top of page

Get Started

Dashboard

Your starting point to speed up your Threat Hunting

Page 1.png

Dashboard

Start your day by navigating to 'Hunt of the Day' recommendation

Page 2.png

Explore SIGMA 

Explore SIGMA files from 'Hunt of the Day' to hunt Threat Actor behavior

Page 3.png

Process CTI Reports

Process your own 'CTI Reports' by creating a repository

Page 4.png

New Repository

Start by navigating to 'New Repository'

Page 5.png

Create Repository

Organize based on Intel Sources, Threat Actors or Hypothesis

Page 6.png

Add URL

Link your 'CTI Report' to build detection rules in minutes

Page 7.png

Add Feedly Stream

Pull multiple 'CTI Reports' from a Feedly board

Page 8.png

Generate SIGMA

Let the engine do its magic

Pgae 9.png

View Insights

Explore 'Threat Actor' Artifacts and behaviors detailed in the 'CTI Report'

Page 10.png

Chat

Research Threat Actor behavior from specific 'CTI Reports' or from System Two's Generative Threat Graph

Page 11.png

Users

Add users and collaborate

Page 12.png
bottom of page