Hi everyone,
We're currently working on ingesting IOC (Indicators of Compromise) data into SecOps. To achieve this, we’ve created custom rules and are successfully ingesting logs through a feeder. The logs contain known malicious IPs that have been verified via the Mandiant portal with a threat score above 80. The alerts are being triggered as expected based on these IPs.
However, we’re noticing that IOCs are not being generated despite the alerts. Has anyone faced a similar issue? Is there any specific configuration or step required to ensure IOCs are created from triggered alerts?
Any guidance or suggestions would be greatly appreciated.
Thanks in advance!