Skip to main content

Cyware Threat Intelligence eXchange

Manage Enrichment Policy

After you configure an enrichment policy, you can do the following:

  • Search: Search for the enrichment policy by source, inbox collections, status, created range, created by, modified range, modified by, object type, and enrichment tool.

  • Edit: Edit the policy using the respective ellipsis. You can make changes to various aspects of the policy, such as the object being enriched, the tools used for enrichment, the execution type, policy priority, source and collections, and the defined conditions. This provides flexibility in customizing the policy to meet your specific needs and requirements.

  • Clone: Clone the policy to utilize the same attributes. This feature is beneficial when you need to enrich the same object using different tools, conditions, execution types, sources and collections, or defined conditions. The platform automatically appends '-cloned' to the policy name to indicate that it is a cloned policy. However, you can modify the policy name. If you choose an existing policy name, the platform will prompt you to modify it to avoid conflicts.

  • Delete: Delete the policy if it no longer returns the required results or no longer serves the intended purpose. Removing such policies ensures that only relevant and effective policies are retained in the system.