The document provides a quick guide on setting up the main tools in Google Threat Intelligence, including:
- IOC Reports: Analyze files for potential threats and get detailed reports.
- IOC Investigations: Tools to investigate and hunt for related Indicators of Compromise.
- Reports & Analysis: Curated reports on Malware, Threat Actors, Event coverage, and more
- My Threat Profile: Filter out irrelevant threats and show the most relevant threats based on the user's profile
- Digital Threat Monitoring (DTM): Set up monitors to proactively identify threats and data leaks.
- Attack Surface Management (ASM): Monitor your external attack surface for vulnerabilities and exposed assets.
The guide also contains additional resources like documentation, API integration details, and use case videos for further learning and support.