ThreatMon
ThreatMon is a platform that provides cyber intelligence for monitoring and analyzing potential threats.
Asset Types Fetched
-
Alerts/Incidents
Before You Begin
Ports
- TCP port 80/443
Authentication Method
- API Key
APIs
Axonius uses the ThreatMon API.
Permissions
-
Requires a valid API key obtained from ThreatMon.
-
Only accessible to authorized customers with active subscriptions.
-
No additional OAuth or user token is needed—API key in header is sufficient.
Supported From Version
Supported from Axonius version 7.0.5
Connecting the Adapter in Axonius
To connect the adapter in Axonius, provide the following parameters:
Required Parameters
- Host Name or IP Address - The hostname or IP address of the ThreatMon server.
- API Key - An API Key associated with a user account that has the Required Permissions to fetch assets.
Optional Parameters
-
Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
-
HTTPS Proxy - Connect the adapter to a proxy instead of directly connecting it to the domain.
-
HTTPS Proxy User Name - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
-
HTTPS Proxy Password - The password to use when connecting to the server using the HTTPS Proxy.
To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.
Updated about 10 hours ago
