Feed Integrations - Administrator Guide - 8 - Cortex XSOAR - Cortex - Security Operations

Cortex XSOAR Administrator Guide

Cortex XSOAR
Creation date
Last date published
Administrator Guide

Feed integrations fetch indicators from a threat intelligence feed and add them to Cortex XSOAR for processing and handling.

Cortex XSOAR has out-of-the-box threat intelligence feed integrations, including:


  • Unit 42 ATOMs

  • Unit 42 Intel Objects

  • TAXII (1, 2.0/2.1)

  • Microsoft Office 365

  • Abuse.ch SSL Blacklist

  • Feodo Tracker IP Blocklist

  • Spamhaus

  • AlienVault

  • TOR Exit Addresses

  • AWS

  • Recorded Future RiskList

  • Proofpoint

Common feed integration parameters

This is a non-exhaustive list of the most common feed integration parameters. Each feed integration might have parameters unique to that integration. Read the documentation for specific feed integrations for more details.




A meaningful name for the integration instance. For example, if you have separate instances to fetch different indicator types, you can include the name of the indicator type that the instance fetches.

Fetches indicators

Select this option for the integration instance to fetch indicators.

Some integrations can fetch indicators or incidents. Make sure you select the relevant option for what you need to fetch in the instance.


Some feeds might have several lists or files that provide indicators. The sub-feeds parameter enables you to select the specific list or file from which to fetch indicators. For example, Bambenek Consulting provides different lists for IPs and domains. Each of the Bambenek lists are available as sub-feeds.


The URL of the feed.

Fetch Interval

How often the integration instance should fetch indicators from the feed.

Indicator Reputation

The indicator verdict to apply to all indicators fetched from this integration instance.

Source Reliability

The reliability of the source providing the threat intelligence data.

Indicator Expiration Method

The method by which to expire indicators from this integration instance. The default expiration method is the interval configured for the indicator type to which this indicator belongs.

  • Indicator Type: the expiration method defined for the indicator type to which this indicator belongs (interval or never).

  • Time Interval: expires indicators from this instance after the specified time interval, in days or hours.

  • Never Expire: indicators from this instance never expire.

  • When removed from the feed: when the indicators are removed from the feed they are expired in the system.

Bypass exclusion list

When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.

Trust any certificate

When selected, certificates are not checked.

Use system proxy settings

Runs the integration instance using the proxy server (HTTP or HTTPS) that you defined in the server configuration.

Do not use by default

Excludes this integration instance when running a generic command that uses all available integrations.

Feed-Triggered Jobs

Customize Threat Intelligence Management Playbooks to run an indicator search query. Create a Create a Job Triggered by Delta in Feed when the specified feed or feeds finish a fetch operation.Threat Intelligence Management Playbooks


To run Threat Intelligence Management playbooks, you need a Threat Intel Management license.