Configuring Threat Intelligence

For Threat Intelligence to fetch information and insights from sources, an initial setup where information such as the sources API name, API key and Base URL must be configured. The sources are Emerging Threats, Critical Stack, CSIS, Custom CSV, MISP, Blueliv, Recorded Future, and StixTaxii. You must also specify how to standardize the fetched information in Mapping and whether to assign a pseudoname to fields of the fetched information in Alias.

General Settings

General Settings consists of all the details about the fetched data. You can find the most recent attempt made to fetch data in Last Fetch Attempt and the last date and time when data was successfully fetched in Last Fetch Date. The information of a disabled Threat Intelligence source is not displayed.

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select General Settings.

Threat Intelligence

General Settings

Emerging Threats

To configure Emerging Threats, you must have the Base URL and API Key generated after Threat Intelligence data is configured on Emerging Threat.

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select Emerging Threats.

  4. Select Enable Source to activate Emerging Threats.

  5. Enter the Emerging Threats Base URL and API Key.

  6. Select the frequency at which data is retrieved in Fetch Interval. It is measured in hours or days.

  7. Select the Age Limit, which is the retention period of the fetched data in days or hours. Select it as 0 to retain the last fetched data until the next successful fetch.

  8. Select Enable Proxy to use a proxy server.

  9. In Proxy Configuration:

    9.1. Enter the proxy server IP Address and Port number.

    9.2. Select either HTTP or HTTPS protocol.

  10. Click Submit.

Threat Intelligence

Enabling Emerging Threats

Critical Stack

Important

We will be removing the critical stack threat source from the upcoming version, so it is recommended to use the MISP threat source.

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select Critical Stack.

  4. Select Enable Source to activate Critical Stack.

  5. Click Add.

  6. Enter the Critical Stack API Name and the API Key.

  7. Click Submit.

  8. Select the frequency at which data is retrieved in Fetch Interval. It is measured in hours or days.

  9. Select the Age Limit, which is the retention period of the fetched data in days or hours. Select it as 0 to retain the last fetched data until the next successful fetch.

  10. Select Enable Proxy to use a proxy server.

  11. In Proxy Configuration:

    11.1. Enter the proxy server IP Address and Port number.

    11.2. Select either HTTP or HTTPS protocol.

  12. Click Submit.

Threat Intelligence

Enabling Critical Stack

To add multiple Critical Stack sources, click Add and enter their names and API keys. Fetch Interval and Age Limit must be same for all the sources. Add all the required APIs before clicking Submit as the APIs added after clicking Submit runs only after the current fetch interval.

Click the source Name to edit its parameters and click the delete (uninstall) icon to delete it.

Threat Intelligence

Critical Stack API Status

CSIS

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select CSIS.

  4. Select Enable Source to activate CSIS.

  5. Enter the Base URL and API Token.

  6. Select the frequency at which data is retrieved in Fetch Interval. It is measured in hours or days.

  7. Select the Age Limit, which is the retention period of the fetched data in days or hours. Select it as 0 to retain the last fetched data until the next successful fetch.

  8. Select Enable Proxy to use a proxy server.

  9. In Proxy Configuration:

    9.1. Enter the proxy server IP Address and Port number.

    9.2. Select either HTTP or HTTPS protocol.

  10. Click Submit.

Threat Intelligence

Enabling CSIS

Custom CSV

Custom CSV enables you to upload a custom CSV file as a TI source. The CSV file must have the following headers:

domain, category, score, first_seen, last_seen, ports, ip, url, type, file_hash

Note

  • The field ports is optional. You can specify multiple ports by separating it with space.

  • The first_seen and last_seen data fields must have the yyyy-mm-dd format.

  • Threat Intelligence ignores fields and their values if the CSV is not in the above format.

To configure the Custom CSV:

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select Custom CSV.

  4. Select Enable Source to activate Custom CSV.

  5. Enter the Base URL. It must link to the custom CSV file.

  6. Select the frequency at which data is retrieved in Fetch Interval. It is measured in hours or days.

  7. Select the Age Limit, which is the retention period of the fetched data in days or hours. Select it as 0 to retain the last fetched data until the next successful fetch.

  8. Select Enable Proxy to use a proxy server.

  9. In Proxy Configuration:

    9.1. Enter the proxy server IP Address and Port number.

    9.2. Select either HTTP or HTTPS protocol.

  10. Click Submit.

Threat Intelligence

Enabling Custom CSV

MISP

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select MISP.

  4. Select Enable Source to activate MISP.

  5. Select the frequency at which data is retrieved in Fetch Interval. It is measured in hours or days.

  6. Select the Age Limit, which is the retention period of the fetched data in days or hours. Select it as 0 to retain the last fetched data until the next successful fetch.

  7. Click Add.

Threat Intelligence

Enabling MISP

  1. Select API to use an API key to fetch MISP feeds or select Free Feed to fetch free MISP feeds.

    Threat Intelligence configures the Botvrij.eu free MISP feed by default. However, it is only configured if Threat Intelligence is newly installed or if MISP is not configured while upgrading Threat Intelligence.

