10 Articles in this category
-
Print
-
DarkLight
Threat Intelligence
Contains articles that describe how to view, create, and manage Threat Intelligence data.
10 Articles in this category
-
DarkLight
Explore In Graph
This article provides an overview of the Threat Graph feature in ThreatConnect.
Updated on : 09 Oct 2024
Modeling File Behavior
This article discusses how to view a File Indicator's behavior model, defines the various behavior types, and describes how to create File Indicator behavior associations.
Updated on : 19 Apr 2023
OSINT and CAL Feeds
This article provides a list of open-source intelligence (OSINT) and CAL feeds included in ThreatConnect by default.
Updated on : 22 Jul 2024
Pivoting on Data
This article describes how to pivot from Indicators, Groups, Tags, and Attributes in ThreatConnect.
Updated on : 24 Jan 2024
Private Indicators
This article describes how to mark an Indicator as private in ThreatConnect.
Updated on : 09 May 2023
Tag Normalization
This article describes Tag normalization in ThreatConnect, including how to create and manage Tag normalization rules, view details for main Tags, and identify when a main Tag is applied to an object.
Updated on : 21 Oct 2024
The Feed Explorer
This article describes the Feed Explorer, which filters all My Intel Sources open-source feeds in ThreatConnect, presenting them in a table with their associated metric data and report cards.
Updated on : 30 Oct 2023