Skip to main content

PHASR MITRE grouping

PHASR MITRE Grouping is a GravityZone feature that organizes monitored rules using the MITRE ATT&CK framework. It provides a structured, top-down view of security coverage, mapping user activity and detections to attacker tactics, techniques, and sub-techniques.

This approach enables better visibility into how threats are detected and helps streamline investigation workflows by aligning security insights with industry-standard attack methodologies.

Page layout

You can access the PHASR MITRE grouping page by navigating to Policies → PHASR MITRE grouping.

Screenshot_2026-04-29_125639.png

Filters

At the top of the page, you can refine the displayed data using:

  • Company selector – Choose the company scope

  • Tactic name filter – Filter by specific MITRE tactics

  • Reset filters – Clear all applied filters

Overview

The PHASR MITRE Grouping page displays monitored rules grouped hierarchically:

  • Tactics – High-level attacker objectives (for example, Initial Access, Execution)

  • Techniques – Methods used to achieve a tactic

  • Sub-techniques – More specific implementations of techniques

  • Monitored rules – Detection logic tied to behaviors

This structure allows you to:

  • Understand how detections map to real-world attack patterns.

  • Evaluate PHASR coverage across MITRE ATT&CK.

  • Drill down from high-level tactics to specific rule-level insights.

  • Identify gaps in detection and enforcement.

Tactics view

The main page displays a grid of MITRE tactics.

Each tactic card includes:

  • Tactic name and ID (for example, Initial Access – TA0001)

  • Coverage by PHASR (%) - Indicates how much of the tactic is covered by behavioral restrictions

  • Behavioral profiles - can be restricted or unrestricted.

  • Activity metrics - Number of recommendations, monitored rules, rule triggers.

  • Target activity types - e.g. Remote admin tools, Living off the land binaries, Piracy tools.

  • View details action.

Note

Coverage is selective and may not reach 100%.

Tactics details panel

Selecting View details on a tactic opens a side panel with detailed information about the selected tactic.

Key information:

  • Coverage by PHASR (%)

  • Tactic ID

  • Targeted activity types

  • Platform support (Windows, macOS)

  • Monitored rules count

  • Recommendations count

  • Behavioral profiles distribution

  • Incidents involving rule triggers.

Observed activity

Displays behavioral profile usage in your environment, containing the percentage of activities using monitored rules and insights into whether tools are fully or partially controlled.

Description

A contextual explanation of the tactic, including how attackers typically use it.

Techniques view

Within a tactic, techniques are listed.

Each technique includes:

  • Technique name and ID (for example, Drive-by Compromise – T1189)

  • Coverage by PHASR (%)

  • Monitored rules count

  • Recommendations

  • Rule triggers

  • Platform applicability

Actions

  • View monitored rules

  • View details

Technique details panel

Provides deeper insight into a selected technique.

The information that is displayed in this panel:

  • Technique ID

  • Targeted activity types

  • Platforms

  • Monitored rules

  • Recommendations

  • Rule triggers

  • Behavioral profile distribution

  • Incidents involving rule triggers

Description

Includes a detailed explanation of the technique, often aligned with MITRE ATT&CK definitions, describing how adversaries use it.

Sub-techniques and Rules

At the lowest level, you can inspect monitored rules associated with a technique.

Each rule entry displays:

  • Rule name (for example, Chflags.HiddenFile)

  • Target activity type

  • Platform

  • Recommendations

  • Rule triggers

Rule details panel

Selecting a rule opens a side panel with:

  • Rule description - explains what behavior is monitored or restricted.

  • Targeted activity type

  • Platform

  • Rule trigger date

  • Recommendations

  • Behavioral profile usage

  • Incidents involving the rule

Key concepts

Coverage by PHASR

Represents how effectively PHASR restrictions address behaviors associated with a tactic or technique.

  • 0% coverage – No active restrictions applied.

  • Partial coverage – Some behaviors are restricted.

  • Full coverage (rare) – All relevant behaviors are restricted.

Behavioral profiles

  • Unrestricted profiles - Behaviors allowed without enforcement

  • Restricted profiles - Behaviors actively controlled by PHASR

Activity metrics

Provide insight into how rules behave in your environment:

  • Recommendations – Suggested actions to improve security posture

  • Monitored rules – Detection rules tracking activity

  • Rule triggers – Number of times rules were activated

Navigation flow

You can investigate security insights in a structured way:

  1. Start at Tactic level.

  2. Drill down into Techniques.

  3. Explore Sub-techniques.

  4. Analyze Monitored rules.

This top-down navigation mirrors attacker behavior and helps prioritize investigations.

Benefits

PHASR MITRE Grouping enhances visibility and investigation by:

  • Aligning detections with the MITRE ATT&CK framework

  • Providing end-to-end visibility from tactic to rule

  • Highlighting coverage gaps

  • Enabling faster root cause analysis

  • Improving contextual understanding of alerts and incidents.