Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Configure Threat Intelligence Source

Configure the threat intelligence providers for IP address, URL, file hash to confirm the maliciousness of the reported event.

To configure the threat intelligence source:

  1. Select Administration > Insights Management > Threat Intelligence.

    The Threat Intelligence page appears.

  2. Click the plus icon (+).

    The Create Configuration page appears.

  3. Complete the configuration according to the guidelines provided in Table 1.
  4. Click OK.

    A new threat intelligence source is configured and listed on the Threat Intelligence page.

Table 1: Configure Threat Intelligence Source

Setting

Guideline

Source Name

Select the threat intelligence providers from the list. The supported threat intelligence providers are IBM X-Force, VirusTotal, and OPSWAT Metadefender.

API Key

Enter a valid API key to look up the threat intelligence provider’s APIs.

  • VirusTotal API Key

  • OPSWAT API Key

  • IBM X-Force API Key

API Password

Enter a password, if you using IBM X-Force, to look up the threat intelligence provider’s APIs.