Configuring the Threat Intelligence dashboard
Use the App Settings page in the Threat Intelligence dashboard to configure Authentication Token, Proxy Settings, API Settings, and Am I Affected settings.
Use the App Settings page in the Threat Intelligence dashboard to configure Authentication Token, Proxy Settings, API Settings, and Am I Affected settings.