The Details Screen

Last Updated: Jun 22, 2018 08:06PM EDT
User and Higher
None

Overview

The Details screen is the main screen in ThreatConnect® on which to view information and content on any type of object—including Indicators, Groups, and Victims.

Steps

  1. On the top navigation bar (Figure 1), hover the cursor over BROWSE and then over one of the options (INDICATORS in this example). Click on an object (HOST Indicator in this example) to display a results table (Figure 2).
  2. Click on one of the entries, and the Details window for that entry will appear (Figure 3).
  3. Click the Details icon at the top right corner of the window, and the Details Overview screen will appear (Figure 4).
  4. The Details Overview screen can be accessed directly from the results table in Figure 2 by hovering the cursor over any part of the entry's row and clicking on the Details icon that appears on the right-hand side of the Summary cell for the entry (Figure 5).

Details Overview Screen: Components

The Details Overview screen (Figure 4) consists of the following components:

  1. The PIVOT button at the top left allows users to pivot to a list of all associated intelligence for the object. See Pivoting on Data for more information.
  2. The DELETE button at the top left allows users to delete an object, depending on the user’s permissions.
  3. The Navigation Tab Menu beneath the object's name contains a series of tabs relevant to the particular object type. For example, a Host Indicator, like the one shown in this example, has a DNS tab for DNS resolution and a Whois tab for Whois information.
  4. The Follow Item checkbox on the right-hand side of the Navigation Tab Menu allows users to choose to receive alerts and updates on changes to the object. See Notifications and Following for more information.
  5. The Owner tab, the blue rectangle in the upper right corner of the screen, allows users to view different Owners’ copies of the object, depending on the user’s permissions. This feature provides the ability to view an Indicator as seen within a user's own Organization or from a particular data feed.
  6. The Indicator Status section below the Owner tab allows users to set the status of the Indicator as active or inactive and to set the CAL Status Lock, which, if checked, prevents CAL from being able to change the Indicator Status. See Indicator Status for more information.
  7. The Indicator Analytics card, on the top left of the screen, provides information from the ThreatAssess and Collective Analytics Layer (CAL™) features. ThreatAssess and CAL provide contextual metrics about Indicators, based on data such as page views and false-positive reports. ThreatAssess metrics are derived from data from Indicators in a user’s local instance, whereas CAL metrics are derived from data from Indicators across the ThreatConnect community of users and partners. See ThreatAssess and CAL for more information.
  8. Below the Indicator Analytics card, most objects contain a Description card to explain the object's relevance, as well as its Source. See The Description Attribute and Sourcing Data for more information.
  9. In the Security Label card, users can choose and view Security Labels for the object. See Creating Security Labels and Applying Security Labels for more information.
  10. The left side of the screen may contain a GeoLocation Data card for an IP Address or Host Indicator. See Using Automated Data Services for more information.
  11. The Attributes card displays the Attributes of the resource. See Creating Attributes for more information.
  12. The Playbook Actions card, on the top right of the screen, displays all active UserAction Trigger Playbooks for the Indicator. See Playbooks and Playbooks: The UserAction Trigger for more information. This card will not be present if there are no active UserAction Trigger Playbooks.
  13. The next card on the right-hand section displays any Additional Owners the object has, along with the Threat Rating and Confidence Rating assigned to the object by those owners.
  14. The Associations card displays associations between the object and other Indicators, Groups, and Victim Assets. It can be toggled between Graph and Table view and popped out to full-screen view. See Associations for more information.
  15. The Details card provides information on the type of object, the date and time it was added to ThreatConnect, and the date and time it was last modified. Users can also choose to enable DNS and Whois lookups and set a Threat Rating and Confidence Rating for the object, as well as view its Overall Threat Rating and Overall Confidence Rating. See Setting Indicator Threat and Confidence Ratings for more information.
  16. In the Observations/False Positives card, users can view the number of observations and false positives on a particular object and report a false positive on the object. See Reporting False Positives for more information.
  17. Users can add and delete Tags in the Tags card. See Applying Tags and Best Practices: Tags for more information.
  18. The Investigation Links card provides links to search results of various third-party lookup and other information services. Each link is a shortcut to query results for the object, which will open in a new browser tab.
  19. Users can post comments in the Add New Comments card.
  20. Users can view posts in the Posts card. See Posts for more information.

CAL is a trademark of ThreatConnect, Inc.

20031-08 EN Rev. A

Contact Us

  • ThreatConnect, Inc.
    3865 Wilson Blvd.
    Suite 550
    Arlington, VA 22203

    Toll Free:   1.800.965.2708
    Local: +1.703.229.4240
    Fax +1.703.229.4489

    Email Us



https://cdn.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete