The Details Screen

Last Updated: Nov 20, 2019 01:37PM EST


The Details screen is the main screen on which to view information on any type of object in ThreatConnect®—including Indicators, Groups, Tags, Tracks, Victims, or Victim Assets.

Viewing the Details Screen

  1. On the top navigation bar (Figure 1), hover the cursor over Browse and then over one of the options (Indicators in this example). Click on an object (Host Indicator in this example) to display a results table (Figure 2).
  2. Click on one of the entries, and the Details drawer for that entry will be displayed (Figure 3).
  3. Click the Details icon at the top right corner of the drawer, and the Overview tab of the Details screen will be displayed (Figure 4).
  4. The Overview tab of the Details screen can be accessed directly from the results table in Figure 2 by hovering the cursor over any part of the entry's row and clicking on the Details icon that appears on the right-hand side of the Summary cell for the entry (Figure 5).

Overview Tab of the Details Screen

The Overview tab of the Details screen (Figure 4) consists of the following components:

  1. The PIVOT button at the top left allows users to pivot to a list of all associated intelligence for the object. See Pivoting on Data for more information.
  2. The DELETE button at the top left allows users to delete an object, depending on the user’s permissions.
  3. The Navigation Tab Menu beneath the object's name contains a series of tabs relevant to the particular object type. For example, a Host Indicator, like the one shown in this example, has a DNS tab for DNS resolution and a Whois tab for Whois information.
  4. The Follow Item checkbox on the right-hand side of the Navigation Tab Menu allows users to choose to receive alerts and updates on changes to the object. See Notifications and Following for more information.
  5. The Owner tab, the orange rectangle in the upper right corner of the screen, allows users to view different Owners’ copies of the object, depending on the user’s permissions. This feature provides the ability to view an Indicator as seen within a user's own Organization or from a particular data feed.
  6. The Indicator Status section below the Owner tab allows users to set the status of the Indicator as active or inactive and to set the CAL Status Lock, which, if checked, prevents ThreatConnect's Collective Analytics Layer (CAL™) from being able to change the Indicator Status. See Indicator Status for more information.
  7. The Indicator Analytics card, on the top left of the screen under the Navigation Tab Menu, provides information from the ThreatAssess and CAL features. ThreatAssess and CAL provide contextual metrics about Indicators, based on data such as page views and false-positive reports. ThreatAssess metrics are derived from data from Indicators in a user’s local instance, whereas CAL metrics are derived from data from Indicators across the ThreatConnect community of users and partners. See ThreatAssess and CAL for more information.
  8. Below the Indicator Analytics card, most objects contain a Description card to explain the object's relevance, as well as its Source. See The Description Attribute and Sourcing Data for more information.
  9. In the Security Label card, users can choose and view Security Labels for the object. See Creating Security Labels and Applying Security Labels for more information.
  10. The left side of the screen may contain a GeoLocation Data card for an IP Address or Host Indicator. See Using Automated Data Services for more information.
  11. The Attributes card displays the Attributes of the resource. See Creating Attributes for more information.
  12. The Playbook Actions card, on the top right of the screen, displays all active UserAction Trigger Playbooks for the Indicator. See Playbooks and Playbooks: The UserAction Trigger for more information. This card will not be present if there are no active UserAction Trigger Playbooks.
  13. The next card on the right-hand section displays any Additional Owners the object has, along with the Threat Rating and Confidence Rating assigned to the object by those owners.
  14. The Associations card displays associations between the object and other Indicators, Groups, and Victim Assets. It can be toggled between Graph and Table view and popped out to full-screen view. See Associations for more information.
  15. The Details card provides information on the type of object, the date and time it was added to ThreatConnect, and the date and time it was last modified. Users can also choose to enable DNS and Whois lookups and set a Threat Rating and Confidence Rating for the object, as well as view its Overall Threat Rating and Overall Confidence Rating. See Setting Indicator Threat and Confidence Ratings for more information.
  16. In the Observations/False Positives card, users can view the number of observations and false positives on a particular object and report a false positive on the object. See Reporting False Positives for more information.
  17. Users can add and delete Tags in the Tags card. See Applying Tags and Best Practices: Tags for more information.
  18. The Investigation Links card provides links to search results of various third-party lookup and other information services. Each link is a shortcut to query results for the object, which will open in a new browser tab.
  19. Users can post comments in the Add New Comments card.
  20. Users can view posts in the Posts card. See Posts for more information.

CAL™ is a trademark of ThreatConnect, Inc.

20031-08 EN Rev. C

Contact Us

  • ThreatConnect, Inc.
    3865 Wilson Blvd.
    Suite 550
    Arlington, VA 22203

    Toll Free:   1.800.965.2708
    Local: +1.703.229.4240
    Fax +1.703.229.4489

    Email Us
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found