Enrichment

Enrich your data in Panther with GreyNoise, IPinfo, Tor and Anomali Threatstream—or create custom Lookup Tables

Overview

With Panther's enrichment capabilities, you can cut through background noise to write higher-fidelity detections and deliver more informative alerts. Create Custom Lookup Tables, or enable a type of Panther-managed Lookup Table: Enrichment Providers or identity provider profiles.

Custom Lookup Tables

Custom Lookup Tables, also referred to as simply "Lookup Tables," let you add custom context to your detections and alerts. Using Lookup Tables saves time by enhancing detections, reducing alert noise, and speeding up investigations.

To learn how to set up Lookup Tables, see Custom Lookup Tables.

Panther-managed Lookup Tables

There are two types of Panther-managed Lookup Tables: Identity Provider Profiles and Enrichment Providers.

Identity Provider Profiles

Panther can retrieve and store user and device data from Okta and Google Workspace once you've configured them as log sources. This information is stored in Panther-managed Lookup Tables, meaning it can be referred to in detection logic and search queries.

Enrichment Providers

Panther comes with four out-of-the-box Enrichment Providers, also known as Panther-managed Lookup Tables: Anomali ThreatStream, GreyNoise, IPinfo, and Tor.

Anomali ThreatStream

Anomali ThreatStream aggregates multiple threat feeds into a single high-fidelity repository by normalizing, deduplicating, removing false positives from, and enriching threat data—then associating all related threat indicators.

The Panther-managed Anomali ThreatStream Lookup Table matches your Anomali indicator data against log events ingested into Panther for high-fidelity alerts.

To learn how to use Anomali ThreatStream enrichment, see Anomali ThreatStream.

GreyNoise

GreyNoise collects data on IP addresses that saturate security tools with noise. This kind of data can help you understand which events can be ignored, which can lead to fewer false positive alerts—letting you focus on real threats.

To learn how to leverage GreyNoise datasets, see GreyNoise.

IPinfo

IPinfo provides contextual information about IP addresses, including geolocation, ASN and privacy data. You can use IPinfo data to identify suspicious or high-risk actors.

To learn how to leverage IPinfo datasets, see IPinfo.

Tor Exit Nodes

Tor is an anonymizing network sometimes used by bad actors to hide their location. The Panther-managed Tor Lookup Table contains IP addresses for the Tor Exit Nodes.

To learn how to use Tor Exit Nodes enrichment, see Tor Exit Nodes.

Enrichment use case examples

Common use cases for Lookup Tables

  • Convert IPs to asset/user names, or geolocation details

  • Group IPs by type (development vs. production for ex.)

  • Append context to AWS Account IDs

Common use cases for GreyNoise

  • Modify an alert's severity depending on whether GreyNoise reports that an IP is malicious or benign

  • Reduce alert noise and fatigue if an IP is known to belong to a common business service that is most definitely not being used to attack your services

  • Enrich Panther alert context with GreyNoise data points

Troubleshooting enrichment

Visit the Panther Knowledge Base to view articles about enrichment that answer frequently asked questions and help you resolve common errors and issues.

Last updated

Change request #1924: [don't merge until ~Oct] Notion Logs (Beta)