2013-03-04 08:56 AM
While I was out at RSA Conference, I had the pleasure of meeting Rob Davis of Critical Start. After I demonstrated to him the new RSA Security Analytics interface, he demonstrated his nifty Threat Analytics Search Plugin for Google Chrome's browser. It is a quick way to pass an IP address or Domain into several different commonly searched online websites with just a click of a button. The plugin is fully customizable to allow a user to utilize his or her own favorite search sites, and even has the capability to pass an IP address right back into Security Analytics.
You can visit the Chrome App store and search for Threat Analytics or just visit this page here:
http://www.criticalstart.com/threat-analytics-chrome-plugin/
By the way, this type of thing demonstrates the power of a tight-knit user community. If you've developed a helper app, best practice or shortcut for use with Security Analytics, please feel free to share it!
2016-08-05 08:59 AM
Hi Everyone,
After reading this discussion on the Critical Start Threat Analytics Plugin I wanted to make a quick tutorial video on how to use it and customize it for your NetWitness (formerly known as Security Analytics) deployment. It's incredibly quick and easy to setup and customize and I hope you find this video useful. If you have any questions, please don't hesitate to leave them below and I'd be happy to address them for you.
Thank you,
Jake Dorval - Services Product Lead - NetWitness
2016-08-05 12:41 PM
Just an FYI, Jake made a great setup video, and explains each entry for those who are new to Netwitnes/SA. Just wasnted to let everyone know that there is a shortcut to filling in the fields on the configuration screen for the Threat Analytics Plugin. In SA if you open an Investigation-> Navigate window to your default broker/concentrator and then copy the URL, you can paste it in the first configuration box and then hit "Save new config" and it will auto populate all the fields using the information from the URL.
2016-09-14 07:02 PM
This is slick...