Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Set up Threat Intelligence Orchestration

Log in to subscribe to topics and get notified when content changes.

Set up Threat Intelligence Orchestration

Prior to using Threat Intelligence Orchestration, perform steps to set up various parts of the system, including populating the CMDB, configuring the MID Server, and configuring credentials.

Before you begin

Role required: admin

To use Threat Intelligence Orchestration you need a fully populated CMDB with domain names. For more information, see Discovery.

About this task


  1. Activate the Threat Intelligence plugin.
  2. Configure the MID Server
  3. Configure MID Server service credentials
    You are now ready to use Threat Intelligence Orchestration activities within a workflow.