Table of Contents
Below you'll find a table of contents for the Onboarding journey.
In the Onboarding section we will discuss how to gain access to Mandiant Threat Detection through Mandiant Advantage, as well as lay the foundation for a successful implementation covering email configuration, Intel Subscriptions, and more.
Prerequisites
- Mandiant Advantage Account.
- Entitlement for Mandiant Threat Intelligence.
Actions
Intel Subscriptions
It is important that you ensure you have the subscriptions you need in Threat Intelligence in order to keep your company safe. In your Account Settings, you'll be able to submit a request for upgrades by following these steps.
Prerequisites
See the Relevant Links section for more documentation regarding the prerequisites.
- Mandiant Advantage Account.
- Entitlement for Mandiant Threat Intelligence.
Steps
-
Navigate to the Mandiant Advantage Login Page, sign in using your credentials.
-
Upon login, you will see your profile page. Fill out your profile appropriately.
-
Click Threat Intelligence under Applications.
-
You will be greeted with a default dashboard showing on-going threats. Click Settings > Intel Subscriptions.
-
Click on Request Upgrade, then fill out the form with the requested information.
-
Note: Due to the sensitive nature of Threat Intelligence, it is important that all requests are reviewed for authenticity.
-
Relevant Links
Configure Users
The Administrative user in Mandiant Advantage is responsible for assigning access to Threat Intelligence. In these steps we will show how to create a user and assign the proper Mandiant applications to them.
Prerequisites
See the Relevant Links section for more documentation regarding the prerequisites.
- Administrative access to Mandiant Advantage.
Steps
-
Navigate to the Mandiant Advantage Login Page, sign in using your credentials.
-
Upon login, you will see your profile page. Select Manage from the global navigation header > Manage Users.
-
Click Add Users, then populate the form, filling the required fields, and select a Role & Access for the new user.
-
Under the Product Access header, select Threat Intelligence, then click Add.
Relevant Links
Next Step: Threat Intelligence: Step 2 - Browser Plugins & Dashboards
Previous Step: Threat Intelligence - Journey Overview