Table of Contents
This section of Google Threat Intelligence Onboarding, will go over the Digital Threat Monitoring section DTM is a powerful cybersecurity solution designed to identify data leaks, discussions about your organization, and emerging attack patterns before they make an impact.
By following this brief guide, users will be able to get a better understanding of how DTM works and how to get it initially configured with some of the most commonly utilized monitors.
Prerequisites
- Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
- Define the user’s Monitor Topics: Carefully choose the monitor topics and keywords to ensure DTM focuses on the most relevant information. Consider including:
- Your organization's name and variations
- Key brands and products
- Registered web domains
- Executive names (VIP users)
- Organization-specific terms
- Network Information (External IP addresses or ranges)
- If a user doesn't have this information, they cannot start to build monitors
Actions
Research Tools
Google Threat Intelligence’s Digital Threat Monitoring (DTM) is a powerful cybersecurity solution designed to identify data leaks, discussions about your organization, and emerging attack patterns from open-source, dark web, and raw data that Google Threat Intelligence has collected.
Prerequisites
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Steps
- On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Digital Threat Monitoring.
- In the dropdown menu, users will select Research Tools tab and explore. This is done so users understand and focus on what matters and reduce false positives.
- To conduct a Search, go to the Search Query box, just below the section title Research Tools, and enter a search.
- Under the Search Box, users can enter from a range of subject items, including:
- Pastes
- Forums
- Emails
- Stores
- Web Content
- On the left pane, users can utilize search Filters to refine their search, including:
- Date Range
- Collection Type
- Threat Type
- kSelect one of the results and a new page will appear that will show an Overview page for the selected result, with an Overview tab and a Raw (JSON) tab with the affiliated Raw (JSON) information.
- The Overview tab will show three sections of the result, showing the following content:
- Characterization
- Source Information
- Content
- The Content section will include two views:
- Message Thread
- Raw Text View
- Research Tools will provide the user with relevant information needed to define their Monitor Topics.
Relevant Documentation Links
Define and Set Up Monitors
Google Threat Intelligence’s Digital Threat Monitoring (DTM) allows users to setup standardized templates or create their own monitors. This gives users the capability to build effective Monitors that help their organization discover and be alerted of potential threats .
Prerequisites
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Steps
- On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Digital Threat Monitoring.
- In the dropdown menu, users will select the Monitors tab and see the Monitors page.
- Users will see under the Monitors tab, there are ten options in the Select a Monitor section.
- These option consist of several pre-configured options that consist of:
- Cards Shops
- Compromised Credentials
- Data Leaks
- Deep & Dark Web
- Domain Protection
- Initial Access Broker
- Netblocks & Domains
- Ransomware Threats
- Supply Chain Compromise
- To select a pre-configured Monitor, users will select one of the options below Select a Monitor.
- For the pre-configured Monitors, many of the fields in the Create a Monitor page will be filled in, with the option to edit those fields.
- These fields include:
- Monitor type
- Description
- Monitor Configuration
- The Monitor Configuration section have condition fields.
- In the Monitor Configuration section, users will first select to Search by Collection Type.
- Then users will choose if the Collection Type conditions Must Equal or Must Not Equal the different Collection Sources (Domain Discovery, Emails, Web Content, etc) based on the Collection Type.
- When complete, users will be able to select from Test Monitor or Create Monitor.
- Additionally, the users will have the capability to Create a Custom Monitor, that has topic values and conditions, without pre-configured values.
- The process and fields are similar to pre-configured options.
- To Create a New Monitor, users must provide a Monitor Name and at least one matching condition.
- In the lower part of the Monitors screen, will be two sections:
- Your Monitors
- Deleted Monitors
- Those sections will show current and former Monitors for the user and allows for editing.
- Optional: Users can create an Email Alert Notification on the Create a Monitor page.
- To enable Email Notifications, users must first configure Email Alert Notification settings using the link at the top of the Alert List.
Relevant Documentation Links
- All Steps: https://gtidocs.virustotal.com/docs/get-started-dtm
- Additional Documentation: https://gtidocs.virustotal.com/docs/monitors-guide
- Additional Documentation: https://gtidocs.virustotal.com/docs/monitors-guide#create-a-monitor-from-a-template
- Additional Documentation: https://gtidocs.virustotal.com/docs/monitor-scenarios
- Additional Documentation: https://gtidocs.virustotal.com/docs/monitor-fields
Review and Respond
Google Threat Intelligence’s Digital Threat Monitoring (DTM) allows users to setup notifications for their alerts, build their own delivery schedule based on their needs with both immediate notification or scheduled delivery, and take appropriate action to mitigate risks.
Prerequisites
- Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
- Monitors have to be created in order to receive alerts.
Steps
- On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Digital Threat Monitoring.
- In the dropdown menu, users will select the Alerts tab and see the Alerts page.
- If Monitors have not been created, then there will be no alerts in the Alerts main page.
- To filter Alerts, users can select Search filters or enter a Search query in the Search bar below the Alerts tab.
- In the top right corner of the Alerts page, users can change the settings of their Email Alert Notifications.
- Below the Alerts tab at the top of the page, users can select Date range for the search.
- On the left side of the Alerts page, is a Filters selection menu, to select the following options:
- Status
- Attributes
- Severity
- Alert Type
- Users can also sort their alerts by Severity level and Time Created.
Relevant Documentation Links
Next Step: Google Threat Intelligence: Step 2.2 - Collection | Vulnerability Intelligence
Previous Step: Google Threat Intelligence: Step 2 - Collection Overview