Intrusion Detection and Prevention Mitigate Threats Using MITRE Framework in Snort 3 Intrusion Policies View Intrusion Events

Last updated: Aug 18, 2025

View Intrusion Events

You can view the MITRE ATT&CK techniques and rule groups in the intrusion events on the Classic Event Viewer and Unified Event Viewer pages. Talos provides mappings from Snort rules (GID:SID) to MITRE ATT&CK techniques and rule groups. These mappings are installed as part of the Lightweight Security Package (LSP).

Procedure

1

Click Analysis and select Events under Intrusions.

2

Click the Table View of Events tab.

3

Under MITRE ATT&CK, you can see the techniques for an intrusion event. Click 1 Technique to view the MITRE ATT&CK techniques.

In this example, Exploit Public-Facing Application is the technique.

4

Click Close.

5

Click Analysis and select Unified Events.

6

If not enabled, click the column selector icon to enable the MITRE ATT&CK and Rule Group columns.

7

In this example, the intrusion event is triggered by an event that is mapped to one rule group. Click 1 Group under the Rule Group column.

8

You can view Protocol, which is the parent rule group, and the DNS rule group under it. Choose Protocol > DNS to search for all the intrusion events that have at least one rule group that is .

The search results are displayed.