-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution] Incorrect rule count on MITRE coverage tactic cell #167930
Comments
Pinging @elastic/security-solution (Team: SecuritySolution) |
Pinging @elastic/security-detections-response (Team:Detections and Resp) |
@dplumlee Let's sync and see if we could quickly fix this in 8.11 |
@dplumlee @banderror I checked this behavior locally. It's Component Object Model Hijacking prebuilt rule. According to the docs it has the following categories
so we should expect it in and not listed at al in The API endpoint returns the correct result
so I'd say it's a purely UI bug. @approksiu I'm curious from where did |
++ Most definitely, there's a bug in the code that processes the API response on the FE side before showing the grid. The #167917 PR doesn't fix this. TY @maximpn for the investigation! |
@dplumlee we should have scenarios in the test plan covering behavior described in this ticket. In particular UI/backend properly handles properly techniques/sub-techniques encountered in different tactics. As far as I remember we don't have such scenarios described right now. |
@vgomez-el Fixed by #169708 and should be available in |
Closing for the same reason as #167929 (comment) |
hi @approksiu we have validated this issue on Build details:
Hence we are closing this issue and adding "QA:Validated" tag to it. thanks !! |
Describe the bug:
Rule is duplicated in the mitre att&ck page cell
Kibana/Elasticsearch Stack version:
8.10.2, 8.10.3
Server OS version:
Browser and Browser OS versions:
Elastic Endpoint version:
Original install method (e.g. download page, yum, from source, etc.):
Functional Area (e.g. Endpoint management, timelines, resolver, etc.):
Steps to reproduce:
Current behavior:
The rule count is 1 on Persistance, and 0 on Privilege Escalation.
Expected behavior:
The rule count is 1 on Persistance, and 1 on Privilege Escalation.
Screenshots (if relevant):
Errors in browser console (if relevant):
Provide logs and/or server output (if relevant):
Any additional context (logs, chat logs, magical formulas, etc.):
The text was updated successfully, but these errors were encountered: