top of page

Get Started


Your starting point to speed up your Threat Hunting

Page 1.png


Start your day by navigating to 'Hunt of the Day' recommendation

Page 2.png

Explore SIGMA 

Explore SIGMA files from 'Hunt of the Day' to hunt Threat Actor behavior

Page 3.png

Process CTI Reports

Process your own 'CTI Reports' by creating a repository

Page 4.png

New Repository

Start by navigating to 'New Repository'

Page 5.png

Create Repository

Organize based on Intel Sources, Threat Actors or Hypothesis

Page 6.png


Link your 'CTI Report' to build detection rules in minutes

Page 7.png

Add Feedly Stream

Pull multiple 'CTI Reports' from a Feedly board

Page 8.png

Generate SIGMA

Let the engine do its magic

Pgae 9.png

View Insights

Explore 'Threat Actor' Artifacts and behaviors detailed in the 'CTI Report'

Page 10.png


Research Threat Actor behavior from specific 'CTI Reports' or from System Two's Generative Threat Graph

Page 11.png


Add users and collaborate

Page 12.png
bottom of page