Threat Intelligence (Beta)
Threat Intelligence uses bushfire.io to power an interactive map with layers of information of threats, alerts and weather updates.
To enable this feature let your account manager know.
This requires an accont with bushfire.io
Standard Operating Procedure for Using Threat Intelligence in Battleground Live
Objective
This SOP outlines the steps to access and utilize the Threat Intelligence feature in Battleground Live, ensuring team members can effectively monitor and respond to threats.
Key Steps
1. Access Threat Intelligence 0:00
-
Navigate to the Threat Intelligence feature in Battleground Live.
-
If you do not see this feature, contact your supervisor or the support team for assistance.
2. Understand the Map Interface 0:13
-
Observe the yellow circles on the map, which indicate locations relevant to your company.
-
Zoom in to view detailed warnings and issues in your area.
3. Customize Map Layers 0:22
-
Use the layers button to toggle different information on and off.
-
Customize the map to display the specific data you need.
4. Explore Information Sources 0:42
-
Recognize that Bushfire.io aggregates both publicly available and proprietary information.
-
Utilize this data to gain insights into potential threats.
5. Zoom and Search Features 1:00
-
Zoom in to get a closer look at specific areas and their associated warnings.
-
Use the search function to find specific locations and monitor their status.
6. Utilize Map Features 1:24
-
Experiment with the bearing feature to rotate the map for better perspective.
-
Zoom in on angles to assess terrain levels and monitor environmental factors like wind or fires.
7. Licensing Requirements 2:01
-
Ensure you have a valid Bushfire.io license to access Threat Intelligence.
-
Contact the appropriate personnel to activate your license if needed.
8. Engage with the Feature 2:15
-
Familiarize yourself with the interface and features to maximize your use of Threat Intelligence.
-
Enjoy exploring the capabilities of the tool.
Cautionary Notes
-
Ensure that you have the necessary permissions and licenses before accessing Threat Intelligence.
-
Be aware of the sensitivity of the information you are handling and follow company protocols for data security.
Tips for Efficiency
-
Regularly check for updates or new features in Threat Intelligence to stay informed.
-
Use the customization options to tailor the map to your specific monitoring needs, saving time during assessments.
Link to Video