  2. If API is selected:

    9.1. Enter the MISP Base URL and the API Key.

    9.2. Enter the MISP source parameters in a JSON format in Filter Parameter to filter incoming logs. Go to the MISP documentation for the list of parameters.

    9.3. Select a date from when Threat Intelligence is to fetch information in Logs From.

    9.4. Select Verify to ensure a secure connection.

    9.5. Select Upload Certificate File to use a self-signed SSL certificate.

    9.6. Browse for the location of the self-signed SSL certificate and click Open.

    9.7. Click Submit.

Threat Intelligence

API

  1. If Free Feed is selected:

    10.1. Enter the MISP Base URL.

    10.2. Select a date from when Threat Intelligence is to fetch information in Logs From.

    10.3. Click Submit.

Threat Intelligence

Free Feed

  1. Select Enable Proxy to use a proxy server.

  2. In Proxy Configuration:

    12.1. Enter the proxy server IP Address and Port number.

    12.2. Select either HTTP or HTTPS protocol.

  3. Click Submit.

Threat Intelligence

Enabling Proxy

Blueliv

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select BlueLiv.

  4. Select Enable Source to activate Blueliv.

  5. Enter the Blueliv Base URL and API Key.

  6. Select the frequency at which data is retrieved in Fetch Interval. It is measured in hours or days.

  7. Select the Age Limit, which is the retention period of the fetched data in days or hours. Select it as 0 to retain the last fetched data until the next successful fetch.

  8. Select Enable Proxy to use a proxy server.

  9. In Proxy Configuration:

    9.1. Enter the proxy server IP Address and Port number.

    9.2. Select either HTTP or HTTPS protocol.

  10. Click Submit.

    Threat Intelligence

    Enabling BlueLiv

Recorded Future

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select Recorded Future.

  4. Select Enable Source to activate Recorded Future.

  5. Enter the Recorded Future API Key.

  6. Select the required Entities. Recorded Future fetches and stores data of the selected entities only.

  7. Select Enable Proxy to use a proxy server.

  8. In Proxy Configuration:

    8.1. Enter the proxy server IP Address and Port number.

    8.2. Select either HTTP or HTTPS protocol.

  9. Click Submit.

Note

Go to Recorded Future for details about Recorded Future.

_images/RF_enabling_proxy.png

Enabling Recorded Future

StixTaxii

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select StixTaxii.

  4. Select Enable Source to fetch STIX data from a TAXII server.

  5. Enter the Discovery URL, which is the location of the discovery service in the TAXII server.

  6. Select Fetch From in months, hours or days. Threat Intelligence fetches data from the selected date.

  7. Select the frequency at which data is retrieved in Fetch Interval. It is measured in hours or days.

  8. Select Enable Basic Authentication if the TAXII server uses basic authentication.

  9. In User Credentials, enter the TAXII server User Name and Password.

  10. Select Enable SSL Authentication if the TAXII server uses SSL authentication.

  11. In SSL Configuration:

    11.1. Upload the SSL certificate file in the Certification File and the SSL key file in the Certificate Key.

    11.2. Enter the Key Password, which is the password used to decrypt the SSL key.

Enabling STIX

Configuring STIX

  1. Select Enable Proxy to use a proxy server.

  2. In Proxy Configuration:

    13.1. Enter the proxy server IP Address and Port number.

    13.2. Select either HTTP or HTTPS protocol.

  3. Click Submit.

Enabling Proxy

Enabling Proxy

Mapping

Mapping enables you to standardize logs by assigning the fields of fetched information to the Logpoint Threat Intelligence Taxonomy fields. Threat Intelligence initially validates if you have mapped the field of a search query. If you have not mapped the field, Threat Intelligence searches the column with the same field name and enriches the logs.

The following fields are mapped by default:

  • source_address to ip_address

  • destination_address to ip_address

To map:

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select Mapping.

  4. Click Add.

  5. Enter the Key to map.

  6. Enter the Column name from the Logpoint taxonomy to map the key.

  7. Click Submit.

Important

  • You can only map one key value to one column of the Logpoint taxonomy.

  • You can enrich the mapped key using the following command:

    | process ti(name_of_the_mapping_key)
    

For example:

| process ti(source_address)
| process ti(destination_address)

Alias

Alias enables you to assign a pseudoname to one or multiple fields of the fetched information.

To assign an alias:

  1. Go to Settings >> System Settings from the navigation bar and click Plugins.

  2. Find Threat Intelligence and click Manage.

  3. Select Alias and click Add.

  4. Enter the pseudoname in Alias.

  5. Enter the name of one or more Fields to which the alias needs to refer.

  6. Select a Mode of the display.

    6.1. Select All to display both the enriched and unenriched logs.

    6.2. Select Filter to display only the enriched logs.

  7. Click Submit.

Note

  • Alias name is case-insensitive.

  • You can enrich the alias using the following command:

    | process ti(*name_of_the_alias) or
    | process ti(field, mode)
    

For example:

| process ti(*domains)
| process ti(*ports)
| process ti(source_address, filter)
| process ti(destination_address, all)
_images/Add_alias_TI.png

Adding Alia


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support