Overview

This document is intended for a technical audience and provides a detailed description of Low-Volume Alerts Processing with the ThreatConnect Platform. Low-volume alerts (less than 1000/alerts/day) processing integrations make use of the in-platform Playbooks by way of a Playbook Template to model data handling. Typically, these integrations ingest alerts from remote systems, enrich the provided alert information using the ThreatConnect Platform, and make a decision on whether extended data is stored and users notified for review.

Integration Attributes

Example Integration Diagram

Diagram Explanation

  1. An event is created in a remote platform.

  2. Event data is appropriately filtered in the remote platform such that the volume fired at the ThreatConnect Platform remains specific and low-volume.

  3. The event payload is prepared in the remote system.

  4. The event payload is fired as a Webhook towards a receiver in the ThreatConnect Platform.

    1. This receiver could be an HTTP Trigger Playbook (Template) or an App Service (which is part of a Playbook Template). The decision on what is used here is best discussed with your ThreatConnect Solutions Engineer.

  5. The event is received in the ThreatConnect Platform as part of a Playbook Template.

  6. Data is processed from the event (JMES Path, etc).

  7. (Optionally) Additional enrichment is requested (such as requesting a document or other body of data regarding the received event).

    1. This is typical when the full context of an event cannot be supplied via the trigger itself.

    2. The work for the additional enrichment should be completed as a separate On-Demand Enrichment integration.

  8. (Optionally) The enrichment request is received by an enrichment source.

  9. (Optionally) The payload of enrichment data is prepared.

  10. (Optionally) The enrichment response is provided.

  11. All enrichment data is processed and typically a decision is made about whether or not to proceed based on known information.

    1. For example, do we have any reason now to continue with these indicators based on other data that we have? If not, we should discontinue. If so, we’ll proceed.

  12. We store the enriched data in the platform (Indicators along with Groups as necessary and according to data modeling).

  13. We fire an in-platform notification to notify ThreatConnect users of information that should be reviewed.

  14. The Playbook logic ends.

Integration Key Points