Importing Objects From STIX

  1. Go to Threat Intelligence > Custom Intelligence > STIX.

    The STIX screen appears.

  2. Click Import.

    The Import Objects From STIX dialog appears.

  3. Click Select to locate a STIX file to import.
  4. (Optional) Type a description for this STIX file.
  5. Click Import.
    • Only IP addresses, domains, URLs, and file SHA-1 hash values will be added to the User-Defined Suspicious Objects list.

    • The STIX file and object information can be shared as part of threat intelligence.

    The objects appear in the User-Defined Suspicious Objects list. Registered appliances receive the updated User-Defined Suspicious Objects list during the next synchronization.