scoutTHREAT - Threat Queries Overview
B
Written by Benjamin Dewey
Updated over a week ago

Threat Queries are at the center of an analyst's work when searching for needed intelligence.


When Threat Queries are created and triggered they comb through the local scoutTHREAT system and TICE for intelligence items and data needed to complete information reports, intelligence object profiles, requests for information, etc.


Threat Queries can be created and triggered to run on scoutTHREAT in order to gather information in the local system.


When creating a TICE Environment Threat Query, an analyst can receive intelligence from the TICE cloud which ingests data from various sources including MITRE and MIST, as well as shared intelligence from other tenants.


Related Content

Did this answer your question?