Before you run Threat Intelligence in your instance, you must download it from the ServiceNow Store. You can also set up properties and define a threat source.

Install Threat Intelligence

Before you run Threat Intelligence in your instance, you must download it from the ServiceNow Store.

Before you begin

Complete the following setup checklist prior to installation. These setup tasks are required for a smooth installation and configuration.
Setup tasks Description

Verify that you have the required ServiceNow roles for your instance.

The following roles are required for installation, configuration, and verification of expected results:
  • If not already assigned, the System Administrator [admin] installs the application and assigns the Threat Admin [sn_ti.admin] role.
  • The Threat Admin [sn_ti.admin] oversees configuration and verifies expected results.
Role required: admin

Procedure

What to do next

Set Threat Intelligence properties.

Components installed with Threat Intelligence

Several types of components are installed with activation of the Threat Intelligence plugin, including tables and user roles.

Note: The Application Files table lists the components that are installed with this application. For instructions on how to access this table, see Find components installed with an application.

Demo data is available for this feature.

Roles installed

Tables installed

Set Threat Intelligence properties

Threat Intelligence properties allow you to control how different aspects of the system function, including the setting of API keys.

Before you begin

Role required: sn_ti.admin

Procedure

  1. Navigate to All > Threat Intelligence > Administration > Properties.
  2. Set the following properties, as needed.
  3. Click Save.

Define a threat source

You can maintain a list of Threat Intelligence threat sources. Each source includes the ability to define how often a source is queried. You can also execute a threat source on demand to import the needed Structured Threat Information eXpression (STIX) data.

Before you begin

Role required: sn_ti.admin

About this task

Threat Intelligence employs two technologies for importing threat-related information: STIX and Trusted Automated Exchange of Indicator Information (TAXII).

STIX provides a standardized, structured language for representing an extensive set of cyberthreat information that includes indicators of compromise (IoC) activity (for example, IP addresses and file hashes), as well as contextual information regarding threats, such as attack modes/methods, that together more completely characterize the motivations, capabilities, and activities of a cyber adversary. As such, STIX data provides valuable information on how your organization can best to defend against cyberthreats.

Trusted Automated Exchange of Indicator Information (TAXII) is used to facilitate automated exchange of cyberthreat information. TAXII defines a set of services and message exchanges that enable sharing of actionable cyberthreat information across organization and product/service boundaries for the detection, prevention, and mitigation of cyberthreats. TAXII profiles can be set up as repositories for sharing STIX-formatted information. Each profile contains one or more TAXII collections or feeds.

Procedure

  1. Navigate to All > Threat Intelligence > Sources > Threat Sources.
  2. Click New.
  3. Fill in the fields on the form, as appropriate.
  4. Fill in the fields in the Schedule section, as appropriate.
  5. Fill in the fields in the Threat Details section, as appropriate.
    Note: The usage of the Indicator, Indicator Type, Attack Mode/Method, and Observable Type fields are implementation-specific. The default processor, SimpleBlocklistProcessor, behaves as the tooltips describe. However, a TAXII threat source is fully data driven. Any custom threat source processor would be able to use its own strategy. These fields are basically items to expose to the integration/processor and the implementation decides how to use them.
  6. Fill in the fields in the Source Details section, as appropriate.
  7. Click Submit.
    Note: For more information on how to configure the threat source's pagination, see KB1213825 article.

Create a TAXII profile

You can maintain TAXII profiles for sharing STIX-formatted information. Each profile contains one or more TAXII collections or feeds.

Before you begin

Role required: sn_ti.admin

Procedure

  1. Navigate to All > Threat Intelligence > Sources > TAXII Profiles.
  2. Click New.
  3. Complete the following fields as appropriate.
  4. Fill in the fields in the Discovery Service Configuration section, as appropriate.
  5. Fill in the fields in the Collection Service Configuration section, as appropriate.
  6. Click Submit.