{"id":31578,"date":"2022-04-18T17:25:45","date_gmt":"2022-04-18T16:25:45","guid":{"rendered":"https:\/\/www.n-able.com\/?p=31578"},"modified":"2022-04-22T09:52:18","modified_gmt":"2022-04-22T08:52:18","slug":"2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know","title":{"rendered":"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know"},"content":{"rendered":"<p class=\"p3\">It\u2019s that time of the year again! The MITRE Engenuity ATT&amp;CK evaluation results are in and generating quite the buzz in the industry. And for good reason.<\/p>\n<p class=\"p3\">The MITRE Engenuity ATT&amp;CK evaluation focuses on a tool\u2019s ability to prevent and detect cyber attacker behaviors. Now in its fourth round of testing, it has become the de-facto standard for how security solutions perform against different advanced cyberattack scenarios.<\/p>\n<p class=\"p3\">It\u2019s interesting to note that MITRE Engenuity does not declare any winners or make any rankings. Instead, they provide transparent and comprehensive assessments of how each solution addressed threat prevention and detection at each step of the process. This leaves it up to the security community to make their own analyses and draw their own conclusions as to which solution best fits their specific needs. This impartial approach is one of the reasons why the MITRE Engenuity evaluation has gained popularity in recent years\u2014a fact that is confirmed by the large number of <a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/participants?adversaries=wizard-spider-sandworm%2Ccarbanak-fin7%2Capt29%2Capt3\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">security vendors<\/span><\/a> (30) who have chosen to participate in this fourth round of evaluations.<\/p>\n<p class=\"p3\">You are probably curious to see how each solution performed. But before you start diving into the results, it\u2019s important to revisit the MITRE ATT&amp;CK evaluation framework to get a good understanding of the evaluation process\u2014how it works, key evaluation categories, and notable changes from past evaluations.<\/p>\n<h2 class=\"p4\">MITRE Engenuity ATT&amp;CK: At a Glance<\/h2>\n<p class=\"p3\">First, let\u2019s take a quick look at <a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/participants\/?adversaries=wizard-spider-sandworm\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">the MITRE ATT&amp;CK framework<\/span><\/a>. \u201cATT&amp;CK\u201d stands for \u201cAdversarial Tactics, Techniques, and Common Knowledge,\u201d and serves as a common language describing adversary behavior. <a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">MITRE<\/span><\/a> describes it as: \u201ca knowledge base of cyber adversary behavior and taxonomy for adversarial actions across their lifecycle.\u201d\u00a0 And by \u201ccyber adversary behavior\u201d, it refers to tactics and techniques based on real-world observations that provide insights into:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">Who are the typical adversaries and why they attack<\/li>\n<li class=\"li3\">How an attack is planned out, in terms of tactics and techniques used<\/li>\n<li class=\"li3\">The nature of the threat and how to communicate it and respond to it faster<\/li>\n<li class=\"li3\">What defenses can be proactively built<\/li>\n<\/ul>\n<p class=\"p3\">Every year, security solutions are evaluated against the ATT&amp;CK framework and different real-world attack scenarios. And each evaluation includes a number of attack steps (tactics) and substeps (i.e., implementations of a technique).<\/p>\n<h2 class=\"p4\">What you need to know about this year\u2019s evaluation<\/h2>\n<p class=\"p3\">This year, the attack scenarios comprised of 19 steps with 109 substeps, covering a wide range of tactics and techniques. There are several important things to note about this latest evaluation, including:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">The focus was on the data encryption for impact technique abused in ransomware attacks.<\/li>\n<li class=\"li3\">The detection evaluation scoring changed. Vendors received credit for the detection with the highest level of context (analytic coverage) provided by the solution at each substep. For this part of the evaluation, the preventative capabilities of each solution were disabled so that the evaluation could focus on the detection test.<\/li>\n<li class=\"li3\">Similar to last year, the evaluation included an <a href=\"https:\/\/medium.com\/mitre-engenuity\/2021-att-ck-evaluations-for-enterprise-call-for-participation-data-encrypted-for-impact-with-3b64cdf7b092\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">optional protections-focused scenario<\/span><\/a> to determine a vendor\u2019s ability to block key techniques and tactics instead of just identifying them. For this protection test, the preventative capabilities of each solution were enabled.<\/li>\n<\/ul>\n<p class=\"p3\">These aspects are important to keep in mind as you start digging through the results and drawing your own conclusions. So, let\u2019s take a closer look at each item:<\/p>\n<h3 class=\"p3\">Data encrypted for impact<\/h3>\n<p class=\"p3\">The 2022 MITRE ATT&amp;CK enterprise evaluations focus on two groups of threat actors: Wizard Spider and Sandworm. MITRE emulates these adversaries\u2019 tactics and techniques, with a focus on how they\u2019ve abused the <a href=\"https:\/\/attack.mitre.org\/techniques\/T1486\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Data Encrypted for Impact technique<\/span><\/a>. For example, the former leveraged data encryption for their ransomware attacks, including the Ryuk malware, while the latter leveraged encryption for destruction of data, as in the global NotPetya attack.<\/p>\n<p class=\"p3\">Given the <a href=\"https:\/\/www.sonicwall.com\/2022-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">105% increase year-over-year in ransomware attacks<\/span><\/a>, the focus on a technique abused in ransomware attacks is spot on. To get a better understanding of the tactics and techniques or the sub-steps of the attack scenarios, you can take a look at this year\u2019s <a href=\"https:\/\/mitre-attack.github.io\/attack-navigator\/%22%20%5Cl%20%22layerURL=https:\/\/raw.githubusercontent.com\/attackevals\/website\/master\/downloadable_JSON\/Wizard_Spider_and_Sandworm_Navigator_layer.json\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">ATT&amp;CK matrix<\/span><\/a>.<\/p>\n<h3 class=\"p3\">\u201cScoring\u201d based on high versus low detection context<\/h3>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/wizard-spider-sandworm\/detection-categories\" target=\"_blank\" rel=\"noopener\">The detection categories<\/a><\/span> used in the Wizard Spider and Sandworm evaluation range are differentiated based on the level of context provided, from \u201cN\/A\u201d or no context at all, to \u201cTechnique\u201d, which enriches detections with insights into how the attack is being performed, providing the highest level of context.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-31579 size-large\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg\" alt=\"\" width=\"1024\" height=\"530\" srcset=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg 1024w, https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-300x155.jpg 300w, https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-768x398.jpg 768w, https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-700x362.jpg 700w, https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18.jpg 1093w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><span class=\"s4\"><i>Source: <\/i><a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/wizard-spider-sandworm\/detection-categories\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\"><i>https:\/\/attackevals.mitre-engenuity.org\/enterprise\/wizard-spider-sandworm\/detection-categories<\/i><\/span><\/a><\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<ul class=\"ul1\">\n<li class=\"li6\"><i>N\/A = no visibility on the system and lowest level of context<\/i><\/li>\n<li class=\"li6\"><i>None = no data was made available<\/i><\/li>\n<li class=\"li6\"><i>Telemetry = minimally processed data<\/i><\/li>\n<li class=\"li6\"><i>General = data on whether a malicious\/abnormal event occurred<\/i><\/li>\n<li class=\"li6\"><i>Tactic = data specifying ATT&amp;CK Tactic or equivalent, which answer the question \u201cwhy is the attack being performed?\u201d<\/i><\/li>\n<li class=\"li6\"><i>Technique = data specifying ATT&amp;CK technique, sub-technique or equivalent, which answers the question \u201chow is the attack being performed?\u201d and provides the highest level of context<\/i><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"p3\">These detection categories are then worked into the final evaluation, which looks at:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">Analytic coverage = the ratio of substeps with detection enriched with analytic logic (i.e., general, tactic, and technique data)<\/li>\n<li class=\"li3\">Telemetry coverage = the ratio of substeps with detections displaying only minimally processed data (i.e., telemetry)<\/li>\n<li class=\"li3\">Visibility = the proportion of substeps with either an analytic or a telemetry detection (i.e., total coverage)<\/li>\n<\/ul>\n<p class=\"p3\">This \u201cscoring\u201d structure allows end users to weigh the types of detections against their needs, determine what they value most in a detection, and choose accordingly.<\/p>\n<p class=\"p3\">Last year, vendors received one point for each type of coverage their solution was able to provide. But this year, one point was received only for the type of coverage with the highest level of context provided by the solution at each substep, even though the solution was able to provide lower-level context detections in parallel.