Mitre Attack category and the Top Findings by Severity widget is updated to show the findings associated with the category. The descriptions for various attacks can be found here: https://attack.mitre.org/tactics/enterprise/.
Reconnaissance: Displays how many times your environment has been tested or checked for potential vulnerabilities.
Resource Development: Displays how many times your environment has been under threat by external entities to gain resources for supporting their operations within your environment.
Initial Access: Displays how many times your environment has been breached to give initial access to an external resource.
Credential Access: Displays how many times usernames/passwords have been compromised within your environment.
Discovery: Displays how many times your environment has been mapped to gain knowledge about your system and environment.
Lateral Movement: Displays how many times an external entity has moved within resources in your environment.
Defense Evasion: Displays how many times an external entity has used an evasive technique to avoid detection.
Command and Control: Displays how many times an external entity has attempted to communicate and control potential compromised systems.
Collection: Displays how many times different collection techniques have been implemented to gather data and information within your environment.
Exfiltration: Displays how many times data has been extracted from in your environment.