Threat Intelligence Standard is built into the core Secure60 platform.
Our Built-in Threat Intelligence leverages a combination of open-source and private data sources to provide a robust foundation of threat information. This includes:
To start using Threat Intelligence in Secure60, follow these steps:
Enable Built-in Threat Intelligence:
System Behaviour
ip_src_address
and ip_dst_address
fields in incoming data and match against IP intelligence lists100
Fields that are available to configure:
Whitelist
- This configuration option allows you to exclude specific IP addresses from triggering the Entity / Threat creation process
Score
- (Optional) Allows configuration of the score of the Entity object that is createdEntity Fieldname
- (Optional) Allows configuration of the Entity object that is created. By default the entity is aligned to the field that the Threat is detected in (eg ip_src_address
)Minimum Bytes
- We exclude network traffic with bytes < 64
by default because this is often failed connections from scanning IP addresses. You can raise or lower this limit via this fieldPort Configuration
- The system is configured with sensible port defaults to reduce noise and only highlight critical Threat situations. Examples where we exclude Threat detections can be when we see known Bad IPs exhibiting scanning behaviour. This would be generate high volumes of low value threats (can be opted into if full visibility is desired)
unsafe
- These ports are not considered safe to be exposed to public internet traffic (Eg Database ports or other critical services)ignore
- The system should ignore these ports from considering in Threat Intelligence processingservice
- These ports are considered standard for services (generally < 1024>) which would be such as 443 for web browsingunknown
- All ports that do not fall into a different category, fall into this categoryThe solution comes configured with smart settings by default to avoid noise and overload. Example configurations built in: