Working with ThreatConnect IOCs
ThreatConnect can provide malware IPs, domains, hashes, or URLs which FortiSIEM can use to match in log data The steps are as follows: for each IOC (IP, domain, hash, URL).
- Discover Collections
- Create Collection Policy
- Schedule IOC Download
Since an Organization may subscribe to many Collections (an intelligence source), downloading every IOC for all Collections may result in too much data. Therefore, specifying a Collection Policy is essential.
Download ThreatConnect Malware Domains
- Go to RESOURCES > Malware Domains and select the ThreatConnect Malware Domain folder.
- Click More > Update. In the Update Malware dialog box, then select Update via API.
- Use your ThreatConnect credentials to complete the URL, User name, and Password fields.
- Plugin Class is provided by default.
- Select a Data Format. In this release, only STIX-TAXII is supported.
- Enter an Organization name that is defined in your ThreatConnect account.
- Define a Collection.
- Click Discover Collections to expose all of the collections you are eligible to use.
- Select a collection policy in the table and click Edit.
- Edit any of the following values in the Edit Collection Policy dialog box:
- Enabled: select whether the collection policy is enabled
- Collection: edit the collection name
- Tag: enter an optional user-defined tag for the collection
- Max False Positive Count: enter a number where the frequency of an attack produces a false positive on your network.
- Min Rating: enter a value between 0 and 5.
- Confidence: enter a value between 1 and 100.
- Click Save.
- Schedule the download. See Specifying a Schedule.
- Check the folder 5 minutes after the scheduled time. Downloaded results should be displayed – organized by each collection.
Note that FortiSIEM does not provide system rules and reports because ThreatConnect folders are dynamic. The user must create them using the Collection folders.
Download Other ThreatConnect IOCs
For ThreatConnect Malware IP, go to RESOURCES > Malware IPs, select the ThreatConnect Malware IP folder, and repeat the same steps as for Malware Domains.
For ThreatConnect Malware URL, go to RESOURCES > Malware URLs, select the ThreatConnect Malware URL folder, and repeat the same steps as for Malware Domains.
For ThreatConnect Malware hash, go to RESOURCES > Malware Hash , select the ThreatConnect Malware Hash folder and repeat the same steps as for Malware Domains.
Specifying a Schedule
- Click the + icon next to Schedule.
- Enter values for the following options:
- Time Range specifies start time (within the day) and the duration of the scheduling window. Select a Start time, a UTC (or Local) and a corresponding location from the drop-down lists.
- Recurrence Pattern specifies if and
how the window will repeat.
- If you are scheduling for one time
only:
- Select Once for Recurrence Pattern.
- Select the specific date in Start From.
- If you are scheduling for hourly:
- Enter the hourly interval.
- Select the Start From date for Recurrence Range, then either End after the number of occurrences, and End by date, or No end date to continue the recurrence forever.
- If you are scheduling for Daily:
- Select the interval of days or Every weekday.
- Select the Start From date for Recurrence Range, then either End after the number of occurrences, and End by date, or No end date to continue the recurrence forever.
- If you are scheduling for Weekly:
- Select the interval of weeks or select particular days of the week.
- Select the Start From date for Recurrence Range, then either End after the number of occurrences, and End by date, or No end date to continue the recurrence forever.
- If you are scheduling for Monthly:
- Select the days and months from the drop-down lists.
- Select the Start From date for Recurrence Range, then either End after the number of occurrences, and End by date, or No end date to continue the recurrence forever.
- If you are scheduling for one time
only:
- Click Save to apply the changes.