Hi, I'm Eric son in this solution Short. Let's look at how you can add threat Intelligence inside. Heidi are to receive and investigate alerts
from the main dashboard. Let's head to the investigations page.
This is where all of your alerts will automatically populate with context on the users and the assets of fault.
Any alerts generated from your threat intelligence will appear here.
Let's start by heading to configure threats
on this page will first see all of our threat feeds, which include the ones that we have created, as was those that we have subscribed to. And then clicking on subscribes or own threats allows you to drill deeper.
You can also short by newest. Most alerts generated organization subscribed to the intelligence, even the number of most, uh, number of false positives reporter.
And so next to that, there's a search function to also help you filter through your feeds. So let's take a look at adding a good threat. Intel source by clicking on at threat
and so in this box you can manually enter copy
Dellin names, hashes I P addresses in murals. So, for example, I received some information about Operation Cool, which is a targeted now attack on industrial and engineering organizations. In this report, there are a couple of 75 hashes that are identified, so let's go ahead and add them
And so, for proper ingestion, just make sure that each indicator is either separated by commas without spaces or a line break, and I can also directly upload a file as well. So I have it here as a T X T, and so it can accept text, Excel and CSC files.
After that, let's go ahead and add in a
A zit was a description. So it's important to carefully note this context behind your intelligence that if an alert fires, you know the source that is coming from,
well, go ahead and save this.
And now it's appears right at the top of the list so you can hit view for more details, including things like how many alerts have been generated. As a result,
a CZ was an audit history. So if it's modified, the leader on you have that full audit trail. You can export the data as a CSC file, and you can also toggle if you'd like it to be public or private.
And so if it's public, it means that the insight idea our community can subscribe to it. And so it's a great way to share threat intelligence with others. So here, going back to threats and checking up the threat community, I can see what's available. View the intelligence
on, then also subscribed to it. And so here they're things like seven organizations tracking I can view or subscribe. According
Finally, let's take a look at an alert that's generated so heading back to the investigations page, we have it filtered down to
threat intelligence alerts, so we have to better network access for threat.
So clicking into it, it's automatically pre populated with the user's involved the assets involved and the alert is denoted by the red lightning bolt on so we can see there's been inbound firewall traffic from an I P that matches a threat intelligence source that we haven't inside. I tr.
So from there you can pull in additional evidence to see all the information available.
And what's also nice is that you get the notable behaviors associated with the users and assets involved. So we automatically have the context that the previous stay a virus alert triggered for that house up.
So that's after for threat intelligence in this solution short.