App-Icon

VMware Carbon Black Response EDR Operation

Integration for Enrichment and Analysis with the EDR

Version

1.2.1

Categories

Enrichment & Analysis,EDR
App-Icon

VMware Carbon Black EDR Connector

Enables Proactive Threat Hunting

Version

2.2.1

Categories

Commercial Intelligence,EDR
App-Icon

VMware Carbon Black Cloud Enterprise EDR

Brings in Intelligence seen with VMWare CB Cloud Enterprise EDR

Version

1.0.1

Categories

Commercial Intelligence,EDR
App-Icon

VMware Carbon Black Cloud Enterprise EDR Connector

Allows a user to export prioritized threat intelligence from ThreatQ into reports within Carbon Black Threat Hunter.Car-bon Black Threat Hunter will match endpoint activity to the threat intelligence from ThreatQ and generate alerts.

Version

1.2.1

Categories

Commercial Intelligence,EDR
App-Icon

Cisco AMP for Endpoints Connector

The Cisco AMP for Endpoints Integration for ThreatQ allows a user to automatically export hashes to a Cisco AMP for Endpoints blacklist.

Version

1.1.0

Categories

Enrichment & Analysis,EDR
App-Icon

Cisco AMP for Endpoints Operation

This operation allows a ThreatQ user to execute 2 actions on their Cisco AMP for Endpoints instance. The first action allows users to submit a SHA-256 hash from ThreatQ to a Cisco AMP for Endpoints application block list. The second action allows users to query their Cisco AMP for Endpoints events for any hits on a specific SHA-256 hash.

Version

1.0.1

Categories

Enrichment & Analysis,EDR
App-Icon

Cisco AMP for Endpoints CDF

The Cisco AMP for Endpoints CDF enables a ThreatQ user to ingest events from Cisco AMP for Endpoints.

Version

1.1.0

Categories

Enrichment & Analysis,EDR
App-Icon

Symantec Endpoint Protection Connector

This is a custom connector for a Symantec Endpoint Protection instance. This connector is meant to attach to a single Symantec Endpoint Protection instance. The connector's purpose is to send MD5 hashes in saved searches from ThreatQ into Symantec Endpoint Protection as a single user specified file fingerprint list.

Version

1.0.0

Categories

Commercial Intelligence,EDR
App-Icon

Crowdstrike Insight EDR

The CrowdStrike Insight EDR CDF for ThreatQ is a bi-directional integration aimed to give analysts the ability to export data collections to CrowdStrike, as well as bring back detection incidents from CrowdStrike.

Version

1.1.1

Categories

Commercial Intelligence,EDR
App-Icon

CrowdStrike Falcon Insight EDR Operation

The CrowdStrike Falcon Insight EDR Operation for ThreatQ enables analysts find detections and create new detection policies.

Version

1.2.1

Categories

EDR
App-Icon

VMware Carbon Black Protection Operation

The VMware Carbon Black Protection operation is used to apply policy rules to MD5, SHA-1 and SHA-256 hashes in CB Protection. The rules it can apply are ban, approve, or unapprove. When executed the operation sends the selected hash from ThreatQ to CB Protection and applies the rule a Threat Analyst has selected.

Version

1.0.0

Categories

EDR
App-Icon

VMware Carbon Black Defense Operation

The VMWare Carbon Black Defense Operation allows a ThreatQ user to query their Carbon Black Defense instance for any sensors/devices that have generated events containing an indicator.

Version

1.0.0

Categories

EDR
App-Icon

ThreatQ Operation for Microsoft 365 Defender

The ThreatQ Operation for Microsoft 365 Defender enables analysts to export IOC’s to Microsoft 365 Defender and set actions and expirations.

Version

1.0.0

Categories

EDR

Copyright © 2025, ThreatQuotient, Inc. All Rights Reserved. Privacy Policy