Set up Threat Intelligence Orchestration

Prior to using Threat Intelligence Orchestration, perform steps to set up various parts of the system, including populating the CMDB, configuring the MID Server, and configuring credentials.

Before you begin

Role required: admin

To use Threat Intelligence Orchestration, you need a fully populated CMDB with domain names. For more information, see Discovery.

About this task

Procedure

  1. Activate the Threat Intelligence plugin.
  2. Configure the MID Server.
  3. Configure MID Server service credentials.
    You are now ready to use Threat Intelligence Orchestration activities within a workflow.