In this section
TH0.1 The Detection Coverage Illusion
The number nobody calculates
Ask your SOC lead how many analytics rules are deployed. You will get a number. Maybe 120 Sentinel rules, plus whatever Defender XDR generates natively, plus a handful of custom detection rules in Advanced Hunting. The number sounds like coverage.
It is not coverage. It is rule count. They are different things.
// What ATT&CK techniques do your Sentinel analytics rules actually cover?
// Run this in your Sentinel workspace — the results are your coverage map
SecurityAlert
| where TimeGenerated > ago(90d)
| where ProviderName == "ASI Scheduled Alerts"
| extend Techniques = tostring(
parse_json(ExtendedProperties).["Techniques"])
| where isnotempty(Techniques) and Techniques != "[]"
| summarize
RuleCount = dcount(AlertName),
Rules = make_set(AlertName, 10),
AlertCount = count()
by Techniques
// RuleCount = how many distinct rules cover each technique
// AlertCount = how often those rules fire
// Techniques missing from this result = your blind spots
| sort by RuleCount desc// Rules with no ATT&CK mapping — coverage contribution unknown
SecurityAlert
| where TimeGenerated > ago(90d)
| where ProviderName == "ASI Scheduled Alerts"
| extend Techniques = tostring(
parse_json(ExtendedProperties).["Techniques"])
| where isempty(Techniques) or Techniques == "[]"
// These rules may detect real threats but their coverage
// contribution is unmeasured — map them to ATT&CK
| summarize AlertCount = count() by AlertName
| sort by AlertCount desc// Where are your rules concentrated? Which kill chain stages are blind?
SecurityAlert
| where TimeGenerated > ago(90d)
| where ProviderName == "ASI Scheduled Alerts"
| extend Tactics = parse_json(tostring(
parse_json(ExtendedProperties).["Tactics"]))
| mv-expand Tactic = Tactics
| summarize
RuleCount = dcount(AlertName),
AlertVolume = count()
by tostring(Tactic)
| sort by RuleCount desc
// If Discovery, Lateral Movement, Collection, or Exfiltration
// return zero rules — the attacker operates undetected through
// the entire middle of the kill chain
// Your rules see the beginning. Your rules see the end.
// Everything in between is invisible.Try it yourself
Exercise: Calculate your actual detection coverage ratio
Run the first query in this subsection against your Sentinel workspace. Count the distinct ATT&CK technique IDs in the results. That is your numerator.
Open the ATT&CK Navigator. Select the techniques relevant to your M365 environment — cloud, identity, email, endpoint, hybrid. Count them. That is your denominator.
Divide. Write the number down.
If you are below 30%, you are in the majority. If you are above 40%, your detection engineering program is more mature than most — and you still have a 60% gap that only hunting addresses.
Then run the tactic distribution query. Look at which kill chain stages have rules and which do not. The stages with zero rules are your highest-priority hunting targets. You will use this output in TH3 to build your first hunt backlog.
The myth: More rules means more coverage. A SOC with 200 rules must be well-protected.
The reality: Twenty rules that all detect variants of phishing give you deep coverage of one technique and zero coverage of everything else. Rule count is a vanity metric. A SOC with 50 rules distributed across 40 distinct ATT&CK techniques has better detection posture than a SOC with 200 rules clustered on 15 techniques. Measure distinct technique coverage, not rule count. Measure tactic distribution, not total alerts.
Extend this analysis
The coverage ratio methodology applies regardless of your SIEM vendor. If you run Splunk alongside Sentinel, or CrowdStrike alongside Defender XDR, the same exercise works: map every detection rule to an ATT&CK technique, define your relevant technique set, calculate the ratio. The gap will exist regardless of vendor. The discipline of measuring it is what creates the foundation for hunting.
References Used in This Subsection
- MITRE Corporation. "MITRE ATT&CK — Enterprise Matrix." https://attack.mitre.org
- MITRE Corporation. "ATT&CK Navigator." https://mitre-attack.github.io/attack-navigator/
- Microsoft. "Microsoft Sentinel — Analytics Rules." Microsoft Learn. https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-built-in
- Microsoft. "Microsoft Defender XDR — Built-in Detection Capabilities." Microsoft Learn. https://learn.microsoft.com/en-us/defender-xdr/automatic-attack-disruption
- Microsoft Threat Intelligence. "Midnight Blizzard conducts targeted social engineering over Microsoft Teams." Microsoft Security Blog, August 2023. — verify URL
- MITRE ATT&CK Techniques referenced: T1566 (Phishing), T1078 (Valid Accounts), T1098 (Account Manipulation), T1550 (Use Alternate Authentication Material), T1199 (Trusted Relationship), T1537 (Transfer Data to Cloud Account)
Your ATT&CK coverage analysis shows 45% coverage. The CISO asks: 'What is our target?' Do you say 100%?
No. 100% ATT&CK coverage is neither achievable nor meaningful — some techniques are inherently difficult to detect, some are irrelevant to NE's environment, and the cost of detecting the last 10% is disproportionate to the risk reduction. The target is based on NE's threat profile: 80% coverage of techniques observed in attacks against defense supply chain organizations (sourced from MDDR and CiSP intelligence). This threat-informed target focuses resources on the techniques NE is most likely to face, not on theoretical completeness.
You understand the detection gap and the hunt cycle.
TH0 showed you what detection rules fundamentally cannot catch. TH1 gave you the hypothesis-driven methodology that closes that gap. Now you run the hunts.
- 10 complete hunt campaigns — from hypothesis through KQL execution through finding disposition, each campaign based on a real TTP
- 70 production hunt queries — every one mapped to MITRE ATT&CK and tested against realistic telemetry
- Advanced KQL for hunting — UEBA composite risk scoring, retroactive IOC sweeps, and hunt management metrics
- Hypothesis-Driven Hunt Toolkit lab pack — 30 days of realistic M365 and endpoint telemetry with multiple attack patterns seeded in
- TH16 — Scaling hunts across a team — the operating model for a production hunt program