Configure Threat Stream Integration
Administrators can configure Collaborate to post threat intel information from Collaborate to the Threat Stream application.
Before you Start
Ensure that you have the View and Create or Update permissions to the Threat Stream module.
Ensure that you have the API key, trusted circle, and user name of your Threat Stream account.
While posting alerts, analysts can select Threat Stream and send threat intel.
Steps
To configure Threat Stream integration in Collaborate, follow these steps:
Go to Administration > Integrations > Third Party Integrations > Threat Stream.
Click Edit Credentials.
Enter the API Key, Trusted Circle, and Username of your Threat Stream account.
Click Update to save your changes.