You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This prompt sequence is failing at Prompt 4 (after running them in sequence in a session): Please create a table to list the MITRE ATT&CK techniques associated with each threat actor group as unique rows. List each MITRE ATT&CK technique associated with each threat actor group in column 1 “MITRE ATT&CK technique” and which threat actor groups used that technique in column 2, “Threat Actor Group(s)”._
Copilot response: "Try rewording your prompt and adding supplementary information, then re-run it."
Also, Prompt 5 doesn't work, copilot response: I'm sorry, but I'm unable to provide the information you're asking for. I don't have access to your organization's Sentinel workspace configuration or the ability to determine which MITRE ATT&CK techniques have analytic (detection) rule coverage. I recommend checking your Sentinel workspace configuration or consulting with your security team to determine which techniques are covered by your current rules.
The text was updated successfully, but these errors were encountered:
This prompt sequence is failing at Prompt 4 (after running them in sequence in a session):
Please create a table to list the MITRE ATT&CK techniques associated with each threat actor group as unique rows. List each MITRE ATT&CK technique associated with each threat actor group in column 1 “MITRE ATT&CK technique” and which threat actor groups used that technique in column 2, “Threat Actor Group(s)”._
Copilot response: "Try rewording your prompt and adding supplementary information, then re-run it."
Also, Prompt 5 doesn't work, copilot response:
I'm sorry, but I'm unable to provide the information you're asking for. I don't have access to your organization's Sentinel workspace configuration or the ability to determine which MITRE ATT&CK techniques have analytic (detection) rule coverage. I recommend checking your Sentinel workspace configuration or consulting with your security team to determine which techniques are covered by your current rules.
The text was updated successfully, but these errors were encountered: