Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Components installed with Threat Intelligence

Log in to subscribe to topics and get notified when content changes.

Components installed with Threat Intelligence

Several types of components are installed with Threat Intelligence.

Activating this plugin adds or modifies several components, including:
  • tables
  • user roles
  • scheduled jobs
These types of components are described here, where applicable.
Note: For all other components installed with this plugin, see Find components installed with your application.

Demo data is available with Threat Intelligence.