
var/www/MISP/app/Console/cake Password NEWPASSWORD Sudo docker exec -i -t misp_web /bin/bash You can reset the password with the following commands. If you are unable to login to the front end, then perhaps the password was not strong enough.
TRANSLATE THEME POEDIT HOW TO
If you are hosting this server on the Internet, you will want to look at how to secure this installation further with TLS and restrictions on access to the web front end. You should be able to sign in and begin adding new feeds. Run these two commands to build the image and start the container.Īt this point a MISP instance will be running on port 80. If you do not set a strong enough password, you might not be able to sign into your MISP instance. Next, you will need to edit the configuration file, making sure to set a strong password.

The MISP project has published a Docker compose configuration, you can use this by first entering these commands.
TRANSLATE THEME POEDIT INSTALL
The Docker MISP instance also requires ‘docker-compose’ so once you have followed the Docker install guide enter the following command. For this blog I used the Ubuntu instructions. The Docker project has already published comprehensive documentation on setting up the most recent version of Docker for your distribution of choice. If you have questions or feedback on this COVID-19 feed, please email integrate this feed with your MISP server you will need to use the following URL: We are maintaining this feed through the peak of the outbreak to help organizations focus on recovery. While some threats and actors are still best defended more discreetly, we are committed to greater transparency and taking community feedback on what types of information is most useful to defenders in protecting against COVID-related threats. We will continue to explore ways to improve the data over the duration of the crisis. The COVID-specific threat intelligence feed represents a start at sharing some of Microsoft’s COVID-related IOCs. Instructions here have been tested on Ubuntu 18.04 but should be applicable to many other distributions – even WSL. Haim Goldshtein has already written a blog post on doing this. It is also possible to use this code to import MISP data into Microsoft Defender ATP as well.

In this blog post I will show Azure Sentinel customers how to set up a MISP server that can receive any public feeds, including these COVID-19 indicators, and import the data into your Azure Sentinel environment. The feed of indicators is provided as data file on GitHub which can be consumed using MISP. Office365 successfully blocked these attempts, but the indicators can be consumed and used by customers to further protect themselves. Recently, Microsoft released an open source set of malicious file hash indicators identified as using COVID-19 themed malicious email attachments in attempted attacks against our customers.
