ThreatPipes connects threat intelligence sources and security tools so that they can work together in powerful new ways.
If you're assessing ThreatPipes, a new ThreatPipes user or someone who is having trouble using ThreatPipes, the documentation is the first place to start.
The documentation is split into a series sections that cover instructions, examples, and common ThreatPipes use-cases.
New users should start with at with the Getting Started section.
Those looking to solve specific problems can search the entire documentation to help uncover a solution.
An introduction to ThreatPipes and core concepts.
Plan and provision an ThreatPipes deployment.
Configure and optimise your ThreatPipes server.
Create and customise new Nodes.
Diagnose any problems you are having with ThreatPipes.