Hortonworks Docs
»
»
Also available as:
Runbook Enriching with Threat Intelligence Information
Enriching Threat Intelligence Information
Bulk Loading CSV Threat Intelligence Information
OPTIONAL: Create a Mock CSV Threat Intel Feed Source
Configure a CSV Extractor Configuration File
Configure Element-to-Threat Intelligence Feed Mapping
Run the Threat Intelligence Loader
Bulk Loading TAXII Threat Intelligence Information
Fetch Hail a TAXII Feeds
Configure a TAXII Extractor Configuration File
Configure a TAXII Connection Configuration File
Push Hailataxii Feeds to HBase
Verify Threat Intelligence Feeds in HBase
Using Stellar Data to Transform Threat Intelligence Data
Map Fields to HBase Enrichments
Verify That the Threat Intel Events Are Enriched
© 2012-2019, Hortonworks, Inc.
Document licensed under the
Creative Commons Attribution ShareAlike 4.0 License
.
Hortonworks.com
|
Documentation
|
Support
|
Community