Configuring Threat Indicators

Indicators of Compromise (IoCs) represent a combination of observable objects, behavioral patterns, and contextual intelligence that together describe malicious activity within an operational cyber domain.

An Indicator is a set of observables that collectively represent or demonstrate malicious activity.

An Observable is an event or a stateful property that can be observed in an operational cyber domain, such as: IP address, a file signature, a URL, an email address and so on. On their own, observables are raw data points. When enriched with behavior and context, they become actionable threat indicators.

Threat indicators demonstrate attacks through:

Indicators are derived from multiple sources, including threat intelligence providers, internal analysis, government organizations, and trusted partners.

The IoCClosed Indicator of Compromise. Artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. Typical IoCs are virus signatures and IP addresses, MD5 hashes of Malware files, or URLs or domain names of botnet command and control servers. Identified through a process of incident response and computer forensics, intrusion detection systems and anti-virus software can use IoC's to detect future attacks. Feeds feature lets you fetch feeds from a third-party server directly to the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.. The Security Gateway enforces the feeds through the Anti-BotClosed Malicious software that neutralizes Anti-Virus defenses, connects to a Command and Control center for instructions from cyber criminals, and carries out the instructions., Anti-Virus and IPS engines, in addition to the feeds included in the Check Point packages and ThreatCloudClosed The cyber intelligence center of all of Check Point products. Dynamically updated based on an innovative global network of threat sensors and invites organizations to share threat data and collaborate in the fight against modern malware. feeds. The IoC Feeds feature helps you manage and monitor indicators with minimum operational overhead. You can upload the feeds through SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. or the CLI.