Applied Threat Intelligence overview

Supported in:

Applied Threat Intelligence (ATI) helps you identify and respond to threats. It continually analyzes and evaluates your security telemetry against Indicators of Compromise (IoCs) curated by Mandiant threat intelligence.

When ATI is enabled, Google Security Operations ingests IoCs curated by Mandiant threat intelligence that have an Indicator Confidence Score (IC-Score) greater than 80. When a match is found, an alert is generated. You can then investigate the IoC on the IoC matches page, which displays possible IoC matches for domains, IP addresses, file hashes, and URLs. Information about the IoC is displayed, including:

  • GCTI priority
  • IC-Score
  • Associations
  • Campaigns

You can also view detailed information about the events that triggered the IoC match, information from the threat intelligence source, and the rationale for the IC-Score. For more information, see View IoCs using Applied Threat Intelligence.

Google SecOps curated detections evaluate your event data against Mandiant threat intelligence data, and generates an alert when one or more rules identify a match to an IoC with an Active Breach or High priority.

To use Applied Threat Intelligence, do the following:

  1. Enable the Applied Threat Intelligence curated detections.
  2. Investigate alerts using the IOC matches page.

You can also learn more about how the IC-Score is assigned in the IC-Score overview.

Need more help? Get answers from Community members and Google SecOps professionals.