Skip to main content

Google Threat Intelligence: Step 2 - Collection Overview

  • September 11, 2024
  • 0 replies
  • 230 views

Digital-Customer-Excellence
Staff
Forum|alt.badge.img+7

This section of Google Threat Intelligence Onboarding will go over Collection: Digital Threat Monitoring and Vulnerability Intelligence. 

124061iFA2DBC4149364ACC.png

Prerequisites

  • Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s). 
  • Define the user’s Monitor Topics: Carefully choose the monitor topics and keywords to ensure DTM focuses on the most relevant information. Consider including:
    • Your organization's name and variations
    •  Key brands and products
    • Registered web domains
    • Executive names (VIP users)
    • Organization-specific terms
    • Network Information (External IP addresses or ranges)
  • If a user doesn't have this information, they cannot start to build monitors

 

Next Step: Google Threat Intelligence: Step 2.1 - Collection | Digital Threat Monitoring

Previous Step: Google Threat Intelligence: Step 1.4 - Direction | Attack Surface Management