Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Activate the Trusted Security Circles Client

Log in to subscribe to topics and get notified when content changes.

Activate the Trusted Security Circles Client

Two versions of Trusted Security Circles are available. The basic level of Trusted Security Circles is activated automatically when you activate Security Incident Response. Trusted Security Circles Client (Advanced) is available as a separate subscription. It provides the capabilities of the basic level, along with the ability to join any available trusted circle and initiate an unlimited number of threat shares per day.

Before you begin

If you are installing either version of Trusted Security Circles on an instance other than prod or subprod (for example, on a demo instance), you must manually activate the appropriate Trusted Circles plugins and register the client to the central instance.
Important: If you are using domain separation, it is important that you request the Domain Support - Domain Extensions plugin from the Service Catalog and activate it before activating Trusted Security Circles.

Role required: admin

About this task

Trusted Security Circles Client (Advanced) activates the following plugins if they are not already active. Additionally, it registers the instance running the client with the central instance. This includes creating both the instance administrator and an anonymous profile. It also adds the client instance as a member of the default public Trusted Security Circle (named ServiceNow).
Table 1. Plugins for Trusted Security Circles Client (Advanced)
Plugin Description
Trusted Security Circles Client


Integrates Trusted Security Circles with Threat Intelligence. This plugin is responsible for displaying group membership within the ServiceNow platform and for keeping Trusted Security Circles membership information up-to-date. It is also responsible for sending messages to the central instance and receiving messages from this instance.
Threat Core


Integrates Trusted Security Circles with Threat Intelligence and other Security Operations applications.

To purchase a subscription, contact your ServiceNow account manager. After purchasing the subscription, activate the plugin within the production instance.


  1. Navigate to System Definition > Plugins.

    A banner appears to notify you that you are in the All Applications page, which contains plugins and ServiceNow Store applications.

    To redirect to the legacy list view for plugins, click the link.
    Legacy list banner
  2. Find the plugin with the filter criteria and search bar.

    You can search for the plugin by its name or ID.

    If you cannot find a plugin, you may have to request it from ServiceNow personnel. To request a plugin, follow the steps in Request a plugin.
  3. Activate the plugin.

    You can activate the plugin directly from the All Applications page or view more details about the plugin before activating it.

    • If you are certain that you have the correct plugin, click Install, and then click Activate in the dialog box that appears.
      Plugin dialog box
    • To view plugin details before activation:
      1. Click the plugin name.
      2. On the form, click the Activate/Update related link.
      3. On the dialog box that appears, review the dependent plugins.

        If your plugin requires dependent plugins, they are activated automatically when you activate your plugin if they are not active already.

      4. If demo data is available and you want to install it, click Load demo data.

        Some plugins include demo data, which are sample records that illustrate plugin features for common use cases. Load demo data when you first activate the plugin on a development or test instance. You can always load demo data later by clicking Load demo data only on the plugin form.

      5. Click Activate.