Set up Trusted Security Circles

Before using Trusted Security Circles, you must set up the application. This process includes identifying the location of the Trusted Security Circles Central instance, setting parameters for communicating with this instance, and defining sightings thresholds for observables derived from both internally- and externally-generated threat intelligence.

The setup you perform depends on whether you intend to use domain separation.