In the ti_icon Threats menu, you can see charts of the threat intelligence incidents logged in your network, view incident logs and search the threat intelligence database of Threat Defender.

Threat intelligence (TI) generates information on known threats that is used in rules to initiate countermeasures.

Threat Defender integrates a continuously active TI subsystem that provides a bundle of TI feeds from multiple sources. They contain various types of data, such as information on downloads of ransomware, C&C server domains and so on.

Threat Defender compares all network traffic flows to these feeds in real time. If an indicator is discovered, the policy engine can be used to log the event and/or intercept the concerned traffic.