Creating New Threat Intel

Article Content

Overview
Related Information/Setup
Navigation
Creating New Threat Intel

Overview

The Threat Intel feature documents evidence (e.g., indicators, implications, advice, etc.) regarding a possible threat to a Person or Site/Asset. 


Related Information/Setup

Please refer to the Editing an Image article for information on removing, replacing, or editing an image.

Please refer to the Assigning a User to a Threat article for more information on assigning Threat Intel.

Please refer to the Adding a Targeted Entity to a Threat article for more information on adding a targeted entity.

Please refer to the Adding a Threat Actor to a Threat article for more information on adding a threat actor.

Please refer to the Acknowledge and Process a Threat article for more information on processing a Threat Intel.


Navigation

  1. From the Home screen, click the Home dropdown.

Home Dropdown

  1. From the Home dropdown menu, click the Threat Protection link.

Threat Protection Link

  1. From the Threat Intel screen, click the + New Threat Intel button.

+ New Threat Intel Button

Creating New Threat Intel

  1. From the Create a New Threat Intel screen, select an Intel Priority from the dropdown menu. The Intel Priority indicates the severity of the Threat Intel.

Intel Priority

  1. Select the date & time the threat occurred by clicking the Key Date & Time dropdown and selecting the Date by clicking a day on the Calendar pop-up and a Time using the Increase and Decrease arrows.

Date & Time

  1. Enter a Threat Type Name in the Threat Type field and select a Threat Type from the dropdown menu. Threat Types help categorize the threat in the system.

Threat Type Dropdown Menu

  1. From the Details tab, select an Intel Source from the dropdown menu. The Intel Source indicates where the threat originated (e.g., Online, Internal, etc.).

Intel Source Dropdown Menu

  1. Add image evidence to the Threat Intel by clicking the designated area within the Intel Image field and selecting an image file from the connected PC or drag and drop an image from the connected PC into the Intel Image field. Users can add an image file (.JPEG, .PNG, or .GIF) to the Image Intel field.

Intel Image Field

  1. Users can remove, replace, or edit an image by hovering the cursor over the image and clicking the Click to Edit Image link.

Click to Edit Image Link

  1. Select an Online Trajectory option from the dropdown menu. The Online Trajectory indicates how the threat is currently trending in popularity online.

Online Trajectory Dropdown Menu

  1. Enter any additional information in the Additional Information field. The Additional Information field is a free-form field used to track additional evidence.

Additional Information Field

  1. Click the Intel Link icon to add URL references to the Threat Intel.

Intel Link

  1. From the Add Link pop-up, enter a Display Name. The Display Name is an alternate name used to represent the URL. The URL will be used instead if the Display Name field is blank.

Add Link Pop-up 

  1. Enter the URL Link.
  2. Click the + Add Link to add the link to the Threat Intel.

+ Add Link 

  1. Click the Edit icon next to an Intel Link to edit the Display Name and URL Link fields.

Edit Icon

  1. Click the Delete icon next to an Intel Link to delete the Intel Link.

Delete Icon

  1. Enter a Threat summary in the Intel Summary field. You can apply simple formatting to the text entered in the Intel Summary field.

Intel Summary Field

  1. Click the Save button to save the content entered in the Intel Summary field.

Save Button

  1. Intel Summary information from third-party applications (e.g., LifeRaft®, samdesk®, etc.) will be pulled into the Intel Summary field through the integration source system and tagged accordingly (e.g., extracted text).
  2. Click the Create button to create the Threat Intel.

Create Button

  1. The Threat Intel Details screen will appear, listing the newly created Threat Intel. The ID Number, Creation Date, and Intel Source will appear on the top left-hand side of the screen, and the Threat Intel ID and Status will appear on the top right-hand side.

Newly Created Threat Intel

  1. The Threat Intel will appear on the Threat Intel screen under the New Threats section.

New Threat

Was this article helpful?
0 out of 0 found this helpful

Articles in this section