Thank you for your feedback.
Form temporarily unavailable. Please try again or contact docfeedback@servicenow.com to submit your comments.
Versions
  • London
  • Kingston
  • Jakarta
  • Istanbul
  • Helsinki
  • Geneva
  • Store
Close

Identify indicator sources

Identify indicator sources

Indicator sources are normally tracked automatically as part of the threat import process, but more sources can be manually added.

Before you begin

Role required: sn_ti.write

Procedure

  1. Navigate to Threat Intelligence > IoC Repository > Indicators.
  2. Click the indicator to which you want to add indicator sources.
  3. Click the Indicator Sources related list.
  4. Click Edit.
  5. As needed, use the filters to locate the indicator source you want to associate with the IoC.
  6. Using the slushbucket, add the indicator source to the Indicator Sources list.
  7. Click Save.