System Administration
Configure integrations, webhooks, and system settings
Changes to system configuration will affect all users. Test integrations before enabling them in production.
External Enrichment Sources
Configure third-party threat intelligence sources for fingerprint enrichment
Enrichment Behavior
Control when and how enrichment occurs
Automatically enrich fingerprints when new observations arrive
Cache results for 24 hours to reduce API calls
Changes are saved automatically. Test configurations before enabling in production.