[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-21。"],[[["\u003cp\u003eThe IOC Matches tab in Google Security Operations displays all indicators of compromise (IOCs) matched in your data, allowing you to view and analyze them.\u003c/p\u003e\n"],["\u003cp\u003eYou can filter IOCs by various criteria such as Type, GCTI Priority, Status, Categories, Sources, Associations, and Campaigns, using both basic and advanced filter options.\u003c/p\u003e\n"],["\u003cp\u003eThe IOC Matches page provides details about each IOC, including type, priority, status, categories, assets, campaigns, and time-related information like ingest time and first/last seen.\u003c/p\u003e\n"],["\u003cp\u003eUsers can adjust the time range of displayed data, and for any selected IOC, you can mute or unmute it, view event prioritization details, and explore associations.\u003c/p\u003e\n"],["\u003cp\u003eApplied intelligence IOCs can be viewed by filtering the data to view only those from the Mandiant source.\u003c/p\u003e\n"]]],[],null,["# View IOCs using Applied Threat Intelligence\n===========================================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n\nWhen Applied Threat Intelligence is enabled, the **IOC Matches** tab displays additional columns.\nThe **IOC matches** tab displays all the indicators of compromise (IOC) that were matched in your Google Security Operations data.\nYou can view and filter IOCs curated by Applied Threat Intelligence.\n\nOn the **IOC matches** page you can do the following.\n\n- [View the IOCs](/chronicle/docs/detection/ati-view-ioc-page#viewioc)\n\n- [View data](/chronicle/docs/detection/ati-view-ioc-page#viewingdata)\n\n- [Filter IOCs](/chronicle/docs/detection/ati-view-ioc-page#filter)\n\n- [View IOC details](/chronicle/docs/detection/ati-view-ioc-page#iocdetails)\n\nView IOCs\n---------\n\nThe **IOC matches** page displays all the IOCs and their details, such as\ntype, priority, status, categories, assets, campaigns, sources, IOC ingest\ntime, first seen, and last seen. The color-coded icons and symbols help you to\nquickly identify which IOCs need your attention.\n\nView data\n---------\n\nClick the calendar_month to display the calendar. You can adjust the time range for the\ndisplayed data. Adjust the time range by\nchoosing one of the pre-set time ranges on the left side (ranging from last\nfive minutes to last month). You can also specify a custom time range by choosing\na start and end date anywhere on the calendar.\n\nFilter IOCs\n-----------\n\nIn the left column, select the category to filter by. You can use the following options to filter:\n\n- **Type**\n\n- **GCTI Priority**\n\n- **Status**\n\n- **Categories**\n\n- **Sources**\n\n- **Associations**\n\n- **Campaigns**\n\nTo select more advanced filters, click the *filter_alt*\nicon and then select the elements to filter on. You also need to select a logical operator:\n\n- OR. Must match any of the combined conditions\n\n- AND. Must match all of the combined conditions\n\nTo add more filters, click *add* Add filter.\n\nWhen you add a filter, it appears as a chip above the table.\n\nTo use two filters from the same category, the filters appear in the same chip.\nTo find IOCs labeled as Active IR or High (both under the **GCTI Priority** label), complete the following steps:\n\n1. Select a logical operator.\n\n2. Select the first filter.\n\n3. Select the second filter.\n When you click the second filter, there are two new options: **Show only**\n and **Filter out** instead. Click **Show only**.\n\n### View applied intelligence IOCs\n\n1. In the left column, click **Sources**.\n\n2. Click **Mandiant** to filter the data and view applied intelligence IOCs.\n\n### Clear filters\n\n- Click the *delete* icon next to the filter you want to delete.\n\n- Click **Clear all** to clear all the existing filters from the page.\n\nView IOC details\n----------------\n\nYou can click an IOC to view details such as priority, type, source, IC-Score, and\ncategory. If you are getting IOC mapping but there are no events, then there is a\nmistake in the field mapping or there are no rules. For more information,\ncontact Google SecOps [Support](/chronicle/docs/getting-support).\n\nFor a selected indicator, on the **IOC details** page, you can do the following:\n\n- [Mute or unmute an IOC](/chronicle/docs/detection/ati-view-ioc-page#muteunmute)\n\n- [View event prioritization](/chronicle/docs/detection/ati-view-ioc-page#viewevent)\n\n- [View associations](/chronicle/docs/detection/ati-view-ioc-page#associations)\n\n### Mute or unmute action\n\nIf an IOC is generated due to an administrator or testing action, you can mute the\nindicator to prevent false positives.\n\n- To mute the status, click the IOC, and then click **Mute** . The status of\n the indicator is changed to **Muted**.\n\n- To unmute the status, click the IOC, and then click **Unmute** . The status\n of the indicator is changed to **Unmuted**.\n\n### Event viewer\n\nOn the **Events** tab, on a selected indicator, you can view how an event is prioritized and the details for an event.\nFor each event, you can view priority and rationale, UDM fields, and event details.\nThe priority and rationale displays how priority is determined for the event.\n\n### Associations\n\nOn the **Associations** tab, on a selected indicator, you can investigate potential breaches.\nYou can view associations for any actor or malware. This also helps to prioritize alerts.\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]