Threat intelligence
A POST request to /api/open/threat_intelligence
allows you to create
indicators.
Requirements and restrictions
- An authenticated user must be in an admin role group or belong to a Threat Intelligence group with the Allow configuration option switched to ON in the group settings.
- JavaScript Object Notation (JSON) content is represented as a array of contents that allows you to insert more than one (1) indicator at a time.
- Type of content must be specified in the
type
parameter and the value must be:packet_rules
,yara_rules
orstix_indicators
. - Content name must be specified in the
name
parameter. - The content must be specified in the
content
parameter. - If the request is accepted, the result contains the
result
with an identifier (ID) as value. - The request is rejected if the sensor is connected to a Central Management Console (CMC).
A GET request to /api/open/threat_intelligence
allows you to list
indicators created by the user.
Requirements and Restrictions
- An authenticated user must be in an admin role group or belong to a Threat Intelligence group.
- If the request is accepted, the result contains a Json array of contents with
id
,name
andtype
.
A DELETE request to /api/open/threat_intelligence
allows you to
remove indicators.
Requirements and restrictions
- An authenticated user must be in an admin role group or belong to a Threat Intelligence group with the Allow configuration option switched to ON in the group settings.
- The Json content is represented as an array of contents that allows you to remove more than one (1) indicator at a time
- The type of content must be specified in the
type
parameter and the value must be:packet_rules
,yara_rules
orstix_indicators
. - The content id must be specified in the
id
parameter. - If the request is accepted, the result contains contents with
id
andtype
. - The request is rejected if the sensor is connected to a CMC.