User Settings

Last Updated: Feb 26, 2019 03:12PM EST


Settings for every ThreatConnect® user account can be configured via the My Profile screen.

Viewing and Editing User Settings

  1. On the top navigation bar (Figure 1), hover the cursor over the Settings icon and select My Profile from the dropdown menu (Figure 2).
  2. The My Profile screen will appear (Figure 3).
  3. From the Overview screen, the following settings can be edited:
    • User Name: The user name on the user account.
    • First Name: The first name on the user account.
    • Last Name: The last name on the user account.
    • Pseudonym: The pseudonym of the user. This field can be changed if the System Administrator has checked the Allow Pseudonym Change box in the Organization Information window under the Organizations tab of the Account Settings Screen.
    • Job Function: The functional department within the Organization.
    • Organizational Role: The job role within the Organization.
    • Time Zone: The chosen time zone.
    • Summary E-Mail Time: The time at which ThreatConnect will send a notification summary email.

      NOTE: Notification priority levels for individual Indicators and Groups can be set on the Details screen for the object. The definitions of the priority levels are configured in the Notifications Center. See Notifications and Following for more information.

    • Log Out Interval: The amount of time for which an account can remain inactive before being automatically logged out.
    • Receive Post Reply Notification Emails: Users can check the box to receive notifications when other users reply to a comment that they have posted.
    • Follow Organization Posts: Users can check the box to follow their own Organization and receive updates and alerts on work they have done with it. They may use the dropdown menu next to the checkbox to set the Notification priority for these alerts. Notification priority levels are configured in the Notifications Center. See Notifications and Following for more information.
    • Dark Mode (Beta): Selecting this option will set the current user’s interface to a dark theme, inverting the user interface colors.

    NOTE: Only an Organization Administrator or System Administrator can edit the User Name and Pseudonym for a regular user account.

  4. Click the Follow Settings tab, and the Follow Settings screen will appear (Figure 4). On this screen, a list of the Communities, Sources, Groups, Indicators, Tags, and Tracks that are being followed will be displayed.
  5. Click the Variables tab, and the Variables screen will appear (Figure 5). Variables can be preconfigured and used to populate certain fields, such as the ThreatConnect API Access ID or Secret Key, so that users can easily select them from a dropdown menu of possible variables rather than having to type out their values.
  6. To add a new variable, click the NEW VARIABLE button, and the Property window will appear (Figure 6).
    • Type: Use the dropdown menu to select a variable type (KEYCHAIN, TEXT, or FILE). Keychain variables are used to store passwords and other secret data. Text variables are used to hold text values (e.g., user names, URLs). File variables are used to store files (e.g., certificates, private keys).
    • Name: Enter a name for the variable.
    • Value: Type in the value for a keychain or text variable. For a file, use the + SELECT FILE button to browse to and select a file.
    • Click the SAVE button to save the variable.
  7. Click the Spaces tab to display the Spaces apps that have been configured (Figure 7). Each tab on the left (CENTRAL, DETAIL, MENU, and SEARCH) displays the Spaces apps of that type and options for configuring and deleting the apps.
  8. Click the Activity tab to display a summary of activity that has taken place involving Indicators and Groups within an Organization (Figure 8).
  9. Click the Authenticator tab to display the screen that will allow two-factor authentication (2FA) to be enabled (Figure 9).
  10. Click the ENABLE button, and the Setup Authenticator window will appear (Figure 10).
  11. Either scan the QR code with an authenticator app (e.g., Google® Authenticator) or manually enter the generated key into the authenticator app.
  12. Enter the Verification Code generated by the authenticator app.
  13. Click the SAVE button to enable two-factor authentication.
Google® is a registered trademark of Google, Inc.

20040-11 EN Rev. A

Contact Us

  • ThreatConnect, Inc.
    3865 Wilson Blvd.
    Suite 550
    Arlington, VA 22203

    Toll Free:   1.800.965.2708
    Local: +1.703.229.4240
    Fax +1.703.229.4489

    Email Us
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found