Configure custom MISP API feed

  • Release version: Zurich
  • Updated September 23, 2025
  • 2 minutes to read
  • The MISP API feed enables you to import events from the MISP server, along with their associated attributes and objects, into the TISC library.

    Before you begin

    Role required: sn_sec_tisc.admin

    Procedure

    1. Navigate to Workspaces > Threat Intelligence Security Center > Integrations.
    2. Select Custom.
      Note:
      By default, the MISP feed is disabled, you must edit the configurations to enable the feed.
      Premium feed - MISP.
    3. Select the Edit button on the MISP Feed page.
    4. Drill down to the Configuration section.
    5. Update the MISP server Base URL field.
    6. Add the required authentication details for the MISP server (if any).
    7. Navigate to Additional Settings to configure the filters to fetch the data from MISP.

      MISP feed- additional settings

      The Additional Settings tab is used to set up filters that determine which MISP events are ingested.

    8. Select Edit Settings.

      MISP edit additional settings.

    9. Select the required filters.
      Note:
      All the filters configured will be applied in conjunction while ingesting the events.
      The following section provides a detailed explanation of each available option. Review each option in the following table to understand how the filters can be applied to optimize which MISP events are ingested into the TISC library.
    10. Select the required values from the following available filters.
      Table 1. Edit Additional Settings
      Field Description
      Filters on events
      Include unpublished events Select this check box if you want to include unpublished events.
      Creator org name or ID Enter a comma-separated list of organization names and/or IDs associated with the event.
      Note:
      If the organization name contains leading or trailing spaces, enclose the name in double quotes to ensure proper processing.
      Tag name or ID Enter a comma-separated list of tag names and/or tag IDs associated with the event.
      Threat level Select a threat level to filter incoming events. Leaving this field empty includes events of all threat levels.
      Distribution level Select a distribution level to limit events. Leaving this field empty includes events of all distribution levels.
      Note:
      With the same additional settings you’ve defined above, you can duplicate the feed when creating a one.
    11. Select Update on the Additional Settings dialog box to save the modified additional settings.
    12. Select Enable to enable the MISP feed for including the MISP events.
    13. Optional: Select Duplicate to duplicate the feed.
      For more information, see Duplicate threat intelligence feeds.
      Note:

      Each MISP event imported into the TISC Library, whether as a Threat Report or Threat Event, includes an associated External Reference record.

      This record is accessible via the Related Records tab and provides a direct URL link to the corresponding MISP event on the MISP server. This also enables a quick access to the original event data.

      For details on how MISP events, along with their associated attributes and objects, are mapped to TISC entities, refer to KB2197697.

      Entity types that aren’t included in the mapping described in the KB article aren't ingested into the TISC Library.