Perform the following tasks before configuring threat intelligence feeds:
Choose your threat intelligence sources.
As a best practice, install a threat intelligence feed aggregator, such as SoltraEdge.