Threat Data Objects
Intel Exchange provides comprehensive details of a threat data object in one place for easy analysis and action. Select a threat data object from the Threat Data listing page to view the details such as key details reported from various sources, view related objects, perform investigations, and take actions based on your analysis.
Note
Read-only users can only view the threat data object details.
The threat data details page includes the following tabs to enable you to manage an object effectively:
Overview: Provides an overview of the threat data object such as key details, sources, relations, and more. For more information, see Overview.
Analysis: Provides complete details of the threat data object reported from sources and allows you to provide more information about the threat data such as adding analyst description, analyst TLP value, and more based on your analysis. For more information, see Analysis.
Relations: Provides relationship details of the threat data object, including any existing relationships to other threat data objects, for easy analysis. For more information, see Relations.
Enrichment: Provides enrichment details that are performed on threat data objects to collate additional information about the objects. For more information, see Enrichment.
Action Taken: Provides details of the type of action performed on the threat data object and the tools used to perform the action. For more information, see Action Taken.
Tasks: Provides details of tasks that are performed and the various tasks that any analyst has to perform on the threat data object. For more information, see Tasks.
Notes: Provides details of the notes added to provide additional information on the threat data object for analysis. For more information, see Notes.
Quick Actions: View the list of actions that can be performed on the threat data object based on your analysis. For more information, see Quick Actions.
Timeline: View the series of activities performed on the indicator object type. For more information, see View Threat Data Activity Timeline.