Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Set up Trusted Security Circles

Log in to subscribe to topics and get notified when content changes.

Set up Trusted Security Circles

Before using Trusted Security Circles, you must set up the application. This process includes identifying the location of the Trusted Security Circles Central instance, setting parameters for communicating with this instance, and defining sightings thresholds for observables derived from both internally- and externally-generated threat intelligence.

The setup you perform depends on whether you intend to use domain separation.