Threat Intelligence: Step 3 - Integrations

Table of Contents

Below you'll find a table of contents for the Integrations journey.

ti-integrations.png

 

The power and insight of Threat Intelligence is useful on its own, but it can become even more powerful when integrated into other platforms such as Chronicle SecOps.

Prerequisites

  • Entitlement to Mandiant Threat Intelligence.
  • Admin access to Integrating Solution.

Actions

ti-integrations-chronicle.png

Chronicle

The power and insight of Threat Intelligence is useful on its own, but it can become even more powerful when integrated into other platforms such as Chronicle SecOps.

Show More
Prerequisites

See the Relevant Links section for more documentation regarding the prerequisites.

  • Admin access to Mandiant Threat Intelligence.
  • Admin access to Chroncile SOAR.
Steps
  1. Navigate to Chronicle Marketplace > Integrations

  2. Search for and install the Mandiant Threat Intelligence integration.

  3. Navigate to SOAR Settings > Ingestion > Connectors.

  4. Select Settings next to the new Mandiant connector.

  5. Populate the Settings with details required, including an organizational API Key as requested in the main onboarding step.

    1. Note: It is important that you work with Support to create an Organizational API key for integrations such as this, rather than user-level API Keys.

Relevant Links
 

ti-integrations-asm.png

 

Attack Surface Management

When you have access to both Mandiant Threat Intelligence and Attack Surface Management, Threat Intelligence is directly applied to your attack surface, giving you a single place to look when trying to assess your total attack surface.

Show More
Prerequisites

See the Relevant Links section for more documentation regarding the prerequisites.

  • Access to Mandiant Advantage
  • Access to Threat Intelligence
  • Access to Attack Surface Management
Steps
  1. No additional configuration necessary, but depending on your level of subscription to Threat Intelligence, your supplied data might vary.

Relevant Links
Complete!

ti-journey-complete.png

 

Your Threat Intelligence Journey is now complete!

Contributors
Version history
Last update:
a month ago
Updated by: