This section of Google Threat Intelligence Onboarding, will go over the general first steps in setting up your organization's account and familiarizing the user to navigating the platform.
Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Google Threat Intelligence platform has an offering to sign up and create an account in the Footer section of the main page. This will navigate the user to a Virus Total: Join our community page.
Organizations or users interested in signing up for Google Threat Intelligence need to have personal and organizational information readily available to enter into the request form.
Google Threat Intelligence has a user-friendly platform homepage, that provides four main areas for users. The Top Bar, Left Navbar (Menu), Main Section, and Footer. This navigation allows users to perform many tasks in one interface.
Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
1. In the Top Bar, users will discover the following elements:
- Profile
- API Key
- Settings
- My Group
- Sign Out
2. Users can see the name of each section when computer cursor hovers over each element.
3. On the left-side of the homepage, users will see the Left Navbar (Menu) and discover the following features:
4. The Main Section allows the users to utilize the search capability. Users can search for Indicators of Compromise (IOCs) in this section:
File hashes
5. Smart Search is identified by the icon,next to the search bar.
6. Users can upload files to analyze.
7. Threat Profiles, IOC Collections, and Reports, can be accessed below the Search Bar.
8. At the Footer section, users can gain access to many useful links, tools, and documentation. Users can find these under the following columns:
a. Google Threat Intelligence
- Contact Us | Get Support
- Sign up / Create Account
- ToS | Privacy Notice
- Blog | Release Notes
b. Popular Workflows
- Check IoCs via API
- Search for any Intel
- Create a Threat Profile
- Track Malware/Actors
c. Tools
- API Command-line
- YARA
d. Intel Offerings
- Incident Response
- Expertise Request
- Security Validation
- Managed Defense
- Applied Threat Intel in Chronicle
e. Documentation
- Getting Started
- Knowledge Base
- API Reference
- YARA Docs
Google Threat Intelligence possesses several different APIs, but Google allows users to use their Google Threat Intelligence API Key for any requests.
Next Step: Google Threat Intelligence: Step 1.2 - Direction | Admin Setup
Previous Step: Google Threat Intelligence: Step 1 - Direction Overview