ThreatConnect Marketplace
  • Apps
  • Playbooks
  • Apps
  • Playbooks
Home » Apps Overview » Tanium Threat Response
Back to Apps
Related Resources
  • Indicators - Configuration Guide
  • Signatures - Configuration Guide
  • Blog

Categories:
  • Endpoint Detection and Response
Built by

ThreatConnect

Tanium Threat Response

The Tanium Threat Response integration for ThreatConnect enables users to send indicators and signatures to Tanium Threat Response as intel packages. The following Playbooks apps are available for this integration:

  • Tanium Threat Response – Indicators
    • This app enables users to send address, host, and file indicators from ThreatConnect to their Tanium Threat Response instance as intel packages based on specified criteria. This functionality allows users to operationalize intelligence from ThreatConnect in the form of searching and monitoring for malicious indicators in their endpoint environment
  • Tanium Threat Response – Signatures
    • This app enables ThreatConnect customers to send signatures from ThreatConnect to their Tanium Threat Response instance as intel packages based on specified criteria. This functionality allows users to operationalize intelligence from ThreatConnect in the form of signature-based searching and monitoring for malicious activity in their endpoint environment.
  • Tanium Threat Response
    • Deploy Indicator Intel Package
    • Deploy Signature Intel Package
    • Delete Intel Package

These apps can be found in the ThreatConnect App Catalog under the names: Tanium Threat Response – Indicators, Tanium Threat Response – Signatures, and Tanium Threat Response

Related Apps

Cybereason
Endpoint Detection and Response

With the Cybereason  integration, customers  have the ability to query both types of malops, isolate suspicious activities,...

SentinelOne
Endpoint Detection and Response

With the SentinelOne integration, users  have the ability to interact with agents, threats, hashes, exclusions and blocklist...

CarbonBlack Playbook
Endpoint Detection and Response

This Playbook template will allow you to deploy a Yara rule to Carbon Black's Yara Manager.

Developers

  • Knowledge Base
  • Training Site

Company

  • ThreatConnect
  • Contact Us
  • Blog
  • Twitter
  • Facebook
  • Linkedin

© Copyright - ThreatConnect Marketplace
Scroll to top