Manage Threat Exchange Business Rules and IoC Sharing

Manage Threat Exchange Business Rules and IoC Sharing

Write-access users can configure Business Rules and IoC sharing. This section describes how to configure the initial business rules used to identify IoCs to be shared, and the IoC sharing configured between plugins (and therefore connected vendor systems) based on the invoked business rules. The result is system-detected IoC sharing between two plugged-in solutions of all IoCs matching the business rule.

Share this Doc

Manage Threat Exchange Business Rules and IoC Sharing

Or copy link

In this topic ...