Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Threat Analytics Manager is an intuitive user interface which enables the ingestion and curation of your Data Sources.  By using the Manager for ingestion/curation, you create a single sheet of sterilized data which can then be leveraged for analysis, reporting, and visualization. 

Data ingestion is a simple 3 step process including ingestion, curation and publishing.  

  1. Connect to your Data Source and associate it with a Data Group.
  2. Configure your Data Source as required, for additional curation.
  3. Save or Publish your data source.

This simple workflow is all that is required to store data sources in Data Groups and make them available to Users and User Groups.  These relationships are illustrated in the diagram below.

Gliffy
nameTA Source Objects


 

Next Steps:

 

Panel

In this section:

 

Panel

Data Sources

Introduction to Sources?

Source Types

CSV Record Import Source

Data Groups

Learn how to ingest and curate Data Sources, by using an intuitive 3 step wizard-based procedure.

Data Groups

Learn how to create Data Groups, and add Users or User Groups, enabling you to share Data Sources.

Panel

Visualizations

 

Panel

Users and User Groups

 

Panel