Connecting Sources
This section contains a general description of the process for connecting external compromise indicators (IoC) sources to the Threat Intelligence module. It presents available integration methods and pre-configured resources.
For detailed step-by-step instructions on connecting specific sources, refer to separate documentation articles: