Security and API Integration

Prev Next

Enhance account security and integrate with Silent Push using Two-Factor Authentication (2FA) and API keys.

Set up 2FA

  1. From your user icon, select Account Settings.

  2. Select Set Up Two Factor Authentication.

  3. Scan the QR code and then select Next.

  4. In the Authentication Code box, enter your authentication code.

  5. Select Next.

  6. (Optional) To copy your recovery codes, select Copy All Codes or the Copy icon beside the specific recovery code.

  7. Select Done.

API Keys are generated by an administrative user for your organization in the Organization Settings.

Generate an API key

  1. Log in as an Organizational Admin.

  2. From your user icon, select Organization.

  3. Select the API Keys tab.

  4. Click +Add New API Key.

  5. Specify a Nickname.

  6. Specify an Expiration Date.

  7. Click Create.

  8. The new key appears in the API Keys table.

  9. Under Actions, you can copy, edit, or delete the key.

Threat Check API

Use the Threat Check API for unrestricted access to our feed data and to quickly determine whether a specific indicator is present on our Indicators of Future Attack (IOFA) feeds. The API also supports DNS-based lookups, ensuring that customers can perform real-time checks without incurring additional costs or limitations.

Benefits

With the Threat Check API, customers gain the following:

  • Rapid Risk Assessment: Quickly determine if an indicator is on an IOFA feed. This allows your team to promptly identify high-risk indicators and take appropriate action, such as blocking potentially dangerous traffic.

  • Unlimited Access: The Threat Check API is provided with unlimited usage for Enterprise customers.

  • High Traffic Capability: The API is engineered to handle large volumes of requests. This makes it ideal for integration into systems that require real-time look-ups under heavy load.

  • Simplified Integration: With a simple Boolean response, integrating the Threat Check API into your security infrastructure is straightforward. It supports both API and DNS-based lookup methods, providing flexibility in how you incorporate threat intelligence into your workflows.

Locate your API key

  1. From your User Icon, click Subscription.

  2. Find the Threat Check API key. For security, the key is masked, but you can reveal it by selecting the icon. This key is essential for authenticating your API calls.

Step 2: Integrate the API into your tools

Use the provided API key to perform lookups directly from your tools or security systems. The API accepts an indicator, such as an IP address, a domain, or a file hash, and returns a boolean value indicating whether it is present on an IOFA feed.

Step 3: Utilize DNS-Based Lookups

The Threat Check API also supports DNS-based lookups. This is especially useful for high-volume scenarios like filtering inbound emails or scanning network traffic.