Overview

TruStar provides an Intelligence Management technology that aims to break down data silos within and across enterprises to align security effectiveness with business objectives.

Hunters uses TruStar to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.
In addition Hunters uses it for it’s Threat Intel detection and investigation pipeline. The Threat Intel pipeline detects IOCs in your raw data from your different data sources, and enriches existing detections containing IOCs.

Supported Data Types

  • TruStar IOCs - Various IOCs collected by TruStar

Sending data to Hunters

In order for Hunters to collect your data you will need to provide Hunters with the required keys. You’ll need to generate or retrieve your API access key and secret from your account settings page on Station. After generating the API key and API Secret, use them in the Hunters platform for setting up the ingestion.

In case you want to filter the IOC sources collected from your trustar account, and only get part of the sources ingested to your environment, you can deliver Hunters support the list of sources you want to collect.