Google Threat Intelligence: Step 1.1 - Direction | Onboarding

Table of Contents

TI-Journey_Direction_01.png

This section of Google Threat Intelligence Onboarding, will go over the general first steps in setting up your organization's account and familiarizing the user to navigating the platform.

Prerequisites

Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).

Actions

GCSCommunity_0-1726095742259.png

Registration

Google Threat Intelligence platform has an offering to sign up and create an account in the Footer section of the main page. This will navigate the user to a Virus Total: Join our community page.

Show More
Prerequisites

Organizations or users interested in signing up for Google Threat Intelligence need to have personal and organizational information readily available to enter into the request form.

Steps
  1. On the Main Page of the Google Threat Intelligence platform, users who do not have a Google Threat Intelligence authentication and are attempting to Sign Up for the platform, those users will see a Join Our Community sign up page.
  2. Users are asked to input the following information:
    1. First Name
    2. Last Name
    3. Email (Organizational) 
    4. Username
    5. Password
    6. Repeat Password
  3. Users are directed to read and agree to the Terms of Service and Privacy Notice, then select the confirmation box. GCSCommunity_2-1726095785103.png
  4. Click the icon titled Join Us.GCSCommunity_1-1726095770965.png
  5. Users will receive an email once completed, welcoming them to VirusTotal (Google Threat Intelligence).
  6. When users get an account, and do not belong to their organization’s Google Threat Intelligence group, they must request their organization’s Google Threat Intelligence Group administrator add them to their Google Threat Intelligence group, and will receive an email to join the group.
Relevant Documentation Links

GCSCommunity_3-1726095803267.png

Navigation Familiarity

Google Threat Intelligence has a user-friendly platform homepage, that provides four main areas for users. The Top Bar, Left Navbar (Menu), Main Section, and Footer. This navigation allows users to perform many tasks in one interface.

Show More
Prerequisites

Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).

Steps


1.  
In the Top Bar, users will discover the following elements: 

    1. Search Box
    2. Smart Search
    3. Managed Services
    4. Upload Files
    5. Notifications
    6. Contact Support
    7. User Menu

- Profile
- API Key
- Settings
- My Group
- Sign Out

2. Users can see the name of each section when computer cursor hovers over each element.

3. On the left-side of the homepage, users will see the Left Navbar (Menu) and discover the following features

    1. Threat Landscape
    2. IoC Investigation
    3. Report & Analysis
    4. Threat Graph
    5. Private Scanning
    6. Vulnerability Intelligence
    7. Attack Surface Management
    8. Digital Threat Monitoring
    9. Dashboards
    10. API Key
    11. Technology Integrations
    12. Documentation
    13. Support

4. The Main Section allows the users to utilize the search capability. Users can search for Indicators of Compromise (IOCs) in this section:

    1. File hashes

    2. Domains
    3. IPs
    4. URLs
    5. Malware families
    6. Threat actors
    7. CVEs
    8. Other malicious observations

5. Smart Search is identified by the icon,next to the search bar. GCSCommunity_4-1726095831133.png

6. Users can upload files to analyze.

7. Threat Profiles, IOC Collections, and Reports, can be accessed below the Search Bar.

8.
At the Footer section, users can gain access to many useful links, tools, and documentation. Users can find these under the following columns:

a. Google Threat Intelligence

- Contact Us | Get Support
- Sign up / Create Account
- ToS | Privacy Notice
- Blog | Release Notes

b. Popular Workflows

- Check IoCs via API
- Search for any Intel
- Create a Threat Profile
- Track Malware/Actors

c. Tools

- API Command-line
- YARA

d. Intel Offerings

- Incident Response
- Expertise Request
- Security Validation
- Managed Defense
- Applied Threat Intel in Chronicle

e. Documentation

- Getting Started
- Knowledge Base
- API Reference
- YARA Docs

Relevant Documentation Links

GCSCommunity_5-1726095859972.png

GTI API Key

Google Threat Intelligence possesses several different APIs, but Google allows users to use their Google Threat Intelligence API Key for any requests.

Show More
Prerequisites
  • Users must register with Google Threat Intelligence.
  • Users must create an account
  • Users must sign into their account
Steps
  1. Google Threat Intelligence users must sign into their account.
  2. Go to the Top Bar section of the main page of the platform, on the top right-hand side. 
  3. Click the User Menu section, and a drop down menu will appear.
  4. Select API Key from the drop down menu. 
  5. The API Key page will appear, where users can find the API Key under the section titled Google Threat Intelligence API Key.
  6. The API Key will be masked with a blurred out cover.
  7. There will be two icons next to the blurred out cover, that will allow users to see the API Key, by selecting Show KeyGCSCommunity_6-1726095883602.png Users can also select Copy GCSCommunity_7-1726095898385.png to make a copy of the API Key. 
  8. Additional option sections on this page include:
    1. API Quota Allowances (For your user)
    2. Consumption Quota Usage over last 30 days.
Relevant Documentation Links

Next Step: Google Threat Intelligence: Step 1.2 - Direction | Admin Setup

Previous Step: Google Threat Intelligence: Step 1 - Direction Overview

Contributors
Version history
Last update:
a week ago
Updated by: