Skip to main content

Cyware Threat Intelligence eXchange

SlashNext

Connector Category: Enrichment Tool

About Integration

SlashNext provides cloud messaging security service and offers behavioral phishing detection to detect unknown phishing threats with accuracy. Intel Exchange uses SlackNext to enrich IP addresses, domains, and URLs.

Configure SlashNext as an Enrichment Tool

Configure SlashNext in Intel Exchange to enrich IP addresses, domains, and URLs.

Before you Start 

  • Ensure that you have the base URL and API token of your SlashNext account.

  • Ensure that your user group has Create, Update, and View permissions for enrichment tools and their associated policies in Intel Exchange.

    Note

    Ensure that the API key includes the permissions to retrieve URLs.

Steps 

To configure SlashNext as an enrichment tool in Intel Exchange, follow these steps:

  1. Sign in to Intel Exchange and go to Administration > Enrichment Management > Enrichment Tools

  2. Search and select the SlashNext enrichment tool. 

  3. Click Add Account and enter the following details:

    1. Account Name: Enter a unique account name to identify the instance. For example, SlashNext Prod.

    2. Base URL: Enter the base URL of your SlashNext instance. The default base URL is https://intel.slashnext.cloud/api/intel/

    3. API Key: Enter the API key of your SlashNext account to authenticate communication between Intel Exchange and SlashNext servers.

    4. Verify SSL: Enable this option to validate the SSL certificate and secure the connection between Intel Exchange and SlashNext servers. This option is enabled by default.

      Note

      Cyware recommends you select Verify SSL. If you disable this option, Intel Exchange may configure an instance for an expired SSL certificate. This may not establish the connection properly and Intel Exchange will not be able to notify you in case of a broken or improper connection.

4. Click Save.

After successfully adding an account, you can view and enable SlashNext feed enrichment types. You can also configure a quota to set a limit on the number of enrichment request the SlashNext account can make. After the quota is exhausted, no further enrichment requests can be made until the quota resets for the next quota duration. For more details, refer to Define Quota in Configure Enrichment Tools.

To understand the number of API calls and quota units consumed by the SlashNext enrichment tool per polling, refer to the following table:

Enrichment Tool

Feed Enrichment Type

No. of API calls

Quota consumed

SlashNext

Retrieve URL Detail

1

1

Retrieve IP Detail

2

2

Retrieve Domain Detail

2

2

You can configure an enrichment policy to automatically enrich threat data objects using the SlashNext enrichment tool. For more information, see Enrichment Policy.