Configure Threat Intelligence Source

Configure the threat intelligence providers for IP address, URL, File Hash to confirm the maliciousness of the reported event.


To configure the threat intelligence source:

  1. Select Administration>Insights Management>Threat Intelligence.

    The Threat Intelligence page appears.

  2. Click the plus(+) sign.

    The Create Configuration page appears.

  3. Complete the configuration according to the guidelines provided in Table 411.
  4. Click OK.

    A new threat intelligence source is configured and listed in the Threat Intelligence page.

Table 411: Configuration Settings




Source Name

Select the threat intelligence providers from the list. The supported threat intelligence providers are IBM X-Force, VirusTotal, and Opswat Metadefender.


Enter a valid API key to look up the threat intelligence provider’s APIs.

API Password

Enter a password to look up the threat intelligence provider’s APIs.