From b1dfa7c684506e6f6bd5cba799103dbcbd5258c5 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Mon, 5 Jun 2017 11:45:09 +0200 Subject: [PATCH] fix: default feeds link added --- features.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/features.html b/features.html index b4d1c9d..2b38d78 100755 --- a/features.html +++ b/features.html @@ -31,7 +31,7 @@ Discover how MISP is used today in multiple organisations. Not only to store, sh
  • Flexible free text import tool to ease the integration of unstructured reports into MISP.
  • A gentle system to collaborate on events and attributes allowing MISP users to propose changes or updates to attributes/indicators.
  • data-sharing: automatically exchange and synchronization with other parties and trust-groups using MISP. -
  • feed import: flexible tool to import and integrate MISP feed and any threatintel or OSINT feed from third parties.
  • +
  • feed import: flexible tool to import and integrate MISP feed and any threatintel or OSINT feed from third parties. Many default feeds are included in standard MISP installation.
  • delegating of sharing: allows a simple pseudo-anonymous mechanism to delegate publication of event/indicators to another organization.
  • Flexible API to integrate MISP with your own solutions. MISP is bundled with PyMISP which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes.
  • Adjustable taxonomy to classify and tag events following your own classification schemes or existing taxonomies. The taxonomy can be local to your MISP but also shareable among MISP instances.