Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.
  • London
  • Kingston
  • Jakarta
  • Istanbul
  • Helsinki
  • Geneva
  • Store

Set up Threat Intelligence Orchestration

Set up Threat Intelligence Orchestration

Prior to using Threat Intelligence Orchestration, perform steps to set up various parts of the system, including populating the CMDB, configuring the MID Server, and configuring credentials.

Before you begin

Role required: admin

To use Threat Intelligence Orchestration, you need a fully populated CMDB with domain names. For more information, see Discovery.

About this task


  1. Activate the Threat Intelligence plugin.
  2. Configure the MID Server.
  3. Configure MID Server service credentials.
    You are now ready to use Threat Intelligence Orchestration activities within a workflow.

This site is scheduled for a small content update on Monday, November 12th, between the hours of 4:00pm and 9:00pm Pacific Time (Nov 13 00:00 – 05:00 UTC). Acces to this site may be delayed during that time.