Perform the following tasks before configuring threat intelligence feeds:
Choose your threat intelligence sources.
Recommended but not required: Install a threat intelligence feed aggregator, such as SoltraEdge.