You are viewing docs on Elastic's new documentation system, currently in technical preview. For all other Elastic docs, visit elastic.co/guide.

Enable threat intelligence integrations

Use threat indicators to detect known threats and malicious activity.

The Threat Intelligence view provides a streamlined way to collect threat intelligence data that you can use for threat detection and matching. Threat intelligence data consists of threat indicators ingested from third-party threat intelligence sources.

Threat indicators describe potential threats, unusual behavior, or malicious activity on a network or in an environment. They are commonly used in indicator match rules to detect and match known threats. When an indicator match rule generates an alert, it includes information about the matched threat indicator.

Note

To learn more about alerts with threat intelligence, visit View alert details.

Refer to the following sections to learn how to connect to threat intelligence sources using an Elastic Agent integration, the Threat Intel module, or a custom integration.

There are a few scenarios when data won't display in the Threat Intelligence view:

  • If you've chosen a time range that doesn't contain threat indicator event data, you are prompted to choose a different range. Use the date and time picker in the Elastic Security app to select a new range to analyze.
  • If the Elastic Agent or Filebeat agent hasn't ingested Threat Intel module data yet, the threat indicator event counts won't load. You can wait for data to be ingested or reach out to your administrator for help resolving this.

Add an Elastic Agent integration

  1. Install a Fleet-managed Elastic Agent on the hosts you want to monitor.

  2. In the Threat Intelligence view, click Enable sources to view the Integrations page. Scroll down and select Elastic Agent only to filter by Elastic Agent integrations.

    Tip

    If you know the name of Elastic Agent integration you want to install, you can search for it directly. You can use the following Elastic Agent integrations with the Threat Intelligence view:

    • AbuseCH
    • AlienVault OTX
    • Anomali
    • Cybersixgill
    • Maltiverse
    • MISP
    • Mimecast
    • Recorded Future
    • ThreatQuotient
  3. Select an Elastic Agent integration, then complete the installation steps.

  4. Return to the Threat Intelligence view on the Overview dashboard. If indicator data isn't displaying, refresh the page or refer to these troubleshooting steps.

Add a Filebeat Threat Intel module integration

  1. Set up the Filebeat agent and enable the Threat Intel module.

    Note

    For more information about enabling available threat intelligence filesets, refer to Threat Intel module.

  2. Update the securitySolution:defaultThreatIndex advanced setting by adding the appropriate index pattern name after the default Fleet threat intelligence index pattern (logs-ti*):

    1. If you're only using Filebeat version 8.x, add the appropriate Filebeat threat intelligence index pattern. For example, logs-ti*, filebeat-8*.
    2. If you're using a previous version of Filebeat and a current one, differentiate between the threat intelligence indices by using unique index pattern names. For example, if you’re using Filebeat version 7.0.0 and 8.0.0, update the setting to logs-ti*,filebeat-7*,filebeat-8*.
  3. Return to the Threat Intelligence view on the Overview dashboard. Refresh the page if indicator data isn't displaying.

Add a custom integration

  1. Set up a way to ingest data into your system.

  2. Update the securitySolution:defaultThreatIndex advanced setting by adding the appropriate index pattern name after the default Fleet threat intelligence index pattern (logs-ti*), for example, logs-ti*,custom-ti-index*.

    Note

    Threat intelligence indices aren’t required to be ECS compatible. However, we strongly recommend compatibility if you’d like your alerts to be enriched with relevant threat indicator information. You can find a list of ECS-compliant threat intelligence fields at Threat Fields.

  3. Return to the Threat Intelligence view on the Overview dashboard (Dashboards → Overview). Refresh the page if indicator data isn't displaying.

    Note

    The Threat Intelligence view searches for a threat.feed.name field value to define the source name in the Name column. If a custom source doesn't have the threat.feed.name field or hasn't defined a threat.feed.name field value, it's considered unnamed and labeled as Other. Dashboards aren't created for unnamed sources unless the threat.feed.dashboard_id field is defined.

On this page