<\/p>\n<p class=\"p3\">This change in scoring is important because it provides more clarity on what vendor has more analytic coverage. If, for example, a vendor has a high telemetry coverage rate, that is not necessarily a good sign, as it can mean that their analytics were not able to enrich the basic telemetry data.<\/p>\n<h3 class=\"p3\">Protection evaluation<\/h3>\n<p class=\"p3\">This test looks at the solutions\u2019 ability to block key techniques and tactics, instead of just discovering and logging them. The <a href=\"https:\/\/assets.sentinelone.com\/mitre-22\/mitre-wbr-22?lb-mode=overlay&amp;&amp;lb-width=100&amp;lb-height=100\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">protection categories<\/span><\/a> are straightforward, meaning that for each threat detected, the solution would either be able to block it (in which case it would be marked as \u201cBlocked\u201d) or not (in which case, it would be marked as \u201cnone\u201d); in cases where blocking is not relevant, for each solution the protection piece would be marked as \u201cnot applicable.\u201d<\/p>\n<p class=\"p3\">Blocking threats in real time is often preferred to just detecting them, which is why considering this protection piece as part of the evaluation is so important.<\/p>\n<h2 class=\"p4\">How can you leverage the MITRE ATT&amp;CK Evaluation?<\/h2>\n<p class=\"p3\">According to the <a href=\"https:\/\/www.n-able.com\/resources\/state-of-the-market-the-new-threat-landscape?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">\u201c2022 State of the Market: The New Market Landscape Report \u2013 Pushing MSP Security to the Next Level\u201d<\/span><\/a>, 42% of the targeted attacks MSPs are experiencing most frequently are ransomware-driven. If you are sharing this experience, then this year\u2019s MITRE ATT&amp;CK Evaluation should be of particular interest to you and your customers. The MITRE ATT&amp;CK evaluation helps you get a better understanding not only of some of the most devastating threats out there such as ransomware, but also of the security tools at your disposal and how you can plan your security strategy.<\/p>\n<p class=\"p3\">Starting from your own needs and priorities, you can use the ATT&amp;CK framework to:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">understand what quality detections look like<\/li>\n<li class=\"li3\">identify evidence of ATT&amp;CK techniques in your environment<\/li>\n<li class=\"li3\">build security metrics relevant to your environment<\/li>\n<li class=\"li3\">identify gaps in your current security stack<\/li>\n<li class=\"li3\">find security solutions that are relevant to your environment, your customers\u2019 environments, and current threat landscape<\/li>\n<\/ul>\n<p class=\"p3\">For MSPs using N&#8209;able EDR, the 2022 MITRE ATTACK evaluation results brought great news. N&#8209;able EDR is powered by SentinelOne, a solution that <a href=\"https:\/\/www.sentinelone.com\/blog\/our-take-sentinelones-2022-mitre-attck-evaluation-results\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">leads the latest MITRE ATT&amp;CK Evaluation results<\/span><\/a> with:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">100% Protection: (9 of 9 MITRE ATT&amp;CK tests)<\/li>\n<li class=\"li3\">100% Detection: (19 of 19 attack steps)<\/li>\n<li class=\"li3\">100% Real-time (0 Delays)<sup>1<\/sup><\/li>\n<li class=\"li3\">99% Visibility: (108 of 109 attack sub-steps)<sup>2<\/sup><\/li>\n<li class=\"li3\">99% Highest Analytic Coverage: (108 of 109 detections)<sup>3<\/sup><\/li>\n<\/ul>\n<p class=\"p3\">One more thing to keep in mind: Linux played a key role in this year\u2019s test and SentinelOne detected 19\/19 techniques tested on all operating systems, including Linux. As Linux powers most cloud workloads, not only is SentinelOne effective at providing user endpoints with unparalleled protection, but cloud workloads as well. This is increasingly important, because as more MSPs and MSP customers move to the cloud, they need to do that with speed and confidence.<\/p>\n<p class=\"p3\">So, as you browse through the MITRE ATT&amp;CK evaluation results, always compare them against your own needs and priorities. And don\u2019t forget\u2014we\u2019re always here for you should you like to learn more about N&#8209;able EDR and how it can help you meet your plans. All you have to do is <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\/contact\"><span class=\"s1\">reach out<\/span><\/a>.<\/p>\n<h6 class=\"p11\"><i><sup>1 <\/sup>The solution works in real-time, with no detection delays. A delayed detection is any detection that happens after 12 hours.<\/i><\/h6>\n<h6 class=\"p11\"><i><sup>2<\/sup> SentinelOne detected the encrypted network traffic and port, but not the specific cryptographic algorithm in use (RC4).<\/i><\/h6>\n<h6 class=\"p11\"><i><sup>3 <\/sup>All detections were correlated 100% to the relevant MITRE ATT&amp;CK technique \u2013 the highest quality detection.