Skip to main content

Table of Contents

 

124054i3909A01A49F0EB16.png

This section of Google Threat Intelligence Onboarding, will go over Vulnerability Intelligence function. Google Threat Intelligence empowers users to prioritize patching and mitigation efforts by providing empirical risk scoring, highly contextualized correlations to other indicators of compromise (IOCs), and continuously updated reporting on vulnerabilities.

By following this brief guide, you will be able to get a better understanding of how Vulnerability Intelligence works and how to get it initially setup.

 

Prerequisites

Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).

 

Actions

124055i57D46090B0A9ED4E.png
Explore Vulnerabilities

Google Threat Intelligence’s Vulnerability Intelligence section allows users to prioritize patching, and implement mitigations efforts through continuous updates and reporting of vulnerabilities. Here users can maintain awareness of the latest and most severe vulnerabilities, tracked by Google Threat Intelligence. 

 

 

Prerequisites

Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).


Steps
  1. On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Vulnerability Intelligence.
  2. The Vulnerability Intelligence page will appear with entity tabs and three sections:
    1. Search Query bar
    2. Filters
    3. Summary
  3. At the top of the page users can see the Search Query bar under the Vulnerabilities tab. Here users can enter searches by:
    1. Name
    2. Owner
    3. Description
    4. Tags
  4. Below the Search Query bar users will see the Filter selection dropdown lists.
  5. The first Filter is an important selection as it is where users can select the Origin of the Vulnerability reporting:
    1. Google Threat Intel
      1. Google Threat Intelligence Reporting
    2. Partner
      1. Peer Threat Intelligence Reporting
    3. Crowd-sourced
      1. Open-source (OSINT) Reporting
  6. The remaining Filters can allow users to select from a variety of options:
    1. Industries
    2. Target Regions
    3. Source Regions
    4. Threat Category
    5. Creation Date
    6. Lookups Trends
  7. To the right of Lookups Trends dropdown tab, users will have see an Actions, but only after selecting a Vulnerability from the list in the Summary section.
  8. The Actions will consist of:
    1. Follow New IOCs in Your IOC Stream
    2. Additionally Send Email Notifications…
  9. If users select to send email notifications, they will enter an email address or multiple.
  10. Users will then select to receive One Email per IOC Added.
  11. Or users will choose Daily Digest to receive a daily email in their inbox with all the new IOCs added to the entity.
  12. Each Vulnerability page will have the following actions at the top-right of the page:
    1. Follow
    2. Share & Visibility
    3. Download (All IOCs as…)
      • JSON
      • CSV
      • STIX
    4. Open in Graph
  13. This page has multiple tabs to select to view specific details:
    1. Summary
    2. Associations
    3. IOCs
    4. Products and Fixes
    5. Activity
    6. Rules
    7. TTPs
    8. Reporting
    9. Community
  14. This page has multiple sections in the main area of the page:
    1. Vulnerability’s Info
    2. Exploitation Details
    3. Summary & Analysis
    4. Description
    5. CVSS Score
    6. Details
    7. Last 2 Weeks Activity
    8. Targets
    9. Timeline
    10. Relevant Reporting
Relevant Documentation Links

 

 

Next Step: Google Threat Intelligence: Step 3 - Analysis Overview

Previous Step: Google Threat Intelligence: Step 2.1 - Collection | Digital Threat Monitoring

Be the first to reply!

Reply