Accessing the Seqrite Threat Intelligence
Seqrite Threat Intelligence is a web-based application hosted on Seqrite’s server.
To access this portal, follow these steps:
- Users are to plug in their USB dongle on their endpoint (Desktop or Laptop).
- Go to https://stip.seqrite.com/.
- On the Sign In page, login with the provided credentials.
- Once authenticated, the user will land on the Dashboard.
Setting Up Organizations and Analysts
An administrator sets up the organization’s structure, assigns user roles, and can disable the account.
- Setting up organization
- Seqrite admin will create organizations within the portal.
- Admins assign an Organization Admin for each created organization.
- Adding Users
- Organization Admins can add Analysts and assign roles such as:
- Org Admin: Full access to manage the organization.
- Org Analyst: Can view and analyse threat intelligence data.
- Disabling Accounts
- Seqrite admins can disable organizations or specific analysts.
- Seqrite Admin or Organization Admin can disable specific users of their organization