Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Activate the Trusted Security Circles Client

Log in to subscribe to topics and get notified when content changes.

Activate the Trusted Security Circles Client

Two versions of Trusted Security Circles are available. The basic level of Trusted Security Circles is activated automatically when you activate Security Incident Response. Trusted Security Circles Client (Advanced) is available as a separate subscription. It provides the capabilities of the basic level, along with the ability to join any available trusted circle and initiate an unlimited number of threat shares per day.

Before you begin

If you are installing either version of Trusted Security Circles on an instance other than prod or subprod (for example, on a demo instance), you must manually activate the appropriate Trusted Circles plugins and register the client to the central instance.
Note: If you are using domain separation, it is important that you request the Domain Support - Domain Extensions plugin from the Service Catalog and activate it before activating Trusted Security Circles.

Role required: admin

About this task

Trusted Security Circles Client (Advanced) activates the following plugins if they are not already active. Additionally, it registers the instance running the client with the central instance. This includes creating both the instance administrator and an anonymous profile. It also adds the client instance as a member of the default public Trusted Security Circle (named ServiceNow).
Table 1. Plugins for Trusted Security Circles Client (Advanced)
Plugin Description
Trusted Security Circles Client


Integrates Trusted Security Circles with Threat Intelligence. This plugin is responsible for displaying group membership within the Now Platform and for keeping Trusted Security Circles membership information up-to-date. It is also responsible for sending messages to the central instance and receiving messages from this instance.
Threat Core


Integrates Trusted Security Circles with Threat Intelligence and other Security Operations applications.

To purchase a subscription, contact your ServiceNow account manager. After purchasing the subscription, activate the plugin within the production instance.


  1. Navigate to System Definition > Plugins.
  2. Find and click the plugin name.
  3. On the System Plugin form, review the plugin details and then click the Activate/Upgrade related link.

    If the plugin depends on other plugins, these plugins are listed along with their activation status.

    If the plugin has optional features that depend on other plugins, those plugins are listed under Some files will not be loaded because these plugins are inactive. The optional features are not installed until the listed plugins are installed (before or after the installation of the current plugin).

  4. (Optional) If available, select the Load demo data check box.

    Some plugins include demo data—Sample records that are designed to illustrate plugin features for common use cases. Loading demo data is a good practice when you first activate the plugin on a development or test instance.

    You can also load demo data after the plugin is activated by clicking the Load Demo Data Only related link on the System Plugin form.

  5. Click Activate.