← Go back to library

Integrate Anomali Threat Intelligence with Sublime Security's email detection signatures

Collect data on threat actors from Anomali ThreatStream, then either create or update detection signature security rules in Sublime Security based on the presence of observables and whether rules already exist. If further results appear, repeat the collection and rule management process after a delay.

Created by

Dan Le

How it works

Import this story to your tenant, from where you can adapt it to meet your unique needs.

Import
Was this story helpful?