How to Check If Mandiant Threat Intelligence is Working in Google Chronicle for IOC Matches

Hi everyone,

We’ve noticed that for the past week, we haven’t seen any alerts or results related to Mandiant Threat Intelligence in Google Chronicle, particularly in terms of IOCs matches.

Could anyone share how we can check if the Mandiant feed is working correctly or if it’s integrated properly? (We've checked and seen that the credentials we've provided are working, but we haven't been getting any successful results for the past week.) We’re specifically looking for any IOC matches that should be triggering alerts or logs.

Is there a way for us to verify or troubleshoot this on our own within Chronicle, such as running specific queries or reviewing any logs to ensure the integration is active and functioning as expected?

Appreciate any help or guidance on this!

Thanks in advance!

Thanks,

Dnyaneshwar

 

Solved Solved
0 3 323
1 ACCEPTED SOLUTION

3 REPLIES 3

Is this relating to automated enrichment in SIEM, or playbook enrichment in SOAR?

Hello ,

This is related to SIEM, specifically the 'Alerts and IOC Matches' section under the detection options. In the past, we have seen numerous matches with IOCs and alerts. However, in the past few days, we haven't seen any results. We compared the older results with the new logs, and found that a few still match the conditions—based on Mandiant's analysis, these are part of the IOCs. Yet, we are not seeing any IOC match alerts in portal. That’s why we have some doubts about whether there might be an issue with the IOC matching in the Google SecOps tool, especially with the Mandiant integration.

Thanks,

Dnyaneshwar

SS_IOC Check mandiant.png