Author
@Andrew_Thomas
Abstract:
Even though Check Point Threat intelligence is the most comprehensive threat intelligence repository in the security industry, many customers still require a mechanism to import Indicator of Compromise (IOC) threat Intelligence from third party sources. These sources may include intelligence harvested from their own network or ecosystem, intelligence feed from other security providers, or third party feeds from industry specific consortiums.
The purpose of this document is to walk you through the step by step process of importing of the IOCs via the SmartConsole GUI as well as the use of the R80.20 management API function for importing IOCs via command line.
For the full list of White Papers, go here.