<\/i><\/h6>\n<h6><\/h6>\n<p class=\"p3\"><em>Emma Nistor is senior product marketing manager, N&#8209;able EDR<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this blog, Emma Nistor takes a look at the evaluation results for MITRE Engenuity ATT&amp;CK\u2019s fourth round of testing and what it means for IT professionals and service providers.<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-31578","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know - N-able<\/title>\n<meta name=\"description\" content=\"In this blog, we look at the evaluation results for MITRE Engenuity ATT&amp;CK\u2019s fourth round of testing and what it means for IT pros.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know - N-able\" \/>\n<meta property=\"og:description\" content=\"In this blog, we look at the evaluation results for MITRE Engenuity ATT&amp;CK\u2019s fourth round of testing and what it means for IT pros.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-18T16:25:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-22T08:52:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/220414_NA_Blogbanner_2022MITREATTCKEvaluationResults_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emma Nistor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/220414_NA_Blogbanner_2022MITREATTCKEvaluationResults_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Nistor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know\"},\"author\":{\"name\":\"Emma Nistor\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\"},\"headline\":\"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know\",\"datePublished\":\"2022-04-18T17:25:45+01:00\",\"dateModified\":\"2022-04-22T08:52:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know\"},\"wordCount\":1565,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know\",\"name\":\"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg\",\"datePublished\":\"2022-04-18T17:25:45+01:00\",\"dateModified\":\"2022-04-22T08:52:18+00:00\",\"description\":\"In this blog, we look at the evaluation results for MITRE Engenuity ATT&CK\u2019s fourth round of testing and what it means for IT pros.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\",\"name\":\"Emma Nistor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"caption\":\"Emma Nistor\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know - N-able","description":"In this blog, we look at the evaluation results for MITRE Engenuity ATT&CK\u2019s fourth round of testing and what it means for IT pros.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know","og_locale":"fr_FR","og_type":"article","og_title":"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know - N-able","og_description":"In this blog, we look at the evaluation results for MITRE Engenuity ATT&CK\u2019s fourth round of testing and what it means for IT pros.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-04-18T16:25:45+00:00","article_modified_time":"2022-04-22T08:52:18+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/220414_NA_Blogbanner_2022MITREATTCKEvaluationResults_ss.jpg","type":"image\/jpeg"}],"author":"Emma Nistor","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/220414_NA_Blogbanner_2022MITREATTCKEvaluationResults_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Emma Nistor","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know"},"author":{"name":"Emma Nistor","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58"},"headline":"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know","datePublished":"2022-04-18T17:25:45+01:00","dateModified":"2022-04-22T08:52:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know"},"wordCount":1565,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg","articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know","url":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know","name":"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg","datePublished":"2022-04-18T17:25:45+01:00","dateModified":"2022-04-22T08:52:18+00:00","description":"In this blog, we look at the evaluation results for MITRE Engenuity ATT&CK\u2019s fourth round of testing and what it means for IT pros.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-19-at-17.12.18-1024x530.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/2022-mitre-attck-evaluation-results-are-in-what-you-need-to-know#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"2022 MITRE ATT&amp;CK Evaluation Results Are In\u2014What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58","name":"Emma Nistor","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","caption":"Emma Nistor"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/31578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=31578"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/31578\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=31578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}