- 03 Aug 2023
- 2 Minutes to read
-
Print
-
DarkLight
Viewing an Object in Threat Graph
- Updated on 03 Aug 2023
- 2 Minutes to read
-
Print
-
DarkLight
Indicators, Groups, and Tags
The following subsections describe how to view an Indicator, Group, or Tag in Threat Graph, which can be done from the Details drawer and Details screen. When you first access Threat Graph for an Indicator, Group, or Tag, an origin node representing the selected object will be displayed, along with a node label containing the object’s summary. The node’s shape will depend on the selected object’s type, where a circle represents an Indicator, an octagon represents a Group, and a pentagon represents a Tag.

Details Drawer
- On the top navigation bar, hover over Browse and select Indicators, Groups, Tags, or a specific Indicator or Group type. The Browse screen will display a results table containing objects of the selected type.
- Click on an object’s entry in the table on the Browse screen. The object’s Details drawer will be displayed.
- If viewing the Details drawer for an Indicator or Tag, click the Explore in Graph button at the top left of the drawer; if viewing the Details drawer for a Group, click the Visual Analysis button at the top left of the drawer and select Explore in Graph. Threat Graph will open in a new browser tab (Figure 1).
Details Screen
- Navigate to the Details screen for an Indicator or Group.
- If viewing the Details screen for an Indicator, click the Explore in Graph button at the top right of the screen; if viewing the Details screen for a Group, click the Visual Analysis button at the top right of the screen and select Explore in Graph. Threat Graph will open in a new browser tab (Figure 1).
Legacy Details Screen
- Navigate to the legacy Details screen for an Indicator, Group, or Tag.
- Click the Explore In Graph button at the top left of the screen. Threat Graph will open in a new browser tab (Figure 1).
Cases
- On the top navigation bar, hover over Workflow and select Cases. The Cases screen will be displayed.
- Select a Case on the Cases screen. A detailed view of the Case will be displayed.
- Click the Explore In Graph button at the top right of the Case. Threat Graph will open in a new browser tab (Figure 2). When you first access Threat Graph for a Case, a diamond-shaped origin node representing the Case will be displayed, along with a node label containing the Case’s name.
Node Contextual Menu Options
When you click on an Indicator, Group, Tag, or Case node in Threat Graph, a contextual menu will be displayed. See Table 1 for a list of options that may be displayed in this menu, based on the type of object the node represents.
Name | Applicable Object Type(s) |
---|---|
Pivot in ThreatConnect |
|
Pivot with CAL1 |
|
Enrich | Indicators of a type for which a System Administrator enabled and configured a third-party enrichment service |
Run Playbook… | Indicators of any type that exist in ThreatConnect |
View Details |
|
CAL Alias Information2 | Adversary, Intrusion Set, Malware, Threat, and Tool Groups |
Combine Group Nodes by Alias2 | Adversary, Intrusion Set, Malware, Threat, and Tool Groups |
1. To use this feature, CAL™ must be enabled on your ThreatConnect instance and for your Organization, and data for the selected object must exist in CAL.
2. To use this feature, CAL must be enabled on your ThreatConnect instance and for your Organization for this option to be displayed, and data for the Adversary, Intrusion Set, Malware, Threat, or Tool Group must exist in CAL.
ThreatConnect® is a registered trademark, and CAL™ is a trademark, of ThreatConnect, Inc.
20117-03 v.07.A