Objective
It is essential to have multiple threat feed managers integrated with a SIEM solution to detect threats in the production environment. This article focuses on how to add Cyware Threat Intelligence Platform as a threat feed manager in EventLog Analyzer.
Prerequisites
- You need access to the EventLog Analyzer console with an administrator role or with the Manage Threat Feeds custom role.
- Ensure that the network communication for the EventLog Analyzer server allows the threat feed manager's endpoint root URL and any other API roots offered by the vendor.
Steps to follow
Step 1: Log in to the EventLog Analyzer console.
Step 2: Navigate to Settings > Admin Settings > Threat Feeds > + Add New Server.
Step 3: Select Cyware Threat Intelligence and enter the Username and Password.
Step 4: Click Test Connection to check the connectivity.
Step 6: In the Poll From field, specify the start date when the feeds should start being collected.
Step 7: From the Schedule drop-down lists, select the schedule frequency and the time for syncing data from the TAXII server.
Step 8: To save the server configuration, click Add Server.
Tips
- Get in touch with the threat feed vendor for the threat feed management configuration and to get the list of URLS to be allowlisted for an air-gapped environment.
- Enable the Advanced Threat Analytics features to enhance the threat detection mechanism.