Google TI Setup pdf

The document provides a quick guide on setting up the main tools in Google Threat Intelligence, including:

  • IOC Reports: Analyze files for potential threats and get detailed reports.
  • IOC Investigations: Tools to investigate and hunt for related Indicators of Compromise.
  • Reports & Analysis: Curated reports on Malware, Threat Actors, Event coverage, and more
  • My Threat Profile: Filter out irrelevant threats and show the most relevant threats based on the user's profile 
  • Digital Threat Monitoring (DTM): Set up monitors to proactively identify threats and data leaks.
  • Attack Surface Management (ASM): Monitor your external attack surface for vulnerabilities and exposed assets.

The guide also contains additional resources like documentation, API integration details, and use case videos for further learning and support.

Contributors
Version history
Last update:
‎10-31-2024 07:19 AM
Updated by: