Subido por Luis Rodriguez

GuiaDeEstudio Qradar

Anuncio
Section 1: System Configuration
TASK: 1.1 Perform license management
1.1.1. Implement and manage shared license pool
1.1.2. Deploy incremental licenses
1.1.3. Explain burst handling
1.1.4. Upload and allocate a license key to a host
1.1.5. View license details for all QRadar components
Burst handling
IBM® QRadar® uses burst handling to ensure that no data is lost when the system exceeds the allocated events
per second (EPS) or flows per minute (FPM) license limits.
When QRadar receives a data spike that causes it to exceed the allocated EPS and FPM limits, the extra events and
flows are moved to a temporary queue to be processed when the incoming data rate slows. When burst handling
is triggered, a system notification alerts you that the appliance exceeded the EPS or FPM license limit.
The backlog in the temporary queue is processed in the order that the events or flows were received. The older
data at the start of the queue is processed before the most recent data at the end of the queue. The rate at which
the queue empties or fills is impacted by several factors, including the volume and duration of the data spike, the
capacity of the appliance, and the payload size.
Hardware appliances normally can handle burst rates at least 50% greater than the appliance's stated EPS and FPM
capability, and can store up to 5GB in the temporary queue. The actual burst rate capability depends upon the
system load. VM appliances can achieve similar results if the VM is adequately sized and meets the performance
requirements.
The burst recovery rate is the difference between the allocated rate and the incoming rate. When the volume of
incoming data slows, the system processes the backlog of events or flows in the queue as fast as the recovery rate
allows. The smaller the recovery rate, the longer it takes to empty the queue.
Example: Incoming data spike
Every morning, between 8am and 9am, a company's network experiences a data spike as employees log in and
begin to use the network resources
Internal events
IBM® QRadar® appliances generate a small number of internal events when they communicate with each other
as they process data.
To ensure that the internal events are not counted against the allocated capacity, the system automatically returns
all internal events to the license pool immediately after they are generated.
Shared license pool
The EPS and FPM rate that is set by each license is combined into a shared license pool. From the shared license
pool, you can distribute the processing capacity to any host within a specific deployment or that is managed by a
single console, regardless of which host the original license is allocated to.
By adjusting the allocation of the shared license pool, you ensure that the event and flow capacity is distributed
according to the network workload, and that each QRadar® host has enough EPS and FPM to effectively manage
periods of peak traffic.
In deployments that have separate event collector and event processor appliances, the event collector inherits the
EPS rate from the event processor that it is attached to. To increase the capacity of the event collector, allocate
more EPS from the shared license pool to the parent event processor.
Contributions to the license pool
A license that includes both event and flow capacity might not contribute both the EPS and FPM to the shared
license pool. The license pool contributions are dependent on the type of appliance that the license is allocated to.
For example, when you apply a license to a 16xx Event Processor, only the EPS is added to the license pool. The
same license, when applied to a 17xx Flow Processor, contributes only the FPM to the license pool. Applying the
license to an 18xx Event/Flow Processor contributes both EPS and FPM to the pool. With exception of software
licenses for event or flow collectors, all software licenses contribute both the EPS and FPM to the shared license
pool, regardless of which type of appliance the license is allocated to.
As of QRadar V7.3.2, you can now acquire stackable EPS/Flow increments instead of replacing existing console or
other managed hosts license when you need to increase the overall event or flow thresholds of your deployment.
After the licenses are uploaded and deployed, the event/flow capacity can then be reallocated through the License
Pool Management.
Exceeding your licensed processing capacity limits
The license pool becomes over-allocated when the combined EPS and FPM that is allocated to the managed hosts
exceeds the EPS and FPM that is in the shared license pool. When the license pool is overallocated, the License
Pool Management window shows a negative value for the EPS and FPM, and the allocation chart turns
red. QRadar blocks functionality on the Network Activity and Log Activity tabs, including the ability to view
events and flows from the Messages list on the main QRadar toolbar.
To enable the blocked functionality, reduce the EPS and FPM that you allocated to the managed hosts in your
deployment. If the existing licenses do not have enough event and flow capacity to handle the volume of network
data, upload a new license that includes enough EPS or FPM to resolve the deficit in the shared license pool.
Expired licenses
When a license expires, QRadar continues to process events and flows at the allocated rate.
If the EPS and FPM capacity of the expired license was allocated to a host, the shared resources in the license pool
might go into a deficit, and cause QRadar to block functionality on the Network Activity and Log Activity tabs.
License management
License keys entitle you to specific IBM® QRadar® products, and control the event and flow capacity for
your QRadar deployment. You can add licenses to your deployment to activate other QRadar products, such
as QRadar Vulnerability Manager.
When you install QRadar, the default license key is temporary and gives you access to the system for 35 days from
the installation date. The email that you received from IBM when you purchased QRadar contains your permanent
license keys. These license keys extend the capabilities of your appliance, and you must apply them before the
default license expires.
To apply a license key to the system, follow these steps:
1. Obtain the license key. For new or updated license keys, contact your local sales representative.
2. Upload the license key.
License keys determine your entitlement to IBM® QRadar® products and features, and the
system capacity for handling events and flows.
Before you begin
If you need assistance to obtain a new or updated license key, contact your local sales
representative.
About this task
You must upload a license key when you are doing these tasks:
•
•
•
Updating an expired QRadar console license
Increasing the events per minute (EPS) or flows per minute (FPM) limits
Adding a QRadar product to your deployment, such as IBM QRadar Vulnerability Manager, to
your deployment
As of QRadar V7.3.0, you do not need to upload a new license when you add an Event
Processor or Flow Processor to your deployment. Event and flow processors are automatically
assigned a perpetual, or permanent, appliance license, and you can allocate EPS or FPM from the
license pool to the appliance.
As of QRadar V7.3.2, you can now acquire stackable EPS/Flow increments instead of replacing
existing console or other managed hosts license when you need to increase the overall event or
flow thresholds of your deployment. After the licenses are uploaded and deployed, the event/flow
capacity can then be reallocated through the License Pool Management.
If the license key for your QRadar Console expires, you are automatically directed to the System and
License Management window when you log on. You must upload a license key before you can
continue.
If a managed host system has an expired license key, a message is displayed when you log in that
indicates that a managed host requires a new license key. You use the System and License
Management window to update the license key. If the license pool is not over allocated, delete the
expired key and allocate EPS or FPM from the license pool to the managed host.
Procedure
1.
2.
3.
4.
5.
6.
On the navigation menu ( ), click Admin.
In the System Configuration section, click System and License Management.
On the toolbar, click Upload License.
In the dialog box, click Select File.
Select the license key, and click Open.
Click Upload, and then click Confirm.
Results
The license is uploaded to your QRadar Console and is displayed in the System and License
Management window.
By default, most licenses are not immediately allocated to a QRadar host. However, the system
automatically allocates all QRadar Vulnerability Manager, QRadar Risk Manager, and QRadar
Incident Forensics keys to the QRadar console.
Note: Incremental licenses that increase capacity for events and flows are automatically allocated to the
Console.
Allocating a license key to a host
Allocate a license key to an IBM® QRadar® host when you want to replace an existing license, add
new QRadar products, or increase the event or flow capacity in the shared license pool.
Before you begin
You must upload a license key.
About this task
You can allocate multiple licenses to a QRadar console. For example, you can allocate license keys
that add IBM QRadar Risk Manager and QRadar Vulnerability Manager to your QRadar console.
You cannot revert a license key after you add it to a QRadar host. If you mistakenly allocate a license
to the wrong host, you must deploy the change, and then delete the license from the system. After
the license is deleted, you can upload the license again, and then reallocate it. After the license is
allocated to the correct host, you must deploy the changes again.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click System and License Management.
From the Display list, select Licenses.
Select the license, and click Allocate System to License.
Tip: When you select System from the Display list, the label changes to Allocate License to
a System.
5. To filter the list of licenses, type a keyword in the search box.
6. On the Allocate a System to a License window, select the host that you want to allocate the
license to, and click Allocate System to License.
Deploying changes
Changes that are made to the IBM® QRadar® deployment must be pushed from the staging area to
the production area.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
Check the deployment banner to determine whether changes must be deployed.
Click View Details to view information about the undeployed configuration changes.
Choose the deployment method:
a. To deploy changes and restart only the affected services, click Deploy Changes on
the deployment banner.
b. To rebuild the configuration files and restart all services on each managed host,
click Advanced > Deploy Full Configuration.
Important: QRadar continues to collect events when you deploy the full
configuration. When the event collection service must restart, QRadar does not
restart it automatically. A message displays that gives you the option to cancel the
deployment and restart the service at a more convenient time.
After you apply the license keys to QRadar, redistribute the EPS and FPM rates to ensure that each of the
managed hosts is allocated enough capacity to handle the average volume of network traffic, and still have enough
EPS and FPM available to efficiently handle a data spike. You do not need to deploy the changes after you
redistribute the EPS and FPM capacity.
License expiry
The processing capacity of the system is measured by the volume of events and flows that QRadar can process in
real time. The capacity can be limited by either the appliance hardware or the license keys. The temporary license
key allows for 5,000 events per second (EPS) on the QRadar Console, and 10,000 EPS on each managed host. The
FPM rate for the temporary license is 200,000 on both the QRadar Console and the managed hosts.
When a license expires, QRadar continues to process events and flows up to the licensed capacity limits. If the EPS
and FPM capacity of the expired license was allocated to a host, the shared license pool might go into a deficit, and
cause QRadar to block capabilities on the Network Activity and Log Activity tabs.
When QRadar is not licensed to handle the volume of incoming network data, you can add a license that has more
event or flow capacity.
Event and flow processing capacity
The capacity of a deployment is measured by the number of events per second (EPS) and flows per
minute (FPM) that IBM® QRadar® can collect, normalize, and correlate in real time. The event and flow
capacity is set by the licenses that are uploaded to the system.
Each host in your QRadar deployment must have enough event and flow capacity to ensure that QRadar can
handle incoming data spikes. Most incoming data spikes are temporary, but if you continually receive system
notifications that indicate that the system exceeded the license capacity, you can replace an existing license with a
license that has more EPS or FPM capacity.
Shared license pool
The EPS and FPM rate that is set by each license is combined into a shared license pool. From the
shared license pool, you can distribute the processing capacity to any host within a specific
deployment or that is managed by a single console, regardless of which host the original license is
allocated to.
By adjusting the allocation of the shared license pool, you ensure that the event and flow capacity is
distributed according to the network workload, and that each QRadar® host has enough EPS and
FPM to effectively manage periods of peak traffic.
In deployments that have separate event collector and event processor appliances, the event
collector inherits the EPS rate from the event processor that it is attached to. To increase the
capacity of the event collector, allocate more EPS from the shared license pool to the parent event
processor.
Contributions to the license pool
A license that includes both event and flow capacity might not contribute both the EPS and FPM to
the shared license pool. The license pool contributions are dependent on the type of appliance that
the license is allocated to. For example, when you apply a license to a 16xx Event Processor, only
the EPS is added to the license pool. The same license, when applied to a 17xx Flow Processor,
contributes only the FPM to the license pool. Applying the license to an 18xx Event/Flow Processor
contributes both EPS and FPM to the pool. With exception of software licenses for event or flow
collectors, all software licenses contribute both the EPS and FPM to the shared license pool,
regardless of which type of appliance the license is allocated to.
As of QRadar V7.3.2, you can now acquire stackable EPS/Flow increments instead of replacing
existing console or other managed hosts license when you need to increase the overall event or
flow thresholds of your deployment. After the licenses are uploaded and deployed, the event/flow
capacity can then be reallocated through the License Pool Management.
Exceeding your licensed processing capacity limits
The license pool becomes over-allocated when the combined EPS and FPM that is allocated to the
managed hosts exceeds the EPS and FPM that is in the shared license pool. When the license pool is
overallocated, the License Pool Management window shows a negative value for the EPS and FPM,
and the allocation chart turns red. QRadar blocks functionality on the Network Activity and Log
Activity tabs, including the ability to view events and flows from the Messages list on the
main QRadar toolbar.
To enable the blocked functionality, reduce the EPS and FPM that you allocated to the managed
hosts in your deployment. If the existing licenses do not have enough event and flow capacity to
handle the volume of network data, upload a new license that includes enough EPS or FPM to
resolve the deficit in the shared license pool.
Expired licenses
When a license expires, QRadar continues to process events and flows at the allocated rate.
If the EPS and FPM capacity of the expired license was allocated to a host, the shared resources in
the license pool might go into a deficit, and cause QRadar to block functionality on the Network
Activity and Log Activity tabs.
Capacity sizing
The best way to deal with spikes in data is to ensure that your deployment has enough events per
second (EPS) and flows per minute (FPM) to balance peak periods of incoming data. The goal is to
allocate EPS and FPM so that the host has enough capacity to process data spikes efficiently, but
does not have large amounts of idle EPS and FPM.
When the EPS or FPM that is allocated from the license pool is very close to the average EPS or FPM
for the appliance, the system is likely to accumulate data in a temporary queue to be processed
later. The more data that accumulates in the temporary queue, also known as the burst-handling
queue, the longer it takes QRadar® to process the backlog. For example, a QRadar host with an
allocated rate of 10,000 EPS takes longer to empty the burst handling queue when the average EPS
rate for the host is 9,500, compared to a system where the average EPS rate is 7,000.
Offenses are not generated until the data is processed by the appliance, so it is important to
minimize how frequently QRadar adds data to the burst handling queue. By ensuring that each
managed host has enough capacity to process short bursts of data, you minimize the time that it
takes for QRadar to process the queue, ensuring that offenses are created when an event occurs.
When the system continuously exceeds the allocated processing capacity, you cannot resolve the
problem by increasing the queue size. The excess data is added to the end of the burst handling
queue where it must wait to be processed. The larger the queue, the longer it takes for the queued
events to be processed by the appliance.
Burst handling
IBM QRadar uses burst handling to ensure that no data is lost when the system exceeds the allocated events per
second (EPS) or flows per minute (FPM) license limits.
Uploading a license key
License keys determine your entitlement to IBM QRadar products and features, and the system capacity for
handling events and flows.
Allocating a license key to a host
Allocate a license key to an IBM QRadar host when you want to replace an existing license, add
new QRadar products, or increase the event or flow capacity in the shared license pool.
Distributing event and flow capacity
Use the License Pool Management window to ensure that the events per second (EPS) and flows per minute (FPM)
that you are entitled to is fully used. Also, ensure that IBM QRadar is configured to handle periodic bursts of data
without dropping events or flows, or having excessive unused EPS and FPM.
Viewing license details
View the license details to see information such as the status, expiration, and event and flow rate limits for each
license that is uploaded to the system.
Deleting licenses
Delete a license if you mistakenly allocated it to the wrong QRadar host. Also, delete an expired license to stop IBM
QRadar from generating daily system notifications about the expired license.
Exporting license information
For auditing, export information about the license keys that are installed on your system to an external .xml file.
Incremental licensing
Incremental licensing streamlines the license distribution process and saves you time and effort because you don't
need separate licenses for each appliance. Purchase monthly capacity increases that can be applied to your
deployment, without running the risk that these temporary keys might shut down the entire system when they
expire. Now, you can add more flows and events to the Console license and redistribute to your pool of appliances
as you see fit. Use your operational budget to add capacity to perpetual licenses on a temporary basis for shortterm projects such as network onboarding, reorganizing, and testing use cases.
With incremental licensing, you can now acquire stackable EPS/Flow increments instead of replacing existing
console or other managed hosts license when you need to increase the overall event or flow thresholds of your
deployment. After the licenses are uploaded and deployed, the event/flow capacity can then be reallocated through
the License Pool Management. For example, suppose that you have a 3105 All-in-One with 1000 EPS on a perpetual
key. You’re working on a 6-month project where several new log sources need to be on-boarded for a temporary
period. Previously, this project would cause the EPS volumes to exceed the 1000 EPS limit. With the new
incremental licensing feature, you can purchase an extra 2500 EPS bundle for just 6 months. IBM provides a license
key that incrementally raises the EPS from 1000 through to 3500 for the 6-month period. At the end of the 6-month
period, the additional 2500 EPS expires, but the original 1000 EPS remains operational, without any additional
intervention from support or product
You can review the status of the primary and secondary host in your high-availability (HA) cluster.
The following table describes the status of each host that is displayed in the System and License
Management window:
Status
Active
Description
Specifies that the host is the active system and that all services are running normally.
The primary or secondary HA host can display the active status.
Note: If the secondary HA host displays the active status, the primary HA host failed.
Standby
Specifies that the host is acting as the standby system. In the standby state, no services
are running but data is synchronized if disk replication is enabled. If the primary or
secondary HA host fails, the standby system automatically becomes the active system.
Specifies that the primary or secondary host failed.
If the primary HA host displays Failed, the secondary HA host assumes the
responsibilities of the primary HA host and displays the Active status.
Failed
If the secondary HA host displays Failed, the primary HA host remains active, but is
not protected by HA.
A system in a failed state must be manually repaired or replaced, and then restored. If
the network fails, you might need access to the physical appliance.
Specifies that data is synchronizing between hosts.
Synchronizing
Note: This status is displayed only when disk replication is enabled.
Status
Description
Online
Specifies that the host is online.
Specifies that an administrator manually set the HA host offline. Offline mode indicates
a state that is typically used to complete appliance maintenance.
When an appliance indicates a status of offline:
Offline
Data replication is functioning between the active and offline HA hosts.
Services that process events, flows, offenses, and heartbeat ping tests are stopped for
the offline HA host.
Failover cannot occur until the administrator sets the HA host online.
Specifies that the host is restoring. For more information, see Verifying the status of
primary and secondary hosts.
Specifies that a license key is required for the HA cluster. In this state, no processes
Needs License are running.
Restoring
For more information about applying a license key, see your Administration Guide.
Setting Offline Specifies that an administrator is changing the status of an HA host to offline.
Setting Online Specifies that an administrator is changing the status of an HA host to online
Specifies that the secondary HA host requires a software upgrade.
Needs
Upgrade
When the Needs Upgrade status is displayed, the primary remains active, but is not
protected against failover. Disk replication of events and flows continues between the
primary and the secondary HA hosts.
Specifies that the secondary HA host is being upgraded by the primary HA host.
If the secondary HA host displays the Upgrading status, the primary HA host remains
active, but is not protected by HA. Heartbeat monitoring and disk replication, if
enabled, continue to function.
Upgrading
After DSMs or protocols are installed and deployed on a Console, the Console
replicates the DSM and protocol updates to its managed hosts. When primary and
secondary HA hosts are synchronized, the DSM and protocols updates are installed on
the secondary HA host.
Only a secondary HA host can display an Upgrading status.
Table 1. HA status descriptions
•
Viewing HA cluster IP addresses
You can display the IP addresses of all the components in your High-availability (HA) cluster.
You can display the IP addresses of all the components in your High-availability (HA) cluster.
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
On the navigation menu, click System Configuration.
Click the System and License Management icon.
Identify the QRadar® primary console.
Hover your mouse over the host name field.
Creating an HA cluster
Pairing a primary host, secondary high-availability (HA) host, and a virtual IP address creates an HA
cluster.
Before you begin
•
•
If external storage is configured for a primary HA host, you must also configure the
secondary HA host to use the same external storage options. For more information, see
the QRadar® Offboard Storage Guide.
Ensure that no undeployed changes exist before you create an HA cluster.
About this task
If disk synchronization is enabled, it might take 24 hours or more for the data in
the /store partition on the primary HA host /store partition to initially synchronize with the
secondary HA host.
If the primary HA host fails and the secondary HA host becomes active, the Cluster Virtual IP
address is assigned to the secondary HA host.
In an HA deployment, the interfaces on both the primary and secondary HA hosts can become saturated. If
performance is impacted, you can use a second pair of interfaces on the primary and secondary HA hosts
to manage HA and data replication. Use a crossover cable to connect the interfaces.
Important: You can enable a crossover connection during and after the creation of an HA cluster and this
does not cause any event collection downtime.
Procedure
1.
2.
3.
4.
5.
6.
On the navigation menu ( ), click Admin.
Click System and License Management.
Select the host for which you want to configure HA.
From the Actions menu, select Add HA Host and click OK.
Read the introductory text. Click Next.
Type values for the parameters:
Option
Description
Primary A new primary HA host IP address. The new IP address replaces the previous IP address.
Host IP
The current IP address of the primary HA host becomes the Cluster Virtual IP address.
address
The new primary HA host IP address must be on the same subnet as the virtual host IP
address.
Important: For a NAT deployment, use the private IP address of the primary HA host.
SecondaryThe IP address of the secondary HA host. The secondary HA host must be on the same
HA host IP subnet as the primary HA host.
address
Important: For a NAT deployment, use the private IP address of the secondary HA host.
Enter the The root password for the secondary HA host. The password must not include special
root
characters.
password
of the
host
Confirm The root password for the secondary HA host again for confirmation.
the root
password
of the
host
7. To configure advanced parameters, click the arrow beside Show Advanced Options and
type values for the parameters.
Option
Description
Heartbeat
Interval
(seconds)
The time, in seconds, that you want to elapse between heartbeat pings. The default
is 10 seconds.
Heartbeat
Timeout
(seconds)
For more information about heartbeat pings, see Heartbeat ping tests.
The time, in seconds, that you want to elapse before the primary HA host is
considered unavailable if no heartbeat is detected. The default is 30 seconds.
Network
The IP addresses of the hosts that you want the secondary HA host to ping. The
Connectivity
default is to ping all other managed hosts in the QRadar deployment.
Test List peer IP
addresses
For more information about network connectivity testing, see Network
(comma
connectivity tests.
delimited)
Disk
The disk synchronization rate. The default is 100 MB/s.
Synchronization
Rate (MB/s)
Increase this value to 1100 MB/s when you are using 10 G crossover cables.
Option
Description
Note: Do not exceed your system's capacity. The limit for Distributed Replicated Block
Devices is 4096 MB/s.
Disable Disk
Replication
This option is displayed only when you are configuring an HA cluster by using a
managed host.
Configure
Crossover cables allow QRadar to isolate the replication traffic from all
Crossover Cable other QRadar traffic, such as events, flows, and queries.
You can use crossover cables for connections between 10 Gbps ports, but not the
management interface.
Crossover
Interface
Select the interfaces that you want to connect to the primary HA host.
Crossover
Advanced
Options
Select Show Crossover Advanced Options to enter, edit, or view the property values.
Important: All interfaces with an established link, or an undetermined link, appear in the
list. Select interfaces with established links only.
8. Click Next, and then click Finish.
Important: When an HA cluster is configured, you can display the IP addresses that are used
in the HA cluster. Hover your mouse over the Host Name field on the System and License
Management window.
9. On the navigation menu ( ), click Admin.
10. Click Advanced > Deploy Full Configuration to enable network connectivity tests.
Disconnecting an HA cluster
By disconnecting an HA cluster, the data on your primary HA console or managed host is not
protected against network or hardware failure.
Before you begin
If you migrated the /store file system to a Fibre Channel device, you must modify
the /etc/fstab file before you disconnect the HA cluster. For more information, see Updating the
/etc/fstab file.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
On the navigation menu, click System Configuration.
Click the System and License Management icon.
Select the HA host that you want to remove.
5. From the toolbar, select High Availability > Remove HA Host.
6. Click OK.
Note: When you remove an HA host from a cluster, the host restarts.
•
Updating the /etc/fstab file
Before you disconnect a Fibre Channel HA cluster, you must modify
the /store and /storetmp mount information in the /etc/fstab file.
About this task
You must update the /etc/fstab file on the primary HA host and the secondary HA host.
Procedure
1. Use SSH to log in to your QRadar® host as the root user:
2. Modify the etc/fstab file.
a. Locate the existing mount information for the /store and /storetmp file systems.
b. Remove the noauto option for the /store and /storetmp file systems.
3. Save and close the file.
Editing an HA cluster
You can edit the advanced options for your HA cluster.
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
9.
On the navigation menu ( ), click Admin.
On the navigation menu, click System Configuration.
Click the System and License Management icon.
Select the row for the HA cluster that you want to edit.
From the toolbar, select High Availability > Edit HA Host.
Edit the parameters in the table in the advanced options section.
Click Next.
Review the information.
Click Finish.
Setting an HA host offline
You can set the primary or secondary high-availability (HA) host to Offline from
the Active or Standby state.
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
On the navigation menu, click System Configuration.
Click the System and License Management icon.
Select the HA host that you want to set to offline.
From the toolbar, select High Availability > Set System Offline .
Setting an HA host online
You can set the primary or secondary HA host to Online.
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
On the navigation menu, click System Configuration.
Click the System and License Management icon.
Select the offline HA host that you want to set to Online.
From the toolbar, select High Availability > Set System Online.
What to do next
On the System and License Management window, verify the status of the HA host. Choose from one of the
following options:
•
•
If the primary HA host displays a status of Active, HA host is restored.
If you experience a problem, restore the primary or secondary HA host. For more
information, see Restoring a failed secondary HA host or Restoring a failed primary HA host.
Switching a primary HA host to active
You can set the primary high-availability (HA) host to be the active system.
Before you begin
The primary HA host must be the standby system and the secondary HA host must be the active system.
About this task
If your primary host is recovered from a failure, it is automatically assigned as the standby system in your HA
cluster. You must manually switch the primary HA host to be the active system and the secondary HA host to be
the standby system.
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
On the navigation menu, click System Configuration.
Click the System and License Management icon.
In the System and License Management window, select the secondary HA host.
From the toolbar, select High Availability > Set System Offline.
Your primary HA host is automatically switched to be the Active HA host.
Note: Your IBM® QRadar® SIEM user interface might be inaccessible during this time. To
return the secondary HA host to standby and return the primary HA host to active run either
of the following commands:
o
From the active host run:
/opt/qradar/ha/bin/ha giveback
The host that was active is now the standby host and the standby host is now the
active host.
o
From the standby host run:
/opt/qradar/ha/bin/ha takeover
The host that was on standby is now the active host and the host that was the active
host is now the standby host.
6. In the System and License Management window, select the secondary HA host.
7. From the toolbar, select High Availability > Set System Online.
Your secondary HA host is now the standby system.
What to do next
When you can access the System and License Management window, check the status column. Ensure
that the primary HA host is the active system and the secondary HA host is the standby system.
Upgrading QRadar SIEM
You must upgrade all of the IBM® QRadar® products in your deployment to the same version.
Before you begin
When you run the upgrade, any QRadar Event Collectors are detected. These event collectors must be
migrated from GlusterFS to Distributed Replicated Block Device before the upgrade can continue. For
more information, see Migrating event collectors from GlusterFS to Distributed Replicated Block Device.
Determine the minimum QRadar version that is required for the version of QRadar to which you
want to update.
•
•
Click Help > About to check your current version of QRadar.
To determine whether you can upgrade to a version of QRadar, go to QRadar Software
101 (https://www.ibm.com/community/qradar/home/software/) and check the release
notes of the version you want to upgrade to.
About this task
To ensure that IBM QRadar upgrades without errors, ensure that you use only the supported
versions of QRadar software.
Important:
•
•
Software versions for all IBM QRadar appliances in a deployment must be the same version
and fix level. Deployments that use different QRadar versions of software are not supported.
Custom DSMs are not removed during the upgrade.
Upgrade your QRadar Console first, and then upgrade each managed host. In high-availability (HA)
deployments, when you upgrade the HA primary host, the HA secondary host is automatically
upgraded.
The following QRadar systems can be upgraded concurrently:
•
•
•
Event processors
Event collectors
Flow processors
•
•
•
QFlow collectors
Data nodes
App hosts
With QRadar 7.5.0 Update Package 2 you can enable secure boot. If Secure Boot is to be enabled on
the system the public key must be imported after the patch completes. For more information,
see Enabling Secure Boot.
Procedure
1. Download the .sfs file from Fix Central (www.ibm.com/support/fixcentral).
o If you are upgrading QRadar SIEM, download the <QRadar>.sfs file.
o If your deployment includes an IBM QRadar Incident Forensics (6000) appliance,
download the <identifier>_Forensics_patchupdate<build_number>.sfs file. The .sfs file upgrades the entire QRadar deployment,
including QRadar Incident Forensics and QRadar Network Insights.
2. Use SSH to log in to your system as the root user.
3. Copy the SFS file to the /storetmp or /var/log directory or to another location that has
sufficient disk space.
Important: If the SFS file is in the /storetmp directory and you do not upgrade, when the
overnight diskmaintd.pl utility runs, the SFS file is deleted. For more information, see Daily
disk maintenance (https://www.ibm.com/support/pages/qradar-732-files-storetmp-areremoved-daily-disk-maintenance).
To verify you have enough space (5 GB) in the QRadar Console, type the following command:
df -h /storetmp /var/log | tee diskchecks.txt
Important: Don't copy the file to an existing QRadar system directory such as
the /store directory.
4. To create the /media/updates directory, type the following command:
mkdir -p /media/updates
5. Use the command cd to change to the directory where you copied the SFS file.
6. To mount the SFS file to the /media/updates directory, type the following command:
mount -o loop <QRadar>.sfs /media/updates
7. To run the installer, type the following command:
/media/updates/installer
If you receive the following error message, you have a QRadar Incident Forensics appliance
in your deployment. Download the QRadar Incident Forensics patch file from IBM Fix
Central (www.ibm.com/support/fixcentral). The patch file is named similar to this one:
<identifier>_Forensics_patchupdate-<build_number>.sfs. For more information about
upgrading with a QRadar Incident Forensics appliance in your deployment, see Upgrading
QRadar Incident Forensics.
Error: This patch is incompatible with Forensics deployments
[ERROR](testmode) Patch pretest 'Check for QIF appliances in deployment'
failed. (check_qif.sh)
[ERROR](testmode) Failed 1/8 pretests. Aborting the patch.
[ERROR](testmode) Failed pretests
[ERROR](testmode) Pre Patch Testing shows a configuration issue. Patching
this host cannot continue.
[INFO](testmode) Set ip-130-86 status to 'Patch Test Failed'
[ERROR](testmode) Patching can not continue
[ERROR] Failed to apply patch on localhost, not checking any managed hosts.
An error was encountered attempting to process patches.
Please contact customer support for further assistance.
What to do next
1. Unmount /media/updates by typing the following command:
umount /media/updates
2. Delete the SFS file.
3. Perform an automatic update to ensure that your configuration files contain the latest
network security information. For more information, see Checking for new updates.
4. Delete the patch file to free up space on the partition.
5. Clear your web browser cache. After you upgrade QRadar, the Vulnerabilities tab might not
be displayed. To use QRadar Vulnerability Manager after you upgrade, you must upload and
allocate a valid license key. For more information, see the Administration Guide for your
product.
6. Determine whether there are changes that must be deployed. For more information,
see Deploy Changes.
•
Migrating event collectors from GlusterFS to Distributed Replicated Block Device
If the QRadar upgrade detects stand-alone or clustered event collectors with GlusterFS in
your deployment, the upgrade fails. You must run a migration script separately on QRadar
7.3.2 Fix Pack 3 or later before you upgrade to QRadar 7.4.2 or later. If your event collectors
are deployed on QRadar 7.1 or earlier and then upgraded to a later version, you must
upgrade the file systems table (fstab) before you migrate GlusterFS to Distributed Replicated
Block Device.
QRadar Network Insights overview
IBM® QRadar® Network Insights provides in-depth visibility into network communications on a
real-time basis to extend the capabilities of your IBM QRadar deployment.
Through the deep analysis of network activity and application content, QRadar Network
Insights empowers QRadar Sense Analytics to detect threat activity that would otherwise go
unnoticed.
QRadar Network Insights provides in-depth analysis of both network metadata and application
content to detect suspicious activity that is hidden among normal traffic and extract content to
provide QRadar with visibility into network threat activity. The intelligence that is provided
by QRadar Network Insights integrates seamlessly with traditional data sources and threat
intelligence to extend QRadar detection, analysis, and threat detection capabilities.
QRadar Network Insights provides visibility across a range of use cases, including:
•
•
•
•
•
•
Malware detection and analysis
Phishing email and campaign detection
Insider threats
Lateral movement attack detection
Data exfiltration protection
Identify compliance gaps
Benefits of
QRadar Network Insights
The following list highlights some of the benefits of using QRadar Network Insights:
•
•
•
•
•
•
Uses in-depth packet inspection to identify advanced threats and malicious content.
Extends the capabilities of QRadar to detect phishing attacks, malware intrusions, lateral
movement, and data exfiltration.
Records application activities, captures key artifacts, and identifies assets, applications, and
users that participate in network communications.
Applies Layer 7 content analysis for advanced security insights.
File analytics analyzes and enables tracking of files.
What's new for users in QRadar Network Insights 7.5.0
IBM QRadar Network Insights 7.5.0 provides users with more IBM X-Force®
Exchange integration and improvements to file type identification and application detection.
Data nodes
A data node is an appliance that you can add to your event and flow processors to increase storage
capacity and improve search performance. You can add an unlimited number of data nodes to
your IBM® QRadar® deployment, and they can be added at any time. Each data node can be
connected to only one processor, but a processor can support multiple data nodes.
QRadar: Troubleshooting disk space usage
problems
Troubleshooting
Problem
The partitions are critical for the regular functioning of Linux and QRadar® SIEM. this
article is to help the administrator with the identification of files and directories when a
partition triggers the disk usage alerts. These issues might also generate issues such as
software upgrade failing disk space tests and configuration deployment not running.
Cause
By default, the QRadar disk sentry check runs every 60 seconds and looks for high disk
usage across the following partitions:
QRadar Partition
Critical
Threshold
Critical Services Stop (7.4.2 and later)
/
Yes, at 95%
Yes, when less than 100GiB
/store
Yes, at 95%
Yes, when less than 100GiB
/transient
Yes, at 95%
Yes, when less than 100GiB
/storetmp
Yes, at 95%
Yes, when less than 100GiB
/opt
Yes, at 95%
Yes, when less than 100GiB
/var
No
No
/var/log
No
No
/var/log/auditNo
No
/tmp
No
No
/home
No
No
Note: 100GiB = 107.3GB
If any of these partitions exceeds 90% usage, a warning notification is sent to the UI.
In /var/log/qradar.log, a log similar to the following appears:
[hostcontext.hostcontext] com.q1labs.hostcontext.ds.DiskSpaceSentinel: [WARN] [-/-]System disk resources above warning threshold
IMPORTANT: For the partitions listed in the table as critical for system
functionality, system services are stopped to avoid the partition becoming full and prevent
further issues. A maximum threshold notification is sent to the UI and can also be seen
in /var/log/qradar.log:
[hostcontext.hostcontext]com.q1labs.hostcontext.ds.DiskSpaceSentinel: [ERROR] [-/-]Disk usage on at least one disk has exceeded
the maximum threshold level of 0.95. The following disks have exceeded the maximum
threshold level: /transient. Processes are being
shut down to prevent data corruption. To minimize the disruption in service, reduce
disk usage on this system.
While the other partitions denoted as noncritical, the disk sentry check gives a warning
when the threshold is met, but system processes are not stopped and don't cause an outage.
When the system recovers back under the threshold, a notification is sent to the UI, and the
following message is seen in /var/log/qradar.log:
[hostcontext.hostcontext] com.q1labs.hostcontext.ds.DiskSpaceSentinel: [INFO] [-/-]System disk resources back to normal levels
Diagnosing The Problem
The first step in diagnosing the problem is determining which partition has the problem.
Verify the managed host affected
1. Log in to the QRadar user interface as an admin user.
2. Click the bell icon and hover the Disk Sentry alert.
In the previous image, the affected host has the IP 10.11.12.13 and the partition
affected is "/".
3. SSH to the Console, then to the affected managed host if not the Console.
4. Use the df -Th command to get the output of the partitions.
5. df -Th
Example output:
Filesystem
Size
/dev/mapper/rootrhel-root
13G
devtmpfs
16G
tmpfs
16G
tmpfs
16G
tmpfs
16G
/dev/mapper/rootrhel-var
5.0G
/dev/sda3
32G
/dev/mapper/rootrhel-home
1014M
/dev/sda2
1014M
/dev/mapper/rootrhel-tmp
3.0G
/dev/mapper/rootrhel-opt
13G
/dev/mapper/rootrhel-storetmp
15G
/dev/mapper/rootrhel-varlog
15G
/dev/mapper/storerhel-transient
40G
/dev/mapper/rootrhel-varlogaudit 3.0G
tmpfs
3.2G
/dev/drbd0
158G
Used Avail Use% Mounted on
2.9G 9.7G 23% /
0
16G
0% /dev
20K
16G
1% /dev/shm
1.7G
15G 11% /run
0
16G
0% /sys/fs/cgroup
208M 4.8G
5% /var
4.1G
28G 13% /recovery
33M 982M
4% /home
224M 791M 23% /boot
53M 3.0G
2% /tmp
5.1G 7.5G 41% /opt
34M
15G
1% /storetmp
3.6G
12G 24% /var/log
40G 236M 100% /transient
205M 2.8G
7% /var/log/audit
0 3.2G
0% /run/user/0
78G
80G 50% /store
Notice that /dev/mapper/storerhel-transient has 100% in
the Use% column. This means /transient is the partition causing the alert.
Finding undersized appliances
QRadar installed on virtual machines with less than 256GB (minimum disk storage) can
cause some partitions to default to the "/" partition. Use the lsblk command to find out
whether the disk size is less than 256GB and /store and /transient partition exists
on the system.
Once the conflicting managed host is identified, go to the Resolving The Problem section
to find details about finding large files and directories, and review the linked article for
the specific partition.
Resolving The Problem
There are a couple of reasons a QRadar partition might have high disk usage:
• Undersized appliances not meeting the minimum disk requirements.
• Large files or directories on the partition causing it to fill.
• Lots of smaller files build up over time and cause a certain directory on
the partition to grow excessively.
Identify directories and files with large disk usage
Use the du and find commands to list the largest directories and files.
1. The following du command return with a recursive directory output for
the /partition/directory, sorted by the smallest to the largest.
du -chaxd1 /<partition> | sort -h | tail
Output Example for "/":
61M
122M
444M
589M
941M
958M
3.2G
7.9G
/usr/sbin
/usr/local
/usr/lib64
/usr/bin
/usr/lib
/usr/share
/usr
/root
12G
12G
/
total
In the previous output, the /root partition is the largest.
NOTE: Sometimes the ssh session can time out before the du command
completes. In this case, it is best to run the du command inside a screen
session, which does not terminate upon ssh timeout, and is accessible until
the session is terminated. From the command prompt, run screen
Run the du command from step "a." If the ssh session times out before the
command completes, you can reattach to the screen session. You first need to
find the screen session ID. Then, run
Output example:
In this case, the screen ID is 17376. To reattach to the screen session, run
Once finished, the output of the du command is presented.
You can also use the "exclude" option with du to identify other large
directories when analyzing a partition with a known large directory (such
as ariel on the /store partition).
du -chaxd1 -exclude=ariel /store
Once finished, the output of the du command is presented, omitting the
excluded directory.
2. The following find command returns the largest files found in a partition,
sorted by the smallest to the largest.
find /<partition> -xdev -type f -size +100M | xargs ls -lhSr
Output Example for "/":
-rw------- 1 root root 596M Jun 13 13:29 /core.26490
-rw-r--r-- 1 root root 7.9G Jan 10 16:02 /root/scripts/test_file.zip
In the previous output, the test_file.zip is a forgotten file, and core.26490 is
a system core file resulted from an abnormal exit of a process.
2. Search in the Disk Space 101 portal for specific information about each partition.
Alternatively, use the direct links in the following table.
QRadar Partition
/
Articles
QRadar: About / partition
QRadar: Delete files or directories to gain space in / partition
/store
QRadar: About /store partition
QRadar: Delete files or directories to gain space in /store partition
/transient
QRadar: About /transient partition
QRadar: Delete files or directories to gain space in /transient partition
/storetmp
QRadar: About /storetmp partition
QRadar: Delete files or directories to gain space in /storetmp partition
/opt
QRadar: About /opt partition
QRadar: Delete files or directories to gain space in /opt partition
/var
QRadar: About /var partition
QRadar: Delete files or directories to gain space in /var partition
/var/log
QRadar: About /var/log partition
QRadar: /var/log and /var/log/audit fills to capacity due to logrotate issue
/var/log/audit
QRadar: About /var/log/audit partition
QRadar: /var/log and /var/log/audit fills to capacity due to logrotate issue
/tmp
QRadar: About /tmp partition
QRadar: Delete files or directories to gain space in /tmp partition
/home
QRadar: About /home partition
QRadar: Delete files or directories to gain space in /home partition
Result
The files and directories contributing to the lack of disk space are evident. Administrators
can proceed with the troubleshooting steps to remove the files or directories.
If the files are not evident enough, the administrators can contact QRadar Support for
assistance.
Changing the network settings of a QRadar
Console in a multi-system deployment
To change the network settings in a multi-system IBM® QRadar® deployment, remove all managed
hosts, change the network settings, add the managed hosts again, and then reassign the component.
Before you begin
•
•
You must have a local connection to your QRadar Console
If you are adding a network adapter to either physical appliance or a virtual machine, you
must shut down the appliance before you add the network adapter. Power on the appliance
before you follow this procedure.
Important: You cannot change the IP address of any host to the IP address of a previously deleted Managed
Host.
Procedure
1. To remove managed hosts, log in to QRadar:
https://IP_Address_QRadar
The Username is admin.
a. On the navigation menu ( ), click Admin.
b. Click the System and License Management icon.
c. Select the managed host that you want to remove.
d. Select Deployment Actions > Remove Host.
e. in the Admin settings, click Deploy Changes.
2. Type the following command: qchange_netsetup.
Important:
a. If you attempt to run qchange_netsetup over a serial connection, the connection can
be misidentified as a network connection. To run over a serial connection
use qchange_netsetup -y. This command allows you to bypass the validation check
that detects a network connection.
b. Verify all external storage which is not /store/ariel or /store is not mounted.
3. Follow the instructions in the wizard to complete the configuration.
The following table contains descriptions and notes to help you configure the network
settings.
Network Setting
Description
Internet Protocol
IPv4 or IPv6
Host name
Secondary DNS server
address
Fully qualified domain name
Optional
Optional
Used to access the server, usually from a different network or the
Public IP address for
Internet.
networks that use Network
Address Translation (NAT) Configured by using Network Address Translation (NAT) services on
your network or firewall settings on your network. (NAT translates an
IP address in one network to a different IP address in another
network).
If you do not have an email server, use localhost.
Email server name
Table 1. Description of network settings for a multi-system QRadar Console deployment
After you configure the installation parameters, a series of messages are displayed. The
installation process might take several minutes.
4. To re-add and reassign the managed hosts, log in to QRadar.
https://IP_Address_QRadar
The Username is admin.
a.
b.
c.
d.
On the navigation menu ( ), click Admin.
Click the System and License Management icon.
Click Deployment Actions > Add Host.
Follow the instructions in the wizard to add a host.
Select the Network Address Translation option to configure a public IP address for
the server. This IP address is a secondary IP address that is used to access the server,
usually from a different network or the Internet. The Public IP address is often
configured by using Network Address Translation (NAT) services on your network or
firewall settings on your network. NAT translates an IP address in one network to a
different IP address in another network
5. Reassign all components that are not your QRadar Console to your managed hosts .
a. On the navigation menu ( ), click Admin.
b. Click the System and License Management icon.
c. Select the host that you want to reassign.
d. Click Deployment Actions > Edit Host Connection.
e. Enter the IP address of the source host in the Modify Connection window.
Managed hosts
For greater flexibility over data collection and event and flow processing, build a distributed IBM®
QRadar® deployment by adding non-console managed hosts, such as collectors, processors, and
data nodes.
Software compatibility requirements
Software versions for all QRadar appliances in your deployment must be at the same version and
update package level. Deployments that use different versions of software are not supported
because mixed software environments can prevent rules from firing, prevent offenses from being
created or updated, or cause errors in search results.
When a managed host uses a software version that is different than the QRadar Console, you might
be able to view components that were already assigned to the host, but you cannot configure the
component or add or assign new components.
Internet Protocol (IP) requirements
The following table describes the various combinations of IP protocols that are supported when
you add non-console managed hosts.
QRadar Console
ManagedQRadar ConsoleQRadar Console
(dual-stack,
QRadar Console (dual-stack, HA)
hosts
(IPv6, single) (IPv6, HA)
single)
IPv4,
single
No
No
Yes*
No
IPv4, HA No
No
No
No
IPv6,
single
Yes
Yes
Yes
No
IPv6, HA Yes
Yes
Yes
No
Table 1. Supported combinations of IP protocols on non-console managed hosts
Restriction: *By default, you cannot add an IPv4-only managed host to a dual-stack single console. You must
run a script to enable an IPv4-only managed host. For more information, see Adding an IPv4-only managed
host in a dual-stack environment.
A dual-stack console supports both IPv4 and IPv6. The following list outlines the conditions you
must follow in dual-stack environments:
•
•
•
You can add IPv6 managed hosts to a dual-stack single console, or to an IPv6-only console.
You can add only IPv4 managed hosts to a dual-stack single console.
Do not add a managed host to a dual-stack console that is configured for HA.
•
Do not add an IPv4 managed host that is not in an HA pair to an IPv6-only console, or to a
dual-stack console that is in an HA pair.
Important: IBM does not support the following configurations:
•
•
•
Adding a managed host to a dual-stack console that is configured for HA
Adding an IPv4 managed host that is not in an HA pair to an IPv6-only console
Adding an IPv4 managed host that is not in an HA pair to a dual-stack console that is in an
HA pair
Bandwidth considerations for managed hosts
To replicate state and configuration data, ensure that you have a minimum bandwidth of 100 Mbps
between the IBM® QRadar® console and all managed hosts. Higher bandwidth is necessary when
you search log and network activity, and you have over 10,000 events per second (EPS).
An Event Collector that is configured to store and forward data to an Event Processor forwards the
data according to the schedule that you set. Ensure that you have sufficient bandwidth to cover the
amount of data that is collected, otherwise the forwarding appliance cannot maintain the scheduled
pace.
Use the following methods to mitigate bandwidth limitations between data centers:
Process and send data to hosts at the primary data center
Design your deployment to process and send data as it's collected to hosts at the primary data
center where the console resides. In this design, all user-based searches query the data from the
local data center rather than waiting for remote sites to send back data.
You can deploy a store and forward event collector, such as a QRadar 15XX physical or virtual
appliance, in the remote locations to control bursts of data across the network. Bandwidth is used
in the remote locations, and searches for data occur at the primary data center, rather than at a
remote location.
Don't run data-intensive searches over limited bandwidth connections
Ensure that users don't run data-intensive searches over links that have limited bandwidth.
Specifying precise filters on the search limits the amount of data that is retrieved from the remote
locations, and reduces the bandwidth that is required to send the query result back.
Encryption
To provide secure data transfer between each of the appliances in your environment, IBM®
QRadar® has integrated encryption support that uses OpenSSH. Encryption occurs between
managed hosts, and is enabled by default when you add a managed host.
When encryption is enabled, a secure tunnel is created on the client that initiates the connection, by
using an SSH protocol connection. When encryption is enabled on a managed host, an SSH tunnel is
created for all client applications on the managed host. When encryption is enabled on a nonConsole managed host, encryption tunnels are automatically created for databases and other
support service connections to the Console. Encryption ensures that all data between managed
hosts is encrypted.
For example, with encryption enabled on an Event Processor, the connection between the Event
Processor and Event Collector is encrypted, and the connection between the Event
Processor and Magistrate is encrypted.
The SSH tunnel between two managed hosts can be initiated from the remote host instead of the
local host. For example, if you have a connection from an Event Processor in a secure environment
to an Event Collector that is outside of the secure environment, and you have a firewall rule that
would prevent you from having a host outside the secure environment connect to a host in the
secure environment, you can switch which host creates the tunnel so that the connection is
established from the Event Processor by selecting the Remote Tunnel Initiation checkbox for
the Event Collector.
You cannot reverse the tunnels from your Console to managed hosts.
Adding a managed host
Add managed hosts, such as event and flow collectors, event and flow processors, and data nodes, to
distribute data collection and processing activities across your IBM® QRadar® deployment.
Before you begin
Ensure that the managed host has the same IBM QRadar version and update packages level as
the QRadar Console that you are using to manage it.
If you want to enable Network Address Translation (NAT) for a managed host, the network must
use static NAT translation. For more information, see NAT-enabled networks.
Warning: Your firewall might block the managed host from being added because of multiple attempts to log
in to the QRadar Console by using SSH. To resolve this problem, tune your firewall to prevent the managed
host from being blocked.
About this task
The following table describes the components that you can connect:
Source
connection
Target
Description
connection
QRadar Flow
Collector
Event
Collector
You can connect a IBM QRadar Flow Collector only to an Event Collector. The
number of connections is not restricted.
You can't connect a QRadar Flow Collector to the Event Collector on a
15xx appliance.
You can connect an Event Collector to only one Event Processor.
Event Collector
Event
Processor
You can connect a non-console Event Collector to an Event Processor on
the same system.
A console Event Collector can be connected only to a console Event
Processor. You can't remove this connection.
You can't connect a console Event Processor to a non-console Event Processor.
Event Processor
Event
Processor
You can connect a non-console Event Processor to another console or
non-console Event Processor, but not both at the same time.
When a non-console managed host is added, the non-console Event
Processor is connected to the console Event Processor.
Data Node
Event
Processor
You can connect a data node to an event or flow processor only. You can connect
multiple Data Nodes to the same processor to create a storage cluster.
Event Collector
Off-site
target
The number of connections is not restricted.
The number of connections is not restricted.
Off-site source
Event
Collector
An Event Collector that is connected to an event-only appliance can't
receive an off-site connection from system hardware that has the Receive
Flows feature enabled.
An Event Collector that is connected to a QFlow-only appliance can't
receive an off-site connection from a remote system that has
the https://ibmid.acrolinx.cloud Receive Flows feature enabled.
Table 1. Supported component connections
If you configured IBM QRadar Incident Forensics in your deployment, you can add a QRadar
Incident Forensics managed host.
If you configured IBM QRadar Vulnerability Manager in your deployment, you can add vulnerability
scanners and a vulnerability processor
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
If you configured IBM QRadar Risk Manager in your deployment, you can add a managed host.
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
In the System Configuration section, click System and License Management.
In the Display list, select Systems.
On the Deployment Actions menu, click Add Host.
Configure the settings for the managed host by providing the fixed IP address, and the root
password to access the operating system shell on the appliance.
6. Click Add.
7. Optional: Use the Deployment actions > View Deployment menu to see visualizations of
your deployment. You can download a PNG image or a Microsoft Visio (2010) VDX file of
your deployment visualization.
8. On the Admin tab, click Advanced > Deploy Full Configuration.
Important: QRadar continues to collect events when you deploy the full configuration.
When the event collection service must restart, QRadar does not restart it automatically. A
message displays that gives you the option to cancel the deployment and restart the service
at a more convenient time.
Adding an IPv4-only managed host in a dualstack environment
•
To add an IPv4-only managed host to a dual-stack Console, you must run scripts to prepare
both the managed host and the Console before you can add the managed host to the Console.
About this task
A dual-stack Console is one that supports both IPv4 and IPv6. You cannot add an IPv4-only managed host to
a QRadar® High Availability (HA) deployment.
QRadar Console
ManagedQRadar ConsoleQRadar Console
(dual-stack,
QRadar Console (dual-stack, HA)
hosts
(IPv6, single) (IPv6, HA)
single)
IPv4,
single
No
No
Yes*
No
IPv4, HA No
No
No
No
IPv6,
single
Yes
Yes
Yes
No
IPv6, HA Yes
Yes
Yes
No
Table 1. Supported combinations of IP protocols on non-console managed hosts
Procedure
1. To enable your QRadar Console for dual-stack deployment, type the following command:
/opt/qradar/bin/setup_v6v4_console.sh ip=<IPv4_address_of_the_Console>
netmask=<netmask> gateway=<gateway>
This example assumes that the IPv4 address of the Console is 192.0.2.2, the subnet mask is
255.255.255.0, and the gateway is 192.0.2.1.
/opt/qradar/bin/setup_v6v4_console.sh ip=192.0.2.2 netmask=255.255.255.0
gateway=192.0.2.1
2. To allow an IPv4-only managed host to be added to your deployment, type the following
command on the Console:
/opt/qradar/bin/add_v6v4_host.sh host=<IP_address_of_the_managed_host>
This example assumes that the IPv4 address of the managed host is 192.0.2.3.
/opt/qradar/bin/add_v6v4_host.sh host=192.0.2.3
3. Add the IPv4-only managed host to the deployment.
Configuring a managed host
Configure a managed host to specify which role the managed host fulfills in your deployment. For
example, you can configure the managed host as a collector, processor, or a data node. You can also
change the encryption settings, and assign the host to a network address translation (NAT) group.
To make network configuration changes, such as an IP address change to your QRadar®
Console and managed host systems after you install your QRadar deployment, use
the qchange_netsetup utility. If you use qchange_netsetup, verify all external storage which
is not /store/ariel or /store is not mounted.
Before you begin
Ensure that the managed host has the same IBM® QRadar version and update package level as
the QRadar Console that is used to manage it. You can't edit or remove a managed host that uses a
different version of QRadar.
If you want to enable Network Address Translation (NAT) for a managed host, the network must
use static NAT translation. For more information, see NAT-enabled networks.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click System and License Management.
In the Display list, select Systems.
Select the host in the host table, and on the Deployment Actions menu, click Edit Host.
a. To configure the managed host to use a NAT-enabled network, select the Network
Address Translation checkbox, and then configure the NAT Group and Public IP
address.
b. To configure the components on the managed host, click the Component
Management settings icon ( ) and configure the options.
c. Click Save.
5. On the Admin tab, click Advanced > Deploy Full Configuration.
Important: QRadar continues to collect events when you deploy the full configuration.
When the event collection service must restart, QRadar does not restart it automatically. A
message displays that gives you the option to cancel the deployment and restart the service
at a more convenient time.
Removing a managed host
You can remove non-Console managed hosts from your deployment. You can't remove a managed
host that hosts the IBM QRadar Console.
Before you begin
Ensure that the managed host has the same IBM QRadar version and update package level as
the QRadar Console that is used to manage it. You can't remove a host that is running a different
version of QRadar.
Important: If a data node is attached to the component that you want to remove, you must move the data
node to another host before you remove the original host.
Important: QRadar continues to collect events when you deploy the full configuration. When the
event collection service must restart, QRadar does not restart it automatically. A message displays
that gives you the option to cancel the deployment and restart the service at a more convenient
time.
•
Configuring your local firewall
Use the local firewall to manage access to the IBM QRadar managed host from specific
devices that are outside the network. When the firewall list is empty, access to the managed
host is disabled, except through the ports that are opened by default.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click System and License Management.
3.
4.
5.
6.
In the Display list, select Systems.
Select the host for which you want to configure firewall access settings.
From the Actions menu, click View and Manage System.
Click the Firewall tab and type the information for the device that needs to connect
to the host.
a. Configure access for devices that are outside of your deployment and need to
connect to this host.
b. Add this access rule.
7. Click Save.
If you change the External Flow Source Monitoring Port parameter in
the QFlow configuration, you must also update your firewall access configuration.
•
Adding an email server
IBM QRadar uses an email server to distribute alerts, reports, notifications, and event
messages.
You can configure an email server for your entire QRadar deployment, or multiple email
servers.
Important: QRadar only supports encryption for the email server using STARTTLS.
Important: If you configure the mail server setting for a host as localhost, then the mail
messages don't leave that host.
Procedure
1. On the Admin tab, click Email Server Management.
2. Click Add, and configure the parameters for your email server.
3. Click Save.
Tip: Keep the TLS option set to On to send encrypted email. Sending encrypted email
requires an external TLS certificate. For more information, see Importing external
TLS certificates.
4. To edit the port for an email server, click the Other Settings ( ) icon for the server,
enter the port number in the Port field, and then click Save.
5. To delete an email server, click the Other Settings icon for the server, and then
click Delete.
6. After you configure an email server, you can assign it to one or more hosts.
a. On the System and License Management page, select a host.
b. Change the Display list to show Systems.
c. Click Actions > View and Manage System.
d. On the Email Server tab, select an email server and click Save.
e. Test the connection to the email server by clicking the Test
Connection button.
f. Click Save.
•
Importing external TLS certificates
You must import an external TLS certificate on any host that sends encrypted email.
You must import an external TLS certificate on any host that sends encrypted email.
Procedure
1. Copy the TLS certificate to the /etc/pki/catrust/source/anchors/ directory on the host that sends encrypted email.
For example, to import a certificate titled TLS_email.crt, type the following
command:
openssl s_client -connect <emailServer>:<port> < /dev/null | openssl
x509 /etc/pki/ca-trust/source/anchors/TLS_email.crt
2. To update the certificates in the certificate authority (CA), type the following
commands:
update-ca-trust enable
update-ca-trust extract
Managed hosts
For greater flexibility over data collection and event and flow processing, build a distributed IBM®
QRadar® deployment by adding non-console managed hosts, such as collectors, processors, and
data nodes.
Software compatibility requirements
Software versions for all QRadar appliances in your deployment must be at the same version and
update package level. Deployments that use different versions of software are not supported
because mixed software environments can prevent rules from firing, prevent offenses from being
created or updated, or cause errors in search results.
When a managed host uses a software version that is different than the QRadar Console, you might
be able to view components that were already assigned to the host, but you cannot configure the
component or add or assign new components.
Internet Protocol (IP) requirements
The following table describes the various combinations of IP protocols that are supported when
you add non-console managed hosts.
QRadar Console
ManagedQRadar ConsoleQRadar Console
(dual-stack,
QRadar Console (dual-stack, HA)
hosts
(IPv6, single) (IPv6, HA)
single)
IPv4,
single
No
No
Yes*
No
IPv4, HA No
No
No
No
IPv6,
single
Yes
Yes
Yes
No
IPv6, HA Yes
Yes
Yes
No
Table 1. Supported combinations of IP protocols on non-console managed hosts
Restriction: *By default, you cannot add an IPv4-only managed host to a dual-stack single console. You must
run a script to enable an IPv4-only managed host. For more information, see Adding an IPv4-only managed
host in a dual-stack environment.
A dual-stack console supports both IPv4 and IPv6. The following list outlines the conditions you
must follow in dual-stack environments:
•
•
•
•
You can add IPv6 managed hosts to a dual-stack single console, or to an IPv6-only console.
You can add only IPv4 managed hosts to a dual-stack single console.
Do not add a managed host to a dual-stack console that is configured for HA.
Do not add an IPv4 managed host that is not in an HA pair to an IPv6-only console, or to a
dual-stack console that is in an HA pair.
Important: IBM does not support the following configurations:
•
•
•
Adding a managed host to a dual-stack console that is configured for HA
Adding an IPv4 managed host that is not in an HA pair to an IPv6-only console
Adding an IPv4 managed host that is not in an HA pair to a dual-stack console that is in an
HA pair
•
Bandwidth considerations for managed hosts
To replicate state and configuration data, ensure that you have a minimum bandwidth of
100 Mbps between the IBM QRadar console and all managed hosts. Higher bandwidth is
necessary when you search log and network activity, and you have over 10,000 events per
second (EPS).
•
•
•
•
•
•
•
•
Encryption
To provide secure data transfer between each of the appliances in your environment, IBM
QRadar has integrated encryption support that uses OpenSSH. Encryption occurs between
managed hosts, and is enabled by default when you add a managed host.
Adding a managed host
Add managed hosts, such as event and flow collectors, event and flow processors, and data
nodes, to distribute data collection and processing activities across your IBM
QRadar deployment.
Adding an IPv4-only managed host in a dual-stack environment
To add an IPv4-only managed host to a dual-stack Console, you must run scripts to prepare
both the managed host and the Console before you can add the managed host to the Console.
Configuring a managed host
Configure a managed host to specify which role the managed host fulfills in your
deployment. For example, you can configure the managed host as a collector, processor, or a
data node. You can also change the encryption settings, and assign the host to a network
address translation (NAT) group.
Removing a managed host
You can remove non-Console managed hosts from your deployment. You can't remove a
managed host that hosts the IBM QRadar Console.
Configuring your local firewall
Use the local firewall to manage access to the IBM QRadar managed host from specific
devices that are outside the network. When the firewall list is empty, access to the managed
host is disabled, except through the ports that are opened by default.
Adding an email server
IBM QRadar uses an email server to distribute alerts, reports, notifications, and event
messages.
Importing external TLS certificates
You must import an external TLS certificate on any host that sends encrypted email.
TASK: 1.3 Understand distributed architecture
SUBTASKS:
App Host
An App Host is a managed host that is dedicated to running apps. provide extra storage, memory,
and CPU resources for your apps without impacting the processing capacity of your Console. Apps
such as User Behavior Analytics with Machine Learning Analytics require more resources than are
currently available on the Console.
App Host information
The following list describes information about App Hosts:
•
•
You cannot upgrade to V7.3.2 or later with an App Node in your deployment.
You can only have one App Host per deployment.
•
•
You can run all of your apps on an App Host, or on the Console. It's not possible to run some
apps on the App Host and some others on the Console.
Port 5000 must be open on your Console.
App Host specifications
Note: *The suggested specifications for medium and large sized deployments haven't been tested. If you are
using some of the larger apps, such as the Pulse Dashboard or User Behavior Analytics with Machine
Learning, the minimum requirements are probably insufficient. Consider upgrading your deployment
environment.
CPU
RAM
cores
Disk
Space
Description
Small
4
256 GB
Minimum requirements for an App Host. You can run most apps with
the minimum requirements, but not larger apps such as QRadar DNS
Analyzer and User Behavior Analytics with Machine Learning.
Medium
12 or 64 GB or 500 GB or *You can run all apps that exist today, but this specification does not
more more
more
give you room for future apps.
Large
24 or 128 GB 1 TB or
more or more more
12 GB
*You can run all apps that exist today, and you would have room for
future apps.
Table 1. App Host specifications
Data Nodes and data storage
IBM® QRadar® processor appliances and All-in-One appliances can store data but many
companies require the stand-alone storage and processing capabilities of the Data Node to handle
specific storage requirements and to help with implementing data retention policies. Many
companies are impacted by regulations and laws that mandate keeping data records for specific
periods.
Data Node information
The following list describes information about Data Nodes:
•
•
•
•
•
•
Data Nodes add storage and processing capacity.
Data Nodes are plug-n-play and can be added to a deployment at any time.
Data Nodes integrate seamlessly with existing deployments.
Use Data Nodes to reduce the processing load on processor appliances by removing the data
storage processing load from the processor.
Users can scale storage and processing power independently of data collection.
As of QRadar V.7.2.7, a new data format with native data compression is used. Data is
compressed in memory and is written out to disk in a proprietary binary compressed
format. The new data format enables a better search performance and a more efficient use of
system resources than the previous data format. The previous data format did not have a
native built-in compression in older versions of QRadar.
The following diagram shows an example of some uses for Data Nodes in a deployment.
The following list describes the different elements that you need to consider when you deploy Data
Nodes.
Data clustering
Data Nodes add storage capacity to a deployment, and also improve performance
by distributing data that is collected across multiple storage volumes. When the data is
searched, multiple hosts, or a cluster does the search. The cluster can improve search
performance, but doesn't require you to add multiple event processors. Data Nodes multiply
the storage for each processor.
Note: You can connect a Data Node to only one processor at a time, but a processor can support
multiple Data Nodes.
Deployment considerations
•
Data Nodes perform similar search and analytic functions as event and flow
processors in a QRadar deployment.
The operational speed on a cluster is affected by the slowest member of a
cluster. Data Node system performance improves if Data Nodes are sized similarly to
the Event Processors and Flow Processors in a deployment. To facilitate similar sizing
between Data Nodes and event and flow processors, Data Nodes are available on
some core appliances..
QRadar xx05 M6 appliance
Use the IBM® QRadar® xx05 (MTM 4563-Q3E) appliance for various appliance types in your
deployment. QRadar xx05 is based on the Lenovo System SR630 M6.
The QRadar xx05 supports the following appliance types:
•
•
•
•
•
•
•
•
•
•
•
•
QRadar Event Processor 1605
QRadar Flow Processor 1705
QRadar 1805 Event and Flow processor
QRadar 3105 (All-in-One)
QRadar 3105 (Console)
QRadar Log Manager 1605
QRadar Risk Manager
QRadar Vulnerability Manager
QRadar Log Manager 3105 (All-in-One)
QRadar Log Manager 3105 Console
QRadar App Host
QRadar Data Node 1405
The following table describes hardware information and requirements for the QRadar
xx05 appliance:
Description Value
QRadar Event Processor 1605: 20,000 EPS
Maximum
capacity
CPU
QRadar Flow Processor 1705: 1,200,000 FPM
QRadar 1805 Event and Flow processor: 5000 EPS, 200,000 FPM
QRadar 3105 (All-in-One): 5000 EPS, 200,000 FPM
2 x Xeon Silver 4210 10C 2.1 GHz 85W
2 x 10 GbE Short Range SFP+
Network
management
Use these transceivers with the 2 x 10 GbE SFP+ ports, labeled as [3] in the appliance
transceivers
diagram
4 x 1 Gb Ethernet ports
Ports
Memory
Storage
2 x 10 GbE SFP+ ports
1 x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port
2 x 16 Gbps Fibre Channel SFP+ ports
64 GB (4 x 16 GB)
10 x 1.2 TB 7.2 K 12 Gbps 2.5" NL SAS 930-16i 4 Gb / RAID 6
Description Value
QRadar 3105: 6 TB available to store event and flow data
All other xx05 appliances: 8 TB available to store event and flow data
Event Collector
Included
components
Event processor for processing events
Internal storage for events
QRadar Data Node appliance
Table 1. QRadar xx05 specifications
The following image is of the QRadar xx05 appliance.
Figure 1. Front and rear panel of the QRadar xx05 appliance.
LabelDescription
1
Event data storage
2
Management ports (1 GbE TX)
3
Management ports (10 GbE SFP+)
4
1x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port
5
Fibre Channel ports (16 Gb SFP+)
Table 2. Legend for use with the QRadar xx05 image
QRadar xx29 M6 appliance
The IBM® QRadar® xx29 (MTM 4563-Q4A) appliance supports various appliance types in your
deployment. QRadar xx29 is based on the Lenovo System SR650 M6.
The QRadar xx29 supports the following appliance types:
•
•
QRadar Event Processor 1629
QRadar Flow Processor 1729
•
•
•
•
•
QRadar Event and Flow Processor 1829
QRadar 3129 (All-in-One)
QRadar 3129 (Console)
QRadar App Host
QRadar Data Node 1429
You can configure the QRadar xx29 as a QRadar Event Collector 1501 (sometimes referred to as a
1529).
The following table describes hardware information and requirements for the QRadar
xx29 appliance:
Description
Value
QRadar Event Collector 1501 40,000 EPS
QRadar Event Processor 1629: 40,000 EPS
Maximum
capacity
QRadar Flow Processor 1729: 2,400,000 FPM
QRadar Event and Flow Processor 1829: : 15,000 EPS, 300,000 FPM
QRadar 3129 (All-in-One): 15,000 EPS, 300,000 FPM
Network
2 x 10 GbE Short Range SFP+
management
transceivers Use these transceivers with the 2 x 10 GbE SFP+ ports, labeled as [4] in the appliance diagram
4 x 1 Gb Ethernet ports
Ports
2 x 10 GbE SFP+ ports
1 x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port
Memory
2 x 16 Gbps Fibre Channel SFP+ ports
8 x 32 GB (256 GB)
12 x 8 TB 7.2 K 12 Gbps NL SAS 930-16i 4 GB / RAID 6
Storage
3129: 64 TB available to store event and flow data
All other xx29 appliances: 77 TB available to store event and flow data
Event Collector
Included
components
Event processor for processing events and flows
Internal storage for events and flows
QRadar Data Node appliance
Table 1. QRadar xx29 specifications
The following image is of the QRadar xx29 appliance.
Figure 1. Front and rear panel of the QRadar xx29 appliance
LabelDescription
1
Event data storage
2
Management ports (1 GbE TX)
3
1 x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port
4
Management ports (10 GbE SFP+)
5
Fibre Channel ports (16 Gb SFP+)
Table 2. Legend for use with the QRadar xx29 image
QRadar xx29-C M5 appliance
The IBM® QRadar® xx29-C (MTM 4654-Q3A) supports various appliance types in your
deployment.
The QRadar xx29-C appliance can be used for the following appliance types:
•
•
•
•
•
•
•
•
•
•
QRadar Event Processor 1629
QRadar Flow Processor 1729
QRadar Event and Flow Processor 1829
QRadar 3129 (All-in-One)
QRadar 3129 (Console)
QRadar Log Manager 1629
QRadar Log Manager 3129 (All-in-One)
QRadar Log Manager 3129 (Console)
QRadar App Host
QRadar 1400 Data Node
View hardware information and requirements for the QRadar xx29-C in the following table:
Description Value
Maximum QRadar Event Processor 1629: 40,000 EPS
capacity
Description Value
QRadar Flow Processor 1729: 2,400,000 FPM
QRadar Event and Flow Processor 1829: : 15,000 EPS, 300,000 FPM
QRadar 3129 (All-in-One): 15,000 EPS, 300,000 FPM
2 x 10 GbE Short Range SFP+
Network
management
Use these transceivers with the 2 x 10 GbE SFP+ ports, labeled as [3] in the appliance
transceivers
diagram.
2 x 16 Gbps Fibre Channel HBA ports
Ports
Memory
Storage
4 x 10/100/1000 Base-T Ethernet management ports
1 x RJ-45 10/100/1000 Mb Ethernet systems management IPMI (iDRAC) port
2 x 10 GbE SFP+ Ethernet management ports
128 GB, 8 x 16 GB 1866 MHz RDIMM
12 x 8 TB 7.2 K 12 Gbps 512e 3.5” NLSAS, 80 TB total (RAID6) 68 TB available to store
event and flow data.
Power
Dual redundant 1100 W AC
supply
Unit weight 73 lbs
Physical
29.0 inches deep x 17.1 inches wide x 3.4 inches high
dimensions
Table 1. QRadar xx29-C specifications
The following image is of the QRadar xx29-C appliance.
Figure 1. Front and rear panel of the QRadar xx29-C appliance
LabelDescription
1
Event data storage
2
1 x RJ-45 10/100/1000 Mb Ethernet systems management IPMI (iDRAC) port
3
Management ports (10 GbE SFP+)
4
Management ports (1 GbE TX)
LabelDescription
5
Fibre channel ports (16 Gb SFP+)
Table 2. Legend for use with the QRadar xx29-C image
QRadar xx48 M6 appliance
The IBM® QRadar® xx48 (MTM 4563-Q5B) appliance captures logs from sources that generate a
large amount of traffic without a need for load balancing. QRadar xx48 is based on the Lenovo
System SR630 M6.
The QRadar xx48 appliance handles the higher levels of performance that are required by
enterprise class clients. For example, you can use the QRadar xx48 appliance for the following
requirements:
•
•
You want faster processing to search and analyze a large amount of data.
You want to reduce the footprint of an IBM QRadar deployment, so you install QRadar
xx48 appliances to reduce rack space.
The QRadar xx48 supports the following appliances types:
•
•
•
•
•
•
•
QRadar Event Processor 1648
QRadar Flow Processor 1748
QRadar Event and Flow Processor 1848
QRadar 3148 (All-in-One)
QRadar 3148 (Console)
QRadar App Host
QRadar Data Node 1448
You can configure the QRadar xx48 as a QRadar Event Collector 1501 (sometimes referred to as
1548).
The following table describes hardware information and requirements for the QRadar
xx48 appliance:
Description Value
QRadar Event Collector 1501: 80,000 EPS
QRadar Event Processor 1648: 80,000 EPS
Maximum
capacity
QRadar Flow Processor 1748: 3,600,000 FPM
QRadar Event and Flow Processor 1848: 30,000 EPS, 1,200,000 FPM
QRadar 3148 (All-in-One): 30,000 EPS, 1,200,000 FPM
2 x 10 GbE Short Range SFP+
Network
management
Use these transceivers with the 2 x 10 GbE SFP+ ports, labeled as [3] in the appliance
transceivers
diagram
4 x 1 Gb Ethernet ports
Ports
Description Value
2 x 10 GbE SFP+ ports
1 x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port
Memory
2 x 16 Gbps Fibre Channel SFP+ ports
8 x 32 GB (256 GB)
6 x 3.84 TB 2.5" SAS SSD, 930-8i RAID 6
Storage
QRadar 3148: 13 TB available to store event and flow data
All other xx48 appliances: 15 TB available to store event and flow data
Dimensions 29.5 inches deep x 17.1 inches wide x 1.7 inches high
Power
Dual redundant 750 W AC
supply
Table 1. QRadar xx48 specifications
The following image is of the QRadar xx48 appliance.
Figure 1. Front and rear panel of the QRadar xx48 appliance
LabelDescription
1
Event data storage
2
Management ports (1 GbE TX)
3
Management ports (10 GbE SFP+)
4
1 x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port
5
Fibre Channel ports (16 Gb SFP+)
Table 2. Legend for use with the QRadar xx48 image
QRadar xx48-C M5 appliance
The IBM® QRadar® xx48-C (MTM 4654-Q4B) captures logs from sources that generate a large
amount of traffic without a need for load balancing.
The QRadar xx48-C appliance handles the higher levels of performance that are required by
enterprise class clients. For example, companies can use the QRadar xx48-C for the following
requirements:
•
•
A company wants faster processing to search and analyze a large amount of data.
A company wants to reduce the footprint of an IBM QRadar deployment, so they
install QRadar xx48-C appliances to reduce rack space.
The following appliances are examples of appliance types that you can use the QRadar xx48-C for:
•
•
•
•
•
•
•
QRadar Event Processor 1648
QRadar Flow Processor 1748
QRadar Event and Flow Processor 1848
QRadar 3148 (All-in-One)
QRadar 3148 (Console)
QRadar App Host
QRadar 1400 Data Node
You can configure the QRadar xx48-C as a QRadar Event Collector 1501 (sometimes referred to as
1548). The default EPS threshold (capability) on M5 xx48-C appliances is 56,000. This value can be
overridden to values not exceeding 80,000 by completing the following steps.
1. Add EC_APPLIANCE_EPS_THRESHOLD_TEMPLATE=80000 to /opt/qradar/conf/nva.conf on the
1501 to increase the supported event rate to the desired level, subject to performance and
license limitations.
2. Restart ecs-ec-ingress on the appliance: systemctl restart ecs-ec-ingress.
3. Perform a full deploy.
View hardware information and requirements for the QRadar xx48-C in the following table.
Description Value
QRadar Event Collector 1501: 56,000 EPS (default) 80,000 EPS with override
QRadar Event Processor 1648: 80,000 EPS
Maximum
capacity
QRadar Flow Processor 1748: 3,600,000 FPM
QRadar Event and Flow Processor 1848: 30,000 EPS, 1,200,000 FPM
CPU
QRadar 3148 (All-in-One): 30,000 EPS, 1,200,000 FPM
2 x Xeon Gold 6132 14C 2.6 GHz 19 MB Cache 3.70 GHz 140 W
2 x 10 GbE Short Range SFP+
Network
management
Use these transceivers with the 2 x 10 GbE SFP+ ports, labeled as [3] in the appliance
transceivers
diagram
2 x 16 Gbps Fibre Channel HBA ports
Ports
4 x 10/100/1000 Base-T Ethernet ports
Description Value
1 x RJ-45 10/100/1000 Mb Ethernet systems management IPMI (iDRAC) port
2 x 10 Gbps SFP+ ports
Memory
128 GB, 8 x 16 GB 1866 MHz RDIMM
Storage /
6 x 3.84 TB 12 Gb SAS 2.5" SSD, 15.36 TB Total (RAID6) 12 TB available to store event
Hard disks and flow data.
Power
Dual redundant 1100 W AC
supply
Unit weight 48.5 lbs
Physical
31.3 inches deep x 17.1 inches wide x 1.7 inches high
dimensions
Table 1. QRadar xx48-C overview
Figure 1. QRadar xx48-C
LabelDescription
1
Event data storage
2
1 x RJ-45 10/100/1000 Mb Ethernet systems management IPMI (iDRAC) port
3
Management ports (10 GbE SFP+)
4
Management ports (1 GbE TX)
5
Fibre channel ports (16 Gb SFP+)
Table 2. Legend for use with the QRadar xx48-C image
•
Data Nodes are available in three formats: software (on your own hardware),
physical, and appliances. You can mix the formats in a single cluster.
Bandwidth and latency
Ensure that you have a 1 Gbps link and less than 10 ms latency between hosts in the cluster.
Searches that yield many results require more bandwidth.
Appliance compatibility
Data Nodes are compatible with all existing QRadar appliances that have an Event
Processor or Flow Processor component, including All-In-One appliances. Data Nodes are not
compatible with QRadar Incident Forensics PCAP appliances.
Data Nodes support high availability (HA).
Installation of Data Nodes
Data Nodes use standard TCP/IP networking, and do not require proprietary or specialized
interconnect hardware.
Install each Data Node that you want to add to your deployment the same as you would
install any other QRadar appliance. Associate Data Nodes with either an event or flow
processor.
You can attach multiple Data Nodes to a single Event Processor or Flow Processor in a manyto-one configuration.
When you deploy high availability (HA) pairs with Data Node appliances, install, deploy, and
rebalance data with the HA appliances before you synchronize the HA pair. The combined
effect of the data rebalancing and the replication process that is utilized for HA results in
significant performance degradation. If HA is set up on appliances to which Data Nodes are
being introduced, then disconnect HA on the appliances and then reconnect it when the
rebalance of the cluster is complete.
Decommissioning Data Nodes
Use the System and License Management window to remove Data Nodes from your
deployment, as with any other QRadar appliance. Decommissioning does not erase data on
the host, nor does it move the data to your other appliances. If you need to retain access to
the data that was on the Data Nodes, you must identify a location to move that data to.
Data Rebalancing
Adding a Data Node to a cluster distributes data to each Data Node. If it is possible, data
rebalancing tries to maintain the same percentage of available space on each Data Node.
New Data Nodes added to a cluster initiate more rebalancing from cluster event and flow
processors to achieve efficient disk usage on the newly added Data Node appliances.
Data rebalancing is automatic and concurrent with other cluster activity, such as queries and
data collection. No downtime is experienced during data rebalancing.
Data Nodes offer no performance improvement in the cluster until data rebalancing is
complete. Rebalancing can cause minor performance degradation during search operations,
but data collection and processing continue unaffected.
Important: When you add Data Nodes to a cluster, they must either all be encrypted, or all be
unencrypted. You cannot add both encrypted and unencrypted Data Nodes to the same cluster.
Note: Encrypted data transmission between Data Nodes and Event Processors is not supported.
Management and Operations
Data Nodes are self-managed and require no regular user intervention to maintain normal
operation. QRadar manages activities, such as data backups, high availability, and retention
policies, for all hosts, including Data Node appliances.
Data Node failure
If a Data Node fails, the remaining members of the cluster continue to process data.
When the failed Data Node returns to service, data rebalancing can occur to maintain proper
data distribution in the cluster, and then normal processing resumes. During the downtime,
data on the failed Data Node is unavailable, and I/O errors that occur appear in search
results from the log and network activity viewers in the QRadar user interface.
For catastrophic failures that require appliance replacement or the reinstallation of QRadar,
decommission Data Nodes from the deployment and replace them using standard
installation steps. Copy any data that is not lost in the failure to the new Data Node before
you deploy. The rebalancing algorithm accounts for data that exists on a Data Node, and
shuffles only data that was collected during the failure.
For Data Nodes deployed with an HA pair, a hardware failure causes a failover, and
operations continue to function normally.
SAN Overview
To increase the amount of storage space on your appliance, you can move a portion of your data to
an offboard storage device. You can move your /store, /store/ariel, or /store/backup file
systems.
Multiple methods are available for adding external storage, including iSCSI, Fiber Channel, and NFS
(Network File System). You must use iSCSI or Fiber Channel to store data that is accessible and
searchable in the UI, such as the /store/ariel directory, and reserve the use of NFS for data
backups only.
Moving the /store file system to an external device might affect QRadar performance.
After migration, all data I/O to the /store file system is no longer done on the local disk. Before
you move your QRadar data to an external storage device, you must consider the following
information:
•
•
Searches that are marked as saved are also in the /transient directory. If you experience
a local disk failure, these searches are not saved.
A transient partition that exists before you move your data is likely to remain in existence
after the move, and it can be mounted on an iSCSI, or Fiber Channel storage mount.
Data encryption
Event data in QRadar® is not encrypted when stored, there are a number of things that can be done
to protect data that is stored on the system.
•
The /store or /store/ariel partitions can be placed on an external device, which uses
transparent (to QRadar) cryptography. For more information on external storage options,
see Offboard storage overview.
•
Event data can be protected from tampering by the use of event hashing. For more
information, see Configuring system settings.
To enable data encryption during QRadar software installations, see Installing RHEL on your system.
Important: To set up encryption on the storage, see the documentation for your storage solution.
Forensics and full packet collection
Use IBM® QRadar® Incident Forensics in your deployment to retrace the step-by-step actions of a potential
attacker, and conduct an in-depth forensics investigation of suspected malicious network security incidents.
QRadar Incident Forensics reconstructs raw network data that is related to a security incident back into its
original form.
QRadar Incident Forensics integrates with the IBM QRadar Security Intelligence Platform and is compatible
with many third-party packet capture offerings.
QRadar Incident Forensics offers an optional QRadar Network Packet Capture appliance to store and manage
data that is used by QRadar Incident Forensics if no other network packet capture (PCAP) device is deployed.
Any number of these appliances can be installed as a tap on a network or sub-network to collect the raw packet
data.
QRadar Network Packet Capture components
The following components can be included in a QRadar deployment:
QRadar Console
Provides the QRadar product user interface. In distributed deployments, use the QRadar Console to
manage multiple QRadar Incident Forensics Processor hosts.
QRadar Incident Forensics Processor
Provides the QRadar Incident Forensics product interface. The interface delivers tools to
retrace the step-by-step actions of cyber criminals, reconstruct raw network data that is
related to a security incident, search across available unstructured data, and visually
reconstruct sessions and events.
You must add QRadar Incident Forensics Processor as a managed host before you can use
the security intelligence forensics capability.
QRadar Incident Forensics Standalone
Provides the QRadar Incident Forensics product user interface. Installing QRadar Incident
Forensics Standalone provides the tools that you need to do forensics investigations. Only
forensics investigative and the related administrative functions are available.
QRadar Network Packet Capture
You can install an optional QRadar Network Packet Capture appliance. If no other packet
capture device is deployed, you can use this appliance to store data that is used by QRadar
Incident Forensics. You can install any number of these appliances as a network tap or
subnetwork to collect the raw packet data.
If no packet capture device is attached, you can manually upload the packet capture files in
the user interface or by using FTP.
Depending on your network and packet capture requirements, you can connect up to five
packet capture devices to a QRadar Incident Forensics appliance.
All-in-One deployment
In standalone or all-in-one deployments, you install the IBM QRadar Incident Forensics
Standalone software. These single appliance deployments are similar to installing the QRadar
Console and QRadar Incident Forensics managed host on one appliance, but without log
management, network activity monitoring, or other security intelligence features. For a stand-alone
network forensics solution, install the QRadar Incident Forensics Standalone in small to midsize
deployments.
The following diagram shows a basic QRadar Incident Forensics All-in-One deployment.
Figure 1. All-in-one deployment
Distributed deployment
The following diagram shows a QRadar Incident Forensics distributed deployment.
Software versions for all IBM QRadar appliances in a deployment must be the same version and fix
level. Deployments that use different versions of software are not supported.
Figure 2. Distributed deployment
The following diagram shows packet forwarding from a IBM QRadar Flow Collector 1310 with a
10G Napatech network card to a QRadar Network Packet Capture appliance.
The QRadar Flow Collector uses a dedicated Napatech monitoring card to copy incoming packets
from one port on the card to a second port that connects to a QRadar Network Packet
Capture appliance.
Figure 3. Packet forwarding
•
Forwarding packets to QRadar Network Packet Capture
You can monitor network traffic by sending raw data packets to a IBM QRadar Flow
Collector 1310 appliance. The QRadar Flow Collector uses a dedicated Napatech monitoring
card to copy incoming packets from one port on the card to a second port that connects to
a QRadar Network Packet Capture appliance.
Before you begin
Ensure that the following hardware is set up in your environment:
•
•
•
You attached the cable to port 1 of the Napatech card on the QRadar Flow Collector 1310
appliance.
You attached the cable that is connected to port 2 of the Napatech card, which is the
forwarding port, to the QRadar Network Packet Capture appliance.
Verify layer 2 connectivity by checking for link lights on both appliances.
Procedure
1. Using SSH from your IBM QRadar Console, log in to QRadar Flow Collector as the root user.
On the QRadar Flow Collector appliance, edit the following file.
/opt/qradar/init/apply_tunings
a. Locate the following line, which is around line 137.
b. apply_multithread_qflow_changes()
c. {
d.
APPLIANCEID=`$NVABIN/myver -a`
e.
if [ "$APPLIANCEID" == "1310" ]; then
f.
MODELNUM=$(/opt/napatech/bin/AdapterInfo 2>&1 | grep "Active
FPGA Image" | cut -d'-' -f2)
if [ "$MODELNUM" == "9220" ]; then..
g. In the AppendToConf lines that follow the code in the preceding step, add these lines:
h. AppendToConf SV_NAPATECH_FORWARD YES
AppendToConf SV_NAPATECH_FORWARD_INTERFACE_SRCDST "0:1"
These statements enable packet forwarding, and forward packets from port 0 to port
1.
i.
Ensure that multithreading is enabled, by verifying that the following line is in
the /opt/qradar/conf/nva.conf
file.
MULTI_THREAD_ON=YES
2. Run the apply_tunings script to update the configuration files on the QRadar Flow
Collector, by typing the following command:
./apply_tunings restart
3. Restart IBM QRadar services by typing the following command:
systemctl restart hostcontext
4. Optional: Verify that your Napatech card is receiving and transmitting data.
a. To verify that the Napatech card is receiving data, type the following command:
/opt/napatech/bin/Statistics -dec -interactive
The "RX" packet and byte statistics increment if the card is receiving data.
b. To verify that the Napatech card is transmitting data, type the following command:
/opt/napatech/bin/Statistics -dec -interactive
The "TX" statistics increment if the card is transmitting data.
5. Verify that your QRadar Network Packet Capture is receiving packets from your QRadar
Flow Collector appliance.
a. Using SSH from your QRadar Console, log in to your QRadar Network Packet
Capture appliance as root on port 4477.
b. Verify that the QRadar Network Packet Capture appliance is receiving packets by
typing the following command:
watch -d cat /var/www/html/statisdata/int0.txt
The int0.txt file updates as data flows into your QRadar Network Packet
Capture appliance.
Geographically distributed deployments
In geographically distributed deployments your IBM® QRadar® deployment might be impacted by
intermittent or poor connectivity to remote data centers. You might also be impacted by local
regulations, such as complying with specific state or country regulations to keep data in the place of
origin. Both of these situations require that you keep collectors on site. If you must keep data in the
place of origin, then you must keep the processor on site.
For example, your company is growing and this growth not only increases activity in the network,
but it also requires that you expand your QRadar deployment to other countries. Data retention
laws vary from country to country, so the QRadar deployment must be planned with these
regulations in mind.
You note these following conditions:
•
•
Your company must collect event data from one of the office locations that has intermittent
connectivity.
Your company must comply with data retention regulations in the countries where data is
collected. For example, if Germany requires that data remains in-country, then that data
must not be stored outside that country.
Figure 1. Geographically Distributed Deployment
In the geographically distributed deployment, the following processes occur:
•
•
•
Your company installs collectors and processors in the German data center to comply with
local data laws.
In the French data center, your company installs collectors, so that data is sent by the
collectors to the head office, which is processed and stored at the head office. Search speeds
are increased by having the processor appliances on the same high-speed network segment
as the QRadar Console.
Your company adds a store-and-forward Event Collector that has scheduled and rate-limited
forwarding connections in the remote data center. The scheduled and rate-limited
connections compensate for intermittent network connectivity and ensures that the
requirement for more bandwidth is avoided during regular business hours.
If you’re constantly searching for data on a remote processor, it’s better to have that processor on
the same high-speed network segment as the QRadar Console. If the bandwidth between
the QRadar Console and remote processor is not good, you might experience latency with your
searches, especially when you're doing multiple concurrent searches.
Expanding deployments to add more capacity
Your business might create or expand a deployment beyond an IBM® QRadar® All-in-One
appliance because of the lack of processing or data storage capacity, or when you have specific data
collection requirements.
The topology and composition of your QRadar deployment are influenced by the capability and
capacity of that deployment to collect, process, and store all the data that you want to analyze in
your network.
If your processing or storage needs expand beyond the capacity of your All-in-One appliance, you
can reconfigure your QRadar environment to a distributed deployment. For more information
see, Adding an appliance to an All-in-One console.
To get rough estimates of the events per second (EPS) or flows per minute (FPM) that you need to
process in your deployment, use the size of your logs that are collected from firewalls, proxy
servers, and Windows boxes.
Reasons to add event or flow collectors to an All-in-One deployment
You might need to add flow or event collectors to your deployment under these conditions:
•
•
•
Your data collection requirements exceed the collection capability of the All-in-One
appliance.
You must collect events and flows in a different location than where your All-in-One
appliance is installed.
You are monitoring larger, or higher-rate packet-based flow sources that are faster than the
50 Mbps connection on the All-in-One.
A 3128 All-in-One appliance can collect up to 15,000 events per second (EPS) and 300,000 flows
per minute (FPM). If your collection requirements are greater, you might want to add Event
Collectors and Flow Collectors to your deployment. For example, you can add a QRadar Flow
Collector 1202, which collects up to 3 Gbps.
An All-in-One appliance processes the events and flows that are collected. By adding Event
Collectors and Flow Collectors, you can use the processing that the All-in-One appliance usually
does for searches and other security tasks.
Packet-based flow sources require a Flow Collector that is connected either to a Flow Processor, or
to an All-in-One appliance in deployments where there is no Flow Processor appliance. You can
collect external flow sources, such as NetFlow, or IPFIX, directly on a Flow Processor or All-in-One
appliance.
Adding remote collectors to a deployment
Add QRadar Event Collectors or QRadar Flow Collectors to expand a deployment when you need to
collect more events locally and collect events and flows from a remote location.
For example, you are a manufacturing company that has a QRadar All-in-One deployment and
you add e-commerce and a remote sales office. You now must monitor for security threats and
are also now subject to PCI audits.
You hire more employees and the Internet usage changes from mostly downloading to twoway traffic between your employees and the Internet. Here are details about your company.
•
•
•
•
•
The current events per second (EPS) license is 1000 EPS.
You want to collect events and flows at the sales office and events from the e-commerce
platform.
Event collection from the e-commerce platform requires up to 2000 events-per-second
(EPS).
Event collection from the remote sales office requires up to 2000 events-per-second (EPS).
The flows per minute (FPM) license is sufficient to collect flows at the remote office.
You take the following actions:
1. You add the e-commerce platform at your head office, and then you open a remote sales
office.
2. You install an Event Collector and a Flow Collector at the remote sales office that sends data
over the Internet to the All-in-One appliance at your head office.
3. You upgrade your EPS license from 1000 EPS to 5000 EPS to meet the requirements for the
extra events that are collected at the remote office.
The following diagram shows an example deployment of when an Event Collector and a Flow
Collector are added at a remote office.
Figure 1. Collectors in remote office
In this deployment, the following processes occur:
•
•
•
•
•
At your remote office, the Event Collector collects data from log sources and the Flow
Collector collects data from routers and switches. The collectors coalesce and normalize the
data.
The collectors compress and send data to the All-in-One appliance over the wide area
network.
The All-in-One appliance processes, and stores the data.
Your company monitors network activity by using the QRadar web application for searches,
analysis, reporting, and for managing alerts and offenses.
The All-in-one collects and processes events from the local network.
Adding processing capacity to an All-in-One deployment
Add Event Processors and Flow Processors to your QRadar deployment to increase processing
capacity and increase storage. Adding processors frees up resources on your QRadar Console by
moving the processing and storage load to dedicated servers.
When you add Event Processors or Flow Processors to an All-in-One appliance the All-in-One acts
as a QRadar Console. The processing power on the All-in-One appliance is dedicated to managing
and searching the data that is sent by the processors, and data is now stored on the Event
Processors and other storage devices, rather than on the Console.
You typically add Event Processors and Flow Processors to your QRadar deployment for the
following reasons:
•
•
•
•
As your deployment grows, the workload exceeds the processing capacity of the All-in-One
appliance.
Your security operations center employs more analysts who do more concurrent searches.
The types of monitored data, and the retention period for that data increases, which
increases processing and storage requirements.
As your security analyst team grows, you require better search performance.
Running multiple concurrent QRadar searches and adding more types of log sources that you
monitor, affects the processing performance of your All-in-One appliance. As you increase the
number of searches and the amount of monitored data, add Event Processors and Flow
Processors to improve the performance of your QRadar deployment.
When you scale your QRadar deployment beyond the 15,000 EPS and 300,000 FPM on the most
powerful All-in-One appliance, you must add processor appliances to process that data.
Example: Adding a
QRadar Event Processor to your deployment
You can add a QRadar Event Processor 1628, which collects and processes up to 40,000 EPS. You
increase your capacity by another 40,000 EPS every time you add a QRadar Event Processor
1628 to your deployment. Add a QRadar Flow Processor 1728, which collects and processes up to
1,200,000 FPM.
The QRadar Event Processor 1628 is a collector and a processor. If you have a distributed network,
it’s a good practice to add Event Collectors to distribute the load and to free system resources on
the Event Processor.
In the following diagram, processing capacity is added when an Event Processor and a Flow Processor are
added to an QRadar 3128 (All-in-One), and the following changes take place:
•
•
Event and flow processing is moved off the All-in-One appliance to the event and flow
processors.
Event processing capacity increases to 40,000 EPS, which includes the 15,000 EPS that was
on the All-in-One.
•
•
Flow processing capacity increases to 1,200,000 FPM, which includes the 300,000 FPM that
was on the All-in-One.
Data that is sent by the event and flow collectors is processed and stored on the event and
flow processors.
Figure 1. Adding processing capacity
Search performance is faster when you install Event Processors and Flow Processors on the same
network as your QRadar Console.
Adding processors and collectors expands the processing capacity of your QRadar deployment. You
can also increase the storage capacity of your deployment. Your company's data retention needs
can increase due to more traffic or to changes to retention policies. Adding Data Nodes to your
deployment expands your data storage capacity, and improves search performance.
When to add Collectors to Processors
Add Event Collectors and Flow Collectors to Event Processors and Flow Processors for the same
reasons that you add collectors to an All-in-One appliance:
•
Your data collection requirements exceed the collection capability of your processor.
•
•
You must collect events and flows at a different location than where your processor is
installed.
You are monitoring packet-based flow sources.
Note: Event Collectors can buffer events, but Flow Collectors can't buffer flows.
Because search performance is improved when processors are installed on the same network as the
console, adding collectors in remote locations, and then sending that data to the processor, speeds
up your QRadar searches.
Adding an appliance to an All-in-One console
Any All-in-One console can become part of a distributed deployment by adding another appliance
to extend the resources and performance of the All-in-One console. Adding more appliances can
increase storage, process more data, and search faster. The Console appliance manages the other
QRadar appliances in the network. When you add appliances to an All-in-One console, it becomes a
distributed deployment console.
About this task
Adding hosts allows users to expand on the capabilities, storage, and resources from an All-in-One
appliance to create a distributed deployment.
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
9.
Log in to the All-in One Console as an administrator.
From the Admin tab, click the System and License Management icon.
In the Display list, select Systems.
On the Deployment Actions menu, select Add Host.
Enter the Host IP, Host Password (root user password). and configure the properties to
Encrypt Host Connections or define Network Address Translation parameters.
Check either Encrypt Host Connections or Network Address Translation and configure
your choice.
Click Add.
From the Admin tab, click Deploy Changes.
Click Continue to restart services.
Results
The host is added to the deployment and the appliance is added to the user interface. After the host
is added, you might need to allocate licenses to the appliance. For more information, see License
management.
Common ports and servers used by QRadar
IBM® QRadar® requires that certain ports are ready to receive information
from QRadar components and external infrastructure. To ensure that QRadar is using the most
recent security information, it also requires access to public servers and RSS feeds.
Warning: If you change any common ports, your QRadar deployment might break.
SSH communication on port 22
All the ports that are used by the QRadar console to communicate with managed hosts can be
tunneled, by encryption, through port 22 over SSH.
The console connects to the managed hosts by using an encrypted SSH session to communicate
securely. These SSH sessions are initiated from the console to provide data to the managed host.
For example, the QRadar Console can initiate multiple SSH sessions to the Event
Processor appliances for secure communication. This communication can include tunneled ports
over SSH, such as HTTPS data for port 443 and Ariel query data for port 32006. IBM QRadar Flow
Collector that use encryption can initiate SSH sessions to Flow Processor appliances that require
data.
Open ports that are not required by
QRadar
You might find additional open ports in the following situations:
•
•
When you install QRadar on your own hardware, you may see open ports that are used by
services, daemons, and programs included in Red Hat Enterprise Linux®.
When you mount or export a network file share, you might see dynamically assigned ports
that are required for RPC services, such as rpc.mountd and rpc.rquotad.
QRadar port usage
Review the list of common ports that IBM QRadar services and components use to communicate
across the network. You can use the port list to determine which ports must be open in your
network. For example, you can determine which ports must be open for the QRadar Console to
communicate with remote event processors.
Warning: If you change any common ports, your QRadar deployment might break.
WinCollect remote polling
WinCollect agents that remotely poll other Microsoft Windows operating systems might require
additional port assignments.
QRadar listening ports
The following table shows the QRadar ports that are open in a LISTEN state. The LISTEN ports are valid
only when iptables is enabled on your system. Unless otherwise noted, information about the assigned port
number applies to all QRadar products.
Port
Description Protocol
Direction
Requirement
Remote management access.
Adding a remote system as a
managed host.
Log source protocols to retrieve
22
SSH
TCP
Bidirectional from the QRadar
files from external devices, for
Console to all other components. example the log file protocol.
Users who use the commandline interface to communicate
from desktops to the Console.
High-availability (HA).
25
SMTP
TCP
111 and
random
Port mapper TCP/UDP
generat
ed port
123
Network Time
Protocol
UDP
(NTP)
135 and
dynamic
ally
allocated DCOM
ports
above
1024 for
TCP
From all managed hosts to the
SMTP gateway.
Managed hosts (MH) that
communicate with the QRadar
Console.
Users that connect to
the QRadar Console.
Outbound from the QRadar
Console to the NTP Server
Outbound from the MH to
the QRadar Console
Emails from QRadar to an SMTP
gateway.
Delivery of error and warning
email messages to an
administrative email contact.
Remote Procedure Calls (RPC)
for required services, such as
Network File System (NFS).
Time synchronization via
Chrony between:
•
•
QRadar Console and NTP
server
QRadar Managed Hosts
and QRadar Console
Bidirectional traffic between
WinCollect agents and Windows
operating systems that are
remotely polled for events.
This traffic is generated by
WinCollect, Microsoft Security
Event Log Protocol, or Adaptive
Log Exporter.
Bidirectional traffic
between QRadar
Note: DCOM typically allocates a
random port range for
communication. You can configure
Port
Description Protocol
RPC
calls.
Direction
Requirement
Console components or IBM
QRadar event collectors that
use either Microsoft Security
Event Log Protocol or Adaptive
Log Exporter agents and
Windows operating systems
that are remotely polled for
events.
Microsoft Windows products to
use a specific port. For more
information, see your Microsoft
Windows documentation.
Bidirectional traffic between
WinCollect agents and Windows
operating systems that are
remotely polled for events.
137
Windows
NetBIOS name UDP
service
This traffic is generated by
Bidirectional traffic
WinCollect, Microsoft Security
between QRadar
Console components or QRadar Event Log Protocol, or Adaptive
Event Collectors that use either Log Exporter.
Microsoft Security Event Log
Protocol or Adaptive Log
Exporter agents and Windows
operating systems that are
remotely polled for events.
Bidirectional traffic between
WinCollect agents and Windows
operating systems that are
remotely polled for events.
138
139
Windows
NetBIOS
datagram
service
Windows
NetBIOS
session
service
UDP
This traffic is generated by
Bidirectional traffic
WinCollect, Microsoft Security
between QRadar
Console components or QRadar Event Log Protocol, or Adaptive
Event Collectors that use either Log Exporter.
Microsoft Security Event Log
Protocol or Adaptive Log
Exporter agents and Windows
operating systems that are
remotely polled for events.
Bidirectional traffic between
WinCollect agents and Windows
operating systems that are
remotely polled for events.
TCP
Bidirectional traffic
between QRadar
Console components or QRadar
Event Collectors that use either
Microsoft Security Event Log
Protocol or Adaptive Log
This traffic is generated by
WinCollect, Microsoft Security
Event Log Protocol, or Adaptive
Log Exporter.
Port
Description Protocol
Direction
Requirement
Exporter agents and Windows
operating systems that are
remotely polled for events.
162
NetSNMP
UDP
199
NetSNMP
TCP
427
Service
Location
UDP/TCP
Protocol (SLP)
UDP port for the NetSNMP daemon
that listens for communications
(v1, v2c, and v3) from external log
External log sources to QRadar sources. The port is open only
when the SNMP agent is enabled.
Event Collectors.
QRadar managed hosts that
connect to the QRadar Console.
TCP port for the NetSNMP daemon
that listens for communications
(v1, v2c, and v3) from external log
External log sources to QRadar sources. The port is open only
when the SNMP agent is enabled.
Event Collectors.
QRadar managed hosts that
connect to the QRadar Console.
The Integrated Management
Module uses the port to find
services on a LAN.
Configuration downloads to
managed hosts from the QRadar
Console.
QRadar managed hosts that
443
Apache/HTTP
TCP
S
Bidirectional traffic for secure
connect to the QRadar Console.
communications from all products
to the QRadar Console.
Users to have log in access
to QRadar.
Unidirectional traffic from the
App Host to the QRadar
QRadar Console that manage
Console.
and provide configuration
updates for WinCollect agents.
Apps that require access to
the QRadar API.
445
Microsoft
Directory
Service
Bidirectional traffic between
WinCollect agents and Windows
operating systems that are
remotely polled for events.
TCP
Bidirectional traffic
between QRadar
Console components or QRadar
Event Collectors that use the
Microsoft Security Event Log
Protocol and Windows
This traffic is generated by
WinCollect, Microsoft Security
Event Log Protocol, or Adaptive
Log Exporter.
Port
Description Protocol
Direction
Requirement
operating systems that are
remotely polled for events.
Bidirectional traffic between
Adaptive Log Exporter agents
and Windows operating
systems that are remotely
polled for events.
External network appliances that
provide TCP syslog events use
External log sources to send event
bidirectional traffic.
data to QRadar components.
UDP/TCP
External network appliances Syslog traffic includes
that provide UDP syslog events WinCollect agents, event
use uni-directional traffic.
collectors, and Adaptive Log
Exporter agents capable of
Internal syslog traffic
sending either UDP or TCP
from QRadar hosts to
events to QRadar.
the QRadar Console.
514
Syslog
762
Network File
System (NFS)
mount
TCP/UDP
daemon
(mountd)
The Network File System (NFS)
Connections between the QRadar mount daemon, which processes
requests to mount a file system at a
Console and NFS server.
specified location.
1514
Syslog-ng
TCP/UDP
Connection between the
local Event Collector component
and local Event
Processor component to the
syslog-ng daemon for logging.
2049
NFS
TCP
The Network File System (NFS)
Connections between the QRadar
protocol to share files or data
Console and NFS server.
between components.
2055
NetFlow data UDP
From the management interface
on the flow source (typically a
router) to the IBM QRadar Flow
Collector.
2376
Docker
TCP
command port
Internal communications. This
port is not available externally.
3389
Remote
Desktop
Protocol
(RDP) and
TCP/UDP
Internal logging port for syslog-ng.
NetFlow datagram from
components, such as routers.
Used to
manage QRadar application
framework resources.
If the Microsoft Windows
operating system is configured to
support RDP and Ethernet over
USB, a user can initiate a session to
the server over the management
Port
Description Protocol
Direction
Requirement
Ethernet over
USB is enabled
network. This means the default
port for RDP, 3389 must be open.
Integrated
Management
Module remot TCP/UDP
e presence
port
Use this port to interact with
the QRadar console through
the Integrated Management
Module.
4333
Redirect port TCP
This port is assigned as a redirect
port for Address Resolution
Protocol (ARP) requests
in QRadar offense resolution.
5000
Used to allow
communicatio
n to the
docker siregistry
running on
the Console.
This allows all
TCP
managed
hosts to pull
images from
the Console
that will be
used to create
local
containers.
Unidirectional from the QRadar
Console to a QRadar App Host.
5432
Postgres
TCP
Communication for the managed Required for provisioning
host that is used to access the local managed hosts from
database instance.
the Admin tab.
6514
Syslog
TCP
External network appliances that External log sources to send
provide encrypted TCP syslog
encrypted event data
events use bidirectional traffic.
to QRadar components.
3900
7676,
7677,
and four
Messaging
randoml
connections
y bound
(IMQ)
ports
above
32000.
Used with an App Host. It allows
the Console to deploy apps to an
App Host and to manage those
apps.
Message queue broker for
communications between
components on a managed host.
TCP
Message queue communications
between components on a
managed host.
Note: You must permit access to
these ports from
the QRadar console to unencrypted
hosts.
Ports 7676 and 7677 are static
TCP ports, and four extra
Port
Description Protocol
Direction
Requirement
connections are created on
random ports.
For more information about
finding randomly bound ports,
see Viewing IMQ port
associations.
5791,
7700,
7777,
7778,
7779,
7780,
7781,
7782,
7783,
7787,
7788,
7790,
7791,
7792,
7793,
7794,
7795,
7799,
8989,
and
8990.
JMX server
ports
7789
HA
Distributed
TCP/UDP
Replicated
Block Device
Distributed Replicated Block
Bidirectional between the
Device is used to keep drives
secondary host and primary host synchronized between the primary
and secondary hosts in HA
in an HA cluster.
configurations.
7800
Apache
Tomcat
TCP
From the Event Processor to
the QRadar Console.
Real-time (streaming) for events.
7801
Apache
Tomcat
TCP
From the Event Processor to
the QRadar Console.
Real-time (streaming) for flows.
7803
Anomaly
Detection
Engine
TCP
From the Event Processor to
the QRadar Console.
Anomaly detection engine port.
7804
QRM Arc
builder
TCP
Internal control communications This port is used for QRadar Risk
between QRadar processes and
Manager only. It is not available
ARC builder.
externally.
TCP
JMX server (Java™ Management
Beans) monitoring for all internal
Internal communications. These QRadar processes to expose
ports are not available externally. supportability metrics.
These ports are used
by QRadar support.
Port
Description Protocol
Direction
Requirement
7805
Syslog tunnel
communicatio TCP
n
Used for encrypted communication
Bidirectional between the QRadar
between the console and managed
Console and managed hosts
hosts.
8000
Event
Collection
TCP
service (ECS)
From the Event Collector to
the QRadar Console.
Listening port for specific Event
Collection Service (ECS).
8001
SNMP daemon
TCP
port
External SNMP systems that
request SNMP trap information
from the QRadar Console.
Listening port for external SNMP
data requests.
8005
Apache
Tomcat
TCP
Internal communications. Not
available externally.
8009
Apache
Tomcat
TCP
Tomcat connector, where the
From the HTTP daemon (HTTPd)
request is used and proxied for the
process to Tomcat.
web service.
8080
Apache
Tomcat
TCP
Tomcat connector, where the
From the HTTP daemon (HTTPd)
request is used and proxied for the
process to Tomcat.
web service.
8082
Secure tunnel
for QRadar
TCP
Risk Manager
Open to control tomcat.
8413
WinCollect
agents
TCP
This port is bound and only
accepts connections from the
local host.
Bidirectional traffic between
the QRadar Console and QRadar
Risk Manager
Required when encryption is used
between QRadar Risk Manager and
the QRadar Console.
Bidirectional traffic between
WinCollect agent and QRadar
Console.
This traffic is generated by the
WinCollect agent and
communication is encrypted. It is
required to provide configuration
updates to the WinCollect agent
and to use WinCollect in connected
mode.
Used by Apache Tomcat to read
information from the host that is
running the QRadar Vulnerability
Manager processor.
8844
Apache
Tomcat
TCP
Unidirectional from the QRadar
Console to the appliance that is
running the QRadar Vulnerability
Manager processor.
Important: The IBM QRadar
Vulnerability Manager scanner is
end of life (EOL) in 7.5.0 Update
Package 6, and is no longer
supported in any version of IBM
QRadar. For more information,
see QRadar Vulnerability Manager:
End of service product
notification (https://www.ibm.co
Port
Description Protocol
Direction
Requirement
m/support/pages/node/6853425)
.
Used with an App Host. It allows
the Console to deploy apps to an
App Host and to manage those
apps.
9000
Conman
9090
XForce IP
Reputation
TCP
database and
server
Internal communications. Not
available externally.
Communications
between QRadar processes and the
XForce Reputation IP database.
9381
Certificate
TCP
files download
Unidirectional
from QRadar managed host or
external network to QRadar
Console
Downloading QRadar CA certificate
and CRL files, which can be used to
validate QRadar generated
certificates.
9381
localca-server TCP
Bidirectional
between QRadar components.
Used to hold QRadar local root and
intermediate certificates, as well as
associated CRLs.
9393,
9394
vault-qrd
TCP
Internal communications. Not
available externally.
Used to hold secrets and allow
secure access to them to services.
TCP
Bidirectional Java Remote Method When the web application is
Invocation (RMI) communication registered, one additional port is
between Java Virtual Machines
dynamically assigned.
9913
plus one
Web
dynamic
application
ally
container
assigned
port
9995
9999
TCP
Unidirectional from the QRadar
Console to a QRadar App Host.
NetFlow data UDP
IBM QRadar
Vulnerability
TCP
Manager proc
essor
From the management interface
on the flow source (typically a
router) to the QRadar Flow
Collector.
NetFlow datagram from
components, such as routers.
Used for QRadar Vulnerability
Manager (QVM) command
information. The QRadar
Console connects to this port on
the host that is running the QRadar
Unidirectional from the scanner to Vulnerability Manager processor.
the appliance running the QRadar This port is only used when QVM is
Vulnerability Manager processor enabled.
Important: The IBM QRadar
Vulnerability Manager scanner is
end of life (EOL) in 7.5.0 Update
Package 6, and is no longer
supported in any version of IBM
Port
Description Protocol
Direction
Requirement
QRadar. For more information,
see QRadar Vulnerability Manager:
End of service product
notification (https://www.ibm.co
m/support/pages/node/6853425)
.
In QRadar V7.2.5 and earlier, this
port is used for server changes,
such as the hosts root password
and firewall access.
10000
QRadar webbased, system
TCP/UDP
administratio
n interface
User desktop systems to
all QRadar hosts.
10101,
10102
Heartbeat
command
TCP
Bidirectional traffic between the Required to ensure that the HA
primary and secondary HA nodes. nodes are still active.
12500
Socat binary
TCP
Port used for tunneling chrony udp
Outbound from MH to the QRadar
requests over tcp when QRadar
Console
Console or MH is encrypted
TCP
Unidirectional from the QRadar
Console to a QRadar App Host.
Port 10000 is disabled in V7.2.6.
14433
traefik
Used with an App Host. It allows
the Console to deploy apps to an
App Host and to manage those
apps.
Required to be open for internal
communication between QRM
and QRadar.
15432
Used for QRadar Vulnerability
Manager (QVM) configuration and
storage. This port is only used
when QVM is enabled.
15433
15434
Postgres
TCP
Important: The IBM QRadar
Vulnerability Manager scanner is
Communication for the managed end of life (EOL) in 7.5.0 Update
host that is used to access the local Package 6, and is no longer
database instance.
supported in any version of IBM
QRadar. For more information,
see QRadar Vulnerability Manager:
End of service product
notification (https://www.ibm.co
m/support/pages/node/6853425)
.
Required to be open for internal
communication between
Forensics and QRadar.
Port
Description Protocol
20000SSH Tunnel
23000
TCP
Direction
Requirement
Bidirectional from the QRadar
Console to all other encrypted
managed hosts.
Local listening point for SSH
tunnels used for Java Message
Service (JMS) communication with
encrypted managed hosts. Used to
perform long-running
asynchronous tasks, such as
updating networking configuration
via System and License
Management.
23111
SOAP web
server
23333
Emulex Fibre
TCP
Channel
User desktop systems that connect Emulex Fibre Channel
to QRadar appliances with a Fibre HBAnywhere Remote Management
Channel card.
service (elxmgmt).
26000
traefik
TCP
Bidirectional
between QRadar components.
Used with an App Host that is
encrypted. Required for app
services discovery.
TCP
Unidirectional from the QRadar
Console to a QRadar App Host.
Used with an App Host that is
encrypted. It allows the Console to
deploy apps to an App Host and to
manage those apps.
TCP
Bidirectional
between QRadar components.
Normalized flow data that is
communicated from an off-site
source or between QRadar Flow
Collectors.
TCP
Bidirectional
between QRadar components.
Normalized event data that is
communicated from an off-site
source or between QRadar Event
Collectors.
Data flow communication port
between QRadar Event
Collectors when on separate
managed hosts.
26001
Conman
32000
Normalized
flow
forwarding
32004
Normalized
event
forwarding
SOAP web server port for the
Event Collection Service (ECS).
TCP
32005
Data flow
TCP
Bidirectional
between QRadar components.
32006
Ariel queries TCP
Bidirectional
between QRadar components.
Communication port between the
Ariel proxy server and
the Ariel query server.
32007
Offense data TCP
Bidirectional
between QRadar components.
Events and flows contributing to
an offense or involved in global
correlation.
32009
Identity data TCP
Bidirectional
between QRadar components.
Identity data that is communicated
between the passive Vulnerability
Port
Description Protocol
Direction
Requirement
Information Service (VIS) and the
Event Collection Service (ECS).
32010
Flow listening
TCP
source port
Bidirectional
between QRadar components.
Flow listening port to collect data
from QRadar Flow Collectors.
32011
Ariel listening
TCP
port
Bidirectional
between QRadar components.
Ariel listening port for database
searches, progress information,
and other associated commands.
Data flow
32000(flows, events, TCP
33999
flow context)
Bidirectional
between QRadar components.
Data flows, such as events, flows,
flow context, event search queries,
and Docker proxy.
Unidirectional from QRadar to
another QRadar system or 3rd
party flow collector.
Used to map exporter IP and port
combinations to a unique port to
be used to forward flows.
4000040500
QFlow process
New in for flow
7.5.0
forwarding
Update
Package
6
UDP
Collecting incoming packet
capture (PCAP) data from
Juniper Networks SRX Series
appliances.
40799
ICMP
PCAP data
ICMP
UDP
From Juniper Networks SRX Series
Note: The packet capture on your
appliances to QRadar.
device can use a different port. For
more information about
configuring packet capture, see
your Juniper Networks SRX Series
appliance documentation.
Testing the network connection
Bidirectional traffic between the between the secondary host and
secondary host and primary host primary host in an HA cluster by
using Internet Control Message
in an HA cluster.
Protocol (ICMP).
Table 1. Listening ports that are used by QRadar services and components
Viewing IMQ port associations
Several ports that are used by IBM QRadar allocate extra random port numbers. For example,
Message Queues (IMQ) open random ports for communication between components on a managed
host. You can view the random port assignments for IMQ by using telnet to connect to the local host
and doing a lookup on the port number.
Procedure
1. Using SSH, log in to the QRadar Console as the root user.
2. To display a list of associated ports for the IMQ messaging connection, type the following
command:
telnet localhost 7676
The results from the telnet command might look similar to this output:
[root@domain ~]# telnet localhost 7676
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
101 imqbroker 4.4 Update 1
portmapper tcp PORTMAPPER 7676
[imqvarhome=/opt/openmq/mq/var,imqhome=/opt/openmq/mq,sessionid=<session_id
>]
cluster_discovery tcp CLUSTER_DISCOVERY 44913
jmxrmi rmi JMX 0 [url=service:jmx:rmi://domain.ibm.com/stub/<urlpath>]
admin tcp ADMIN 43691
jms tcp NORMAL 7677
cluster tcp CLUSTER 36615
The telnet output shows 3 of the 4 random high-numbered TCP ports for IMQ. The fourth
port, which is not shown, is a JMX Remote Method Invocation (RMI) port that is available
over the JMX URL that is shown in the output.
If the telnet connection is refused, it means that IMQ is not currently running. It is probable
that the system is either starting up or shutting down, or that services were shut down
manually.
Searching for ports in use by QRadar
Use the netstat command to determine which ports are in use on the IBM QRadar Console or
managed host. Use the netstat command to view all listening and established ports on the
system.
Procedure
1. Using SSH, log in to your QRadar Console, as the root user.
2. To display all active connections and the TCP and UDP ports on which the computer is
listening, type the following command:
netstat -nap
3. To search for specific information from the netstat port list, type the following command:
netstat -nap | grep port
Examples:
o
To display all ports that match 199, type the following command:
netstat -nap | grep 199
o
To display information on all listening ports, type the following command:
netstat -nap | grep LISTEN
QRadar public servers
To provide you with the most current security information, IBM QRadar requires access to a
number of public servers.
Public servers
IP address or hostname
Description
IBM QRadar Vulnerability Manager DMZ scanner
194.153.113.31
Important: The IBM QRadar Vulnerability Manager scanner is end of life
(EOL) in 7.5.0 Update Package 6, and is no longer supported in any
version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
QRadar Vulnerability Manager DMZ scanner
194.153.113.32
Important: The IBM QRadar Vulnerability Manager scanner is end of life
(EOL) in 7.5.0 Update Package 6, and is no longer supported in any
version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
QRadar auto-update servers.
autoupdate.qradar.ibmcloud.co For more information about auto-update servers, see QRadar:
Important auto update server changes for
m/
administrators (https://www.ibm.com/support/pages/node/624
4622).
update.xforcesecurity.com
X-Force® Threat Feed update server
license.xforcesecurity.com
X-Force Threat Feed licensing server
Table 1. Public servers that QRadar must access. This table lists descriptions for the IP addresses or
hostnames that QRadar accesses. https://www.ibm.com/support/pages/node/6244622
Docker containers and network interfaces
A Docker network defines a communication trust zone where communication is unrestricted
between containers in that network.
Each network is associated with a bridge interface on the host, and firewall rules are defined
to filter traffic between these interfaces. Typically, containers within a zone that share the
same Docker network and host bridge interface can communicate with each other. An
exception to this general rule is that apps run on the same dockerApps network, but are
isolated from each other by the firewall.
Docker interfaces
To view a list of Docker interfaces, type the following command:
docker network ls
Here's an example of the output:
[root@q1dk00
NETWORK ID
943dd35a4747
9e2ba36111d1
514471d98b42
~]# docker network ls
NAME
DRIVER SCOPE
appProxy bridge local
dockerApps bridge local
dockerInfra bridge local
The dockerApps interface is used to apply rules for communication between apps.
The appProxy interface displays the nginx_framework_apps_proxy container.
The dockerInfra interface is used to host service launcher and qoauth. Apps are
isolated from most infrastructure components but they must be able to connect to service
launcher and qoauth to manage secrets and authorization.
Information about Docker interfaces
Type the following command to get information about Docker interfaces:
docker inspect <docker_container_ID> | grep NetworkMode
Here's an example of the output:
"NetworkMode": "appProxy"
This example shows how you use the docker inspect
<docker_container_ID> command and pipe it to less to view more network details:
docker inspect d9b3e58649de | less
Here's an example of the output:
"Networks": {
"dockerApps": {
"IPAMConfig": null,
"Links": null,
"Aliases": [
"d9b3e58649de"
], "NetworkID":
"79bc4716da5139a89cfa5360a3b72824e67701523768822d11b53caeaa5e349e",
"EndpointID":
"9dba9d9a174b037f72333945b72cdf60c3719fdb9a3a10a14a8ee3cc0e92a856",
"Gateway": "172.18.0.1",
"IPAddress": "172.18.0.2",
"IPPrefixLen": 16,
"IPv6Gateway": "2003:db8:1::1",
"GlobalIPv6Address": "2003:db8:1::2",
"GlobalIPv6PrefixLen": 64,
"MacAddress": "02:42:ac:12:00:02"
}
The output in this example shows the configuration of the network that is used by the
specified container (d9b3e58649de), and shows the Docker network interface name
(dockerApps) and the IP address of the network that is assigned to the Docker container.
TASK: 1.4 Manage configuration and data backups
1.4.1. Understand and configure data retention
1.4.2. Import config backup
• through the GUI
• through file system
1.4.3. Restore config backup options
1.4.4. Schedule config backup
1.4.5. Restore data backup
Backup and recovery
You can back up and recover IBM® QRadar® configuration information and data.
You can use the backup and recovery feature to back up your event and flow data; however, you
must restore event and flow data manually. For more information, see Restoring data.
Each managed host in your deployment, including the QRadar Console, creates and stores all
backup files in the /store/backup/ directory. Your system might include
a /store/backup mount from an external SAN or NAS service. External services provide long
term, offline retention of data, which is commonly required for compliancy regulations, such as PCI.
By default, at midnight QRadar creates a daily backup archive of your configuration information.
The backup archive includes configuration information, data, or both from the previous day
You can use two types of backups: configuration backups and data backups.
Important: Individual QRadar managed hosts do not have their own nightly configuration backup files.
The QRadar Console's configuration backup is a single file that contains a full database backup of all
configuration parameters for all hosts in the deployment. All configuration backups are stored on
the QRadar Console by default.
Configuration backups include the following components:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Application configuration
Assets
Custom logos
Custom rules
Device Support Modules (DSMs)
Event categories
Flow sources
Flow and event searches
Groups
Index management information
License key information
Log sources
Offenses
Reference set elements
Store and Forward schedules
User and user roles information
Vulnerability data (if IBM QRadar Vulnerability Manager is installed)
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0
Update Package 6, and is no longer supported in any version of IBM QRadar. For more
information, see QRadar Vulnerability Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
Data backups include the following information:
•
•
•
•
•
Audit log information
Event data
Flow data
Report data
Indexes
The data backup does not include application data. To configure and manage backups for
application data, see Backing up and restoring app data.
Backup QRadar configurations and data
By default, IBM® QRadar® creates a backup archive of your configuration information daily at
midnight. The backup archive includes your configuration information, data, or both from the
previous day. You can customize this nightly backup and create an on-demand configuration
backup, as required.
Scheduling nightly backup
Use the Backup Recovery Configuration window to configure a night scheduled backup process.
About this task
By default, the nightly backup process includes only your configuration files. You can customize
your nightly backup process to include data from your IBM® QRadar® Console and selected
managed hosts. You can also customize your backup retention period, the backup archive location,
the time limit for a backup to process before timing out, and the backup priority in relation to
other QRadar processes.
Note: The nightly backup starts running at midnight in the timezone where the QRadar Console is installed.
If QRadar automatic updates are scheduled to run at the same time, the performance of QRadar might be
impacted.
The Backup Recovery Configuration window provides the following parameters:
ParameterDescription
General Backup Configuration
Type the location where you want to store your backup file. The default location
is /store/backup. This path must exist before the backup process is initiated. If this
path does not exist, the backup process aborts.
If you modify this path, make sure the new path is valid on every system in your
deployment.
If you change the path to the backup repository, all files in the previous repository
automatically are moved to the new path.
Backup
Repository The directory must match one of the following formats:
Path
•
•
•
•
/store/backup/*
/mount/*
/mnt/*
/home/*
Active data is stored on the /store directory. If you have both active data and backup
archives stored in the same directory, data storage capacity might easily be reached and
your scheduled backups might fail. We recommend you specify a storage location on
another system or copy your backup archives to another system after the backup process
ParameterDescription
is complete. You can use a Network File System (NFS) storage solution in
your QRadar deployment. For more information on using NFS, see the Offboard Storage
Guide.
Type or select the length of time, in days, that you want to store backup files. The default
Backup
Retention is 7 days.
Period
(days)
Nightly
Backup
Schedule
This period of time only affects backup files generated as a result of a scheduled process.
On-demand backups or imported backup files are not affected by this value.
Select a backup option.
This option is only displayed if you select the Configuration and Data Backups option.
Select the All hosts in your deployment are listed. The first host in the list is your Console; it is
managed enabled for data backup by default, therefore no check box is displayed. If you have
hosts you managed hosts in your deployment, the managed hosts are listed below the Console and
would like each managed host includes a check box.
to run data
backups: Select the check box for the managed hosts you want to run data backups on.
For each host (Console or managed hosts), you can optionally clear the data items you
want to exclude from the backup archive.
Configuration Only Backup
Backup
Type or select the length of time, in minutes, that you want to allow the backup to run. The
Time Limit default is 180 minutes. If the backup process exceeds the configured time limit, the backup
(min)
process is automatically canceled.
Backup
Priority
From this list box, select the level of importance that you want the system to place on the
configuration backup process compared to other processes.
A priority of medium or high have a greater impact on system performance.
Data Backup
Backup
Type or select the length of time, in minutes, that you want to allow the backup to run. The
Time Limit default is 1020 minutes. If the backup process exceeds the configured time limit, the backup is
(min)
automatically canceled.
Backup
Priority
From the list, select the level of importance you want the system to place on the data
backup process compared to other processes.
A priority of medium or high have a greater impact on system performance.
Table 1. Backup Recovery Configuration parameters
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Backup and Recovery.
3.
4.
5.
6.
7.
On the toolbar, click Configure.
On the Backup Recovery Configuration window, customize your nightly backup.
Click Save.
Close the Backup Archives window.
On the Admin tab, click Deploy Changes.
Creating an on-demand configuration backup archive
If you must back up your configuration files at a time other than your nightly scheduled backup, you
can create an on-demand backup archive. On-demand backup archives include only configuration
information.
About this task
You initiate an on-demand backup archive during a period when IBM® QRadar® has low
processing load, such as after normal office hours. During the backup process, system performance
is affected.
Procedure
1.
2.
3.
4.
Option
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
From the toolbar, click On Demand Backup.
Enter values for the following parameters:
Description
Type a unique name that you want to assign to this backup archive. The name can be up
to 100 alphanumeric characters in length. The name can contain following characters:
underscore (_), dash (-), or period (.).
DescriptionType a description for this configuration backup archive. The description can be up to
255 characters in length.
Name
5. Click Run Backup.
You can start a new backup or restore processes only after the on-demand backup is
complete. You can monitor the backup archive process in the Backup Archives window.
Creating an email notification for a failed backup
To receive a notification by email about a backup failure on the IBM QRadar Console or
a QRadar Event Processor, create a rule that is based on the system notification message.
Before you begin
You must configure an email server to distribute system notifications in QRadar. For more information,
see Configuring your local firewall.
About this task
If a backup fails, you see one of the following backup failure system notifications:
•
•
•
Backup: requires more disk space
Backup: last Backup exceeded execution threshold
Backup: unable to execute request
Procedure
1.
2.
3.
4.
Click the Offenses tab.
In the Offenses pane, click Rules.
Click Actions > New Event Rule.
In the Rule Wizard, check the Skip this page when running this rules wizard box and
click Next.
5. In the filter box, type the following search query:
when the event QID is one of the following QIDs
Learn more about tests:Figure 1. Rule Wizard event test
6.
7.
8.
9.
Click the green add (+) icon.
In the Rule pane, click the QIDs link.
In the QID/Name field, type Backup:
Select the following QIDs and click Add +:
o Backup requires more disk space
o Backup: last backup exceeded execution threshold
o Backup unable to execute request
Learn more about QIDs:Figure 2. Rule Wizard QIDs
10. Click Submit.
11. In the Rule pane, type the following name for your rule test and click Next:
Backup Failure
12. In the Rule Response section, check the Email box and type the email addresses you want to
notify.
Manage existing backup archives
Use the Backup and Recovery icon on the Admin tab to view and manage all successful backup
archives.
•
Importing a backup archive
Importing a backup archive is useful if you want to restore a backup archive that was
created on another IBM QRadar host.
About this task
If you place a QRadar backup archive file in the /store/backupHost/inbound directory
on the Console server, the backup archive file is automatically imported.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
In the Upload Archive field, click Browse.
Locate and select the archive file that you want to upload. The archive file must
include a .tgz extension.
5. Click Open.
6. Click Upload.
•
Deleting a backup archive
To delete a backup archive file, the backup archive file and the Host Context component
must be located on the same system. The system must also be in communication with
the IBM QRadar Console and no other backup can be in progress.
About this task
If a backup file is deleted, it is removed from the disk and from the database. Also, the entry
is removed from this list and an audit event is generated to indicate the removal.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
In the Existing Backups section, select the archive that you want to delete.
Click Delete.
Restore QRadar configurations and data
Restoring a backup archive is useful if you want to restore previously archived configuration files,
offense data, and asset data on your IBM QRadar system.
Before you restore a backup archive, note the following considerations:
•
•
•
•
You can restore only a backup archive that is created within the same release of software
and its software update level. For example, if you are running QRadar 7.5.0 p1, make sure
that the backup archive is created on the QRadar 7.5.0 p1 Console.
The restore process restores only your configuration information, offense data, and asset
data. For more information, see Restoring data.
If the backup archive originated on a NATed Console system, you can restore only that back
up archive on a NATed system.
You cannot complete a configuration restore on a console in which the IP address matches
the IP address of a managed host in the backup.
Restriction: Your restore might fail if you are taking a configuration from another deployment and run
the qchange_netsetup utility to change the private IP address of the console.
The qchange_netsetup utility modifies the deployed configuration, but not the backup one. When you
perform a restore, the backup configuration is read, and the restore might convert components with the
wrong IP address.
If possible, before you restore a configuration backup, run an on-demand backup to preserve the current
environment. The following description is a high-level view of the configuration restore process:
•
•
•
•
•
•
Tomcat is shut down
All system processes are shut down.
All files are extracted from the backup archive and restored to disk.
Database tables are restored.
All system processes are restored.
Tomcat is restarted.
Important:
•
•
If you are restoring WinCollect data, you must install the WinCollect SFS that matches the
version of WinCollect in your backup before you restore the configuration. For more
information, see WinCollect files are not restored during a configuration restore
When you do a cross deployment restore or when you restore after a factory reinstall, the
managed host that is attached to the original console is automatically pointed to the newly
restored deployment. However, any changes before the restore regarding deployment (add
or remove managed hosts), causes the restore process to fail.
For more information about how to back up or restore an archive, see the following topics.
•
Restoring a backup archive
You can restore a backup archive. Restoring a backup archive is useful if you have a system
hardware failure or you want to restore a backup archive on a replacement appliance.
About this task
You can restart the Console only after the restore process is complete.
The restore process can take up to several hours; the process time depends on the size of the
backup archive that must be restored. When complete, a confirmation message is displayed.
A window provides the status of the restore process. This window provides any errors for
each host and instructions for resolving the errors.
The following parameters are available in the Restore a Backup window:
Parameter
Description
Name
The name of the backup archive.
Description The description, if any, of the backup archive.
The type of backup. Only configuration backups can be restored, therefore, this parameter
displays config.
Type
Select All
When selected, this option indicates that all configuration items are included in the
Configuration
restoration of the backup archive.
Items
Lists the configuration items to include in the restoration of the backup archive. To
Restore
Configurationremove items, you can clear the check boxes for each item you want to remove or
clear the Select All Configuration Items check box.
Select All
Data Items
When selected, this option indicates that all data items are included in the restoration
of the backup archive.
Lists the configuration items to include in the restoration of the backup archive. All
Restore Data items are cleared by default. To restore data items, you can select the check boxes for
each item you want to restore.
Table 1. Restore a Backup parameters
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
Select the archive that you want to restore.
Click Restore.
On the Restore a Backup window, configure the parameters.
Select the Custom Rules Configuration check box to restore the rules and reference
data that is used by apps. Select the Users Configuration check box to restore
authorized tokens that are used by apps.
The following table lists the restore configurations and what is included in each:
Note: The content included in each configuration is not limited to the content that is
listed.
Restore
ConfigurationContent Included
Custom Rules
Configuration
o
o
o
Rules
Reference Sets
Reference Data
Restore
ConfigurationContent Included
o
o
o
o
o
o
o
Saved Searches
Forwarding Destinations
Routing Rules
Custom Properties
Historical Searches
Historical Rules
Retention Bucket Configuration
Deployment All content.
Configuration
If you select this option, it is recommended that you select all other
configuration options.
Users
o Users
Configuration
o User Roles
o Security Profiles
o Authorized Services
o Dashboards
o User Settings
o User Quick Searches
License
Report
Templates
System
Settings
o
o
o
License keys
License Pool Allocations
License history
Report templates
This does not include generated report content.
o System Settings
o Asset Profiler Configuration
QVM Scan
QVM Scan profiles and results
profiles and
Important: The IBM® QRadar® Vulnerability Manager scanner is end of life
results
(EOL) in 7.5.0 Update Package 6, and is no longer supported in any version
of IBM QRadar. For more information, see QRadar Vulnerability Manager:
End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
Installed
App configurations
Applications
ConfigurationThis does not include app data.
Apps depending on authorized services might not work as expected
if Users Configuration is not selected.
When Installed Applications Configuration is selected,
the Deployment Configuration group is auto-selected.
Restore
ConfigurationContent Included
Assets
Offenses
Asset model
When Assets is selected, the Deployment Configuration group is
auto-selected.
o Offense data
o Offense associations (for example, QID links, rule links, or asset
links)
o Offense searches
o When Offenses is selected, the Deployment Configuration group
is auto-selected.
Important:
When you restore to another system where only partial options are
restored and rules are restored but related offenses are not. For
example, when you restore deployment configuration without
offenses.
When you are restoring to a new or rebuilt system and if you had rules
that created offenses that were indexed on custom properties of the
system that the backup was created on, restore the offenses so that the
offense types (offense indexed fields) are restored correctly.
If this is not done, you need to edit any rules that create offenses
indexed on custom properties and re-link them to the correct property
again.
The following default normalized fields are not affected by this.
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
Source IP
Destination IP
QID
Username
Source MAC
Destination MAC
Device
Hostname
Source port
Destination port
Source IPV6
Destination IPV6
Source ASN
Destination ASN
Rule
Application ID
Source identity
Restore
ConfigurationContent Included
o
o
Destination identity
Search result
6.
7.
8.
9.
Click Restore.
Click OK.
Click OK.
Choose one of the following options:
o If the user interface was closed during the restore process, open a web
browser and log in to IBM QRadar.
o If the user interface was not closed, the login window is displayed. Log in
to QRadar.
10. Follow the instructions on the status window.
What to do next
After you verify that your data is restored to your system, ensure that your DSMs,
vulnerability assessment (VA) scanners, and log source protocols are also restored.
If the backup archive originated on an HA cluster, you must click Deploy Changes to
restore the HA cluster configuration after the restore is complete. If disk replication is
enabled, the secondary host immediately synchronizes data after the system is restored.
If the secondary host was removed from the deployment after a backup, the secondary
host displays a failed status on the System and License Management window.
Restoring a backup archive created on a different QRadar system
Each backup archive includes the IP address information of the system where it was created. When
you restore a backup archive from a different IBM QRadar system, the IP address of the backup
archive and the system that you are restoring are mismatched. You can correct the mismatched IP
addresses.
About this task
You can restart the Console only after the restore process is complete. The restore process can take
up to several hours; the process time depends on the size of the backup archive that must be
restored. When complete, a confirmation message is displayed.
A window provides the status of the restore process, and provides any errors for each host and
instructions for resolving the errors.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
Select the archive that you want to restore, and click Restore.
On the Restore a Backup window, configure the following parameters and then
click Restore.
Parameter
Description
Select All
Configuration Items
Indicates that all configuration items are included in the restoration of the
backup archive. This checkbox is selected by default.
Restore Configuration Lists the configuration items to include in the restoration of the
backup archive. All items are selected by default.
Select All Data Items Indicates that all data items are included in the restoration of the
backup archive. This checkbox is selected by default.
Lists the configuration items to include in the restoration of the
Restore Data
backup archive. All items are cleared by default.
Table 1. Restore a Backup parameters
5. Stop the IP table service on each managed host in your deployment. The IP tables is
a Linux®-based firewall.
a. Using SSH, log in to the managed host as the root user.
b. For App Host, type the following commands:
systemctl stop docker_iptables_monitor.timer
systemctl stop iptables
c. For all other managed hosts, type the following command:
service iptables stop
d. Repeat for all managed hosts in your deployment.
6. Ensure that the power is off on the original QRadar console that the backup was taken from.
7. On the Restore a Backup window, click Test Hosts Access.
8. After testing is complete for all managed hosts, verify that the status in the Access
Status column indicates a status of OK.
9. If the Access Status column indicates a status of No Access for a host, stop iptables again,
and then click Test Host Access again to attempt a connection.
10. On the Restore a Backup window, configure the parameters.
Important: By selecting the Installed Applications Configuration checkbox, you restore
the install app configurations only. Extension configurations are not restored. Select
the Deployment Configuration checkbox if you want to restore extension configurations.
11. Click Restore.
12. Click OK.
13. Click OK to log in.
14. Choose one of the following options:
a. If the user interface was closed during the user restore process, open a web browser
and log in to QRadar.
b. If the interface was not closed, the login window is displayed. Log in to QRadar.
15. View the results of the restore process and follow the instructions to resolve any errors.
16. Refresh your web browser window.
17. From the Admin tab, select Advanced > Deploy Full Configuration.
QRadar continues to collect events when you deploy the full configuration. When the event
collection service must restart, QRadar does not restart it automatically. A message displays
that gives you the option to cancel the deployment and restart the service at a more
convenient time.
18. To enable the IP tables for an App Host, type the following command:
systemctl start docker_iptables_monitor.timer
What to do next
After you verify that your data is restored to your system, you must reapply RPMs for any DSMs,
vulnerability assessment (VA) scanners, or log source protocols.
If the backup archive originated on an HA cluster, you must click Deploy Changes to restore the HA
cluster configuration after the restore is complete. If disk replication is enabled, the secondary host
immediately synchronizes data after the system is restored. If the secondary host was removed
from the deployment after a backup, the secondary host displays a failed status on the System and
License Management window.
Restoring data
You can restore the data on your IBM QRadar Console and managed hosts from backup files. The
data portion of the backup files includes information such as source and destination IP address
information, asset data, event category information, vulnerability data, flow data, and event data.
Each managed host in your deployment, including the QRadar Console, creates all backup files in
the /store/backup/ directory. Your system might include a /store/backup mount from an
external SAN or NAS service. External services provide long term, offline retention of data, which is
commonly required for compliancy regulations, such as PCI.
Before you begin
Restriction: If you are restoring data on a new QRadar Console, the configuration backup must be restored
before you restore the data backup.
Ensure that the following conditions are met:
•
•
•
•
You know the location of the managed host where the data is backed up.
If your deployment includes a separate mount point for that volume,
the /store or /store/ariel directory has sufficient space for the data that you want to
recover.
You know the date and time for the data that you want to recover.
If your configuration has been changed, before you restore the data backup, you must
restore the configuration backup.
Procedure
1. Use SSH to log in to IBM QRadar as the root user.
2. Go to the /store/backup directory.
3. To list the backup files, type the following command:
ls -l
4. If backup files are listed, go to the root directory by typing the following command:
cd /
Important: The restored files must be in the /store directory. If you type cd instead of cd
/, the files are restored to the /root/store directory.
5. To extract the backup files to their original directory, type the following command:
tar -zxpvPf /store/backup/backup.name.hostname_hostID .target
date.backup type.timestamp.tgz
File name variable Description
name
The name of the backup.
File name variable Description
hostname_hostID
The name of the QRadar system that hosts the backup file followed by the
identifier for the QRadar system.
target date
The date that the backup file was created. The format of the target date
is day_month_year.
backup type
The options are data or config.
timestamp
The time that the backup file was created.
Table 1. Description of file name variables
Results
Daily backup of data captures all data on each host. If you want to restore data on a managed host
that contains only event or flow data, only that data is restored to that host. If you want to maintain
the restored data, increase your data retention settings to prevent the nightly disk maintenance
routines from deleting your restored data.
Verifying restored data
Verify that your data is restored correctly in IBM QRadar.
Procedure
1. To verify that the files are restored, review the contents of one of the restored directories by
typing the following command:
cd /store/ariel/flows/payloads/<yyyy/mm/dd>
cd /store/ariel/events/payloads/<yyyy/mm/dd>
You can view the restored directories that are created for each hour of the day. If directories
are missing, data might not be captured for that time period.
2. Verify that the restored data is available.
a. Log in to the QRadar interface.
b. Click the Log Activity or Network Activity tab.
c. Select Edit Search from the Search list on the toolbar.
d. In the Time Range pane of the Search window, select Specific Interval.
e. Select the time range of the data you restored and then click Filter.
f. View the results to verify the restored data.
g. If your restored data is not available in the QRadar interface, verify that data is
restored in the correct location and file permissions are correctly configured.
Restored files must be in the /store directory. If you typed cd instead of cd
/ when you extracted the restored files, check the /root/store directory for the
restored files. If you did not change directories before you extracted the restored
files, check the /store/backup/store directory for the restored files.
Typically, files are restored with the original permissions. However, if the files are not
owned by the root user account, issues might occur. The correct ownership of
directories and files
in /store/ariel/events/payloads and /store/ariel/flows/payloads
is root:root. If the files and folders do not have the correct ownership, change the
ownership by using the chown command.
The correct permissions of directories and files
in /store/ariel/events/payloads and /store/ariel/flows/payloads
is 755 for folders, and 644 for files. If the files and folders do not have the correct
permissions, change the permissions by using the chmod command.
What to do next
After you verified that your data is restored, you must complete an auto update in QRadar. The auto
update ensures DSMs, vulnerability assessment (VA) scanners, and log source protocols are at the
latest version. For more information, see c_tuning_guide_deploy_dsmupdates.html.
Retrieving backup files missing from the disk
When the backup files are missing from the disk, the respective backup table entry on the Backup
and Recovery page is marked with an exclamation icon to show that the file is not retrievable. Files
that are missing cannot be downloaded or restored. This issue can occur when you are using
external storage that is no longer available, or is offline.
Procedure
1. On the Admin tab, click Backup and Recovery.
2. If the external storage is offline or no longer available, delete the table entry by using
the Delete option at the top of the Backup and Recovery page.
Note: If you are not expecting this behavior and are using external storage for your backup
archive location, investigate whether the storage system is still accessible. If it is offline, and
you are able to restore the directory, the indicator icons are automatically updated and
removed when the system detects the restored files.
3. On the Backup and Recovery page, click Configure and take note of the Backup
Repository Path.
4. Log out of QRadar® and log back in to ensure that the files are again accessible by fixing the
external mount or restoring missing files to the appropriate backup location.
5. Refresh the Backup and Recovery page to synchronize the backups.
WinCollect files are not restored during a configuration restore
When you complete a configuration restore and some WinCollect files are not restored, it might be
because the installation ISO contains a previous version of WinCollect.
The QRadar® ISO contains a built-in version of WinCollect. When you restore by using that ISO,
it deploys the WinCollect files that are stored in that ISO, rather than the files from your
backup.
To remedy this issue, you must install the WinCollect SFS that matches the version
of WinCollect in your backup before you restore the configuration. Perform the following
tasks in this order:
1. Perform QRadar backup.
2. Bring new hardware online and deploy the ISO.
3. Install the WinCollect SFS that matches the version of WinCollect in your backup on the
Console.
4. Restore the configuration backup.
The appropriate WinCollect files are deployed with the configuration restore.
Backup and restore applications
IBM QRadar provides a way to backup and restore application configurations separate from the
application data.
Application configurations are backed up as part of the nightly configuration backup. The
configuration backup includes apps that are installed on the QRadar Console and on an App
Host. You can restore the application configuration by selecting the Installed Applications
Configuration option when you restore a backup.
Application data is backed up separate from the application configuration by using an easy-touse script that runs nightly. You can also use the script to restore the app data, and to
configure backup times and data retention periods for app data.
•
Backing up and restoring apps
Use the IBM QRadar Backup and Recovery window on the Admin tab to back up and restore
apps.
About this task
You can back up your apps by creating a configuration backup. For information on backing
up your apps, see Backup QRadar configurations and data. A configuration backup does not
back up your app's data. For information on backing up your app's data, see Backing up and
restoring app data.
If an App Host is attached to your QRadar Console, the App Host's configuration is backed up
as part of the console's Deployment Configuration. You cannot restore an App Host on
a QRadar Console with a different IP address than the App Host was initially configured with.
Commented [LER1]: Aquí y hay que vlaidar si esta ien la
gia
By default, apps are restored to console unless an App Host is present. If QRadar cannot
restore apps to your App Host, it attempts to back restore them to the QRadar Console. The
number of App Host apps that can be restored onto the console is constrained by the amount
of memory that is available on the QRadar Console. Apps that are defined as node_only in
their application manifest file cannot be restored to the QRadar Console.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
Select an existing backup in the Backup and Recovery window and click Restore.
Ensure that the Installed Applications Configuration check box is selected, and
click Restore.
Note: By selecting the Installed Applications Configuration check box, you restore
the install app configurations only. Extension configurations are not restored. Select
the Deployment Configuration check box if you want to restore extension
configurations.
•
Backing up and restoring app data
Use the app-volume-backup.py script to back up and recover app data.
About this task
A configuration backup that you do on the backup and Recovery window does not back up
your apps' data. The /opt/qradar/bin/app-volume-backup.py script runs nightly at
2:30 AM, and backs up each installed application's /store mounted volume. By default,
data is retained for 7 days.
Use the script to do the following tasks:
•
•
•
•
Back up data manually for installed apps.
List all installed app data backups on the system.
Restore data for installed apps.
Run the retention process and set the retention period for backups.
This script is on both the QRadar® Console and the App Host if one is installed. The script
backs up app data only if apps are on the current host.
Procedure
1. Use SSH to log in to your Console or your App Host as the root user.
2. Go to the /opt/qradar/bin/ directory.
o Use the following command to back up app data:
./app-volume-backup.py backup
The app-volume-backup.py script runs nightly at 2:30 AM local time to
back up all installed apps. Backup archives are stored in
the /store/apps/backup folder. You can change the backup archives
location by editing the APP_VOLUME_BACKUP_DIR variable
in /store/configservices/staging/globalconfig/nva.conf.
You must deploy changes after you edit this variable.
o
To view all data backups for installed apps, enter the following command:
./app-volume-backup.py ls
This command outputs all backup archives that are stored in the backup
archives folder.
o
To restore a backup archive, enter the following command:
./app-volume-backup.py restore -i
<backup_name>
Use the ls command to find the name of a backup archive.
o
New in 7.5.0To restore data for a specific application instance, rather than
restoring all instances, enter the following command:
./app-volume-backup.py restore-interactive -i
<backup name>
Note: This function was added in QRadar 7.5.0 Update Package 1, and works
only with backups that were created after updating to 7.5.0 Update Package 1.
o
New in 7.5.0 Update Package 6To backup data for an individual application
instance, enter the following command:
/opt/qradar/bin/app-volume-backup.py backup -u
<app definition
uuid>
In a multitenant deployment, you must specify the security profile associated
with the application instance that you want to backup. For
example, /opt/qradar/bin/app-volume-backup.py backup -u <app
definition uuid> -s <security profile id>
o
New in 7.5.0 Update Package 6To restore data for an individual application
instance, enter the following command:
/opt/qradar/bin/app-volume-backup.py restore -i
<backup
tarball> -n -u <app definition uuid>
In a multitenant deployment, you must specify the security profile associated
with the application instance that you want to restore. For
example, /opt/qradar/bin/app-volume-backup.py restore -i <backup
tarball> -n -u <app definition uuid> -s <security profile
id>
o
By default, all backup archives are retained for one week. The retention
process runs nightly at 2:30 AM local time with the backup.
▪ To perform retention manually, and use the default retention period,
enter the following command:
./app-volume-backup.py retention
▪
You can also set the retention period manually by adding -t (time defaults to 1) and -p (period - defaults to 0) switches.
The -p switch accepts three values: 0 for a week, 1 for a day, and 2 for
an hour.
For example, to set the retention period for a backup to 3 weeks, enter
the following command:
./app-volume-backup.py retention -t 3 -p 0
o
If you want to change the retention time that is used by the nightly timer, add
flags to the retention command found in the following systemd service file.
/usr/lib/systemd/system/app-data-backup.service
For example, to change the retention period that is used by the nightly
retention process to 5 days, locate the following line:
ExecStart=/opt/qradar/bin/app-volume-backup.py retention
Replace it with:
ExecStart=/opt/qradar/bin/app-volume-backup.py retention -t 5 -p 1
Save your changes, and run the systemctl daemon-reload command for
systemd to apply the changes.
3. App containers are restarted automatically after the restore is complete.
Data redundancy and recovery in QRadar deployments
To safeguard from data loss, configure your deployments to include data redundancy and recovery
functionality. Data Synchronization is possible when you have two identical QRadar systems in
separate geographic environments that are a mirror of each other, and data is synchronized at both
sites. Forwarding data uses off-site forwarding, which is set up on both the primary and secondary
deployments. You can set up data synchronization with deployments that are in different
geographical locations.
Data Synchronization App
Implement the Data Synchronization app to safeguard your IBM® QRadar® configurations and
data by mirroring your data to another identical QRadar system. Recovery from a data loss is
possible when you have two identical QRadar systems in separate geographic environments that
are a mirror of each other, and data is collected at both sites. To learn more about the Data
Synchronization app, see Redundancy and recovery for QRadar deployments.
If you do not meet the requirements for the Data Synchronization app, the following are
some alternative solutions. Recovery from data loss is possible when you forward live data,
for example, flows and events from a primary QRadar system, to a parallel system at another
site.
Primary QRadar Console and backup console
A hardware failure solution, where the backup console is a copy of the primary server, with
the same configuration but stays powered off. Only one console is operational at any one
time. If the primary console fails, you manually turn the power on the backup console,
apply the primary configuration backup, and use the IP address from the primary console.
After you restore the primary server and before you turn it on, you manually turn off the
backup server. If the system is down for a long time, apply the backup console
configuration backup to the primary server.
Event and flow forwarding
Events and flows are forwarded from a primary site to a secondary site. Identical
architectures in two separate data centers are required.
Distributing the same events and flows to the primary and secondary sites
Distribute the same event and flow data to two live sites by using a load balancer or other
method to deliver the same data to mirrored appliances. Each site has a record of the log
data that is sent.
•
Primary QRadar Console and backup QRadar Console
When the primary QRadar Console fails and you want the backup QRadar Console to
take up the role of the primary, you manually turn the power on the backup console,
apply the configuration backup and the IP address from the primary. Use a similar
switchover method for other appliances such as a QRadar Flow Collector or an Event
Collector, where each appliance has a cold backup or spare that is an identical
appliance.
The backup console takes over the primary QRadar Console role from the time of activation,
and does not store past events, flow, or offenses from the original primary QRadar Console.
Use this type of deployment for your appliances, to minimize downtime, when there is a
hardware failure.
•
•
•
A backup console requires its own dedicated license key (matching the EPS
and FPM values of the primary console).
The backup console uses a standard appliance Activation key.
The license configuration of the backup console needs to match the values of
the primary QRadar Console; this includes the EPS and FPS values of the
primary QRadar Console.
Example: If the primary QRadar Event Processor was licensed for 15K EPS,
the redundant backup console should also be licensed for 15K EPS.
•
•
•
There are special failover upgrade parts that need to be purchased for the
backup console.
From a technical perspective, the license for both primary and backup
consoles are identical, however for compliance reasons the backup console
(and associated license) cannot not be processing live data unless a failure has
occurred with the primary QRadar Console.
Data collected by the backup console will need to be copied back to the
Primary console when the Primary console once again becomes functional.
If the primary fails, take the following steps to set up the backup console as the
primary QRadar Console:
1. Power on the backup console.
2. Add the IP address from the primary console.
3. Restore configuration backup data from the primary console to the backup
console.
The backup console functions as the primary console until the primary console is
brought back online. Ensure that both servers are not online at the same time.
•
Configuring the IP address on the backup console
When the primary QRadar Console fails, you configure the secondary backup
console to take on the primary console role. Add the IP address of the
failed QRadar Console to the backup console so that your QRadar system
continues to function.
Procedure
1. Use SSH to log in to as the root user.
2. To configure the IP address on the backup console, follow these steps:
a. Type the following command:
qchange_netsetup
Note: Verify all external storage which is not /store/ariel or
/store is not mounted.
•
Backup and recovery
Back up your IBM® QRadar configuration information and data so that you
can recover from a system failure or data loss.
Use the backup and recovery that is built-in to QRadar to back up your
data. However, you must restore the data manually. By
default, QRadar creates a daily backup archive of your configuration
information at midnight. The backup archive includes configuration
information, generated data, or both from the previous day.
You can create the following types of backup:
•
•
•
Configuration backups, which include system configuration data, for
example, assets and log sources in your QRadar deployment.
Data backups, which include information that is generated by a
working QRadar deployment such as log information or event dates.
Event and flow forwarding from a primary data center to another data center
To ensure that there is a redundant data store for events, flows, offenses, and that there is an
identical architecture in two separate data centers, forward event and flow data from site 1
to site 2.
The following information is provided only for general guidance and is not intended or
designed as a how-to guide.
This scenario is dependent upon site 1 remaining active. If site 1 fails, data is not
transmitted to Site 2, but the data is current up to the time of failure. In the case of
failure at site 1, you implement recovery of your data, by manually changing IP
addresses and use a backup and restore to fail over from site 1 to site 2, and to switch
to site 2 for all QRadar® hosts.
The following list describes the setup for event and flow forwarding from the primary
site to the secondary site:
•
•
•
There is an identical distributed architecture in two separate data centers, which
includes a primary data center and a secondary data center.
The primary QRadar Console is active and collecting all events and flows from log
sources and is generating correlated offenses.
You configure off-site targets on the primary QRadar Console to enable forwarding of
event and flow data from the primary data center to the event and flow processors in
another data center.
Fast path: Use routing rules instead of off-site targets because the setup is easier.
•
Periodically, use the content management tool to update content from the
primary QRadar Console to the secondary QRadar Console.
For more information about forwarding destinations and routing rules, see the IBM
QRadar Administration Guide.
In the case of a failure at site 1, you can use a high-availability (HA) deployment to
trigger an automatic failover to site 2. The secondary HA host on site 2 takes over the
role of the primary HA host on site 1. Site 2 continues to collect, store, and process
event and flow data. Secondary HA hosts that are in a standby state don't have services
that are running but data is synchronized if disk replication is enabled. For more
information about HA deployment planning, see HA deployment planning.
Note: You can use a load balancer to divide events, and split flows such as NetFlow, J-Flow, and sFlow
but you can't use a load balancer to split QFlows. Use external technologies such as a regenerative tap
to divide QFlow and send to the backup site.
The following diagram shows how site 2 is used as a redundant data store for site 1.
Event and flow data are forwarded from site 1 to site 2.
Figure 1. Event and flow forwarding from site 1 to site 2 for disaster recovery
•
Event and flow forwarding configuration
For data redundancy, configure IBM® QRadar systems to forward data from one site to a
backup site.
The target system that receives the data from QRadar is known as a forwarding
destination. QRadar systems ensure that all forwarded data is unaltered. Newer
versions of QRadar systems can receive data from earlier versions
of QRadar systems. However, earlier versions cannot receive data from later
versions. To avoid compatibility issues, upgrade all receivers before you
upgrade QRadar systems that send data. Follow these steps to set up forwarding:
1. Configure one or more forwarding destinations.
A forwarding destination is the target system that receives the event and flow
data from the IBM QRadar primary console. You must add forwarding
destinations before you can configure bulk or selective data forwarding. For more
information about forwarding destinations, see the IBM QRadar Administration
Guide.
2. Configure routing rules, custom rules, or both.
After you add one or more forwarding destinations for your event and flow data,
you can create filter-based routing rules to forward large quantities of data. For
more information about routing rules, see the IBM QRadar Administration Guide.
3. Configure data exports, imports, and updates.
You use the content management tool to move data from your primary QRadar
Console to the QRadar secondary console. Export security and configuration
content from IBM QRadar into an external, portable format.
•
Load balancing of events and flows between two sites
When you are running two live IBM QRadar deployments at both a primary and secondary
site, you send event and flow data to both sites. Each site has a record of the log data that is
sent. Use the content management tool to keep the data synchronized between the
deployments
The following diagram shows two live sites, where data from each site is replicated to
the other site.
Figure 1. Load balancing of events and flows between two sites
•
Restoring configuration data from the primary to the secondary QRadar Console
After you set up the secondary QRadar Console as the destination for the logs, you either add
or import a backup archive from the primary QRadar Console. You can restore a backup
archive that is created on another QRadar host. Log in to the secondary QRadar Console and
do a full restore of the primary console backup archive to the secondary QRadar Console.
•
Event and flow data redundancy
Send the same events and flows to separate data centers or geographically separate sites
and enable data redundancy by using a load balancer or other method to deliver the same
data to mirrored appliances.
Backup and Restore the QRadar Analyst Workflow
If you need to restore QRadar Analyst Workflow to a different QRadar console, you must
reinstall QRadar Analyst Workflow after the QRadar restore.
Data back up and restore
You can use a command-line interface (CLI) script to back up data that is stored on IBM® QRadar®
SIEM Console managed hosts.
You can use the CLI script to restore IBM QRadar Risk Manager after a data failure or hardware
failure on the appliance.
A backup script is included in QRadar Risk Manager, which can be scheduled by using crontab. The
script automatically creates a daily archive of QRadar Risk Manager data at 3:00 AM. By
default, QRadar Risk Manager keeps the last five backups. If you have network or attached storage,
you must create a cron job to copy QRadar Risk Manager back archives to a network storage
location.
The backup archive includes the following data:
•
•
•
•
•
QRadar Risk Manager device configurations
Connection data
Topology data
Policy Monitor questions
QRadar Risk Manager database tables
For information about migrating from QRadar Risk Manager Maintenance Release 5 to this current
release, see the IBM QRadar Risk Manager Migration Guide.
Prerequisites for backing up and restoring data
You must understand how data is backed up, stored, and archived before you back up and restore
your data.
Data backup location
Data is backed up in the /store/qrm_backups local directory. Your system might include a
mount /store/backup from an external SAN or NAS service. External services provide long-term
offline retention of data. Long-term storage might be required for compliance regulations, such as
Payment Card Industry (PCI) standards.
Appliance version
The version of the appliance that created the backup in the archive is stored. A backup can be
restored only in an IBM® QRadar® Risk Manager appliance if it is the same version.
Data backup frequency and archival information
Daily data backups are created at 3:00 AM. Only the last five backup files are stored. A backup
archive is created if there is enough free space on QRadar Risk Manager.
Format of backup files
Use the following format to save backup files:
backup-<target date>-<timestamp>.tgz
Where, <target date> is the date that the backup file was created.
The format of the target date is <day>_<month>_<year>. <timestamp> is the time that the
backup file was created.
The format of the time stamp is <hour>_<minute>_<second>.
Backing up your data
Automatic backup occurs daily, at 3:00 AM, or you can start the backup process manually.
Procedure
1. Using SSH, log in your IBM® QRadar® SIEM Console as the root user.
2. Using SSH from the QRadar Console, log in to QRadar Risk Manager as the root user.
3. Start a QRadar Risk Manager backup by typing the following command:
/opt/qradar/bin/dbmaint/risk_manager_backup.sh
Results
The script that is used to start the backup process might take several minutes to start.
The following message is an example of the output that is displayed, after the script completes the backup
process:
Fri Sep 11 10:14:41 EDT 2015
- Risk Manager Backup complete,
wrote /store/qrm_backups/backup-2015-09-11-10-14-39.tgz
Restoring data
You can use a restore script to restore data from a QRadar Risk Manager backup.
Before you begin
The QRadar Risk Manager appliance and the backup archive must be the same version of QRadar Risk
Manager. If the script detects a version difference between the archive and the QRadar Risk
Manager managed host, an error is displayed.
About this task
Use the restore script to specify the archive that you are restoring to QRadar Risk Manager. This
process requires you to stop services on QRadar Risk Manager. Stopping services logs off all QRadar
Risk Manager users and stops multiple processes.
The following table describes the parameters that you can use to restore a backup archive.
OptionDescription
-f
Overwrites any existing QRadar Risk Manager data on your system with the data in the restore file.
Selecting this parameter allows the script to overwrite any existing device configurations in
Configuration Source Management with the device configurations from the backup file.
-w
Do not delete directories before you restore QRadar Risk Manager data.
-h
The help for the restore script.
Table 1. Parameters used to restore a backup archive to QRadar Risk Manager
Procedure
1.
2.
3.
4.
Using SSH, log in your IBM® QRadar SIEM Console as the root user.
Using SSH from the QRadar SIEM Console, log in to QRadar Risk Manager as the root user.
Stop hostcontext by typing systemctl stop hostcontext.
Type the following command to restore a backup archive to QRadar Risk Manager:
/opt/qradar/bin/risk_manager_restore.sh -r /store/qrm_backups/<backup>.
Where <backup> is the QRadar Risk Manager
archive that you want to restore.
For example, backup-2012-09-11-10-14-39.tgz.
5. Start hostcontext by typing systemctl start hostcontext.
Scheduling nightly backup
Use the Backup Recovery Configuration window to configure a night scheduled backup process.
About this task
By default, the nightly backup process includes only your configuration files.
Note: The nightly backup starts running at midnight in the timezone where the QRadar Console is installed.
If QRadar automatic updates are scheduled to run at the same time, the performance of QRadar might be
impacted.
The Backup Recovery Configuration window provides the following parameters:
ParameterDescription
General Backup Configuration
Type the location where you want to store your backup file. The default location
is /store/backup. This path must exist before the backup process is initiated. If this
path does not exist, the backup process aborts.
If you modify this path, make sure the new path is valid on every system in your
deployment.
If you change the path to the backup repository, all files in the previous repository
automatically are moved to the new path.
The directory must match one of the following formats:
Backup
Repository
• /store/backup/*
Path
•
•
•
/mount/*
/mnt/*
/home/*
Active data is stored on the /store directory. If you have both active data and backup
archives stored in the same directory, data storage capacity might easily be reached and
your scheduled backups might fail. We recommend you specify a storage location on
another system or copy your backup archives to another system after the backup process
is complete. You can use a Network File System (NFS) storage solution in
your QRadar deployment. For more information on using NFS, see the Offboard Storage
Guide.
Type or select the length of time, in days, that you want to store backup files. The default
Backup
Retention is 7 days.
Period
(days)
This period of time only affects backup files generated as a result of a scheduled process.
On-demand backups or imported backup files are not affected by this value.
ParameterDescription
Nightly
Backup
Schedule
Select a backup option.
This option is only displayed if you select the Configuration and Data Backups option.
Select the All hosts in your deployment are listed. The first host in the list is your Console; it is
managed enabled for data backup by default, therefore no check box is displayed. If you have
hosts you managed hosts in your deployment, the managed hosts are listed below the Console and
would like each managed host includes a check box.
to run data
backups: Select the check box for the managed hosts you want to run data backups on.
For each host (Console or managed hosts), you can optionally clear the data items you
want to exclude from the backup archive.
Configuration Only Backup
Backup
Type or select the length of time, in minutes, that you want to allow the backup to run. The
Time Limit default is 180 minutes. If the backup process exceeds the configured time limit, the backup
(min)
process is automatically canceled.
Backup
Priority
From this list box, select the level of importance that you want the system to place on the
configuration backup process compared to other processes.
A priority of medium or high have a greater impact on system performance.
Data Backup
Backup
Type or select the length of time, in minutes, that you want to allow the backup to run. The
Time Limit default is 1020 minutes. If the backup process exceeds the configured time limit, the backup is
(min)
automatically canceled.
Backup
Priority
From the list, select the level of importance you want the system to place on the data
backup process compared to other processes.
A priority of medium or high have a greater impact on system performance.
Table 1. Backup Recovery Configuration parameters
Procedure
1.
2.
3.
4.
5.
6.
7.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
On the toolbar, click Configure.
On the Backup Recovery Configuration window, customize your nightly backup.
Click Save.
Close the Backup Archives window.
On the Admin tab, click Deploy Changes.
Backup QRadar configurations and data
By default, IBM® QRadar® creates a backup archive of your configuration information daily at
midnight.
Scheduling nightly backup
Use the Backup Recovery Configuration window to configure a night scheduled backup process.
Use the Backup Recovery Configuration window to configure a night scheduled backup process.
About this task
By default, the nightly backup process includes only your configuration files.
Note: The nightly backup starts running at midnight in the timezone where the QRadar Console is installed.
If QRadar automatic updates are scheduled to run at the same time, the performance of QRadar might be
impacted.
The Backup Recovery Configuration window provides the following parameters:
ParameterDescription
General Backup Configuration
Type the location where you want to store your backup file. The default location
is /store/backup. This path must exist before the backup process is initiated. If this
path does not exist, the backup process aborts.
If you modify this path, make sure the new path is valid on every system in your
deployment.
If you change the path to the backup repository, all files in the previous repository
automatically are moved to the new path.
The directory must match one of the following formats:
Backup
Repository
• /store/backup/*
Path
•
•
•
/mount/*
/mnt/*
/home/*
Active data is stored on the /store directory. If you have both active data and backup
archives stored in the same directory, data storage capacity might easily be reached and
your scheduled backups might fail. We recommend you specify a storage location on
another system or copy your backup archives to another system after the backup process
is complete. You can use a Network File System (NFS) storage solution in
your QRadar deployment. For more information on using NFS, see the Offboard Storage
Guide.
ParameterDescription
Type or select the length of time, in days, that you want to store backup files. The default
Backup
Retention is 7 days.
Period
This period of time only affects backup files generated as a result of a scheduled process.
(days)
On-demand backups or imported backup files are not affected by this value.
Nightly
Backup
Schedule
Select a backup option.
This option is only displayed if you select the Configuration and Data Backups option.
Select the All hosts in your deployment are listed. The first host in the list is your Console; it is
managed enabled for data backup by default, therefore no check box is displayed. If you have
hosts you managed hosts in your deployment, the managed hosts are listed below the Console and
would like each managed host includes a check box.
to run data
backups: Select the check box for the managed hosts you want to run data backups on.
For each host (Console or managed hosts), you can optionally clear the data items you
want to exclude from the backup archive.
Configuration Only Backup
Backup
Type or select the length of time, in minutes, that you want to allow the backup to run. The
Time Limit default is 180 minutes. If the backup process exceeds the configured time limit, the backup
(min)
process is automatically canceled.
Backup
Priority
From this list box, select the level of importance that you want the system to place on the
configuration backup process compared to other processes.
A priority of medium or high have a greater impact on system performance.
Data Backup
Backup
Type or select the length of time, in minutes, that you want to allow the backup to run. The
Time Limit default is 1020 minutes. If the backup process exceeds the configured time limit, the backup is
(min)
automatically canceled.
Backup
Priority
From the list, select the level of importance you want the system to place on the data
backup process compared to other processes.
A priority of medium or high have a greater impact on system performance.
Table 1. Backup Recovery Configuration parameters
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
On the toolbar, click Configure.
On the Backup Recovery Configuration window, customize your nightly backup.
Click Save.
6. Close the Backup Archives window.
7. On the Admin tab, click Deploy Changes.
Creating an on-demand configuration backup archive
If you must back up your configuration files at a time other than your nightly scheduled backup,.
On-demand backup archives include only configuration information.
During the backup process, system performance is affected.
Procedure
1.
2.
3.
4.
Option
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
From the toolbar, click On Demand Backup.
Enter values for the following parameters:
Description
Type a unique name that you want to assign to this backup archive. The name can be up
to 100 alphanumeric characters in length. The name can contain following characters:
underscore (_), dash (-), or period (.).
DescriptionType a description for this configuration backup archive. The description can be up to
255 characters in length.
Name
5. Click Run Backup.
You can start a new backup or restore processes only after the on-demand backup is
complete. You can monitor the backup archive process in the Backup Archives window.
Data retention
Retention buckets define how long event and flow data is retained in IBM® QRadar®.
As QRadar receives events and flows, each one is compared against the retention bucket filter
criteria. When an event or flow matches a retention bucket filter, it is stored in that retention
bucket until the deletion policy time period is reached. The default retention period is 30 days;
then, the data is immediately deleted.
Retention buckets are sequenced in priority order from the top row to the bottom row. A record is
stored in the bucket that matches the filter criteria with highest priority. If the record does not
match any of your configured retention buckets, the record is stored in the default retention bucket,
which is always located below the list of configurable retention buckets.
Tenant data
You can configure up to 10 retention buckets for shared data, and up to 10 retention buckets for
each tenant.
When data comes into the system, the data is assessed to determine whether it is shared data or
whether the data belongs to a tenant. Tenant-specific data is compared to the retention bucket
filters that are defined for that tenant. When the data matches a retention bucket filter, the data is
stored in that retention bucket until the retention policy time period is reached.
If you don't configure retention buckets for the tenant, the data is automatically placed in the
default retention bucket for the tenant. The default retention period is 30 days, unless you
configure a tenant-specific retention bucket.
For more information about tenant data retention, see Retention policies for tenants.
Configuring retention buckets
Configure retention policies to define how long IBM QRadar is required to keep event and flow data,
and what to do when that data reaches a certain age.
About this task
Changes to the retention bucket filters are applied immediately to incoming data only. For example,
if you configured a retention bucket to retain all data from source IP address 10.0.0.0/8 for 1 day,
and you later edit the filter to retain data from source IP 192.168.0.1, the change is not retroactive.
Immediately upon changing the filter, the retention bucket has 24 hours of 10.0.0.0/8 data, and all
data that is collected after the filter change is 192.168.0.1 data.
The retention policy on the bucket is applied to all data in the bucket, regardless of the filters
criteria. Using the previous example, if you changed the retention policy from 1 day to 7 days, both
the 10.0.0.0/8 data and the 192.168.0.1 data in the bucket is retained for 7 days.
The Distribution of a retention bucket indicates the retention bucket usage as a percentage of total
data retention in all your retention buckets. The distribution is calculated on a per-tenant basis.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Data sources section, click Event Retention or Flow Retention.
3. If you configured tenants, in the Tenant list, select the tenant that you want the retention
bucket to apply to.
Note: To manage retention policies for shared data in a multi-tenant configuration,
choose N/A in the Tenant list.
4. To configure a new retention bucket, follow these steps:
a. Double-click the first empty row in the table to open the Retention
Properties window.
b. Configure the retention bucket parameters.
Learn more about retention bucket parameters:
Properties Description
Name
Type a unique name for the retention bucket.
Keep data The retention period that specifies how long the data is to be kept. When the retention period is
placed in
reached, data is deleted according to the Delete data in this
this bucket
bucket parameter. QRadar does not delete data within the retention period.
for
Select Immediately after the retention period has expired to delete data immediately on
matching the Keep data placed in this bucket for parameter. The data is deleted
at the next scheduled disk maintenance process, regardless of disk storage requirements.
Select When storage space is required to keep data that matches the Keep data
placed in this bucket for parameter in storage until the disk monitoring
system detects that storage is required.
Delete data
Deletions that are based on storage space begin when the free disk space drops to 15%
in this
bucket
or less, and the deletions continue until the free disk space is 18% or the policy time
frame that is set in the Keep data placed in this bucket for field runs out. For example,
if the used disk space reaches 85% for records, data is deleted until the used percentage
drops to 82%. When storage is required, only data that matches the Keep data placed
in this bucket for field is deleted.
If the bucket is set to Delete data in this bucket: immediately after the retention
period has expired, no disk space checks are done and the deletion task immediately
removes any data that is past the retention.
DescriptionType a description for the retention bucket.
Current
Filters
Configure the filter criteria that each piece of data is to be compared against.
c. Click Add Filter after you specify each set of filter criteria.
d. Click Save.
5. To edit an existing retention bucket, select the row from the table and click Edit.
6. To delete a retention bucket, select the row from the table and click Delete.
7. Click Save.
Incoming data that matches the retention policy properties is immediately stored in the
retention bucket.
Managing retention bucket sequence
You can change the order of the retention buckets to ensure that data is being matched against the
retention buckets in the order that matches your requirements.
About this task
Retention buckets are sequenced in priority order from the top row to the bottom row on the Event
Retention and Flow Retention windows. A record is stored in the first retention bucket that matches the record
parameters.
You cannot move the default retention bucket. It always resides at the bottom of the list.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Data sources section, click Event Retention or Flow Retention.
3. If you configured tenants, in the Tenant list, select the tenant for the retention buckets that
you want to reorder.
Note: To manage retention policies for shared data in a multi-tenant configuration,
choose N/A in the Tenant list.
4. Select the row that corresponds to the retention bucket that you want to move, and
click Up or Down to move it to the correct location.
5. Click Save.
Enabling and disabling a retention bucket
When you configure and save a retention bucket, it is enabled by default. You can disable a bucket
to tune your event or flow retention.
About this task
When you disable a bucket, any new events or flows that match the requirements for the disabled
bucket are stored in the next bucket that matches the event or flow properties.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Data sources section, click Event Retention or Flow Retention.
3. If you configured tenants, in the Tenant list, select the tenant for the retention bucket that
you want to change.
Note: To manage retention policies for shared data in a multi-tenant configuration,
choose N/A in the Tenant list.
4. Select the retention bucket you want to disable, and then click Enable/Disable.
Deleting a Retention Bucket
When you delete a retention bucket, only the criteria that defines the bucket is deleted. The events
or flows that were stored in the bucket are collected by the default retention bucket. The default
retention period is 30 days; then, the data is immediately deleted.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Data sources section, click Event Retention or Flow Retention.
3. If you configured tenants, in the Tenant list, select the tenant for the retention bucket that
you want to delete.
Note: To manage retention policies for shared data in a multi-tenant configuration,
choose N/A in the Tenant list.
4. Select the retention bucket that you want to delete, and then click Delete.
TASK: 1.5 Configure custom SNMP and email templates
SUBTASKS:
Customizing the SNMP trap output
IBM® QRadar® uses SNMP to send traps that provide information when rule conditions are met.
By default, QRadar uses the QRadar management information base (MIB) to manage the devices in
the communications network. However, you can customize the output of the SNMP traps to adhere
to another MIB.
Important: SNMPv3 rule responses are sent out as SNMP informs and not traps.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/conf directory and make backup copies of the following files:
o eventCRE.snmp.xml
o offenseCRE.snmp.xml
3. Open the configuration file for editing.
o To edit the SNMP parameters for event rules, open the eventCRE.snmp.xml file.
o To edit the SNMP parameters for offense rules, open
the offenseCRE.snmp.xml file.
4. To change the trap that is used for SNMP trap notification, update the following text with the
appropriate trap object identifier (OID):
5. -<creSNMPTrap version="3" OID="1.3.6.1.4.1.20212.1.1"
name="eventCRENotification">
6. Use the following table to help you update the variable binding information:
Each variable binding associates a particular MIB object instance with its current value.
Value type
Description
Example
Alphanumeric
characters
string
You can
configure
multiple
values.
A numerical name="ATTACKER_PORT"
integer32
type="integer32">%ATTACKER_PORT%
value
Each SNMP
trap carries
an identifier
that is
OID="1.3.6.1.4.1.20212.2.46"
oid
assigned to
an object
within the
MIB
A numerical
gauge32
value range
A numerical
value that
increments
within a
counter64
defined
minimum and
maximum
range
Table 1. Value types for variable binding
7. For each of the value types, include any of the following fields:
Field
Description
Example
Example: 1If the value type is ipAddress, you
For more information about these fields, see must use a variable that is an IP address. The
Native
the /opt/qradar/conf/snmp.help file.string value type accepts any format.
Example: 1If you used the default file information
and want to include this information in the SNMP
trap, include the following code:
Custom
Custom SNMP trap information that you
configured for the custom rules wizard
<variableBinding name="My Color
Variable Binding"
OID="1.3.6.1.4.1.20212.3.1"
type="string">
My favorite color
is %MyColor%</variableBinding>
Field
Description
Example
1Surround
the field name with percentage (%) signs. Within the percentage signs, fields must match
the value type.
Table 2. Fields for the variable bindings
8. Save and close the file.
9. Copy the file from the /opt/qradar/conf directory to
the /store/configservices/staging/globalconfig directory.
10. Log in to the QRadar as an administrator.
11. On the navigation menu ( ), click Admin.
12. Select Advanced > Deploy Full Configuration.
Important: QRadar continues to collect events when you deploy the full configuration.
When the event collection service must restart, QRadar does not restart it automatically. A
message displays that gives you the option to cancel the deployment and restart the service
at a more convenient time.
Configuring custom offense email notifications
You can create templates for email notifications that are triggered for offenses.
You customize the content that is included in the email notification by editing the alertconfig.xml file.
You must create a temporary directory where you can safely edit your copy of the files, without the
risk of overwriting the default files. After you edit and save the alert-config.xml file, you must
run a script that validates your changes. The validation script automatically applies your changes to
a staging area. You must deploy the full configuration to rebuild the configuration files for all
appliances.
Procedure
1. Use SSH to log in to the QRadar® Console as the root user.
2. Create a new temporary directory to use to safely edit copies of the default files.
3. Type the following command to copy the files that are stored in
the custom_alerts directory to the temporary directory:
cp /store/configservices/staging/globalconfig/templates/custom_alerts/*.*
<directory_name>
The <directory_name> is the name of the temporary directory that you created.
If the file does not exist in the staging directory, you might find it in
the /opt/qradar/conf/templates/custom_alerts directory.
4. Confirm that the files were copied successfully:
a. To list the files in the directory, type ls -lah.
b. Verify that the alert-config.xml file is listed.
5. Open the alert-config.xml file for editing.
6. Add a new <template> element for the new offense template.
a. Required: Enter offense for the template type value.
<templatetype>offense</templatetype>
b. Type a name for the offense template.
For example, <templatename>Default offense template</templatename>
If you have more than one template, ensure that the template name is unique.
c. Set the <active> element to true.
<active>true</active>
Important: The <active></active> property must be set to true for each template
type that you want to appear as an option in QRadar. There must be at least one
active template for each type.
d. Edit the parameters in the <body> or <subject> elements to include the information
that you want to see.
The following lists provide the values that you can use in the offense template. $Label
values provide the label for the item and the $Value values provide the data.
Offense parameters
$Value.DefaultSubject
$Value.Intro
$Value.OffenseId
$Value.OffenseStartTime
$Value.OffenseUrl
$Value.OffenseMRSC
$Value.OffenseDescription
$Value.EventCounts
$Label.OffenseSourceSummary
$Value.OffenseSourceSummary
$Label.TopSourceIPs
$Value.TopSourceIPs
$Label.TopDestinationIPs
$Value.TopDestinationIPs
$Label.TopLogSources
$Value.TopLogSources
$Label.TopUsers
$Value.TopUsers
$Label.TopCategories
$Value.TopCategories
$Label.TopAnnotations
$Value.TopAnnotations
$Label.ContributingCreRules
$Value.ContributingCreRules
Configuring event and flow custom email
notifications
When you configure rules in IBM® QRadar®, specify that each time the rule generates a response,
an email notification is sent to recipients. The email notification provides useful information, such
as event or flow properties.
About this task
You can customize the content that is included in the email notification for rule response by editing
the alert-config.xml file.
Note: References to flows do not apply to IBM QRadar Log Manager.
You must create a temporary directory where you can safely edit your copy of the files, without the
risk of overwriting the default files. After you edit and save the alert-config.xml file, you must
run a script that validates your changes. The validation script automatically applies your changes to
a staging area. You must deploy the full configuration to rebuild the configuration files for all
appliances.
Important: For IBM QRadar on Cloud, you must open a ticket with IBM Support to get a copy of the alertconfig.xml file. You must open another ticket to apply the updated alert-config.xml file to
your QRadar on Cloud instance.
Procedure
1. Use SSH to log in to the QRadar Console as the root user.
2. Create a new temporary directory to use to safely edit copies of the default files.
3. To copy the files that are stored in the custom_alerts directory to the temporary
directory, type the following command:
cp /store/configservices/staging/globalconfig/templates/custom_alerts/*.*
<directory_name>
The <directory_name> is the name of the temporary directory that you created.
4. Confirm that the files were copied successfully:
a. To list the files in the directory, type ls -lah.
b. Verify that the alert-config.xml file is listed.
5. Open the alert-config.xml file for editing.
6. Edit the contents of the <template> element.
a. Required: Specify the type of template to use. Valid options are event or flow.
<templatetype>event</templatetype>
<templatetype>flow</templatetype>
b. Type a name for the email template:
<templatename>Default flow template</templatename>
If you have more than one template, ensure that the template name is unique.
c. Set the <active> element to true:
<active>true</active>
d. Edit the parameters in the <body> or <subject> elements to include the information
that you want to see.
Important: The <active></active> property must be set to True for each event and
flow template type that you want to appear as an option in QRadar. There must be at
least one active template for each type.
You must also ensure that the <filename></filename> property is left empty.
Notification parameters that you can use in the template:
Common Parameters
Event Parameters
Flow Parameters
AppName
EventCollectorID
Type
RuleName
DeviceId
CompoundAppID
RuleDescription
DeviceName
FlowSourceIDs
EventName
DeviceTime
SourceASNList
EventDescription
DstPostNATPort
DestinationASNList
EventProcessorId
SrcPostNATPort
InputIFIndexList
Qid
DstMACAddress
OutputIFIndexList
Common Parameters
Event Parameters
Flow Parameters
Category
DstPostNATIPAddress
AppId
RemoteDestinationIP
DstPreNATIPAddress
Host
Payload
SrcMACAddress
Port
Credibility
SrcPostNATIPAddress
SourceBytes
Relevance
SrcPreNATIPAddress
SourcePackets
Source
SrcPreNATPor
Direction
SourcePort
DstPreNATPort
SourceTOS
SourceIP
SourceDSCP
Destination
SourcePrecedence
DestinationPort
DestinationTOS
DestinationIP
DestinationDSCP
DestinationUserName
SourceASN
Protocol
DestinationASN
StartTime
InputIFIndex
Duration
OutputIFIndex
StopTime
FirstPacketTime
EventCount
LastPacketTime
SourceV6
TotalSourceBytes
DestinationV6
TotalDestinationBytes
UserName
TotalSourcePackets
DestinationNetwork
TotalDestinationPackets
SourceNetwork
SourceQOS
Severity
DestinationQOS
CustomProperty
SourcePayload
CustomPropertiesList
CalculatedProperty
CalculatedPropertiesList
AQLCustomProperty
AqlCustomPropertiesList
Common Parameters
Event Parameters
Flow Parameters
LogSourceId
LogSourceName
Table 1. Accepted Notification Parameters
Note: If you do not want to retrieve the entire list when you use the
CustomProperties, CalculatedProperties, or AqlCustomProperties parameter, you can
select a specific property by using the following tags:
▪
▪
Custom
Property: ${body.CustomProperty("<custom_property_name>")}
Calculated
Property: ${body.CalculatedProperty("<calculated_property_name>
")}
▪
AQL Custom
Property: ${body.AqlCustomProperty("<AQL_custom_property_name>"
)}
7. Optional: To create multiple email templates, copy and paste the following sample email
template in the <template> element in the alert-config.xml file. Repeat Step 6 for each
template that you add.
Sample email template:
<template>
<templatename>Default Flow</templatename>
<templatetype>flow</templatetype>
<active>true</active>
<filename></filename>
<subject>${RuleName} Fired </subject>
<body>
The ${AppName} event custom rule engine sent an automated response:
${StartTime}
Rule Name:
Rule Description:
${RuleName}
${RuleDescription}
Source
Source
Source
Source
${SourceIP}
${SourcePort}
${UserName}
${SourceNetwork}
IP:
Port:
Username (from event):
Network:
Destination
Destination
Destination
Destination
Protocol:
IP:
${DestinationIP}
Port:
${DestinationPort}
Username (from Asset Identity): ${DestinationUserName}
Network:
${DestinationNetwork}
${Protocol}
QID:
${Qid}
Event Name:
Event Description:
Category:
${EventName}
${EventDescription}
${Category}
Log Source ID:
Log Source Name:
${LogSourceId}
${LogSourceName}
Payload:
${Payload}
CustomPropertiesList:
${CustomPropertiesList}
AQL Custom Property, CEP_aql_1:
${body.AqlCustomProperty("CEP_aql_1")}
Calculated Property, CEP_calc_2:
${body.CalculatedProperty("CEP_calc_2")}
Regex Property, CEP_reg_3:
${body.CustomProperty("CEP_reg_3")}
</body>
<from></from>
<to></to>
<cc></cc>
<bcc></bcc>
</template>
Note: Currently, the DomainID for multi-tenancy or overlapping IP addresses isn’t available
in the custom email templates.
8. Save and close the alert-config.xml file.
9. Validate the changes by typing the following command.
/opt/qradar/bin/runCustAlertValidator.sh <directory_name>
The <directory_name> parameter is the name of the temporary directory that you
created.
If the script validates the changes successfully, the following message is displayed: File
alert-config.xml was deployed successfully to staging!
10. Deploy the changes in QRadar.
a. Log in to QRadar.
b. On the navigation menu ( ), click Admin.
c. Click Advanced > Deploy Full Configuration.
Important: QRadar continues to collect events when you deploy the full
configuration. When the event collection service must restart, QRadar does not
restart it automatically. A message displays that gives you the option to cancel the
deployment and restart the service at a more convenient time.
TASK: 1.6 Manage network hierarchy
SUBTASKS:
TASK: 1.7 Use and manage reference data
SUBTASKS:
Defining your network hierarchy
A default network hierarchy that contains pre-defined network groups is included in IBM®
QRadar®. You can edit the pre-defined network hierarchy objects, or you can create new network
groups or objects.
About this task
Network objects are containers for Classless Inter-Domain Routing (CIDR) addresses. Any IP
address that is defined in a CIDR range in the network hierarchy is considered to be a local address.
Any IP address that is not defined in a CIDR range in the network hierarchy is considered to be a
remote address. A CIDR can belong only to one network object, but subsets of a CIDR range can
belong to another network object. Network traffic matches the most exact CIDR. A network object
can have multiple CIDR ranges assigned to it.
Some of the default building blocks and rules in QRadar use the default network hierarchy objects.
Before you change a default network hierarchy object, search the rules and building blocks to
understand how the object is used and which rules and building blocks might need adjustments
after you modify the object. It is important to keep the network hierarchy, rules, and building
blocks up to date to prevent false offenses.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Network Hierarchy.
3. From the menu tree on the Network Views window, select the area of the network in which
you want to work.
4. To add network objects, click Add and complete the following fields:
Option
Description
Name
The unique name of the network object.
Tip: You can use periods in network object names to define network object hierarchies. For
example, if you enter the object name D.E.F, you create a three-tier hierarchy with E as a
subnode of D, and F as a subnode of E.
Group
The network group in which to add the network object. Select from the Group list, or click Add
a New Group.
Option
Description
Tip: When you add a network group, you can use periods in network group names to define
network group hierarchies. For example, if you enter the group name A.B.C, you create a
three-tier hierarchy with B as a subnode of A, and C as a subnode of B.
Restriction: The lengths of the name and the group combined must not be more than 255
characters.
IP/CIDR(s) Type an IP address or CIDR range for the network object, and click Add. You can add multiple IP
addresses and CIDR ranges.
DescriptionA description of the network object.
Country / The country or region in which the network object is located.
Region
Longitude The geographic location (longitude and latitude) of the network object. These fields are coand
dependent.
Latitude
5. Click Create.
6. Repeat the steps to add more network objects, or click Edit or Delete to work with existing
network objects.
Types of reference data collections
IBM® QRadar® has different types of reference data collections that can handle different levels of
data complexity. The most common types are reference sets and reference maps.
If you want to use the same reference data in both QRadar SIEM and QRadar Risk Manager, use a
reference set. You can't use other types of reference data collections with QRadar Risk Manager.
Type of
collection
Description
How to use
Use a reference set to
compare a property
A collection of
Reference set
value against a list,
unique values.
such as IP addresses
or user names.
A collection of
Use a reference map
data that maps a to verify a unique
Reference map
unique key to a combination of two
value.
property values.
A collection of
Use a reference map
data that maps a of sets to verify a
Reference map
key to multiple combination of two
of sets
values. Every key property values
is unique and
against a list.
Examples
To verify whether a login ID that was used
to log in to QRadar is assigned to a user,
create a reference set with
the LoginID parameter.
To correlate user activity on your network,
create a reference map that uses
the LoginID parameter as a key, and
the Username as a value.
To test for authorized access to a patent,
create a map of sets that uses a custom
event property for Patent ID as the key,
and the Username parameter as the value.
Type of
collection
Description
How to use
Examples
maps to one
Use the map of sets to populate a list of
reference set.
authorized users.
A collection of
data that maps
one key to
To test for network bandwidth violations,
another key,
Use a reference map create a map of maps that uses the Source
which is then
IP parameter as the first key,
Reference map
of maps to verify a
mapped to a
of maps
combination of three the Application parameter as the second
single value.
property values.
key, and the Total Bytes parameter as
Every key is
the value.
unique and maps
to one reference
map.
A collection of
data that maps
one key to
Use a reference table Create a reference table that
another key,
to verify a
stores Username as the first key, Source
Reference
which is then
combination of three
IP as the second key with an
table
mapped to a
property values when
assigned cidr data type, and Source
single value. The one of the properties
second key is
is a specific data type. Port as the value.
assigned a data
type.
Table 1. Types of reference data collections
Viewing the contents of a reference set
View information about the data elements in the reference set, such as the domain assignment, the expiry
on the data, and when the element was last seen in your network.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Reference Set Management.
Select a reference set and click View Contents.
Click the Content tab to view information about each data element.
Tip: Use the search field to filter for all elements that match a keyword. You can't search for
data in the Time To Live column.
Learn more about the data elements:
The following table describes the information that is shown for each data element in the
reference set.
ParameterDescription
Domain
Domain-specific reference data can be viewed by tenant users who have access to the domain,
MSSP Administrators, and users who do not have a tenant assignment. Users in all tenants can
view shared reference data.
Value
The data element that is stored in the reference set. For example, the value might show user
names or IP addresses.
Origin
Shows the user name when the data element is added manually, and the file name when the data
was added by importing it from an external file. Shows the rule name when the data element is
added in response to a rule.
Time to
Live
The time that is remaining until this element is removed from the reference set.
Date Last
The date and time that this element was last detected on your network.
Seen
Table 1. Information about the reference set data elements
5. Click the References tab to view the rules that use the reference set in a rule test or in a rule
response.
ParameterDescription
Rule
Name
Name of the rule that is configured to use the reference set.
Group
The group that the rule belongs to.
Category Shows if the rule is a custom rule or an anomaly detection rule.
Type
Shows event, flow, common, or offense to indicate the type of data that the rule is tested
against.
Enabled
A rule must be enabled for the custom rule engine to evaluate it.
Response The responses that are configured for this rule.
System indicates a default rule.
Origin
Modified indicates that a default rule was customized.
User indicates a user-created rule.
Table 2. Content tab parameters
6. To view or edit an associated rule, double-click the rule in the References list and complete
the rule wizard.
Adding, editing, and deleting reference sets
Use a reference set to compare a property value, such as an IP address or user name, against a list. You can
use reference sets with rules to keep watch lists. For example, you can create a rule to detect when an
employee accesses a prohibited website and then add that employee's IP address to a reference set.
About this task
After you add data to the reference set, the Number of Elements and Associated
Rules parameters are automatically updated.
When you edit a reference set, you can change the data values, but you can't change the type of data
that the reference set contains.
Before a reference set is deleted, QRadar® runs a dependency check to see whether the reference
set has rules that are associated with it.
Note: If you use techniques to obfuscate data on the event properties that you want to compare to the
reference set data, use an alphanumeric reference set and add the obfuscated data values.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Reference Set Management.
3. To add a reference set:
a. Click Add and configure the parameters.
Learn more about reference set parameters:
The following table describes each of the parameters that are used to configure a
reference set.
ParameterDescription
Name
The maximum length of the reference set name is 255 characters.
Select the data types for the reference elements. You can't edit the Type parameter after
you create a reference set.
Type
The IP type stores IPv4 addresses. The Alphanumeric (Ignore Case) type automatically
changes any alphanumeric value to lowercase.
To compare obfuscated event and flow properties to the reference data, you must use an
alphanumeric reference set.
Time to Specifies when reference elements expire. If you select the Lives Forever default setting,
Live of
the reference elements don’t expire.
elements
ParameterDescription
If you specify an amount of time, indicate whether the time-to-live interval is based on
when the data was first seen, or was last seen.
QRadar removes expired elements from the reference set periodically (by default, every
5 minutes).
Specifies how expired reference elements are logged in the qradar.log file when they
are removed from the reference set.
When
elements
expire
The Log each element in a separate log entry option triggers an Expired
ReferenceData element log event for each reference element that is removed. The
event contains the reference set name and the element value.
The Log elements in one log entry option triggers one Expired ReferenceData
element log event for all reference elements that are removed at the same time. The
event contains the reference set name and the element values.
The Do not log elements option does not trigger a log event for removed reference
elements.
Table 1. Reference Set parameters
b. Click Create.
4. Click Edit or Delete to work with existing reference sets.
Tip: To delete multiple reference sets, use the Quick Search text box to search for the
reference sets that you want to delete, and then click Delete Listed.
Creating reference data collections by using
the command line
Use the command line to manage reference data collections that cannot be managed in IBM®
QRadar®, such as reference maps, map of sets, map of maps, and tables. Although it's easier to
manage reference sets using QRadar, use the command line when you want to schedule
management tasks.
About this task
Use the ReferenceDataUtil.sh script to manage reference sets and other types of reference
data collections.
When you use an external file to populate the reference data collection, the first non-comment line
in the file identifies the column names in the reference data collection. Each line after that is a data
record that gets added to the collection. While the data type for the reference collection values is
specified when the collection is created, each key is an alphanumeric string.
The following table shows examples of how to format data in an external file that is to be used for
populating reference maps.
Type of
reference Data formatting examples
collection
key1,data
Reference
key1,value1
map
key2,value2
key1,data
Reference
map of
key1,value1
sets
key1,value2
key1,key2,data
Reference
map of
map1,key1,value1
maps
map1,key2,value2
Table 1. Formatting data in an external file to be used for populating reference data collections
You can also create reference data collections by using the /reference_data endpoint in
the QRadar RESTful API.
Procedure
1. Using SSH, log in to IBM QRadar as the root user.
2. Go to the /opt/qradar/bin directory.
3. To create the reference data collection, type the following command:
4. ./ReferenceDataUtil.sh create name
5. [SET | MAP | MAPOFSETS | MAPOFMAPS | REFTABLE]
6. [ALN | NUM | IP | PORT | ALNIC | DATE]
[-timeoutType=[FIRST_SEEN | LAST_SEEN]] [-timeToLive=]
7. To populate the map with data from an external file, type the following command:
8. ./ReferenceDataUtil.sh load name filename
[-encoding=...] [-sdf=" ... "]
Example
Here are some examples of how to use the command line to create different types of reference data
collections:
•
Create an alphanumeric map:
./ReferenceDataUtil.sh create testALN MAP ALN
•
Create a map of sets that contains port values that will age out 3 hours after they were last
seen:
•
./ReferenceDataUtil.sh create testPORT MAPOFSETS PORT
-timeoutType=LAST_SEEN -timeToLive='3 hours'
•
Create a map of maps that contains numeric values that will age out 3 hours 15 minutes after
they were first seen:
•
./ReferenceDataUtil.sh create testNUM MAPOFMAPS
NUM -timeoutType=FIRST_SEEN -timeToLive='3 hours 15 minutes'
•
•
Create a reference table where the default format is alphanumeric:
./ReferenceDataUtil.sh create testTable REFTABLE
ALN -keyType=ipKey:IP,portKey:PORT,numKey:NUM,dateKey:DATE
Command reference for reference data utilities
You can manage your reference data collections by using the ReferenceDataUtil.sh utility on
the command line. The following commands are available to use with the script.
Reference data query examples
Use AQL queries to get data from reference sets, reference maps, or reference tables. You can create
and populate reference data by using rules to populate reference sets, by using external threat
feeds, for example, LDAP Threat Intelligence App, or by using imported data files for your reference
set.
Tip: For information on how to use quotation marks in AQL queries, see Quotation marks.
Use the following examples to help you create queries to extract data from your reference data.
Use reference tables to get external metadata for user names that show up in events
SELECT
REFERENCETABLE('user_data','FullName',username) AS 'Full Name',
REFERENCETABLE('user_data','Location',username) AS 'Location',
REFERENCETABLE('user_data','Manager',username) AS 'Manager',
UNIQUECOUNT(username) AS 'Userid Count',
UNIQUECOUNT(sourceip) AS 'Source IP Count',
COUNT(*) AS 'Event Count'
FROM events
WHERE qidname(qid)ILIKE '%logon%'
GROUP BY "Full Name", "Location", "Manager"
LAST 1 days
Use the reference table to get external data such as the full name, location, and manager name for
users who logged in to the network in the last 24 hours.
Get the global user IDs for users in events who are flagged for suspicious activity
SELECT
REFERENCEMAP('GlobalID_Mapping',username) AS 'Global ID',
REFERENCETABLE('user_data','FullName', 'Global ID') AS 'Full Name',
UNIQUECOUNT(username),
COUNT(*) AS 'Event count'
FROM events
WHERE RULENAME(creEventlist)
ILIKE '%suspicious%'
GROUP BY "Global ID"
LAST 2 days
In this example, individual users have multiple accounts across the network. The organization
requires a single view of a user's activity. Use reference data to map local user IDs to a global ID.
The query returns the user accounts that are used by a global ID for events that are flagged as
suspicious.
Use a reference map lookup to extract global user names for user names that are
returned in events
SELECT
QIDNAME(qid) as 'Event name',
starttime AS Time,
sourceip AS 'Source IP',
destinationip AS 'Destination IP',
username AS 'Event Username',
REFERENCEMAP('GlobalID_Mapping', username) AS 'Global User'
FROM events
WHERE "Global User" = 'John Ariel'
LAST 1 days
Use the reference map to look up the global user names for user names that are returned in events.
Use the WHERE clause to return only events for the global user John Ariel. John Ariel might have a
few different user names but these user names are mapped to a global user, for example, in an
external identity mapping system, you can map a global user to several user names used by the
same global user.
Monitoring high network utilization by users
SELECT
LONG(REFERENCETABLE('PeerGroupStats', 'average',
REFERENCEMAP('PeerGroup',username)))
AS PGave,
LONG(REFERENCETABLE('PeerGroupStats', 'stdev',
REFERENCEMAP('PeerGroup',username)))
AS PGstd,
SUM(sourcebytes+destinationbytes) AS UserTotal
FROM flows
WHERE flowtype = 'L2R'
GROUP BY UserTotal
HAVING UserTotal > (PGAve+ 3*PGStd)
Returns user names where the flow utilization is three times greater than the average user.
You need a reference set to store network utilization of peers by user name and total bytes.
Threat ratings and categories
SELECT
REFERENCETABLE('ip_threat_data','Category',destinationip)
AS 'Threat Category',
REFERENCETABLE('ip_threat_data','Rating', destinationip)
AS 'Threat Rating',
UNIQUECOUNT(sourceip)
AS 'Source IP Count',
UNIQUECOUNT(destinationip)
AS 'Destination IP Count'
FROM events
GROUP BY "Threat Category", "Threat Rating" LAST 24 HOURS
Returns the threat category and the threat rating.
You can look up reference table threat data and include it in your searches.
Copying query examples from the AQL guide
If you copy and paste a query example that contains single or double quotation marks from the AQL
Guide, you must retype the quotation marks to be sure that the query parses.
Creating reference data collections with the
APIs
You can use the application program interface (API) to manage IBM® QRadar® reference data
collections.
Procedure
1. Use a web browser to access https://<Console IP>/api_doc and log in as the
administrator.
2. Select the latest iteration of the IBM QRadar API.
3. Select the /reference_data directory.
4. To create a new reference set, follow these steps:
a. Select /sets.
b. Click POST and enter the relevant information in the Value fields.
Learn more about the parameters to create a reference set:
The following table provides information about the parameters that are required to
create a reference set:
Parameter Type Value
Data MIME
Type Type
Sample
element_typequery(required)Stringtext/plainString <one of: ALN, NUM, IP, PORT, ALNIC, DATE>
name
query(required)Stringtext/plainString
fields
query(optional) Stringtext/plainfield_one (field_two, field_three), field_four
time_to_live query(optional) Stringtext/plainString
timeout_type query(optional) Stringtext/plainString <one of: UNKNOWN, FIRST_SEEN, LAST_SEEN>
Table 1. Parameters - Reference Set
c. Click Try It Out! to finish creating the reference data collection and to view the
results.
5. To create a new reference map, follow these steps:
a. Click /maps.
b. Click POST and enter the relevant information in the Value fields.
Learn more about the parameters to create a reference map:
The following table provides information about the parameters that are required to
create a reference map:
Parameter Type Value
Data MIME
Type Type
Sample
element_typequery(required)Stringtext/plainString <one of: ALN, NUM, IP, PORT, ALNIC, DATE>
name
query(required)Stringtext/plainString
fields
query(optional) Stringtext/plainfield_one (field_two, field_three), field_four
key_label
query(optional) Stringtext/plainString
time_to_live query(optional) Stringtext/plainString
timeout_type query(optional) Stringtext/plainString <one of: UNKNOWN, FIRST_SEEN, LAST_SEEN>
value_label query(optional) Stringtext/plainString
Table 2. Parameters - Reference Map
c. Click Try It Out! to finish creating the reference data collection and to view the
results.
6. To create a new reference map of sets, follow these steps:
a. Select /map_of_sets.
b. Click POST and enter the relevant information in the Value fields.
Learn more about the parameters to create a reference map of sets:
The following table provides information about the parameters that are required to
create a reference map of sets:
Parameter Type Value
Data MIME
Type Type
Sample
element_typequery(required)Stringtext/plainString <one of: ALN, NUM, IP, PORT, ALNIC, DATE>
name
query(required)Stringtext/plainString
fields
query(optional) Stringtext/plainfield_one (field_two, field_three), field_four
key_label
query(optional) Stringtext/plainString
time_to_live query(optional) Stringtext/plainString
timeout_type query(optional) Stringtext/plainString <one of: UNKNOWN, FIRST_SEEN, LAST_SEEN>
value_label query(optional) Stringtext/plainString
Table 3. Parameters - Reference Map of Sets
c. Click Try It Out! to finish creating the reference data collection and to view the
results.
7. To create a new reference table or map of maps, follow these steps:
a. Click /tables.
b. Click POST and enter the relevant information in the Value fields.
Learn more about the parameters to create a reference table or a map of maps:
The following table provides information about the parameters that are required to
create a reference table or a map of maps:
Data
MIME Type
Type
Parameter
Type Value
Sample
element_type
query(required)Stringtext/plain
String <one of: ALN, NUM, IP, PORT, ALNIC, DATE>
name
query(required)Stringtext/plain
String
fields
query(optional) Stringtext/plain
field_one (field_two, field_three), field_four
[ { "element_type": "String <one of: ALN, NUM, IP,
key_name_typesquery(optional) Array application/json
PORT, ALNIC, DATE>", "key_name": "String" }]
outer_key_label query(optional) Stringtext/plain
String
time_to_live
query(optional) Stringtext/plain
String
timeout_type
query(optional) Stringtext/plain
String <one of: UNKNOWN, FIRST_SEEN,
LAST_SEEN>
Table 4. Parameters - Reference Table
c. Click Try It Out! to finish creating the reference data collection and to view the
results.
TASK: 1.8 Manage automatic update
SUBTASKS:
Automatic updates
Using IBM® QRadar®, you can either replace your existing configuration files or integrate the
updated files with your existing files.
The QRadar console must be connected to the internet to receive updates. If your console is not
connected to the internet, you must configure an internal update server. For information about
setting up an automatic update server, see the IBM QRadar User Guide.
Download software updates from IBM Fix Central (www.ibm.com/support/fixcentral/).
Update files can include the following updates:
•
•
•
•
Configuration updates, which include configuration file changes, vulnerability, QID map, and
security threat information updates.
DSM updates, which include corrections to parsing issues, scanner changes, and protocol
updates.
Major updates, which include items such as updated JAR files.
Minor updates, which include items such as extra online help content or updated scripts.
Configuring automatic update settings
You can customize the frequency of IBM QRadar updates, update types, server configuration, and
backup settings.
About this task
You can select the Auto Deploy to automatically deploy updates. If Auto Deploy is not selected,
then you must manually deploy changes, from the Dashboard tab, after updates are installed.
Restriction: In high-availability (HA) environment, automatic updates aren't installed when a secondary
host is active. The updates are installed only after the primary host become the active node.
You can select Auto Restart Service to allow automatic updates that require the user interface to
restart. A user interface disruption occurs when the service restarts. Alternatively, you can
manually install the updated from the Check for Updates window.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Auto Update.
3. Click Change Settings.
4. On the Basic tab, select the schedule for updates.
a. In the Configuration Updates section, select the method that you want to use for
updating your configuration files.
▪ To merge your existing configuration files with the server updates without
affecting your custom signatures, custom entries, and remote network
configurations, select Auto Integrate.
▪ To override your customizations with server settings, select Auto Update.
b. In the DSM, Scanner, Protocol Updates section, select an option to install updates.
c. In the Major Updates section, select an option for receiving major updates for new
releases.
d. In the Minor Updates section, select an option for receiving patches for minor
system issues.
e. If you want to deploy update changes automatically after updates are installed, select
the Auto Deploy check box.
f. If you want to restart the user interface service automatically after updates are
installed, select the Auto Restart Service check box.
5. Click the Advanced tab to configure the update server and backup settings.
a. In Web Server field, type the web server from which you want to obtain the updates.
The default web server is https://auto-update.qradar.ibmcloud.com/.
b. In the Directory field, type the directory location on which the web server stores the
updates.
The default directory is autoupdates/.
c. Optional: Configure the settings for proxy server.
If the application server uses a proxy server to connect to the Internet, you must
configure the proxy server. If you are using an authenticated proxy, you must provide
the username and password for the proxy server.
d. In the Backup Retention Period list, type or select the number of days that you want
to store files that are replaced during the update process.
The files are stored in the location that is specified in the Backup Location. The
minimum is one day and the maximum is 65535 years.
e. In the Backup Location field, type the location where you want to store backup files.
f. In the Download Path field, type the directory path location to which you want to
store DSM, minor, and major updates.
The default directory path is /store/configservices/staging/updates.
6. Click Save.
QRadar: Important auto update server changes
for administrators
Troubleshooting
Problem
IBM® is migrating QRadar SIEM auto update servers to a new location in the IBM Cloud®.
This notice is intended to remind administrators that they must change their auto update
configuration to use a new IBM Cloud® web server to avoid interruptions with daily and
weekly software updates. Administrators who use IP-based firewall rules in their
organization must also update their corporate firewall rules to allow traffic to the IBM
Cloud auto update web server.
Resolving The Problem
Notice: Administrators must change their auto update server configuration before 30
November 2020 to avoid interruptions with your auto update download. A benign error
message can be displayed in the user interface when you update your configuration as
described in APAR IJ29298.
About
IBM® is migrating the QRadar® auto update servers to the IBM Cloud to better serve
updates globally starting on 27 July 2020. Administrators with firewalls that use IP-based
rules will experience interruptions to auto update downloads after November 30,2020.
This server change allows a single host name and IP address to be leveraged through IBM
Cloud® clusters for all QRadar auto updates globally.
Server changes Web server hostname
Static IP address
and port
Location Description
New server
cluster
https://auto169.47.251.244:443Global
update.qradar.ibmcloud.com/
Legacy server
https://qmmunity.q1labs.com/69.20.113.167
United
States
Active until 30 November
2020
Legacy server
https://qmmunityeu.q1labs.com/
Europe
Active until 30 November
2020
212.64.156.13
New server active on 27 July
2020
Affected versions
All QRadar® products and versions are impacted by this change.
IMPORTANT: Administrators who fail to update their corporate firewalls might
experience an interruption in service after 30 November 2020. QRadar® Support
recommends that all administrators update their QRadar Console's auto update settings
during a maintenance window and confirm that auto updates complete successfully.
Summary
Administrators can update their QRadar auto update servers to use the new server
location starting on 27 July 2020. Administrators must contact their corporate firewall
team to ensure that any IP-based firewall rules are updated before November 30, 2020 to
use the new static IP address at 169.47.251.244. QRadar Support recommends that
administrators can add both the auto update host name and the static IP address to their
corporate firewall policy rules to allow traffic:
Web server
Static IP address and
Location Description
port
https://autoupdate.qradar.ibmcloud.com/
169.47.251.244:443
Global
New server active on 27 July
2020
TASK: 1.9 Demonstrate the use of the asset database
SUBTASKS
Sources of asset data
Asset data is received from several different sources in your IBM® QRadar® deployment.
Asset data is written to the asset database incrementally, usually 2 or 3 pieces of data at a time.
With exception of updates from network vulnerability scanners, each asset update contains
information about only one asset at a time.
Asset data usually comes from one of the following asset data sources:
Events
Event payloads, such as those created by DHCP or authentication servers, often contain user logins,
IP addresses, host names, MAC addresses, and other asset information. This data is immediately
provided to the asset database to help determine which asset the asset update applies to.
Events are the primary cause for asset growth deviations.
Flows
Flow payloads contain communication information such as IP address, port, and protocol that is
collected over regular, configurable intervals. At the end of each interval, the data is provided to
the asset database, one IP address at a time.
Because asset data from flows is paired with an asset based on a single identifier, the IP
address, flow data is never the cause of asset growth deviations.
Important: Asset generation from IPv6 flows is not supported.
Vulnerability scanners
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update
Package 6, and is no longer supported in any version of IBM QRadar. For more information,
see QRadar Vulnerability Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
QRadar integrates with both IBM and third-party vulnerability scanners that can provide asset
data such as operating system, installed software, and patch information. The type of data varies
from scanner to scanner and can vary from scan to scan. As new assets, port information, and
vulnerabilities are discovered, data is brought into the asset profile based on the CIDR ranges that
are defined in the scan.
It is possible for scanners to introduce asset growth deviations but it is rare.
User interface
Users who have the Assets role can import or provide asset information directly to the asset
database. Asset updates that are provided directly by a user are for a specific asset. Therefore the
asset reconciliation stage is bypassed.
Asset updates that are provided by users do not introduce asset growth deviations.
Domain-aware asset data
When an asset data source is configured with domain information, all asset data that comes from
that data source is automatically tagged with the same domain. Because the data in the asset model
is domain-aware, the domain information is applied to all QRadar components, including identities,
offenses, asset profiles, and server discovery.
When you view the asset profile, some fields might be blank. Blank fields exist when the system did
not receive this information in an asset update, or the information exceeded the asset retention
period. The default retention period is 120 days. An IP address that appears as 0.0.0.0 indicates that
the asset does not contain IP address information.
Incoming asset data workflow
IBM® QRadar® uses identity information in an event payload to determine whether to create a
new asset or update an existing asset.
Important: Asset generation from IPv6 flows is not supported.
Figure 1. Asset data workflow diagram
1. QRadar receives the event. The asset profiler examines the event payload for identity
information.
2. If the identity information includes a MAC address, a NetBIOS host name, or a DNS host
name that are already associated with an asset in the asset database, then that asset is
updated with any new information.
3. If the only available identity information is an IP address, the system reconciles the update
to the existing asset that has the same IP address.
4. If an asset update has an IP address that matches an existing asset but the other identity
information does not match, the system uses other information to rule out a false-positive
match before the existing asset is updated.
5. If the identity information does not match an existing asset in the database, then a new asset
is created based on the information in the event payload.
Asset profile data in CSV format
An asset profile is a collection of information about a specific asset. The profile includes information
about the services that are running on the asset and any identity information that is known. You can
import asset profile data in CSV format.
When you import asset profile data in CSV format, the file must be in the following format:
ip,name,weight,description
The following table describes the parameters that you must configure.
Parameter Description
IP
Specifies any valid IP address in the dot decimal format; for example, 192.168.5.34.
Specifies the name of the asset up to 255 characters in length. Commas are not valid in
Name
this field because they invalidate the import process; for example, WebServer01.
Specifies a number 0 - 10, which indicates the importance of the asset on your
Weight
network. A value of 0 denotes low importance, while 10 denotes a high importance.
Specifies a textual description for this asset up to 255 characters in length. This value is
Description
optional.
Table 1. Asset profile import CSV format parameters
The following entries can be included in a CSV file:
•
•
192.168.5.34,WebServer01,5,Main Production Web Server
192.168.5.35,MailServ01,0,
The CSV import process merges any asset profile information that is stored in
your QRadar® system.
Tuning the number of IP addresses allowed for
a single asset
IBM® QRadar® monitors the number of IP addresses that a single asset accumulates over time.
By default, QRadar generates a system message when a single asset accumulates more than 75 IP
addresses. If you expect assets to accumulate more than 75 IP addresses, you can tune the Number
of IPs Allowed for a Single Asset value to avoid future system messages.
About this task
Setting the limit for the number of IP addresses too high prevents QRadar from detecting asset
growth deviations before they have a negative impact on the rest of the deployment. Setting the
limit too low increases the number of asset growth deviations that are reported.
You can use the following guideline when you tune the Number of IPs Allowed for a Single
Asset setting for the first time.
Number of IP addresses that are allowed for a single asset = (<retention time
(days)> x <estimated IP addresses per day>) + <buffer number of IP
addresses>
Where
•
•
<estimated IP addresses per day> is the number of IP addresses that a single
asset might accumulate in one day under normal conditions
<retention time (days)> is the preferred amount of time to retain the asset IP
addresses
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
In the Assets section, click Asset Profiler Configuration.
Click Asset Profiler Configuration.
Adjust the configuration values and click Save.
Deploy the changes into your environment for the updates to take effect.
Updates to asset data
IBM® QRadar® uses identity information in an event payload to determine whether to create a new asset
or update an existing asset.
Each asset update must contain trusted information about a single asset. When QRadar receives an
asset update, the system determines which asset to which the update applies.
Asset reconciliation is the process of determining the relationship between asset updates and the
related asset in the asset database. Asset reconciliation occurs after QRadar receives the update but
before the information is written to the asset database.
Identity information
Every asset must contain at least one piece of identity data. Subsequent updates that contain one or
more pieces of that same identity data are reconciled with the asset that owns that data. Updates
that are based on IP addresses are handled carefully to avoid false-positive asset matches. False
positive asset matches occur when one physical asset is assigned ownership of an IP address that
was previously owned by another asset in the system.
When multiple pieces of identity data are provided, the asset profiler prioritizes the information from the
most deterministic to the least in the following order:
•
•
•
•
MAC address
NetBIOS host name
DNS host name
IP address
MAC addresses, NetBIOS host names, and DNS host names are unique and therefore are considered
as definitive identity data. Incoming updates that match an existing asset only by the IP address are
handled differently than updates that match more definitive identity data.
Asset reconciliation exclusion rules
With each asset update that enters IBM QRadar, the asset reconciliation exclusion rules apply tests
to the MAC address, NetBIOS host name, DNS host name, and IP address in the asset update.
Tip: QRadar excludes events based on data that is received in the event, not on any data that is later
inferred or linked to the event.
In domain-aware environments, the asset reconciliation exclusion rules track the behavior of asset
data separately for each domain.
The asset reconciliation exclusion rules test the following scenarios:
Scenario
Rule response
When a MAC address is associated to three or Add the MAC address to the Asset Reconciliation
more different IP addresses in 2 hours or less Domain MAC blacklist
Scenario
Rule response
When a DNS host name is associated to three
Add the DNS host name to the Asset Reconciliation
or more different IP addresses in 2 hours or
Domain DNS blacklist
less
When a NetBIOS host name is associated to
Add the NetBIOS host name to the Asset
three or more different IP addresses in 2
Reconciliation Domain NetBIOS blacklist
hours or less
When an IPv4 address is associated to three
Add the IP address to the Asset Reconciliation
or more different MAC addresses in 2 hours or
Domain IPv4 blacklist
less
When a NetBIOS host name is associated to
Add the NetBIOS host name to the Asset
three or more different MAC addresses in 2
Reconciliation Domain NetBIOS blacklist
hours or less
When a DNS host name is associated to three
Add the DNS host name to the Asset Reconciliation
or more different MAC addresses in 2 hours or
Domain DNS blacklist
less
When an IPv4 address is associated to three
Add the IP address to the Asset Reconciliation
or more different DNS host names in 2 hours
Domain IPv4 blacklist
or less
When a NetBIOS host name is associated to
Add the NetBIOS host name to the Asset
three or more different DNS host names in 2
Reconciliation Domain NetBIOS blacklist
hours or less
When a MAC address is associated to three or
Add the MAC address to the Asset Reconciliation
more different DNS host names in 2 hours or
Domain MAC blacklist
less
When an IPv4 address is associated to three
Add the IP address to the Asset Reconciliation
or more different NetBIOS host names in 2
Domain IPv4 blacklist
hours or less
When a DNS host name is associated to three
Add the DNS host name to the Asset Reconciliation
or more different NetBIOS host names in 2
Domain DNS blacklist
hours or less
When a MAC address is associated to three or
Add the MAC address to the Asset Reconciliation
more different NetBIOS host names in 2 hours
Domain MAC blacklist
or less
Table 1. Rule tests and responses
You can view these rules on the Offenses tab by clicking Rules and then selecting the asset
reconciliation exclusion group in the drop-down list.
Asset merging
Asset merging is the process where the information for one asset is combined with the
information for another asset under the premise that they are actually the same physical asset.
Asset merging occurs when an asset update contains identity data that matches two different asset
profiles. For example, a single update that contains a NetBIOS host name that matches one asset
profile and a MAC address that matches a different asset profile might trigger an asset merge.
Some systems can cause high volumes of asset merging because they have asset data
sources that inadvertently combine identity information from two different physical assets
into a single asset update. Some examples of these systems include the following
environments:
•
•
•
•
•
•
Central syslog servers that act as an event proxy
Virtual machines
Automated installation environments
Non-unique host names, common with assets like iPads and iPhones.
Virtual private networks that have shared MAC addresses
Log source extensions where the identity field is OverrideAndAlwaysSend=true
Assets that have many IP addresses, MAC addresses, or host names show deviations in asset
growth and can trigger system notifications.
Identification of asset growth deviations
Sometimes, asset data sources produce updates that IBM® QRadar® cannot handle properly without
manual remediation. Depending on the cause of the abnormal asset growth, you can either fix the asset
data source that is causing the problem or you can block asset updates that come from that data source.
Asset growth deviations occur when the number of asset updates for a single device grows beyond
the limit that is set by the retention threshold for a specific type of the identity information. Proper
handling of asset growth deviations is critical to maintaining an accurate asset model.
At the root of every asset growth deviation is an asset data source whose data is untrustworthy for
updating the asset model. When a potential asset growth deviation is identified, you must look at
the source of the information to determine whether there is a reasonable explanation for the asset
to accumulate large amounts of identity data. The cause of an asset growth deviation is specific to
an environment.
DHCP server example of unnatural asset growth in an asset profile
Consider a virtual private network (VPN) server in a Dynamic Host Configuration Protocol (DHCP)
network. The VPN server is configured to assign IP addresses to incoming VPN clients by proxying
DHCP requests on behalf of the client to the network's DHCP server.
From the perspective of the DHCP server, the same MAC address repeatedly requests many IP
address assignments. In the context of network operations, the VPN server is delegating the IP
addresses to the clients, but the DHCP server can't distinguish when a request is made by one asset
on behalf of another.
The DHCP server log, which is configured as a QRadar log source, generates a DHCP
acknowledgment (DHCP ACK) event that associates the MAC address of the VPN server with the IP
address that it assigned to the VPN client. When asset reconciliation occurs, the system reconciles
this event by MAC address, which results in a single existing asset that grows by one IP address for
every DHCP ACK event that is parsed.
Eventually, one asset profile contains every IP address that was allocated to the VPN server. This
asset growth deviation is caused by asset updates that contain information about more than one
asset.
Threshold settings
When an asset in the database reaches a specific number of properties, such as multiple IP
addresses or MAC addresses, QRadar blocks that asset from receiving more updates.
The Asset Profiler threshold settings specify the conditions under which an asset is blocked from
updates. The asset is updated normally up to the threshold value. When the system collects enough
data to exceed the threshold, the asset shows an asset growth deviation. Future updates to the asset
are blocked until the growth deviation is rectified.
System notifications that indicate asset growth deviations
IBM QRadar generates system notifications to help you identify and manage the asset growth
deviations in your environment.
IBM® QRadar® generates system notifications to help you identify and manage the asset growth
deviations in your environment.
The following system messages indicate that QRadar identified potential asset growth deviations:
•
•
The system detected asset profiles that exceed the normal size threshold
The asset blacklist rules have added new asset data to the asset blacklists
The system notification messages include links to reports to help you identify the assets that have
growth deviations.
Asset data that changes frequently
Asset growth can be caused by large volumes of asset data that changes legitimately, such as in these
situations:
•
•
A mobile device that travels from office-to-office frequently and is assigned a new IP address
whenever it logs in.
A device that connects to a public wifi with short IP addresses leases, such as at a university
campus, might collect large volumes of asset data over a semester.
QRadar might mistakenly report this activity as an asset growth deviation. If the asset growth is
legitimate, you can take steps to ensure that the asset data is handled properly. For more
information, see c_qradar_adm_prevent_asset_grwth_deviat.html.
Example: How configuration errors for log source extensions can cause asset growth
deviations
Customized log source extensions that are improperly configured can cause asset growth
deviations.
You configure a customized log source extension to provide asset updates to IBM® QRadar® by
parsing user names from the event payload that is on a central log server. You configure the log
source extension to override the event host name property so that the asset updates that are
generated by the custom log source always specify the DNS host name of the central log server.
Instead of QRadar receiving an update that has the host name of the asset that the user logged in to,
the log source generates many asset updates that all have the same host name.
In this situation, the asset growth deviation is caused by one asset profile that contains many IP
addresses and user names.
Troubleshooting asset profiles that exceed the normal size threshold
IBM QRadar generates the following system notification when the accumulation of data under a
single asset exceeds the configured threshold limits for identity data.
The system detected asset profiles that exceed the normal size threshold
Explanation
The payload of the notification shows a list of the top five most frequently deviating assets and why the
system marked each asset as a growth deviation. As shown in the following example, the payload also
shows the number of times that the asset attempted to grow beyond the asset size threshold.
Feb 13 20:13:23 127.0.0.1 [AssetProfilerLogTimer]
com.q1labs.assetprofile.updateresolution.UpdateResolutionManager:
[INFO] [NOT:0010006101][192.0.2.83/- -] [-/- -]
The top five most frequently deviating asset profiles between
Feb 13, 2015 8:10:23 PM AST and Feb 13, 2015 8:13:23 PM AST:
[ASSET ID:1003, REASON:Too Many IPs, COUNT:508],
[ASSET ID:1002, REASON:Too many DNS Names, COUNT:93],
[ASSET ID:1001, REASON:Too many MAC Addresses, COUNT:62]
When the asset data exceeds the configured threshold, QRadar blocks the asset from future
updates. This intervention prevents the system from receiving more corrupted data and mitigates
the performance impacts that might occur if the system attempts to reconcile incoming updates
against an abnormally large asset profile.
Required user action
Use the information in the notification payload to identify the assets that are contributing to the
asset growth deviation and determine what is causing the abnormal growth. The notification
provides a link to a report of all assets that experienced deviating asset growth over the past 24
hours.
After you resolve the asset growth deviation in your environment, you can run the report again.
1. Click the Log Activity tab and click Search > New Search.
2. Select the Deviating Asset Growth: Asset Report saved search.
3. Use the report to identify and repair inaccurate asset data that was created during the
deviation.
New asset data is added to the asset blocklists
IBM QRadar generates the following system notification when a piece of asset data exhibits
behavior that is consistent with deviating asset growth.
The asset blacklist rules have added new asset data to the asset
blacklists
Explanation
Asset exclusion rules monitor asset data for consistency and integrity. The rules track specific
pieces of asset data over time to ensure that they are consistently being observed with the same
subset of data within a reasonable time.
For example, if an asset update includes both a MAC address and a DNS host name, the MAC address
is associated with that DNS host name for a sustained period. Subsequent asset updates that
contain that MAC address also contain that same DNS host name when one is included in the asset
update. If the MAC address suddenly is associated with a different DNS host name for a short
period, the change is monitored. If the MAC address changes again within a short period, the MAC
address is flagged as contributing to an instance of deviating or abnormal asset growth.
Required user action
Use the information in the notification payload to identify the rules that are used to monitor asset
data. Click the Asset deviations by log source link in the notification to see the asset deviations
that occurred in the last 24 hours.
If the asset data is valid, QRadar administrators can configure QRadar to resolve the problem.
•
•
If your blocklists are populating too aggressively, you can tune the asset reconciliation
exclusion rules that populate them.
If you want to add the data to the asset database, you can remove the asset data from the
blocklist and add it to the corresponding asset allowlist. Adding asset data to the allowlist
prevents it from inadvertently reappearing on the blocklist.
Tuning the Asset Profiler retention settings
IBM® QRadar® uses the asset retention settings to manage the size of the asset profiles.
The default retention period for most asset data is 120 days after the last time it was either
passively or actively observed in QRadar. User names are retained for 30 days.
Asset data that is added manually by QRadar users does not usually contribute to asset growth
deviations. By default, this data is retained forever. For all other types of asset data, the Retain
Forever flag is suggested only for static environments.
About this task
You can adjust the retention time based on the type of asset identity data that is in the event. For
example, if multiple IP addresses are merging under one asset, you can change the Asset IP
Retention period from 120 days to a lower value.
When you change the asset retention period for a specific type of asset data, the new retention
period is applied to all asset data in QRadar. Existing asset data that already exceeds the new
threshold is removed when the deployment is complete. To ensure that you can always identify
named hosts even when the asset data is beyond the retention period, the asset retention cleanup
process does not remove the last known host name value for an asset.
Before you determine how many days that you want to retain the asset data, understand the following
characteristics about longer retention periods:
•
•
•
provides a better historical view of your assets.
creates larger data volumes per asset in the asset database.
increases the probability that stale data will contribute to asset growth deviation messages.
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Asset Profiler Configuration.
Click Asset Profiler Retention Configuration.
Adjust the retention values and click Save.
Deploy the changes into your environment for the updates to take effect.
TASK: 1.10 Install and configure apps
SUBTASKS:
1.10.1. Install apps
1.10.2. Manage authorized services
1.10.3. Backup and restore applications
1.10.4. Configure out-of-the-box installed Apps
Apps overview
After a developer creates an app, IBM certifies and publishes it in the IBM Security App
Exchange. QRadar administrators can then browse and download the apps and then install the apps
into QRadar to address specific security requirements.
The IBM Security App Exchange is a community-based sharing hub, that you use to share apps across IBM
Security products. By participating in App Exchange, you can use the rapidly assembled, innovative
workflows, visualizations, analytics, and use cases that are packaged into apps to address specific security
requirements. Easy-to-use solutions are developed by partners, consultants, developers to address key
security challenges. To detect and remediate threats, use these shared security components, from realtime correlation and behavioral modeling to custom responses and reference data.
Note: The combined memory requirements of all the apps that are installed on a QRadar Console cannot
exceed 10 per cent of the total available memory, or the apps won't work. If you exceed the 10 per cent
memory allocation and want to run more apps, use a dedicated appliance for your apps (AppNode appliance
for QRadar V7.3.1 or the AppHost appliance for QRadar V7.3.2 or later).
The IBM QRadar Assistant app helps you to manage and update your app and content extension
inventory, view app and content extension recommendations, follow the QRadar Twitter feed, and
get links to useful information. The app is automatically installed with QRadar V7.3.2 or later.
The following diagram shows the workflow for an app and the role who is typically responsible for
the work.
Figure 1. App workflow
FAQ
What is an app?
Apps create or add new functions in QRadar by providing new tabs, API methods, dashboard
items, menus, toolbar buttons, configuration pages, and more within the QRadar user
interface. You download apps from the IBM Security App Exchange. Apps that are created by
using the GUI Application Framework Software Development Kit integrate with
the QRadar user interface to deliver new security intelligence capabilities or extend the
current functions.
Every downloaded file from the IBM Security App Exchange is known as an extension. An
extension can consist of an app or security product enhancement (content extension) that is
packaged as an archive (.zip) file, which you can deploy on QRadar by using the Extensions
Management tool on the Admin tab.
Who can create an app?
You can use the GUI Application Framework Software Development Kit to create apps. For
more information about the GUI Application Framework Software Development Kit, see
the IBM Security QRadar App Framework Guide.
You download (https://developer.ibm.com/qradar/) the SDK from IBM developerWorks®.
How do I share my app?
Only certified content is shared in the IBM Security App Exchange, a new platform for
collaborating where you can respond quickly and address your security and platform
enhancement requirements. In the IBM Security App Exchange, you can find available apps,
discover their purpose, and what they look like, and learn what other users say about the
apps.
How do I get an app that I downloaded into QRadar?
A QRadar administrator downloads an extension and imports it into QRadar by using
the Extensions Management tool, which is used to upload the downloaded extension from
a local source.
Where do I get help for an app?
You can see information about an app in the overview section when you download the app
from the IBM Security App Exchange. For apps developed solely by IBM, you can find
information in the IBM Knowledge Center.
How much memory does an app need?
The combined memory requirements of all the apps that are installed on a QRadar Console cannot
exceed 10 per cent of the total available memory. If you install an app that causes the 10 per cent
memory limit to be exceeded, the app does not work.
If your app requires a minimum memory allocation, you must specify this allocation as part
of your app manifest. The default allocation is 200 MB.
What is the difference between an app, a content extension, and a content pack?
Extension
From within QRadar, an extension is a term that is used for everything that you download
from the IBM Security App Exchange. Sometimes that extension contains individual content
items, such as custom AQL functions or custom actions, and sometimes the extension
contains an app that is developed by using the GUI App Framework Software Development
Kit. You use the Extensions Management tool to install extensions.
App
An app is content that is created when you use the GUI App Framework Software
Development Kit. The app extends or creates new functions in QRadar.
Content extension
A content extension is typically used to update QRadar security template information or add
new content such as rules, reports, searches, logos, reference sets, custom properties.
Content extensions are not created by using the GUI Application Framework Software
Development Kit.
You download content packs from IBM Fix Central in RPM format.
Typically, content extensions differ from content packs because you download content packs
(RPM files) from IBM Fix Central (www.ibm.com/support/fixcentral).
Backup and restore applications
IBM® QRadar® provides a way to backup and restore application configurations separate from the
application data.
Application configurations are backed up as part of the nightly configuration backup. The
configuration backup includes apps that are installed on the QRadar Console and on an App Host.
You can restore the application configuration by selecting the Installed Applications
Configuration option when you restore a backup.
Application data is backed up separate from the application configuration by using an easy-to-use
script that runs nightly. You can also use the script to restore the app data, and to configure backup
times and data retention periods for app data.
Backing up and restoring apps
Use the IBM QRadar Backup and Recovery window on the Admin tab to back up and restore apps.
You can back up your apps by creating a configuration backup. A configuration backup does not
back up your app's data. For information on backing up your app's data, see Backing up and
restoring app data.
If an App Host is attached to your QRadar Console, the App Host's configuration is backed up as part
of the console's Deployment Configuration. You cannot restore an App Host on a QRadar
Console with a different IP address than the App Host was initially configured with.
By default, apps are restored to console unless an App Host is present. If QRadar cannot restore
apps to your App Host, it attempts to back restore them to the QRadar Console. The number of App
Host apps that can be restored onto the console is constrained by the amount of memory that is
available on the QRadar Console. Apps that are defined as node_only in their application manifest
file cannot be restored to the QRadar Console.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Backup and Recovery.
Select an existing backup in the Backup and Recovery window and click Restore.
Ensure that the Installed Applications Configuration check box is selected, and
click Restore.
Note: By selecting the Installed Applications Configuration check box, you restore the
install app configurations only. Extension configurations are not restored. Select
the Deployment Configuration check box if you want to restore extension configurations.
Backing up and restoring app data
Use the app-volume-backup.py script to back up and recover app data.
A configuration backup that you do on the backup and Recovery window does not back up your
apps' data. The /opt/qradar/bin/app-volume-backup.py script runs nightly at 2:30 AM,
and backs up each installed application's /store mounted volume. By default, data is retained for
7 days.
Use the script to do the following tasks:
•
•
•
•
Back up data manually for installed apps.
List all installed app data backups on the system.
Restore data for installed apps.
Run the retention process and set the retention period for backups.
This script is on both the QRadar® Console and the App Host if one is installed. The script backs up
app data only if apps are on the current host.
Procedure
1. Use SSH to log in to your Console or your App Host as the root user.
2. Go to the /opt/qradar/bin/ directory.
o Use the following command to back up app data:
./app-volume-backup.py backup
The app-volume-backup.py script runs nightly at 2:30 AM local time to back up
all installed apps. Backup archives are stored in the /store/apps/backup folder.
You can change the backup archives location by editing
the APP_VOLUME_BACKUP_DIR variable
in /store/configservices/staging/globalconfig/nva.conf. You must
deploy changes after you edit this variable.
o
To view all data backups for installed apps, enter the following command:
./app-volume-backup.py ls
This command outputs all backup archives that are stored in the backup archives
folder.
o
To restore a backup archive, enter the following command:
./app-volume-backup.py restore -i
<backup_name>
Use the ls command to find the name of a backup archive.
o
New in 7.5.0To restore data for a specific application instance, rather than restoring
all instances, enter the following command:
./app-volume-backup.py restore-interactive -i
<backup name>
Note: This function was added in QRadar 7.5.0 Update Package 1, and works only
with backups that were created after updating to 7.5.0 Update Package 1.
o
New in 7.5.0 Update Package 6To backup data for an individual application instance,
enter the following command:
/opt/qradar/bin/app-volume-backup.py backup -u
<app definition uuid>
In a multitenant deployment, you must specify the security profile associated with
the application instance that you want to backup. For
example, /opt/qradar/bin/app-volume-backup.py backup -u <app
definition uuid> -s <security profile id>
o
New in 7.5.0 Update Package 6To restore data for an individual application instance,
enter the following command:
/opt/qradar/bin/app-volume-backup.py restore -i
u
<backup tarball> -n -
<app definition uuid>
In a multitenant deployment, you must specify the security profile associated with
the application instance that you want to restore. For
example, /opt/qradar/bin/app-volume-backup.py restore -i <backup
tarball> -n -u <app definition uuid> -s <security profile id>
o
By default, all backup archives are retained for one week. The retention process runs
nightly at 2:30 AM local time with the backup.
▪ To perform retention manually, and use the default retention period, enter the
following command:
./app-volume-backup.py retention
▪
You can also set the retention period manually by adding -t (time - defaults to
1) and -p (period - defaults to 0) switches.
The -p switch accepts three values: 0 for a week, 1 for a day, and 2 for an
hour.
For example, to set the retention period for a backup to 3 weeks, enter the
following command:
./app-volume-backup.py retention -t 3 -p 0
o
If you want to change the retention time that is used by the nightly timer, add flags to
the retention command found in the following systemd service file.
/usr/lib/systemd/system/app-data-backup.service
For example, to change the retention period that is used by the nightly retention
process to 5 days, locate the following line:
ExecStart=/opt/qradar/bin/app-volume-backup.py retention
Replace it with:
ExecStart=/opt/qradar/bin/app-volume-backup.py retention -t 5 -p 1
Save your changes, and run the systemctl daemon-reload command for systemd to
apply the changes.
App containers are restarted automatically after the restore is complete.
Configuring the QRadar Assistant app
The QRadar® Assistant app is included in QRadar installations of version 7.3.1 and later. You can
download the app from the IBM® Security App Exchange (https://exchange.xforce.ibmcloud.com/)
for those versions. An Admin user must configure certain options to enable the Assistant app in
your QRadar environment.
About this task
QRadar requires that you use authentication tokens to authenticate the API that calls the app. Use
the Authorized Services to create authentication tokens before using the QRadar Assistant App. You
must have QRadar administrator privilege to create authorized service tokens.
QRadar on Cloud administrators should use Self Serve App to create authentication tokens with
Admin security profile and Admin user role. See Authorized Service Tokens .
Procedure
1. Click the Assistant app icon (
).
2. If you are the Admin configuring the Assistant app for the first time, complete the following
steps:
a. Enter a valid authorized service token into the banner on the Assistant app page and
click Save.
For more information, see How to add an authorized
service (https://www.ibm.com/docs/en/qsip/7.4?topic=services-addingauthorized-service).
Important: The security profile for the token must be Admin.
b. Click Settings, select the API Authentications tab, and enter your X-Force®
Exchange API Key and API Password. For more information, see Obtaining an API Key
and Password (https://api.xforce.ibmcloud.com/doc/#auth).
c. For Assistant 3.5.0 or later, click the gear icon on the Assistant app page to go to
the Settings page, and then enter the authorized service token, your X-Force®
Exchange API Key, and API password.
After an Admin configures the authorized service token and API key and password, other
Admin users do not need to perform this configuration. Non-Admin users can use the
Assistant app, but are not authorized to download and install apps.
3. To configure a proxy server for communication with X-Force Exchange, click Settings, select
the Proxy tab, and enter the following information for your proxy server:
a. Protocol
b. Address
c. Port
d. User name
e. Password
4. Click Save, then close the Settings window.
5. If you want to use the QRadar Phone Home Service, click Agree.
Managing authorized services
You can configure authorized services on the Admin tab to authenticate an API call for your IBM®
QRadar® deployment.
The QRadar RESTful API uses authorized services to authenticate API calls to the QRadar Console.
You can add or revoke an authorized service at any time. For more information about the RESTful
API, see the IBM QRadar API Guide.
The Manage Authorized Services window provides the following information:
Parameter
Description
Service Name The name of the authorized service.
Authorized By The name of the user or administrator that authorized the addition of the service.
Authentication
Removed in 7.4.3 The token that is associated with this authorized service.
Token
User Role
The user role that is associated with this authorized service.
Security
Profile
The security profile that is associated with this authorized service.
Created
The date that this authorized service was created.
Expires
The date and time that the authorized service expires. By default, the authorized service is valid for 30 days.
Table 1. Parameters for authorized services
Viewing authorized services
Removed in 7.4.3 The Authorized Services window displays a list of authorized services, from
which you can copy the token for the service.
Adding an authorized service
Use the Add Authorized Service window to add a new authorized service.
The authorized service token cannot be made visible after you close the Authorized Service
Created Successfully dialog. Copy the token to a secure location before you close the dialog.
Revoking authorized services
Use the Add Authorized Service window to revoke an authorized service.
Section 2: Performance Optimization
TASK: 2.1 Construct identity exclusions
SUBTASKS:
2.1.1. Display understanding of identity exclusions
• Identity exclusion searches
• Differences between identity exclusions searches and blocklists
2.1.2. Create identity exclusion searches
Identity exclusion searches
Identity exclusion searches can be used to manage single assets that accumulate large volumes of
similar identity information for known, valid reasons.
For example, log sources can provide large volumes of asset identity information to the asset
database. They provide IBM® QRadar® with near real-time changes to asset information and they
can keep your asset database current. But log sources are most often the source of asset growth
deviations and other asset-related anomalies.
When a log source sends incorrect asset data to QRadar, try to fix the log source so that the data it
sends is usable by the asset database. If the log source cannot be fixed, you can build an identity
exclusion search that blocks the asset information from entering the asset database.
You can also use an identity exclusion search where Identity_Username+Is Any Of + Anonymous
Logon to ensure that you are not updating assets that are related to service accounts or automated
services.
Differences between identity exclusion searches and blacklists
While identity exclusion searches appear to have similar functionality to asset blacklists, there are
significant differences.
Blacklists can specify only raw asset data, such as MAC addresses and host names, that is to be
excluded. Identity exclusion searches filter out asset data based on search fields like log source,
category, and event name.
Blacklists do not account for the type of data source that is providing the data, whereas identity
exclusion searches can be applied to events only. Identity exclusion searches can block asset
updates based on common event search fields, such as event type, event name, category, and log
source.
Creating identity exclusion searches
To exclude certain events from providing asset data to the asset database, you can create an IBM
QRadar identity exclusion search.
The filters that you create for the search must match events that you want to exclude, not the
events that you want to keep.
You might find it helpful to run the search against events that are already in the system. However,
when you save the search, you must select Real Time (streaming) in the Timespan options. If you
do not choose this setting, the search does not match any results when it runs against the live
stream of events that are coming into QRadar.
When you update the saved identity exclusion search without changing the name, the identity
exclusion list that is used by the Asset Profiler is updated. For example, you might edit the search to
add more filtering of the asset data that you want to exclude. The new values are included and the
asset exclusion starts immediately after the search is saved.
Procedure
1. Create a search to identify the events that do not provide asset data to the asset database.
a. On the Log Activity tab, click Search > New Search.
b. Create the search by adding search criteria and filters to match the events that you
want to exclude from asset updates.
c. In the Time Range box, select Real Time (streaming) and then click Filter to run
the search.
d. On the search results screen, click Save Criteria and provide the information for the
saved search.
Note: You can assign the saved search to a search group. An Identity Exclusion search
group exists in the Authentication, Identity and User Activity folder.
e. Click OK to save the search.
2. Identify the search that you created as an identity exclusion search.
a. On the navigation menu ( ), click Admin.
b. In the System Configuration section, click Asset Profiler Configuration.
c. Click Manage Identity Exclusion at the bottom of the screen.
d. Select the identity exclusion search that you created from the list of searches on the
left and click the add icon (>).
Tip: If you can't find the search, type the first few letters into the filter at the top of
the list.
e. Click Save.
3. On the Admin tab, click Deploy changes for the updates to take effect.
TASK: 2.2 Deal with resource restrictions
SUBTASKS:
2.2.1. Document the function of resource restrictions in distributed and non-distributed
environments
• Access wise
• Resource limitation wise
• Canceled searches
• Empty search results
• Inconsistent search results
• Limited search results
2.2.2. Configure resource restrictions
• Set resource restrictions to apply time or data limitations to event and flow searches
• Execution time, time span, record limit
2.2.3. Explain different types of resource restrictions
• User-based
• Role-based
• Tenant-based
Types of resource restrictions
You can set limitations on searches by configuring either time or data set restrictions based on user, role,
or tenant.
Resource restrictions are applied in the following order: user, user role, and tenant. For example,
restrictions that are set for a user take precedence over restrictions that are set for the user role or
tenant that the user is assigned to.
You can set the following types of restrictions on event and flow searches:
•
•
•
The length of time that a search runs before data is returned.
The time span of the data to be searched.
The number of records that are processed by the Ariel query server.
Note: Ariel search stops when the record limit is reached, but all in-progress search results
are returned to the search manager and are not truncated. Therefore, the search result set is
often larger than the specified record limit.
User-based restrictions
User-based restrictions define limits for an individual user, and they take precedence over role and
tenant restrictions.
For example, your organization hires university students to work with the junior analysts in your
SOC. The students have the same user role as the other junior analysts, but you apply more
restrictive user-based restrictions until the students are properly trained in
building QRadar® queries.
Role-based restrictions
Role-based restrictions allow you to define groups of users who require different levels of access to
your QRadar deployment. By setting role-based restrictions, you can balance the needs of different
types of users.
Tenant-based restrictions
In a Managed Security Service Provider (MSSP) or a multi-divisional organization, tenant-based
restrictions can help you ensure quality of service by preventing resource contention and
degradation of services. You can prevent a tenant from querying terabytes of data that can
negatively impact the system performance for all other tenants.
As an MSSP, you might define standard resource restrictions based on a set of criteria that each
tenant is compared to. For example, the standard configuration for a medium-sized tenant might
include resource restrictions that limit searches to accessing only the last 14 days of data and a
maximum of 10,000 records returned.
Configuring resource restrictions
Set resource restrictions to apply time or data limitations to event and flow searches.
About this task
You can set the following types of resource restrictions:
•
•
•
Execution time restrictions specify the maximum amount of time that a query runs before
data is returned.
Time span restrictions specify the time span of the data to be searched.
Record limit restrictions specify the number of data records that are returned by a search
query.
Users who run searches that are limited by resource restrictions see the resource restriction icon (
) next to the search criteria.
Note: The search result set is often larger than the specified record limit. When the record limit is reached,
the search manager signals all search participants to stop (there are multiple search participants even on a
single system), but results continue to accumulate until the search fully stops on all participants. All search
results are added to the result set.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Resource Restrictions.
3. If your deployment has tenants that are configured, click Role or Tenant to specify the type
of restrictions to set.
4. Double-click the role or tenant that you want to set restrictions for.
5. To set restrictions for all users who are assigned to the user role or tenant, follow these
steps:
a. Click the summary row at the top to open the Edit Restriction dialog box.
b. Click Enabled for the type of restriction that you want to set, and specify the
restriction values.
c. Click Save.
6. To set restrictions for a specific user, follow these steps:
a. Double-click the user that you want to set the restrictions for.
To search for a user, type the user name in the filter field.
b. Click Enabled for the type of restriction that you want to set, and specify the
restriction values.
c. Click Save.
TASK: 2.3 Rule configuration and tuning
SUBTASKS:
2.3.1. Explain different types of correlation rules
• Event rules
• Flow rules
• Common rules
• Offense rules
2.3.2. Create different types of correlation rules
• Rule creation wizard
• Test groups
• Response parameters
2.3.3. Tune rules
• Tuning wizard
• Basic rule tests familiarity
2.3.4. Identify expensive rules with QRadar support tolos
QRadar tuning
Before you tune QRadar, wait one day to enable QRadar to detect servers on your network, store
events and flows, and create offenses that are based on existing rules.
Administrators can do the following tuning tasks:
•
•
•
•
Optimize event and flow payload searches by enabling a payload index on the Log
Activity and Network Activity.
Provide a faster initial deployment and easier tuning by automatically or manually adding
servers to building blocks.
Configure responses to event, flow, and offense conditions by creating or modifying custom
rules and anomaly detection rules.
Ensure that each host in your network creates offenses that are based on the most current
rules, discovered servers, and network hierarchy.
Payload indexing
Use the Quick Filter function, which is available on the Log Activity and Network Activity tabs, to
search event and flow payloads.
To optimize the Quick Filter, you can enable a payload index Quick Filter property.
Enabling payload indexing might decrease system performance. Monitor the index statistics after
you enable payload indexing on the Quick Filter property.
For more information, see Index management.
Enabling payload indexing
You can optimize event and flow payload searches by enabling a payload index on the Log
Activity and Network Activity Quick Filter property.
Procedure
1.
2.
3.
4.
5.
6.
7.
Click the Admin tab.
In the System Configuration section, click Index Management.
In the Search field, type quick filter.
Right-click the Quick Filter property that you want to index.
Click Enable Index.
Click Save, and then click OK.
Optional: To disable a payload index, choose one of the following options:
o Click Disable Index.
o Right-click a property and select Disable Index from the menu.
Servers and building blocks
IBM QRadar automatically discovers and classifies servers in your network, providing a faster
initial deployment and easier tuning when network changes occur.
To ensure that the appropriate rules are applied to the server type, you can add individual devices or
entire address ranges of devices. You can manually enter server types that do not conform to unique
protocols into their respective Host Definition Building Block. For example, adding the following server
types to building blocks reduces the need for further false positive tuning:
•
•
•
•
Add network management servers to the BB:HostDefinition: Network Management
Servers building block.
Add proxy servers to the BB:HostDefinition: Proxy Servers building block.
Add virus and Windows update servers to the BB:HostDefinition: Virus Definition and
Other Update Servers building block.
Add vulnerability assessment (VA) scanners to the BB-HostDefinition: VA Scanner Source
IP building block.
The Server Discovery function uses the asset profile database to discover several types of servers
on your network. The Server Discovery function lists automatically discovered servers and you can
select which servers you want to include in building blocks.
Using Building blocks, you can reuse specific rule tests in other rules. You can reduce the number of
false positives by using building blocks to tune QRadar and enable extra correlation rules.
Adding servers to building blocks automatically
The Server Discovery function uses the asset profile database to discover different server types that
are based on port definitions. Then, you can select the servers to add to a server-type building block
for rules.
Procedure
1. Click Assets > Server Discovery.
2. In the Server Type list, select the server type that you want to discover.
Keep the remaining parameters as default.
3. Click Discover Servers.
4. In the Matching Servers pane, select the checkbox of all servers you want to assign to the
server role.
5. Click Approve Selected Servers.
Remember: You can right-click any IP address or host name to display DNS resolution
information.
Adding servers to building blocks manually
If a server is not automatically detected, you can manually add the server to its corresponding Host
Definition Building Block.
Procedure
1.
2.
3.
4.
Click the Offenses tab.
In the navigation pane, click Rules.
In the Display list, select Building Blocks.
In the Group list, select Host Definitions.
The name of the building block corresponds with the server type. For
example, BB:HostDefinition: Proxy Servers applies to all proxy servers in your
environment.
5. To manually add a host or network, double-click the corresponding Host Definition Building
Block appropriate to your environment.
6. In the Building Block field, click the underlined value for the source or destination IP
address.
7. In the Enter an IP address or CIDR field, type the host names or IP address ranges that you
want to assign to the building block.
8. Click Add > Submit.
9. Click Finish.
10. Repeat these steps for each server type that you want to add.
Configuring rules
From the Log Activity, Network Activity, and Offenses tab, you can configure rules or building
blocks.
Procedure
1.
2.
3.
4.
5.
Click the Offenses tab.
Double-click the offense that you want to investigate.
Click Display > Rules.
Double-click a rule.
Close the Rules wizard.
The Creation Date property changes to the date and time when you last updated a rule.
6. In the Rules page, click Actions.
7. Optional: If you want to prevent the offense from being removed from the database after the
offense retention period is elapsed, select Protect Offense.
8. Optional: If you want to assign the offense to a IBM QRadar user, select Assign.
Cleaning the SIM data model
Clean the SIM data model to ensure that each host creates offenses that are based on the most
current rules, discovered servers, and network hierarchy.
Procedure
1. Click the Admin tab.
2. On the toolbar, select Advanced > Clean SIM Model.
3. Select an option:
o Soft Clean to set the offenses to inactive.
o Soft Clean with the optional Deactivate all offenses check box to close
all offenses.
o Hard Clean to erase all entries.
4. Select the Are you sure you want to reset the data model checkbox.
5. Click Proceed.
6. After the SIM reset process is complete, refresh your browser.
Results
When you clean the SIM model, all existing offenses are closed. Cleaning the SIM model does not
affect existing events and flows.
Creating a custom rule
IBM® QRadar® includes rules that detect a wide range of activities, including excessive firewall denies,
multiple failed login attempts, and potential botnet activity. You can also create your own rules to detect
unusual activity.
Before you begin
Before you create a new rule, you must have the Offenses > Maintain Custom Rules permission.
About this task
When you define rule tests, test against the smallest data possible. Testing in this way helps rule
test performance and ensures that you don't create expensive rules. To optimize performance, start
with broad categories that narrow the data that is evaluated by the rule test. For example, start
with a rule test for a specific log source type, network location, flow source, or context (R2L, L2R,
L2L). Any mid-level tests might include IP addresses, port traffic, or any other associated test. The
rule must test payload and regex expressions last.
Similar rules are grouped by category. For example, Audit, Exploit, DDoS, Recon, and more. When
you delete an item from a group, the rule or building block is only deleted from the group; it
remains available on the Rules page. When you delete a group, the rules or building blocks of that
group remain available on the Rules page.
Procedure
1. From the Offenses, Log Activity, or Network Activity tabs, click Rules.
2. From the Display list, select Rules to create a new rule.
3. Optional: From the Display list, select Building Blocks to create a new rule by using
building blocks.
4. From the Actions list, select a rule type.
Each rule type tests against incoming data from different sources in real time. For example,
event rules test incoming log source data and offense rules test the parameters of an offense
to trigger more responses.
5. In the Rule Wizard window, select the Skip this page when running this rules
wizard checkbox and click Next.
If you select the Skip this page when running this rules wizard checkbox,
the Welcome page does not appear each time that you start.
6. On the Rule Test Stack Editor page, in the Rule pane, type a unique name that you want to
assign to this rule in the Apply text box.
7. From the list box, select Local or Global.
o If you select Local, all rules are processed on the Event Processor on which they were
received and offenses are created only for the events that are processed locally.
o If you select Global, all matching events are sent to the QRadar Console for
processing and therefore, the QRadar Console uses more bandwidth and processing
resources.
Learn more about Local and Global rules:
Global rule tests
Use global rules to detect things like "multiple user login failures" where the events from
that user might appear on multiple Event processors. For example, if you configured
a Local rule for five login failures in 10 minutes from the same username, all 5 of those login
failures must appear on the same Event Processor. Therefore, if three login failures were on
one Event Processor and 2 were on another, no offense is generated. However, if you set this
rule to Global, it generates an offense.
8. From the Test Group list, select one or more tests that you want to add to this rule. The CRE
evaluates rule tests line-by-line in order. The first test is evaluated and when true, the next
line is evaluated until the final test is reached.
If you want to select the when the event matches this AQL filter query test for a new
event rule, click the add (+) icon. In the Rule pane, click This and enter an AQL WHERE
clause query in the Enter an AQL filter query text box.
Learn more about using rules for events that are not detected:
The following rule tests can be triggered individually, but rule tests in the same rule test
stack are not acted upon.
o
o
o
when the event(s) have not been detected by one or more of these log source
types for this many seconds
when the event(s) have not been detected by one or more of these log sources
for this many seconds
when the event(s) have not been detected by one or more of these log source
groups for this many seconds
These rule tests are not activated by an incoming event, but instead are activated when a
specific event is not seen for a specific time interval that you configured. QRadar uses
a watcher task that periodically queries the last time that an event was seen (last seen time),
and stores this time for the event, for each log source. The rule is triggered when the
difference between this last seen time and the current time exceeds the number of seconds
that is configured in the rule.
9. To export the configured rule as a building block to use with other rules, click Export as
Building Block.
10. On the Rule Responses page, configure the responses that you want this rule to generate.
Learn more about rule response page parameters:
Parameter
Description
Severity
Select this checkbox to assign a severity level to the event, where 0 is the lowest and 10 is
the highest. The severity is displayed in the Annotation pane of the event details.
Credibility
Select this checkbox to assign credibility to the log source. For example, is the log source
noisy or expensive? The range is 0 (lowest) to 10 (highest) and the default is 10. Credibility
is displayed in the Annotation pane of the event details.
Relevance
Select this checkbox to assign relevance to the weight of the asset. For example, how much
do you care about the asset? The range is 0 (lowest) to 10 (highest) and the default is 10.
Relevance is displayed in the Annotation pane of the event details.
Bypass further Select this checkbox to match an event or flow to bypass all other rules in the rule
rule correlation engine and prevent it from creating an offense. The event is written to storage for
event
searching and reporting.
Select this checkbox to dispatch a new event in addition to the original event or flow,
which is processed like all other events in the system.
Dispatch New
Event
Dispatches a new event with the original event, and is processed like all other events
in the system.
The Dispatch New Event parameters are displayed when you select this checkbox .
By default, the checkbox is clear.
Email
Select this checkbox to change the Email Locale setting from the System Settings on
the Admin tab.
Parameter
Description
Select this checkbox to log the event or flow locally.
Send to Local
Syslog
By default, this checkbox is clear.
Note: Only normalized events can be logged locally on an appliance. If you want to send raw
event data, you must use the Send to Forwarding Destinations option to send the data to a
remote syslog host.
Select this checkbox to log the event or flow on a forwarding destination.
Send to
Forwarding
Destinations
A forwarding destination is a vendor system, such as SIEM, ticketing, or alerting
systems. When you select this checkbox, a list of forwarding destinations is
displayed.
Notify
To add, edit, or delete a forwarding destination, click the Manage Destinations link.
Select this checkbox to display events that are generated as a result of this rule in
the System Notifications item on the Dashboard tab.
If you enable notifications, configure the Response Limiter parameter.
Select this checkbox to add events that are generated as a result of this rule to a
reference set. You must be an administrator to add data to a reference set.
Add to
Reference Set
To add data to a reference set, follow these steps:
o
o
From the first list, select the property of the event or flow that you
want to add.
From the second list, select the reference set to which you want to add
the specified data.
Add to
Reference Data To use this rule response, you must create the reference data collection.
Select this checkbox to remove data from a reference set.
To remove data from a reference set:
o
Remove from
Reference Set
o
From the first list box, select the property of the event or flow that you
want to remove. Options include all normalized or custom data.
From the second list box, select the reference set from which you want
to remove the specified data.
The Remove from Reference Set rule response provides the following function:
Refresh
Click Refresh to refresh the first list box to ensure that the list is current.
Remove from
Reference Data To use this rule response, you must have a reference data collection.
Parameter
Description
Select this checkbox to write scripts that do specific actions in response to network events.
For example, you might write a script to create a firewall rule that blocks a particular source
Execute Custom IP address from your network in response to repeated login failures.
Action
You add and configure custom actions by using the Define Actions icon on
the Admin tab.
Response
Limiter
Select this checkbox to configure the frequency in which you want this rule to respond.
Table 1. Event , Flow and Common Rule, and Offense Rule Response page parameters
An SNMP notification might resemble the following example:
"Wed Sep 28 12:20:57 GMT 2005, Custom Rule Engine Notification Rule 'SNMPTRAPTst' Fired. 172.16.20.98:0 -> 172.16.60.75:0 1, Event Name:
ICMP Destination Unreachable Communication with Destination Host is
Administratively Prohibited, QID: 1000156, Category: 1014, Notes:
Offense description"
A syslog output might resemble the following example:
Sep 28 12:39:01 localhost.localdomain ECS:
Rule 'Name of Rule' Fired: 172.16.60.219:12642
-> 172.16.210.126:6666 6, Event Name: SCAN SYN FIN, QID:
1000398, Category: 1011, Notes: Event description
•
Example: Configuring a Modified Offense Rule Test
You can apply a modified offense rule test when any offense property is changed based on
the events that are associated with that offense. Modified rule tests allow for better
configuration of how and when rules are implemented.
IBM® QRadar building blocks
Building blocks group commonly used tests to build complex logic so that they can be used in rules.
Building blocks use the same tests that rules use, but have no actions that are associated with them.
They're often configured to test groups of IP addresses, privileged user names, or collections of
event names. For example, you might create a building block that includes the IP addresses of all
mail servers in your network, then use that building block in another rule, to exclude those hosts.
The building block defaults are provided as guidelines, which can be reviewed and edited based on
the needs of your network.
You can configure the host definition building blocks (BB:HostDefinition) to enable QRadar® to
discover and classify more servers on your network. If a particular server is not automatically
detected, you can manually add the server to its corresponding host definition building block. This
action ensures that the appropriate rules are applied to the particular server type. You can also
manually add IP address ranges instead of individual devices.
Edit the following building blocks to reduce the number of offenses that are generated by high
volume traffic servers:
BB:HostDefinition
VA Scanner Source IP
BB:HostDefinition
Network Management Servers
BB:HostDefinition
Virus Definition and Other Update Servers
BB:HostDefinition
Proxy Servers
BB:NetworkDefinition
NAT Address Range
BB:NetworkDefinition
Trusted Network
Tuning building blocks
Building blocks group commonly used tests, to build complex logic, so they can be used in rules.
You can edit building blocks to reduce the number of false positives that are generated
by IBM® QRadar®.
About this task
To edit building blocks, you must add the IP address or IP addresses of the server or servers into
the appropriate building blocks.
Procedure
1.
2.
3.
4.
5.
6.
Click the Offenses tab.
On the navigation menu, click Rules.
From the Display list, select Building Blocks.
Double-click the building block that you want to edit.
Update the building block.
Click Finish.
The following table describes editable building blocks.
Building Block
BB:NetworkDefinition:
NAT Address Range
BB:HostDefinition:
Network Management
Servers
Description
Edit the and where either the source or destination IP is one of the
following test to include the IP addresses of the Network Address
Translation (NAT) servers.
Edit this building block only if you have a detection in the nonNATd address space. Editing this building block means that offenses are
not created for attacks that are targeted or sourced from this IP address
range.
Network management systems create traffic, such as ICMP (Internet
Control Message Protocol) sweeps to discover hosts. QRadar SIEM might
consider this threatening traffic. To ignore this behavior and define
network management systems, edit the and when either the source or
destination IP is one of the following test to include the IP addresses of
the Network Management Servers (NMS), and other hosts that normally
perform network discovery or monitoring.
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of the proxy servers.
BB:HostDefinition: Proxy Edit this building block if you have sufficient detection on the proxy
Servers
server. Editing this building block prevents offense creation for attacks
BB:HostDefinition: VA
Scanner Source IP
that are targeted or sourced from the proxy server. This adjustment is
useful when hundreds of hosts use a single proxy server and that single IP
address of the proxy server might be infected with spyware.
Vulnerability assessment products launch attacks that can result in
offense creation. To avoid this behavior and define vulnerability
assessment products or any server that you want to ignore as a source,
edit the and when the source IP is one of the following test to include
the IP addresses of the following scanners:
o
o
VA Scanners
Authorized Scanners
BB:HostDefinition: Virus Edit the and when either the source or destination IP is one of the
Definition and Other
following test to include the IP addresses of virus protection and update
Update Servers
function servers.
Edit the and when the source is located in test to include geographic
BB:Category Definition: locations that you want to prevent from accessing your network. This
Countries with no Remote change enables the use of rules, such as anomaly: Remote Access from
Access
Foreign Country to create an offense when successful logins are detected
from remote locations.
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of servers that are used for
BB:ComplianceDefinition:Gramm-Leach-Bliley Act (GLBA) compliance. By populating this building
GLBA Servers
block, you can use rules such as Compliance: Excessive Failed Logins to
Compliance IS, which create offenses for compliance and regulationbased situations.
Building Block
Description
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of servers that are used for
BB:ComplianceDefinition:Health Insurance Portability and Accountability Act (HIPAA) compliance.
HIPAA Servers
By populating this building block, you can use rules, such as Compliance:
Excessive Failed Logins to Compliance IS, which create offenses for
compliance and regulation-based situations.
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of servers that are used for SOX
BB:ComplianceDefinition:(Sarbanes-Oxley Act) compliance. By populating this building block, you
SOX Servers
can use rules, such as Compliance: Excessive Failed Logins to
Compliance IS, which create offenses for compliance and regulationbased situations.
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of servers that are used for PCI
BB:ComplianceDefinition:DSS (Payment Card Industry Data Security Standards) compliance. By
PCI DSS Servers
populating this building block, you can use rules such as Compliance:
Excessive Failed Logins to Compliance IS, which creates offenses for
compliance and regulation-based situations.
Edit the and when either the source or destination IP is one of the
BB:NetworkDefinition: following test to include the broadcast addresses of your network. This
Broadcast Address Space change removes false positive events that might be caused by the use of
broadcast messages.
BB:NetworkDefinition:
Client Networks
Edit the and when the local network is test to include workstation
networks that users are operating.
BB:NetworkDefinition:
Server Networks
Edit the when the local network is test to include any server networks.
Edit the and when the local network is test to include the IP addresses
that are considered to be a dark net. Any traffic or events that are directed
towards a dark net is considered suspicious.
Edit the and when the any IP is a part of any of the following test to
BB:NetworkDefinition: include the remote services that might be used to obtain information from
DLP Addresses
the network. This change can include services, such as WebMail hosts or
file sharing sites.
BB:NetworkDefinition:
Darknet Addresses
BB:NetworkDefinition:
DMZ Addresses
Edit the and when the local network test to include networks that are
considered to be part of the network’s DMZ.
BB:PortDefinition:
Authorized L2R Ports
Edit the and when the destination port is one of the following test to
include common outbound ports that are allowed on the network.
BB:NetworkDefinition:
Watch List Addresses
Edit the and when the local network is to include the remote networks
that are on a watch list. This change helps to identify events from hosts
that are on a watch list.
BB:FalsePositive: User
Edit this building block to include any categories that you want to
Defined Server Type False consider as false positives for hosts that are defined in
Positive Category
the BB:HostDefinition: User Defined Server Type building block.
Building Block
Description
BB:FalsePositive: User
Edit this building block to include any events that you want to consider as
Defined Server Type False false positives for hosts that are defined in the BB:HostDefinition: User
Positive Events
Defined Server Type building block.
Edit this building block to include the IP address of your custom server
type. After you add the servers, you must add any events or categories
BB:HostDefinition: User that you want to consider as false positives to this server, as defined in
Defined Server Type
the BB:FalsePositives: User Defined Server Type False Positive Category
or the BB:False Positives: User Defined Server Type False Positive
Events building blocks.
Table 1. Building blocks to edit.
You can include a CIDR range or subnet in any of the building blocks instead of listing the IP
addresses. For example, 192.168.1/24 includes addresses 192.168.1.0 to 192.168.1.255. You
can also include CIDR ranges in any of the BB:HostDefinition building blocks.
Tip: For more information, see the IBM QRadar Administration Guide.
Use the IBM QRadar Use Case Manager to review your building blocks. Download the app at
the IBM Security App
Exchange (https://exchange.xforce.ibmcloud.com/hub/extension/bf01ee398bde8e5866fe5
1d0e1ee684a).
Creating an OR condition within the CRE
You can create a conditional OR test within the Custom Rules Engine (CRE), which gives you more
options for defining your rules by using building blocks.
About this task
For each extra test that you add, it can be only an AND or AND NOT conditional test. To create an
OR condition within the CRE you must place each separate set of conditions into a building block,
and then create a new rule or building block that uses the when <selected_rule> matches any
of the following rules rule.
Both building blocks are then loaded when the test is applied.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Actions list, select one of the following options:
o New Event Rule Select this option to configure a rule for events.
o New Flow Rule Select this option to configure a rule for flows.
o New Common Rule Select this option to configure a rule for events and flows.
o New Offense Rule Select this option to configure a rule for offenses.
4. Read the introductory text and then click Next.
You are prompted to Choose the source from which you want this rule to generate.
The default is the rule type that you selected on the Offenses tab.
5. Optional: Select the rule type that you want to apply to the rule, and then click Next.
6. From the Type to filter menu, select one of the following corresponding tests that is based
on the option that you choose in step 3, and then click the (+) icon for the test.
o when an event matches any|all of the following rules
o when a flow matches any|all of the following rules
o when a flow or an event matches any|all of the following rules
o when the offense matches any of the following offense rules
For example, if you select New Event Rule in step 3, select when an event matches any|all
of the following rules.
7. In the Rule pane, select one of the following corresponding tests that is based on the option
that you choose in step 3, and then click rules.
o and when an event matches any of the following rules
o and when a flow matches any of the following rules
o and when a flow or an event matches any of the following rules
o and when the offense matches any of the following offense rules
For example, if you select New Event Rule in step 3, select and when an event matches
any of the following rules, and then click rules.
8. From the Select the rule(s) to match and click 'Add' field, select multiple building blocks
by holding down the Ctrl key and click Add +.
If you select the offense rule, select building blocks from the Select an offense rule and
click 'Add' field.
9. Click Submit.
Guidelines for tuning system performance
How you tune IBM® QRadar® depends on different scenarios and whether you have one target or
many targets within your network.
To ensure reliable system performance, you must consider the following guidelines:
•
•
•
•
Disable rules that produce numerous unwanted offenses.
To tune CRE rules, increase the rule threshold by doubling the numeric parameters and the
time interval.
Consider modifying rules to consider the local network context rather than the remote
network context.
When you edit a rule with the attach events for the next 300 seconds option enabled, wait
300 seconds before you close the related offenses.
The following table provides information on how to tune false positives according to these differing
scenarios.
Scenario
One attacker,
one event
One Target
Use the False Positive
Wizard to tune the
specific event.
Many Targets
Use the False Positive Wizard to tune the specific
event.
One attacker,
Use the False Positive
many unique
Wizard to tune the
Use the False Positive Wizard to tune the category.
events in the
category.
same category
Use the False Positive
Many attackers,
Edit the building blocks by using the Custom Rules
Wizard to tune the
one event
Editor to tune the specific event.
specific event.
Many attackers,
Use the False Positive
many events in
Edit building blocks by using the Custom Rules
Wizard to tune the
the same
Editor to tune the category.
category.
category
Investigate the offense
and determine the nature
One attacker, of the attacker. If the
Investigate the offense and determine the nature of the
many unique
offense or offenses can be
attacker. If the offense or offenses can be tuned out, edit
events in
tuned out, edit the
the building blocks by using the Custom Rules Editor to
different
building blocks by using
tune the categories for the host IP address.
categories
the Custom Rules
Editor to tune categories
for the host IP address.
Many attackers,
Edit the building blocks
many unique
by using the Custom
Edit the building blocks by using the Custom Rules
events in
Rules Editor to tune the Editor to tune the categories.
different
categories.
categories
Scenario
One Target
Many Targets
Table 1. Tuning methodology.
•
Tuning false positives
You can tune false positive events and flows to prevent them from creating offenses.
https://www.ibm.com/docs/en/qsip/7.5?topic=performance-tuning-false-positives
Tuning false positives
You can tune false positive events and flows to prevent them from creating offenses.
Before you begin
To create a new rule, you must have the Offenses > Maintain Custom Rules permission for
creating customized rules to tune false positives. For more information about roles and
permissions, see the IBM® QRadar User Guide.
Procedure
1. Click the Log Activity tab, or the Network Activity tab.
2. Select the event or flow that you want to tune.
3. Click False Positive.
Note: If you are viewing events or flows in streaming mode, you must pause streaming
before you click False Positive.
4. Select one of the following Event or Flow Property options:
o Event/Flow(s) with a specific QID of <Event>
o Any Event/Flow(s) with a low-level category of <Event>
o Any Event/Flow(s) with a high-level category of <Event>
5. Select one of the following Traffic Direction options:
o <Source IP Address> to <Destination IP Address>
o <Source IP Address> to Any Destination
o Any Source to <Destination IP Address>
o Any Source to any Destination
6. Click Tune.
QRadar® prevents you from selecting Any Events/Flow(s) and Any Source To Any
Destination. This change creates a custom rule and prevents QRadar from creating offenses.
False positives configuration
The rule FalsePositive: False Positive Rules and Building Blocks is the first rule to execute in the
CRE. When it loads, all of its dependencies are loaded and tested.
Manage the configuration of false positives to minimize their impact on legitimate threats and
vulnerabilities. To prevent IBM® QRadar® from generating an excessive number of false positives,
you can tune false positive events and flows to prevent them from creating offenses.
False positive rule chains
The first rule to execute in the custom rules engine (CRE) is FalsePositive:False Positive Rules and
Building Blocks. When it loads, all of its dependencies are loaded and tested.
When an event or flow successfully matches the rule, it bypasses all other rules in the CRE to
prevent it from creating an offense.
Creating false positive building blocks
When you create false positive building blocks within QRadar, you must review the following
information:
Naming conventions
Use a methodology similar to the default rule set, by creating new building blocks by using the
following naming convention:
<CustomerName>-BB:False Positive: All False Positive Building Blocks,
where <CustomerName> is a name that you assign to the false positive building block.
False positive building blocks
Building blocks must contain the test: and when a flow or an event matches any of the
following rules. This test is a collection point for false positive building blocks and helps you to
quickly find and identify customizations. Note the following guidelines when you create your false
positive building blocks:
•
•
•
When the <CustomerName>-BB:False Positive: All False Positive Building
Block is created, add it to the test in the rule FalsePositive: False Positive Rules
and Building Blocks.
When the new false positive building block is created, you can create new building
blocks to match the traffic that you want to prevent from creating offenses. Add these
building blocks to the <CustomerName>-BB:False Positive: All False Positive
Building block.
To prevent events from creating offenses, you must create a new building block that
matches the traffic that you are interested in. Save as a building
block <CustomerName>-BB:False Positive: <name_of_rule>, then
edit <CustomerName>-BB:False Positive: All False Positive building blocks, to
include the rule that you created.
Note: If you add a rule or building block that includes a rule to the FalsePositive: False Positive
Rules and Building Blocks rule, the rule that you add runs before the event bypasses the CRE and
might create offenses by overriding the false positive test.
Custom rule testing order
When you build custom rules, you must optimize the order of the testing to ensure that the rules do
not impact custom rules engine (CRE) performance.
The tests in a rule are executed in the order that they are displayed in the user interface. The most
memory intensive tests for the CRE are the payload and regular expression searches. To ensure that
these tests run against a smaller subset of data and execute faster, you must first include one of the
following tests:
•
•
•
•
•
•
•
•
when the event(s) were detected by one or more of these log source types
when the event QID is one of the following QIDs
when the source IP is one of the following IP addresses
when the destination IP is one of the following IP addresses
when the local IP is one of the following IP addresses
when the remote IP is one of the following IP addresses
when either the source or destination IP is one of the following IP addresses
when the event(s) were detected by one of more of these log sources
You can further optimize QRadar® by exporting common tests to building blocks. Building blocks
execute per event as opposed to multiple times if tests are individually included in a rule.
QRadar: Troubleshooting Custom Rule
performance with findExpensiveCustomRules.sh
Problem
If not tuned properly, custom rules can cause performance issues. Warning messages such
as "Custom Rule Engine has sent a total of X event(s) directly to storage" in qradar.error
can indicate issues with rules. This article explains how to troubleshoot rule performance
by using the findExpensiveCustomRules.sh script.
Cause
A common cause for this issue is rules that need to be tuned in the QRadar deployment. If
a rule takes too long to execute, it could cause a performance issue. The result can cause
events to be routed directly to storage.
Examples of Expensive Rules are:
•
•
Payload-related tests that use Pattern or Curly regex-based calls.
The order in the rule can make the difference between a good rule and an expensive
rule.
Host and Port Profiles are expensive, especially if the asset and port vulnerability
databases are large.
Diagnosing The Problem
If events were sent to store, messages similar to the following appear in qradar.error:
[[type=com.eventgnosis.system.ThreadedEventProcessor][parent=device_name:ecs ep/EP/Processor2]] com.q1labs.semsources.cre.CRE: [WARN] [NOT:0080004101][x.x.x.x/-] [-/- -]Custom Rule Engine has sent a total of 5455 event(s) directly to storage.
5455 event(s) were sent in the last 60 seconds. Queue is at 80 percent capacity.
[[type=com.eventgnosis.system.ThreadedEventProcessor][parent=device_name:ecs ep/EP/Processor2]] com.q1labs.semsources.cre.CRE: [WARN] [NOT:0080004101][x.x.x.x/-] [-/- -]Custom Rule Engine has sent a total of 2734 event(s) directly to storage.
2734 event(s) were sent in the last 60 seconds. Queue is at 100 percent capacity.
Resolving The Problem
What is the findExpensiveCustomRules script?
The findExpensiveCustomRules.sh script is designed to query the QRadar data
pipeline and report on the processing statistics from the Custom Rules Engine (CRE). The
script monitors metrics and collects statistics on how many events hit each rule, how long
it takes to process a rule, total execution time, and average execution time. When the
script completes, it turns off these performance metrics.
The findExpensiveCustomRules.sh script is a useful tool for creating on-demand
reports for rule performance and not for tracking historical rule data in QRadar. The core
functionality of this script is often run when users see events routed to storage between
components in QRadar.
Part 1: How to run the findExpensiveCustomRules script
1. Using SSH, log in to the QRadar appliance that is reporting the events routed to
store.
The following appliance types run ECS-EP and the log files show the hostname of
the appliance that is reporting the issue:
o QRadar 16xx Event Processor appliances
o QRadar 17xx Flow Processor appliances
o QRadar 18xx Combination Event and Flow appliances
o QRadar 21xx Log Manager appliance
o QRadar 31xx Consoles
2. Run the findExpensiveCustomRules.sh script to review for any rules that are
expensive and tune them as required:
/opt/qradar/support/findExpensiveCustomRules.sh -d /root
Note: The -d option specifies the path of the output
of findExpensiveCustomRules.sh
Example output:
Data can be found in /root/CustomRule-2022-03-02-905476050.tar.gz
3. Use WinSCP or an equivalent tool to move the CustomRule-yyyy-mm-ddseconds.tar.gz file to your local laptop or workstation.
4. Use a compression utility to extract the CustomRule-yyyy-mm-ddseconds.tar.gz file to a .tar file.
5. Extract the .tar file a second time to access the Expensive Custom Rules report
text file. The output contains a .txt file, .xml file, and a folder named "reports".
6. Open CustomRule-yyyy-mm-dd-seconds.txt file in any spreadsheet
program as a CSV file.
Alternatively the output can be analyzed by using the command line by:
• Decompressing the file generated
tar -xvzf <file_name>
Example:
tar -xvzf CustomRule-2022-10-24-17-37.tar.gz
• Moving to the new decompressed
cd CustomRule-2022-10-24-17-37
•
folder:
Open the reports/AverageTestTime<date_stamp>.report and reports/AverageResponseTime.report files.
head reports/AverageTestTime-* reports/AverageResponseTime-* | sed
's/com.*\,name\=//g'
Part 2: What to look for in the CustomRule report
1. Sort the AverageResponseTime column and AverageTestTime column to look for
large values. It identifies which rules take more time on average to run than others.
Expensive rules are displayed first and are typically a magnitude larger in size than
the rules that are running efficiently. Look for values that are 0.01 or larger; these
are considered potentially expensive rules that require review.
2. Alternately, review the TotalExecutionTime column to find the rules that are
taking much longer to complete than other rules.
3. Typically, rules that use "Payload Contains" or "Payload Matches REGEX" are
expensive.
4. Review the output of this report to match rule names from the Dashboard System
Notifications to execution time for that specific rule in QRadar.
5. If AverageExecutionTime is high, but the event count is low, the rule might not be
what is causing the issue.
Example report:
Output example if the file is being reviewed by using the command line:
==> reports/AverageTestTime-2023-06-09-17-24.report <==
0.00628894 Rule_QRadar Audit> Shared Account
0.005786699999999997 Rule_Reference Test
0.002238430000000001 Rule_User>BB>HostDefinition> Server Type 3 - User Defined
0.0018611400000000022 Rule_Excessive Firewall Denies from Single Source
0.0018289500000000021 Rule_BB>HostDefinition> Virus Definition and Other Update
Servers
0.0018138199999999996 Rule_Local host on Botnet CandC List (DST)
0.0018058699999999996 Rule_Host Port Scan Detected by Remote Host
0.0017851399999999984 Rule_BB>NetworkDefinition> Honeypot like Addresses
0.0017358700000000016 Rule_BB>NetworkDefinition> Broadcast Address Space
0.001588610000000001 Rule_BB>NetworkDefinition> Darknet Addresses
==> reports/AverageResponseTime-2023-06-09-17-24.report <==
0.12540199999999999 Rule_System> Notification
0.08520499999999999 Rule_test_rule_support
0.052504999999999996 Rule_QRadar Audit> Shared Account
0.02857951 Rule_QRadar Audit> QRadar Hosts
3.7099999999999996E-4 Rule_BB>DeviceDefinition> FW fsl Router fsl Switch
2.53E-4 Rule_BB>PortDefinition> SSH Ports
2.37E-4 Rule_BB>CategoryDefinition> Firewall or ACL Denies
1.9846000000000008E-4 Rule_Source Address is a Bogon IP
1.945789473684211E-4 Rule_BB>CategoryDefinition> Superuser Accounts
1.882699999999999E-4 Rule_Source Asset Weight is Low
Part 3: What to do next
1. Find the expensive Rule in the Offenses tab and disable it. Do not modify or delete
the rule yet.
2. Verify in the Dashboard notifications to confirm if the warnings no longer appear.
3. If the notifications are still occurring, recheck the CustomRule report and
verify whether there are any other entries that look suspicious.
4. If you confirm that the disabled rule is causing the notifications, modify it to be less
expensive or delete it.
Note: The sequence that the rules are laid out can make a difference in
performance. Information on best practices for writing rules can be found
in Everything you need to know about QRadar Rules (for beginners and experts)
Part 4: Alternate issues that can cause Custom Rule error messages
•
•
•
•
•
Verify whether any rules are configured as Global rules. In some cases, Global rules
can cause excessive events to be processed by the console and resulting in an MPC
queue to max out. In this case, change any Global rules to Local rules, if possible.
Verify how many Managed Hosts (MHs) are in the deployment. Sometimes, when
there are several MHs in the deployment, and only the console has 1k EPS, it might
be required to get a 5k EPS console license from the licensing team. In this case,
request a 5k EPS console license from [email protected].
Payload-related tests that use "Pattern" or "Curly" regex-based calls can be
expensive. Payload tests can end up scanning every event, if not careful. Try to filter
on log source, log source type, and maybe an IP address before doing payload tests.
The order of tests makes a difference in the rule or CRE.
Host and Port profiles are also expensive, especially if the asset database, port
profile, or vulnerabilities data is large. For more information on host and port
profiles, see the tuning guide.
If the X-force data feed is enabled, X-force lookups can cause the error message.
Custom rules
IBM® QRadar® includes rules that detect a wide range of activities, including excessive firewall
denies, multiple failed login attempts, and potential botnet activity. You can also create your own
rules to detect unusual activity.
What are custom rules?
Customize default rules to detect unusual activity in your network.
Rule types
Each of the event, flow, common, and offense rule types test against incoming data from different sources
in real time. There are multiple types of rule tests. Some check for simple properties from the data set.
Other rule tests are more complicated. They track multiple, event, flow, and offense sequences over a
period of time and use "counter" that is on one or more parameters before a rule response is triggered.
Event rules
Test against incoming log source data that is processed in real time by the QRadar Event Processor.
You create an event rule to detect a single event or event sequences. For example, to monitor your
network for unsuccessful login attempts, access multiple hosts, or a reconnaissance event followed
by an exploit, you create an event rule. It is common for event rules to create offenses as a
response.
Flow rules
Test against incoming flow data that is processed by the QRadar Flow Processor. You can create a
flow rule to detect a single flow or flow sequences. It is common for flow rules to create offenses as
a response.
Common rules
Test against event and flow data. For example, you can create a common rule to detect events and
flows that have a specific source IP address. It is common for common rules to create offenses as a
response.
Offense rules
Test the parameters of an offense to trigger more responses. For example, a response generates
when an offense occurs during a specific date and time. An offense rule processes offenses only
when changes are made to the offense. For example, when new events are added, or the system
scheduled the offense for reassessment. It is common for offense rules to email a notification as a
response.
Managing rules
You can create, edit, assign rules to groups, and delete groups of rules. By categorizing your rules or
building blocks into groups, you can efficiently view and track your rules. For example, you can
view all rules that are related to compliance.
Domain-specific rules
If a rule has a domain test, you can restrict that rule so that it is applied only to events that are
happening within a specified domain. An event that has a domain tag that is different from the
domain that is set on, the rule does not trigger a response.
To create a rule that tests conditions across the entire system, set the domain condition to Any
Domain.
Rule conditions
Most rule tests evaluate a single condition, like the existence of an element in a reference data
collection or testing a value against a property of an event. For complex comparisons, you can test
event rules by building an Ariel Query Language (AQL) query with WHERE clause conditions. You
can use all of the WHERE clause functions to write complex criteria that can eliminate the need to
run numerous individual tests. For example, use an AQL WHERE clause to check whether inbound
SSL or web traffic is being tracked on a reference set.
You can run tests on the property of an event, flow, or offense, such as source IP address, severity of
event, or rate analysis.
With functions, you can use building blocks and other rules to create a multi-event, multi-flow, or
multi-offense function. You can connect rules by using functions that support Boolean operators,
such as OR and AND. For example, if you want to connect event rules, you can use when an event
matches any|all of the following rules function.
TASK: 2.4 Index management
SUBTASKS:
2.4.1. Enable indexes
2.4.2. Enable payload indexing
2.4.3. Describe the use of index management
• What is an index
• Reading the index management interface
2.4.4. Configure retention period for payload indexes
Enabling indexes
The Index Management window lists all event and flow properties that can be indexed and provides
statistics for the properties. Toolbar options allow you to enable and disable indexing on selected event
and flow properties.
About this task
Modifying database indexing might decrease system performance. Ensure that you monitor the
statistics after you enable indexing on multiple properties.
Procedure
1.
2.
3.
4.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Index Management.
Select one or more properties from the Index Management list.
Choose one of the following options:
Situation
Time frame Action
Reason
The index is disabled
and % of Searches
Using Property is
above 30% and % of
Searches Missing
Index is above 30%.
24 hours, 7
days, or 30
days
Click Enable
Index.
This search property is used often. Enabling an
index can improve performance.
Click Disable
Index.
The enabled index is not used in the searches.
Disable the indexed property to preserve disk
space.
The index is enabled
and % of Searches
30 days
Using Property is zero.
5. Click Save.
6. Click OK.
Results
In lists that include event and flow properties, indexed property names are appended with the
following text: [Indexed]. Examples of such lists include the search parameters on the Log
Activity and Network Activity tab search criteria pages, and the Add Filter window.
Index management
Use Index Management to control database indexing on event and flow properties. To improve the
speed of searches in IBM® QRadar®, narrow the overall data by adding an indexed field in your
search query.
An index is a set of items that specify information about data in a file and its location in the file
system. Data indexes are built in real-time as data is streamed or are built upon request after data is
collected. Searching is more efficient because systems that use indexes don't have to read through
every piece of data to locate matches. The index contains references to unique terms in the data and
their locations. Because indexes use disk space, storage space might be used to decrease search
time.
Use indexing event and flow properties first to optimize your searches. You can enable indexing on
any property that is listed in the Index Management window and you can enable indexing on more
than one property. When a search starts in QRadar, the search engine first filters the data set by
indexed properties. The indexed filter eliminates portions of the data set and reduces the overall
data volume and number of event or flow logs that must be searched. Without any
filters, QRadar takes more time to return the results for large data sets.
For example, you might want to find all the logs in the past six months that match the text: The
operation is not allowed. By default, QRadar stores full text indexing for the past 30 days.
Therefore, to complete a search from the last 6 months, the system must reread every payload
value from every event or flow in that time frame to find matches. Your results display faster when
you search with an indexed value filter such as a Log Source Type, Event Name, or Source IP.
The Index Management feature also provides statistics, such as:
•
•
The percentage of saved searches running in your deployment that include the indexed
property
The volume of data that is written to the disk by the index during the selected time frame
To enable payload indexing, you must enable indexing on the Quick Filter property.
•
•
Enabling indexes
The Index Management window lists all event and flow properties that can be indexed and
provides statistics for the properties. Toolbar options allow you to enable and disable
indexing on selected event and flow properties.
Enabling payload indexing to optimize search times
You use the Quick Filter feature on the Log Activity and Network Activity tab to search
event and flow payloads by using a text string. To optimize event and flow search times,
enable payload indexing on the Quick Filter property.
Restriction: Payload indexing increases disk storage requirements and might affect
system performance. Enable payload indexing if your deployment meets the following
conditions:
•
•
The event and flow processors are at less than 70% disk usage.
The event and flow processors are less than 70% of the maximum events per second
(EPS) or flows per interface (FPI) rating.
Configuring the retention period for payload indexes
By default, IBM® QRadar® sets 30 days for the data retention period of the payload index. You can
search for specific values in quick filter indexes beyond 30 days by changing the default retention
in QRadar.
Before you begin
Your virtual and physical appliances require a minimum of 24 GB of RAM to enable full payload
indexing. However, 48 GB of RAM is suggested.
The minimum and suggested RAM values applies to all QRadar systems, such as 16xx, 17xx, or 18xx
appliances, that are processing events or flows.
About this task
The retention values reflect the time spans that you are typically searching. The minimum retention
period is 1 day and the maximum is 2 years.
Note: Quick Filter searches that use a time frame outside of the Payload Index Retention setting can trigger
slow and resource-intensive system responses. For example, if the payload index retention is set for 1 day,
and you use a time frame for the last 30 hours in the search.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click System Settings.
3. In the Database Settings section, select a retention time period from the Payload Index
Retention list.
4. Click Save.
5. Close the System Settings window.
6. On the Admin tab, click Deploy Changes.
What to do next
If you retain payload indexes longer than the default value, extra disk space is used. After you select
a greater value in the Payload Index Retention field, monitor system notifications to ensure that you
do not fill disk space.
Enabling payload indexing to optimize search
times
You use the Quick Filter feature on the Log Activity and Network Activity tab to search event and
flow payloads by using a text string. To optimize event and flow search times, enable payload
indexing on the Quick Filter property.
Restriction: Payload indexing increases disk storage requirements and might affect system performance.
Enable payload indexing if your deployment meets the following conditions:
•
•
The event and flow processors are at less than 70% disk usage.
The event and flow processors are less than 70% of the maximum events per second (EPS)
or flows per interface (FPI) rating.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Index Management.
3. In the Quick Search field, type Quick Filter.
The Quick Filter property is displayed.
4. Select the Quick Filter property that you want to index.
In the results table, use the value in the Database column to identify the events or
flows Quick Filter property.
5. On the toolbar, click Enable Index. A green dot indicates that the payload index is enabled.
If a list includes event or flow properties that are indexed, the property names are appended
with the following text: [Indexed].
6. Click Save.
TASK: 2.5 Search management
SUBTASKS:
2.5.1. Manage saved searches
2.5.2. Manage search results
• Explain different types of parameters (new search, save results, cancel, delete, notify,view)
Scheduled search
Use the Scheduled search option to schedule a search and view the results.
You can schedule a search that runs at a specific time of day or night. If you schedule a search to run
in the night, you can investigate in the morning. Unlike reports, you have the option of grouping the
search results and investigating further. You can search on number of failed logins in your network
group. If the result is typically 10 and the result of the search is 100, you can group the search
results for easier investigating. To see which user has the most failed logins, you can group by user
name. You can continue to investigate further.
You can schedule a search on events or flows from the Reports tab. You must select a previously
saved set of search criteria for scheduling.
1. Create a report
Specify the following information in the Report Wizard window:
o
o
The chart type is Events/Logs or Flows.
The report is based on a saved search.
Note: QRadar® does not support reports based on AQL searches that contain
subselect statements.
o
Generate an offense.
You can choose the create an individual offense option or the add result to an
existing offense option.
You can also generate a manual search.
2. View search results
You can view the results of your scheduled search from the Offenses tab.
•
Scheduled search offenses are identified by the Offense Type column.
If you create an individual offense, an offense is generated each time that the report is run. If
you add the saved search result to an existing offense, an offense is created the first time that
the report runs. Subsequent report runs append to this offense. If no results are returned,
the system does not append or create an offense.
•
To view the most recent search result in the Offense Summary window, double-click a
scheduled search offense in the offense list. To view the list of all scheduled search runs,
click Search Results in the Last 5 Search Results pane.
You can assign a Scheduled search offense to a user.
Advanced search options
Use the Advanced Search field to enter an Ariel Query Language (AQL) that specifies the fields that
you want and how you want to group them to run a query.
Note: When you type an AQL query, use single quotation marks for a string comparison, and use double
quotation marks for a property value comparison.
Attention: The XFORCE_IP_CONFIDENCE function does not work in AQL advanced searches in
languages other than English.
The Advanced Search field has auto completion and syntax highlighting.
Use auto completion and syntax highlighting to help create queries. For information about
supported web browsers, see Supported web browsers
Note: If you use a quick filter on the Log Activity tab, you must refresh your browser window before you
run an advanced search.
Accessing Advanced Search
Access the Advanced Search option from the Search toolbar that is on the Network
Activity and Log Activity tabs to type an AQL query.
Select Advanced Search from the list box on the Search toolbar.
Expand the Advanced Search field by following these steps:
1. Drag the expand icon that is at the right of the field.
2. Press Shift + Enter to go to the next line.
3. Press Enter.
You can right-click any value in the search result and filter on that value.
Double-click any row in the search result to see more detail.
All searches, including AQL searches, are included in the audit log.
AQL search string examples
The following table provides examples of AQL search strings.
Description
Example
Select default columns from events.
SELECT * FROM events
Select default columns from flows.
SELECT * FROM flows
Select specific columns.
SELECT sourceip, destinationip FROM events
Description
Example
Select specific columns and order the
results.
SELECT sourceip, destinationip FROM events
ORDER BY destinationip
Run an aggregated search query.
SELECT sourceip, SUM(magnitude) AS magsum
FROM events GROUP BY sourceip
Run a function call in a SELECT clause.
SELECT CATEGORYNAME(category) AS
namedCategory FROM events
SELECT CATEGORYNAME(category) AS
Filter the search results by using a WHERE
namedCategory, magnitude FROM events WHERE
clause.
magnitude > 1
Search for events that triggered a specific SELECT LOGSOURCENAME(logsourceid), * from
rule, which is based on the rule name or events where RULENAME(creeventlist) ILIKE
partial text in the rule name.
'%suspicious%'
Reference field names that contain special SELECT sourceip, destinationip,
characters, such as arithmetic characters
"+field/name+" FROM events WHERE
or spaces, by enclosing the field name in
"+field/name+" LIKE '%test%'
double quotation marks.
Table 1. Examples of AQL search strings
The following table provides examples of AQL search strings for X-Force®.
Description
Example
Check an IP address
against an XForce category with a
confidence value.
select * from events where
XFORCE_IP_CONFIDENCE('Spam',sourceip)>3
Search for X-Force URL
categories associated
with a URL.
select url, XFORCE_URL_CATEGORY(url) as myCategories
from events where XFORCE_URL_CATEGORY(url) IS NOT NULL
Retrieve X-Force IP
categories that are
associated with an IP.
select sourceip, XFORCE_IP_CATEGORY(sourceip) as
IPcategories from events where
XFORCE_IP_CATEGORY(sourceip) IS NOT NULL
Table 2. Examples of AQL search strings for X-Force
For more information about functions, search fields and operators, see the Ariel Query Language
guide.
•
•
AQL search string examples
Use the Ariel Query Language (AQL) to retrieve specific fields from the events, flows, and
simarc tables in the Ariel database.
Converting a saved search to an AQL string
Convert a saved search to an AQL string and modify it to create your own searches to quickly
find the data you want. Now you can create searches faster than by typing the search
criteria. You can also save the search for future use.
Saving search criteria
You can save configured search criteria so that you can reuse the criteria and use the saved search
criteria in other components, such as reports. Saved search criteria does not expire.
About this task
If you specify a time range for your search, then your search name is appended with the specified
time range. For example, a saved search named Exploits by Source with a time range of Last 5
minutes becomes Exploits by Source - Last 5 minutes.
If you change a column set in a previously saved search, and then save the search criteria using the
same name, previous accumulations for time series charts are lost.
Procedure
1. Choose one of the following options:
o Click the Log Activity tab.
o Click the Network Activity tab.
2. Perform a search.
3. Click Save Criteria.
4. Enter values for the parameters:
Option
Description
Parameter Description
Search
Name
Type the unique name that you want to assign to this search criteria.
Assign
Select the check box for the group you want to assign this saved search. If you do not select a
Search to group, this saved search is assigned to the Other group by default. For more information,
Group(s) see Managing search groups.
Manage
Groups
Click Manage Groups to manage search groups. For more information, see Managing search
groups.
Timespan Choose one of the following options:
options:
o
Real Time (streaming) - Select this option to filter your search results while in
streaming mode.
Option
Description
o
o
o
Last Interval (auto refresh) - Select this option to filter your search results
while in auto-refresh mode. The Log Activity and Network
Activity tabs refreshes at one-minute intervals to display the most recent
information.
Recent - Select this option and, from this list box, select the time range that you
want to filter for.
Specific Interval- Select this option and, from the calendar, select the date and
time range you want to filter for.
Include in Select this check box to include this search in your Quick Search list box on the toolbar.
my Quick
Searches
Include in Select this check box to include the data from your saved search on the Dashboard tab. For more
my
information about the Dashboard tab, see Dashboard management.
Dashboard
Note: This parameter is only displayed if the search is grouped.
Set as
Default
Select this check box to set this search as your default search.
Share with Select this check box to share these search requirements with all users.
Everyone
Restriction: You must have the Admin security profile to share search requirements.
5. Click OK.
Quick filter search options
Search event and flow payloads by typing a text search string that uses simple words or phrases.
Quick filter is one of the fastest methods that you use to search for event or flow payloads for specific data.
For example, you can use quick filter to find these types of information:
•
•
•
•
Every firewall device that is assigned to a specific address range in the past week
A series of PDF files that were sent by a Gmail account in the past five days
All records in a two-month period that exactly match a hyphenated user name
A list of website addresses that end in .ca
You can filter your searches from these locations:
Log Activity toolbar and Network Activity toolbars
Select Quick Filter from the list box on the Search toolbar to type a text search string. Click
the Quick Filter icon to apply your Quick Filter to the list of events or flows.
Add Filter Dialog box
Click the Add Filter icon on the Log Activity or Network Activity tab.
Select Quick Filter as your filter parameter and type a text search string.
Flow search pages
Add a quick filter to your list of filters.
Note: Quick Filter searches that use a time frame outside of the Payload Index Retention setting can trigger
slow and resource-intensive system responses. For example, if the payload index retention is set for 1 day,
and you use a time frame for the last 30 hours in the search.
When you view flows in real-time (streaming) or last interval mode, you can type only simple words or
phrases in the Quick Filter field. When you view events or flows in a time-range, follow these syntax
guidelines:
Description
Example
Include any plain text that you expect to
Firewall
find in the payload.
Search for exact phrases by including
multiple terms in double quotation
marks.
"Firewall deny"
Include single and multiple character
wildcards. The search term cannot start F?rewall or F??ew*
with a wildcard.
Group terms with logical expressions,
such as AND, OR, and NOT. To be
recognized as logical expressions and
not as search terms, the syntax and
operators must be uppercase.
(%PIX* AND ("Accessed URL" OR "Deny udp
src") AND 10.100.100.*)
When you create search criteria that
includes the NOT logical expression, you
(%PIX* AND ("Accessed URL" OR "Deny udp
must include at least one other logical
expression type, otherwise, no results src") NOT 10.100.100.*)
are returned.
Precede the following characters by a
backslash to indicate that the character
is part of your search term: + - &&
"%PIX\-5\-304001"
|| ! () {} [] ^ " ~ * ? :
\.
Table 1. Quick filter syntax guidelines
Limitations
Quick filter searches operate on raw event or flow log data and don't distinguish between the fields.
For example, quick filter searches return matches for both source IP address and destination IP
address, unless you include terms that can narrow the results.
Search terms are matched in sequence from the first character in the payload word or phrase. The
search term user matches user_1 and user_2, but does not match the following
phrases: ruser, myuser, or anyuser.
Quick filter searches use the English locale. Locale is a setting that identifies language or geography
and determines formatting conventions such as collation, case conversion, character classification,
the language of messages, date and time representation, and numeric representation.
The locale is set by your operating system. You can configure QRadar® to override the operating
system locale setting. For example, you can set the locale to English and the QRadar Console can be
set to Italiano (Italian).
If you use Unicode characters in your quick filter search query, unexpected search results might be
returned.
If you choose a locale that is not English, you can use the Advanced search option in QRadar for
searching event and payload data.
How does Quick Filter search and payload tokens work?
Text that is in the payload is split into words, phrases, symbols, or other elements. These tokens are
delimited by space and punctuation. The tokens don't always match user-specified search terms, which
cause some search terms not to be found when they don't match the generated token. The delimiter
characters are discarded but exceptions exist such as the following exceptions:
•
Periods that are not followed by white space are included as part of the token.
For example, 192.0.2.0:56 is tokenized as host token 192.0.2.0 and port token 56.
•
•
Words are split at hyphens, unless the word contains a number, in which case, the token is
not split and the numbers and hyphens are retained as one token.
Internet domain names and email addresses are preserved as a single token.
192.0.2.0/home/www is tokenized as one token and the URL is not separated.
192.0.2.7:/calling1/www2/scp4/path5/fff is tokenized as host 192.0.2.7 and
the remainder is one token /calling1/www2/scp4/path5/fff
File names and URL names that contain more than one underscore are split before a period (.).
Example of multiple underscores in a file name:
If you use hurricane_katrina_ladm118.jpg as a search term, it is split into the following tokens:
•
•
hurricane
katrina_ladm118.jpg
Search the payload for the full search term by placing double quotation marks around the search
term: "hurricane_katrina_ladm118.jpg"
Example of multiple underscores in a relative file path:
The thumb.ladm1180830/thumb.ladm11808301806.hurricane_katrina_ladm118.jpg is
split into the following tokens:
•
•
thumb.ladm1180830/thumb.ladm11808301806.hurricane
katrina_ladm118.jpg
To search for hurricane_katrina_ladm118.jpg, which consists of one partial and one full token,
place an asterisk in front of the query term, *hurricane_katrina_ladm118.jpg
Finding IOCs quickly with lazy search
You use the IBM® QRadar® lazy search to search for an indicator of compromise (IOC), such as
unusual outbound network traffic or anomalies in privileged user account activity.
Before you begin
Lazy search returns the first 1000 events that are related to the search criterion. For example, if you
need to search for a particular MD5 as part of a malware outbreak investigation, you do not need to
review every related event. Do a lazy search to quickly return a limited result set.
To take advantage of the lazy search, you must have the Admin security profile, or a nonadministrator security profile that is configured in the following way:
•
•
Permission precedence set to No Restrictions.
Access to all networks and log sources.
Lazy search cannot be used by users with non-administrator security profiles on networks where
domains are configured.
Procedure
1. To do a lazy search for quick filters, do these steps:
a. On the Log Activity tab, in the Quick Filter field, enter a value.
b. From the View list, select a time range.
2. To do a lazy search for basic searches, do these steps:
a. On the Log Activity tab, click Search > New Search.
b. Select a Recent time range or set a Specific Interval.
c. Ensure that Order by field value is set to Start Time and the Results Limit field
value is 1000 or less. Aggregated columns must not be included in the search.
d. Enter a value for the Quick Filter parameter and click Add Filter.
3. To disable lazy search completely, do these steps:
a. Click the System Settings on the Admin tab.
b. In the System Settings window, remove any values from the Default Search
Limit field.
Using a subsearch to refine search results
You can use a subsearch to search within a set of completed search results. The subsearch is used to
refine search results, without searching the database again.
Before you begin
When you define a search that you want to use as a base for subsearching, make sure that Real Time
(streaming) option is disabled and the search is not grouped.
About this task
This feature is not available for grouped searches, searches in progress, or in streaming mode.
Procedure
1. Choose one of the following options:
o Click the Log Activity tab.
o Click the Network Activity tab.
2. Perform a search.
3. When your search is complete, add another filter:
o Click Add Filter.
o From the first list box, select a parameter that you want to search for.
o From the second list box, select the modifier that you want to use for the search. The
list of modifiers that are available depends on the attribute that is selected in the first
list.
o In the entry field, type specific information that is related to your search.
o Click Add Filter.
Results
The Original Filter pane specifies the original filters that are applied to the base search. The
Current® Filter pane specifies the filters that are applied to the subsearch. You can clear subsearch
filters without restarting the base search. Click the Clear Filter link next to the filter you want to
clear. If you clear a filter from the Original Filter pane, the base search is relaunched.
If you delete the base search criteria for saved subsearch criteria, you still have access to saved
subsearch criteria. If you add a filter, the subsearch searches the entire database since the search
function no longer bases the search on a previously searched data set.
Adding filters to improve search performance
When you search for event or flow information, you can improve performance by adding filters to
search fields that are indexed.
About this task
The following table provides information about the fields that are indexed:
QRadar SIEM Tab
Indexed Filter
Username
Source or Destination IP
Destination Port
Log Activity tab (Events)
Has Identity
Device Type
Device ID
Category
Matches Custom Rule
Application
Network Activity tab (Flows)
Source or Destination IP
Destination Port
Table 1. Log viewer and flow viewer indexed fields
Procedure
1.
2.
3.
4.
5.
Click the Log Activity tab, or the Network Activity tab.
On the toolbar, click Add Filter.
From the first list, select an index filter.
From the second list, select the modifier that you want to use.
Type or select the information for your filter. The controls that are displayed depend on the
index filter that you added.
6. Click Add Filter.
What to do next
You can monitor the performance of your search by expanding the Current Statistics option on
the Search page. The page displays the volume of data that loads from data files and indexes. If your
search does not display a count in the index file count, then add an indexed filter to the search.
•
Enabling quick filtering
You can enable the Quick Filter property to optimize event and flow search times.
Searching for offenses that are indexed on a
custom property
Define search criteria to filter the offense list and make it easier to see which offenses you need to
investigate. You can use the offense type in your search criteria to find all offenses that are based on
a custom property. You can filter the query results to show offenses that have a specific custom
property capture result.
Before you begin
The custom property must be used as a rule index. For more information, see Offense indexing.
Procedure
1. Click the Offenses tab.
2. From the Search list, select New Search.
3. On the Offense Source pane, select the custom property in the Offense Type list.
The Offense Type list shows only normalized fields and custom properties that are used as
rule indexes. You cannot use Offense Source to search DateTime properties.
4. Optional: To search for offenses that have a specific value in the custom property capture
result, type the value that you want to search for in the filter box.
5. Configure other search parameters to satisfy your search requirements.
6. Click Search.
Results
All offenses that meet the search criteria are shown in the offense list. When you view the offense
summary, the custom property that you searched on is shown in the Offense Type field. The custom
property capture result is shown in the Custom Property Value field in the Offense Source
Summary pane.
QRadar: How to manage accumulated search
results that are found in the Log activity tab
under Managed Search Results
Question & Answer
Question
How can you manage large search result data on a daily basis?
Answer
Steps to manage Search Results:
1. Log in to the QRadar User Interface.
2. Open the Admin settings:
1. In IBM Security QRadar V7.3.1, click the navigation menu
,
and then click Admin to open the Admin tab.
2. In IBM Security QRadar V7.3.0 or earlier, click the Admin tab.
3. Click on the System settings icon within the System Configuration section.
4. Select the Ariel Database Settings in the left hand column to bring you to
the appropriate settings.
5. Change the Search Results Retention Period setting to the number of days,
weeks, or months that are desired to retain the search results.
Note: If you select 1 day, then after 24 hours from that time, your search
results will be cleared for all users. The default is 1 day.
Results: You can now modify the default Search Results Retention Period.
TASK: 2.6 Manage routing rules and event forwarding
SUBTASKS:
2.6.1. Explain routing rules configuration and usage
• Different routing options for rules
• Create a routing rule
Routing options for rules
You can choose from four rule routing options: Forward, Drop, Bypass correlation, and Log Only.
The following table describes the different options and how to use them.
Routing type
Description
Forward
Data is forwarded to the specified forwarding destination. Data is also stored in the
database and processed by the Custom Rules Engine (CRE).
Drop
Data is dropped. The data is not stored in the database and is not processed by the
CRE. This option is not available if you select the Offline option. Any events that are
dropped are credited back 100% to the license.
Data bypasses CRE, but it is stored in the database. This option is not available if you
select the Offline option.
Bypass Correlation The Bypass correlation option does not require an entitlement
for QRadar® Data Store. Bypass correlation allows events that are received in
batches to bypass real-time rules. You can use the events in analytic apps and
for historical correlation runs. For historical correlation runs, the events can
be replayed as though they were received in real time.
Events are stored and flagged in the database as Log Only and bypass CRE. These
events are not available for historical correlation, and are credited back 100% to the
license. This option is not available for flows or if you select the Offline option.
Log Only (Exclude
Analytics)
Important: Do not choose this option for internal events because they are
automatically credited back 100% to the license. These events still bypass correlation
if they match the routing rule but are not flagged as Log Only.
The Log Only option requires an entitlement for QRadar Data Store. After the
entitlement is purchased and the Log Only option is selected, events that
match the routing rule are stored to disk and are available to view and for
searches. The events bypass the custom rule engine and no real-time
correlation or analytics occur. The events can't contribute to offenses and are
ignored when historical correlation runs. Some apps will also ignore Log Only
events (https://www-ibm.com/support/docview.wss?uid=swg22009471).
Table 1. Rule routing options
The following table describes different routing option combinations that you can use. These options are
not available in offline mode.
Routing
combination
Description
Data is forwarded to the specified forwarding destination. Data is not stored in the
Forward and Drop database and is not processed by the CRE. Any events that are dropped are credited
back 100% to the license.
Forward and BypassData is forwarded to the specified forwarding destination. Data is stored in the
Correlation
database, but it is not processed by the CRE.
Forward and Log
Only (Exclude
Analytics)
Events are forwarded to the specified forwarding destination. Events are stored and
flagged in the database as Log Only and bypass CRE. These events are not available for
historical correlation, and are credited back 100% to the license.
Table 2. Rule routing combination options
If data matches multiple rules, the safest routing option is applied. For example, if data that matches
a rule that is configured to drop and a rule to bypass CRE processing, the data is not dropped.
Instead, the data bypasses the CRE and is stored in the database.
Configuring routing rules to forward data
About this task
You can configure routing rules to forward data in either online or offline mode:
•
•
In Online mode, your data remains current because forwarding is done in real time. If the
forwarding destination becomes unreachable, any data that is sent to that destination is not
delivered, resulting in missing data on that remote system. To ensure that delivery is
successful, use offline mode.
In Offline mode, all data is first stored in the database and then sent to the forwarding
destination. This mode ensures that no data is lost; however, delays in data forwarding can
occur.
Procedure
1.
2.
3.
4.
5.
6.
On the navigation menu ( ), click Admin.
In the System Configuration section, click Routing Rules.
On the toolbar, click Add.
In the Routing Rule window, type a name and description for your routing rule.
In the Mode field, select one of the following options: Online or Offline.
In the Forwarding Event Collector or Forwarding Event Processor list, select the event
collector from which you want to forward data.
Learn more about the forwarding appliance:
Forwarding Event Collector
Specifies the Event Collector that you want this routing rule to process data from. This
option displays when you select the Online option.
Note: Online/Realtime forwarding is not impacted by any Rate Limit or Scheduling
configurations that might be configured on a Store and Forward (15xx) event collectors.
Forwarding Event Processor
Specifies the Event Processor that you want this routing rule to process data from. This
option is displayed when you select the Offline option.
Restriction: This option is not available if Drop is selected from the Routing Options pane.
7. In the Data Source field, select which data source you want to route: Events or Flows.
The labels for the next section change based on which data source you select.
8. Specify which events or flows to forward by applying filters:
a. To forward all incoming data, select the Match All Incoming Events or Match All
Incoming Flows checkbox.
Restriction: If you select this checkbox, you cannot add a filter.
b. To forward only some events or flows, specify the filter criteria, and then click Add
Filter.
9. Specify the routing options to apply to the forwarded data:
a. Optional: If you want to edit, add, or delete a forwarding destination, click
the Manage Destinations link.
b. To forward log data that matches the specified filters, select the Forward checkbox
and then select the checkbox for each forwarding destination.
Restriction: If you select the Forward checkbox, you can select only one of these
check boxes: Drop, Bypass Correlation, or Log Only.
For more information, see Routing options for rules.
10. Click Save.
Section 3: Data Source Configuration
This section accounts for 14% of the exam (9 out of 62 questions).
TASK: 3.1 Manage flow sources
SUBTASKS:
3.1.1. Understand flow sources
• What are flow sources
• What are the types
• External versus internal
3.1.2. Add or edit a flow source
3.1.3. Enable, disable, and delete a flow source
3.1.4. Understand Flow source alias
• Add
• Delete
Types of flow sources
IBM® QRadar® Flow Collector can process flows from multiple sources, which are categorized as
either internal or external sources.
Internal flow sources
Sources that include packet data by connecting to a SPAN port or a network TAP are considered
internal sources. These sources provide raw packet data to a monitoring port on the Flow Collector,
which converts the packet details into flow records.
QRadar does not keep the entire packet payload. Instead, it captures a snapshot of the flow,
referred to as the payload or content capture, which includes packets from the beginning of the
communication. Flow collection from internal sources normally requires a dedicated Flow
Collector.
External flow sources
QRadar supports the following external flow sources:
•
•
•
•
•
•
•
NetFlow
IPFIX
sFlow
J-Flow
Packeteer
Napatech interface
Network interface
External sources do not require as much CPU utilization to process so you can send the flows
directly to a Flow Processor. In this configuration, you may have a dedicated flow collector and a
flow processor, both receiving and creating flow data.
If your Flow Collector collects flows from multiple sources, you can assign each flow source a
distinct name. A distinct name helps to distinguish the external flow data from other sources.
QRadar SIEM can forward external flow source data by using the spoofing or non-spoofing method:
Spoofing
Resends the inbound data that is received from a flow source to a secondary destination.
To configure the spoofing method, configure the flow source so that the Monitoring
Interface is set to the management port on which the data is received.
When you use a specific interface, the Flow Collector uses a promiscuous mode capture to
collect the flow data, rather than the default UDP listening port on port 2055. This way, the
Flow Collector can capture and forward the data.
Non-Spoofing
For the non-spoofing method, configure the Monitoring Interface parameter in the flow source
configuration as Any.
The Flow Collector opens the listening port, which is the port that is configured as
the Monitoring Port, to accept the flow data. The data is processed and forwarded to
another flow source destination.When the data is forwarded, the source IP address of the
flow becomes the IP address of the QRadar SIEM system, not the original router that sent the
data.
Adding a flow source
If you add a network interface to your appliance after the initial installation, you must add it as a
flow source before you can use it to monitor network flows. After you change the flow sources
configuration, you must deploy the changes.
Procedure
1.
2.
3.
4.
Log in to the QRadar® Console as an administrator.
Click the Admin tab.
In the Flows section, click Flow Sources, and click Add.
Configure the flow source details.
a. In the Flow Source Name field, type a descriptive name.
b. In the Target Flow Collector field, select a flow collector or accept the value
provided.
c. In the Flow Source Type list, select Netflow v.1/v.5/v.7/v.9/IPFIX.
d. In the Monitoring Interface, select the network interface that supplies the flow
traffic.
e. In the Monitoring Port field, select a port or accept the value provided.
f. In the Linking Protocol list, select the protocol to use.
g. To forward flows, select the Enable Flow Forwarding checkbox and configure the
settings.
5. Click Save.
6. On the Admin tab, click Deploy Changes.
Adding or editing a flow source
Use the Flow Source window on the Admin tab to add or edit a flow source.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Data Sources section, under Flows, click Flow Sources.
3. Do one of the following actions:
o To add a flow source, click Add.
o To edit a flow source, select the flow source and click Edit.
4. To create this flow source from an existing flow source, select the Build from existing flow
source check box, and select a flow source from the Use as Template list.
5. Enter the name for the Flow Source Name.
Tip: If the external flow source is also a physical device, use the device name as the flow
source name. If the flow source is not a physical device, use a recognizable name.
For example, if you want to use IPFIX traffic, enter ipf1. If you want to use NetFlow traffic,
enter nf1.
6. Select a flow source from the Flow Source Type list and configure the properties.
o If you select the Flowlog File option, ensure that you configure the location of the
Flowlog file for the Source File Path parameter.
o If you select the JFlow, Netflow, Packeteer FDR, or sFlow options in the Flow
Source Type parameter, ensure that you configure an available port for
the Monitoring Port parameter.
The default port for the first NetFlow flow source that is configured in your network
is 2055. For each additional NetFlow flow source, the default port number
increments by 1. For example, the default NetFlow flow source for the
second NetFlow flow source is 2056.
o
If you select the Napatech Interface option, enter the Flow Interface that you want
to assign to the flow source.
Restriction: The Napatech Interface option is displayed only if you installed
the Napatech Network Adapter on your system.
o
If you select the Network Interface option, for the Flow Interface, configure only
one log source for each Ethernet interface.
Restriction: You cannot send different flow types to the same port.
7. If traffic on your network is configured to take alternate paths for inbound and outbound
traffic, select the Enable Asymmetric Flows check box.
8. Click Save.
9. On the Admin tab, click Deploy Changes.
Flow sources
IBM® QRadar® Network Insights uses two types of flow sources.
Flow source for incoming network traffic
The QRadar Network Insights host processes raw traffic from a network interface flow
source.
When you add a QRadar Network Insights host, an input flow source is automatically created for
all non-management interfaces that are available on the host.
•
•
For Napatech network interfaces, flow sources are auto-detected and enabled by
default. They cannot be edited, disabled, or deleted.
For non-Napatech network interfaces, the auto-detected flow sources are disabled by
default. You must enable them if you want to use them for monitoring network flows.
QRadar flow sources
When you install IBM QRadar, a default_Netflow flow source is automatically added to the
deployment. This flow source is enabled by default.
New flow sources are created as you add QRadar Flow Collectors and Flow Processors to the
deployment.
QRadar Network Insights exports the network traffic flow records to an IPFIX flow source
that is running elsewhere in your QRadar deployment.
Flow source example
In the following example, a QRadar Network Insights host (qnihw1) is connected to a QRadar
Console (qradarhw1).
•
•
•
•
The default_Netflow flow source is auto-detected and enabled.
An input flow source is created for all non-management interfaces that are connected to
the QRadar Network Insights host, but they are not enabled.
The system did not create a flow source for the management interface of the
appliance (ens2f0).
You can edit or change the enabled status for each of the flow sources.
An appliance that uses a Napatech network interface is connected.
•
•
The napatech0 flow source is auto-detected and enabled.
You cannot edit, delete, or change the enabled status for these flow sources.
•
•
Enabling a flow source
Flow sources that are used to monitor network flows must be enabled. After you enable the
flow source, you must deploy the changes.
Adding a flow source
If you add a network interface to your appliance after the initial installation, you must add it
as a flow source before you can use it to monitor network flows. After you change the flow
sources configuration, you must deploy the changes.
Flow source aliases
A flow source alias uses a virtual name to identify external flows that are sent to the same port on a
flow collector. For example, the IBM® QRadar® Flow Collector can have a single NetFlow flow
source that is listening on port 2055, and can have multiple NetFlow sources sending to the
same QRadar Flow Collector. By using flow source aliases, you can identify the
different NetFlow sources based by their IP addresses.
When QRadar Flow Collector receives traffic from a device that has an IP address but does not have
a current alias, the QRadar Flow Collector attempts a reverse DNS lookup. The lookup is used to
determine the host name of the device.
You can configure the QRadar Flow Collector to automatically create flow source aliases. When
the QRadar Flow Collector receives traffic from a device that has an IP address but does not have a
current alias, it does a reverse DNS lookup to determine the host name of the device.
If the lookup is successful, the QRadar Flow Collector adds this information to the database and
reports the information to all QRadar Flow Collector components in your deployment. If the lookup
fails, QRadar creates a default alias for the flow source based on the flow source name and the
source IP address. For example, the default alias might appear as default_NetFlow_172.16.10.139.
•
•
Adding a flow source alias
Use the Flow Source Alias window to add a flow source alias.
Deleting a flow source alias
Use the Flow Source Alias window to delete a flow source alias.
Enabling and disabling a flow source
Using the Flow Source window, you can enable or disable a flow source.
Deleting a Flow Source
Use the Flow Source window to delete a flow source.
TASK: 3.2 Manage log sources
SUBTASKS:
3.2.1. Add log sources
3.2.2. Filter log sources
3.2.3. Test log sources
3.2.4. Bulk add/edit log sources
3.2.5. Disconnected log collector (DLC)
• Understanding
• Collecting events
Gateway log source
Use a gateway log source to configure a protocol to use many Device Support Modules (DSMs)
instead of relying on a single DSM type. With a gateway log source, event aggregator protocols can
dynamically handle various event types. Before you configure your gateway log source, you must
understand the difference between protocols, DSMs, and log sources.
Protocol
Protocols provide the capability of collecting a set of data files by using various connection options.
These connections pull the data back, or passively receive data, into the event pipeline
in QRadar®. Then, the corresponding DSM parses and normalizes the data.
DSM
A DSM is a code module that parses received events from multiple log sources and converts them
to a standard taxonomy format that can be displayed as output. Each type of log source has a
corresponding DSM.
Log source
A log source is a data source that creates an event log. For more information, see Introduction to
log source management.
Gateway log sources support the following protocols:
•
•
•
•
•
•
•
•
•
Amazon AWS S3 REST
Amazon AWS Web Services
Google Cloud Pub Sub
HTTP Receiver
Kafka
Microsoft Azure Event Hubs
TCPMutilineSyslog
TLS Syslog
UDPMutilineSyslog
Tip: To provide the best fit for the generic data, use the Universal DSM when you configure your gateway log
source.
A gateway log source does not use a DSM. It delegates the DSM parsing to stand-alone Syslog log
sources that have an appropriate identifier and DSM. These log sources are a collector log source
(the gateway) and a parser log source. Parser log sources match data that comes in from the
gateway and do not actively collect the events themselves.
Before you create your gateway log source, you must know what types of data you expect to collect
from the data gateway. Data gateways can collect many data types and QRadar does not support all
data types by default. To parse the data correctly, a DSM must exist that can handle the events that
you are collecting. Even if QRadar supports the event’s source, if the gateway returns it in an
unexpected format, the DSM might not parse it. For example, if the data gateway returns an event in
a JSON format, but the DSM expects a LEEF format, you might need a custom DSM to parse the data.
A gateway log source works in the same way as other log sources by using its selected protocol to
reach out and collect events. The difference between a gateway log source and other log sources
occurs when the collected events are ready to be posted. A normal log source attempts to force the
events to be parsed by the selected DSM. A gateway log source sends the events as a Syslog payload
with a default identifier set to either 0.0.0.0 or to the connected Services IP address.
When an event is posted to the event pipeline as a Syslog payload, the events are handled by log
source auto detection. If an existing dummy log source with the provided identifier exists, the event
is handled by that log source, regardless of whether the event parses with that DSM. If no existing
dummy log source exists, the event is parsed by DSMs that support auto detection. If the event
correctly parses with a DSM, then it updates the identifier to “IP or Host @ DSM” and creates a log
source.
Log sources that are automatically created do not have their identifier set by the protocol. These log
sources identifiers are in the “IP or Host @ DSM Type” format. To match to an automatically created
dummy log source, the Syslog payload must have an identifier that is the same IP or Host, and the
selected DSM must be able to parse it. The default identifier is sent as [IP or Host], not “IP or Host
@ DSM Type”. For the identifier to be updated with the DSM Type, it must parse with that DSM
Type. If you use the default settings, events that cannot be parsed are sent directly to sim-generic.
Tip:
Manually created log sources that have an identifier that matches the identifier of the Syslog
payload are used even if the DSM of the log source fails to parse the event.
To configure a gateway log source, enable the Use As A Gateway Log Source option for the
selected protocol. If you enable this option, the events are sent to the event pipeline and are
autodetected. To get the maximum value from this feature, use the Log source identifier pattern.
•
Log source identifier pattern
Use the log source identifier pattern to customize the identifier that is sent with payloads
when an event is posted. You can choose identifiers for your event formats and event types.
To use the full capabilities of the log source identifier pattern, you must have a basic
understanding of regular expressions (regex) and how to use them.
The log source identifier pattern accepts a list of key-value pairs. A key is an identifier
that is represented as a regex. The value is a regex that matches to event data. When
the regex matches to the data within the event, then it posts the event with the identifier
that is associated with that value.
Basic example
Key1 = value1
Key2 = value2
Key3 = value3
In this example, if an event contains a value of “value1”, the identifier for that event is key1.
If an event contains a value of “value2”, the identifier is Key2. If an event contains both
“value1” and “value2”, the first identifier, Key1, is matched.
In this example, you must manually create three Syslog log sources, one for each of the
identifier options.
Regex example
Key1 = value1
Key2 = \d\d\d (where \d\d\d is a regex that matches to three consecutive digits.)
\1= \d(\d) (where \d(\d) is a regex that matches to two consecutive digits and captures the
second digit. \1 references the first captured value in the value field.)
In this example, the following statements are true:
•
•
•
•
\d represents a "digit".
If an event contains a value of “value1”, the identifier for that event is Key1.
If an event contains “111” or “652” or any three consecutive digits, the identifier
would be Key2.
If an event contains two consecutive digits such as “11’, “73”, and “24”, the identifier
is \1. The regex saves the second value (“1”, “3” and “4” in the examples) for future
use with the parentheses. The value that is saved by the regex is used later as the
identifier. If you set the key to “\1”, the key matches to the first saved value in the
regex. In this case, the identifier is not a hardcoded value, but instead it can be ten
values (0 - 9.) Three identifiers are in the sample events (“1”, “3” and “4”.)
You must create a log source with the identifiers Key1 and Key2, and a log source for each
possible Key1 value. In this example, for the events to go to the correct log source, you must
create three Syslog log sources. For the log sources, one has the identifier set to “1”, one has
the identifier set to “3” and one has the identifier set to “4”. To capture all of the possible
identifiers, you need ten Syslog log sources. Each log source corresponds to a single digit.
Tips for using the log source identifier pattern
It is important to know what type of data you are receiving and how granular you need your
log sources to be. Each QRadar® environment is unique. The following tips can help you to
configure the log source identifier pattern.
Keep the data separated at the source
Most gateway supported services, such as Microsoft Azure Event Hubs and Google
Pub Sub, offer ways to separate the data at the source. Keep your data in separate
sources to reduce the complexity on the QRadar side. For example, if you want to
collect Windows Logs, Linux® Logs and Audit Logs, use three separate gateway log
sources to simplify the configuration. If you collect all of those logs in one
source, QRadar must identify the events and associate them with the correct log
source.
Hardcode the regex if possible
If you hardcode the key, all of the events that match the value’s regex are collected by
a single log source. This action requires less effort to create and maintain log sources,
and they are easier to monitor.
Use online regex testers
Before you save and enable your log source, use online tools to test the regex.
Use the Event Retriever to determine the identifier
Use the Event Retriever to display the assigned log source identifier in QRadar. You
can also use it to test that your regex and identifier are matching correctly.
DSM Editor overview
Instead of manually creating a log source extension to fix parsing issues or extend support for new
log source types, use the DSM Editor. The DSM Editor provides different views of your data. You use
the DSM Editor to extract fields, define custom properties, categorize events, and define new QID
definition.
The DSM Editor provides the following views:
Workspace
The Workspace shows you raw event data. Use sample event payloads to test the behavior of the
log source type, and then the Workspace area shows you the data that you capture in real time.
All sample events are sent from the workspace to the DSM simulator, where properties are parsed
and QID maps are looked up. The results are displayed in the Log Activity Preview section. Click
the edit icon to open in edit mode.
In the edit mode, you paste up to 100,000 characters of event data into the workspace or edit data
directly. When you edit properties on the Properties tab, matches in the payload are highlighted in
the workspace. Custom properties and overridden system properties are also highlighted in
the Workspace.
New in 7.4.1You can specify a custom delimiter that makes it easier for QRadar® to ingest
multiline events. To ensure that your event is kept intact as a single multiline event, select
the Override event delimiter checkbox to separate the individual events based on another
character or sequence of characters. For example, if your configuration is ingesting multiline
events, you can add a special character to the end of each distinct event in the Workspace, and then
identify this special character as the event delimiter.
New in 7.4.2QRadar can suggest regular expressions (regex) when you enter event data in
the Workspace. If you are not familiar with creating regex expressions, use this feature to generate
your regex. Highlight the payload text that you want to capture and in the Properties tab,
click Suggest Regex. The suggested expression appears in the Expression field. Alternatively, you
can click the Regex button in the Workspace and select the property that you want to write an
expression for. If QRadar cannot generate a suitable regex for your data sample, a system message
appears.
Tip: The regex generator works best for fields in well-structured event payloads. If your payload consists of
complex data from natural language or unstructured events, the regex generator might not be able to parse
it and does not return a result.
Log activity preview
New in 7.4.1 The Parsing Status column was added to the Log Activity Preview.
The Log Activity Preview simulates how the payloads in the workspace appear in the Log
Activity viewer. The Parsing Status column indicates whether your event properties are
successfully parsing and mapping to a QID record. Every standard property that is supported is
displayed. The fields that are marked with an asterisk (*), for example, Event
name, Severity, Low-level category, and QID, are populated from the QID map. Fields that
are populated from the QID map cannot be parsed verbatim from the raw events data in the
workspace, so they cannot be defined or edited. You can adjust their values by selecting the
corresponding event ID and category combination from the Event Mappings tab. Then click Edit to
re-map an event to a different QID record that exists in the system or to a newly created QID.
Important: You must set an Event ID for any system properties to be parsed correctly.
Click the configure icon to select which columns to show or to hide in the Log Activity
Preview window, and to reorder the columns.
Properties
The Properties tab contains the combined set of system and custom properties that constitute a
DSM configuration. Configuring a system property differs from configuring a custom property. You
can override a property, by selecting the Override system behaviour check box and defining the
expression.
Note: If you override the Event Category property, you must also override the Event ID property.
Matches in the payload are highlighted in the event data in the workspace. The highlighting color is
two-toned, depending on what you capture. For example, the orange highlighting represents the
capture group value while the bright yellow highlighting represents the rest of the regex that you
specified. The feedback in the workspace shows whether you have the correct regex. If an
expression is in focus, the highlighting in the workspace reflects only what that expression can
match. If the overall property is in focus, then the highlighting turns green and shows what the
aggregate set of expressions can match, taking into account the order of precedence.
In the Format String field, capture groups are represented by using the $<number> notation. For
example, $1 represents the first capture group from the regex, $2 is the second capture group, and
so on.
You can add multiple expressions to the same property, and you can assign precedence by dragging
and dropping the expressions to the top of the list.
A warning icon beside any of the properties indicates that no expression was added.
Event mappings tab
New in 7.4.1 Support for copying Event ID and Event Category fields was added to the Event
Mapping tab.
The Event Mappings tab displays all the event ID and category combinations that exist in the
system for a selected log source type. If a new event mapping is created, it is added to the list of
event ID and category combination that is displayed in the Event Mappings tab. In general,
the Event Mappings tab displays all event ID and category combinations and the QID records that
they are mapped to.
Configuration tab
You can configure Auto Property Discovery for structured data that are in JSON format. By default,
log source types have Auto Property Discovery turned off.
When you enable Auto Property Discovery on the Configuration tab, the property discovery engine
automatically generates new properties to capture all fields that are present in the events that are
received by a log source type. You can configure the number of consecutive events to be inspected for new
properties in the Discovery Completion Threshold field. Newly discovered properties appear in
the Properties tab, and are made available for use in the rules and search indexes. However, if no new
properties are discovered before the threshold, the discovery process is considered complete and Auto
Property Discovery for that log source type is disabled. You can manually enable the Auto Property
Discovery on the Configuration tab at any time.
Note: To continuously inspect events for a log source type, you must make sure that you set the Discovery
Completion Threshold value to 0.
Protocol configuration options
Protocols in IBM® QRadar® provide the capability of collecting a set of data files by using various
connection options. These connections pull the data back or passively receive data into the event
pipeline in QRadar. Then, the corresponding Device Support Module (DSM) parses and normalizes
the data.
The following standard connection options pull data into the event pipeline:
•
•
•
•
JDBC
FTP
SFTP
SCP
The following standard connection options receive data into the event pipeline:
•
•
•
Syslog
HTTP Receiver
SNMP
QRadar also supports proprietary vendor-specific protocol API calls, such as Amazon Web Services.
•
•
•
•
•
•
•
Akamai Kona REST API protocol configuration options
To receive events from your Akamai Kona Platform, configure a log source to use the Akamai
Kona REST API protocol.
Amazon AWS S3 REST API protocol configuration options
The Amazon AWS S3 REST API protocol is an active outbound protocol that collects AWS
CloudTrail logs from Amazon S3 buckets.
Amazon Web Services protocol configuration options
The Amazon Web Services (AWS) protocol is an outbound/active protocol for IBM
QRadar that collects AWS CloudWatch Logs, Amazon Kinesis Data Streams, and Amazon
Simple Queue Service (SQS) messages.
Apache Kafka protocol configuration options
IBM QRadar uses the Apache Kafka protocol to read streams of event data from topics in a
Kafka cluster that uses the Consumer API. A topic is a category or feed name in Kafka where
messages are stored and published. The Apache Kafka protocol is an outbound or active
protocol, and can be used as a gateway log source by using a custom log source type.
Blue Coat Web Security Service REST API protocol configuration options
To receive events from Blue Coat Web Security Service, configure a log source to use the
Blue Coat Web Security Service REST API protocol.
Centrify Redrock REST API protocol configuration options
The Centrify Redrock REST API protocol is an outbound/active protocol for IBM Security
QRadar that collects events from Centrify Identity Platform.
Cisco Duo protocol configuration options
To receive authentication events from Cisco Duo, configure a log source to use the Cisco Duo
protocol.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Cisco Firepower eStreamer protocol configuration options
To collect events in IBM QRadar from a Cisco Firepower eStreamer (Event Streamer)
service, configure a log source to use the Cisco Firepower eStreamer protocol.
Cisco NSEL protocol configuration options
To monitor NetFlow packet flows from a Cisco Adaptive Security Appliance (ASA), configure
the Cisco Network Security Event Logging (NSEL) protocol source.
EMC VMware protocol configuration options
To receive event data from the VMWare web service for virtual environments, configure a
log source to use the EMC VMware protocol.
Forwarded protocol configuration options
To receive events from another Console in your deployment, configure a log source to use
the Forwarded protocol.
Google Cloud Pub/Sub protocol configuration options
The Google Cloud Pub/Sub protocol is an outbound/active protocol for IBM QRadar that
collects Google Cloud Platform (GCP) logs.
Google G Suite Activity Reports REST API protocol options
The Google G Suite Activity Reports REST API protocol is an active outbound protocol
for IBM QRadarthat retrieves logs from Google G Suite.
HCL BigFix SOAP protocol configuration options (formerly known as IBM BigFix)
To receive Log Event Extended Format (LEEF) formatted events from HCL BigFix®
appliances, configure a log source that uses the HCL BigFix SOAP protocol.
HTTP Receiver protocol configuration options
To collect events from devices that forward HTTP or HTTPS requests, configure a log source
to use the HTTP Receiver protocol.
IBM Cloud Object Storage protocol configuration options
The IBM Cloud Object Storage protocol for IBM QRadar is an outbound or active protocol
that collects logs that are contained in objects from IBM Cloud Object Storage buckets.
IBM Fiberlink REST API protocol configuration options
To receive Log Event Extended Format (LEEF) formatted events from IBM MaaS360®
appliances, configure a log source that uses the IBM Fiberlink® REST API protocol.
IBM Security Randori REST API protocol configuration options
To receive events from IBM Security Randori, configure a log source to communicate with
the IBM Security Randori REST API protocol.
IBM Security QRadar EDR REST API protocol configuration options
To receive events from IBM Security QRadar EDR, configure a log source to communicate
with the IBM Security QRadar EDR REST API protocol.
IBM Security Verify Event Service protocol configuration options
To receive events from IBM Security Verify, configure a log source in IBM QRadar to use the
IBM Security Verify Event Service protocol.
JDBC protocol configuration options
QRadar uses the JDBC protocol to collect information from tables or views that contain event
data from several database types.
JDBC - SiteProtector protocol configuration options
You can configure log sources to use the Java™ Database Connectivity (JDBC) - SiteProtector
protocol to remotely poll IBM Proventia® Management SiteProtector® databases for events.
Juniper Networks NSM protocol configuration options
To receive Juniper Networks NSM and Juniper Networks Secure Service Gateway (SSG) logs
events, configure a log source to use the Juniper Networks NSM protocol.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Juniper Security Binary Log Collector protocol configuration options
You can configure a log source to use the Security Binary Log Collector protocol. With this
protocol, Juniper appliances can send audit, system, firewall, and intrusion prevention
system (IPS) events in binary format to QRadar.
Log File protocol configuration options
To receive events from remote hosts, configure a log source to use the Log File protocol.
Microsoft Azure Event Hubs protocol configuration options
The Microsoft Azure Event Hubs protocol is an outbound and active protocol for IBM
Security QRadar that collects events from Microsoft Azure Event Hubs.
Microsoft Defender for Endpoint SIEM REST API protocol configuration options
Configure a Microsoft Defender® for Endpoint SIEM REST API protocol to receive events
from supported Device Support Modules (DSMs).
Microsoft DHCP protocol configuration options
To receive events from Microsoft DHCP servers, configure a log source to use the Microsoft
DHCP protocol.
Microsoft Exchange protocol configuration options
To receive events from SMTP, OWA, and message tracking events from Microsoft Windows
Exchange 2007, 2010, 2013 and 2017 servers, configure a log source to use the Microsoft
Exchange protocol.
Microsoft Graph Security API protocol configuration options
To receive events from the Microsoft Graph Security API, configure a log source in IBM
QRadar to use the Microsoft Graph Security API protocol.
Microsoft IIS protocol configuration options
You can configure a log source to use the Microsoft IIS protocol. This protocol supports a
single point of collection for W3C format log files that are located on a Microsoft IIS web
server.
Microsoft Security Event Log protocol configuration options
Support for the Windows Event Log protocols ended on 31 October 2022.
MQ protocol configuration options
To receive messages from a message queue (MQ) service, configure a log source to use the
MQ protocol. The protocol name displays in IBM QRadar as MQ JMS.
Office 365 Message Trace REST API protocol configuration options
The Office 365 Message Trace REST API protocol for IBM Security QRadar collects message
trace logs from the Message Trace REST API. This active outbound protocol is used to collect
Office 365 email logs.
Office 365 REST API protocol configuration options
The Office 365 REST API protocol for IBM Security QRadar is an active outbound protocol.
Okta REST API protocol configuration options
To receive events from Okta, configure a log source in IBM QRadar by using the Okta REST
API protocol.
OPSEC/LEA protocol configuration options
To receive events on port 18184, configure a log source to use the OPSEC/LEA protocol.
Oracle Database Listener protocol configuration options
To remotely collect log files that are generated from an Oracle database server, configure a
log source to use the Oracle Database Listener protocol source.
PCAP Syslog Combination protocol configuration options
To collect events from Juniper SRX Series Services Gateway or Juniper Junos OS Platform
that forward packet capture (PCAP) data, configure a log source to use the PCAP Syslog
Combination protocol.
•
•
•
•
•
•
•
•
•
•
•
•
•
RabbitMQ protocol configuration options
To receive messages from a Cisco AMP DSM, configure a log source to use the RabbitMQ
protocol.
SDEE protocol configuration options
You can configure a log source to use the Security Device Event Exchange (SDEE)
protocol. QRadar uses the protocol to collect events from appliances that use SDEE servers.
Seculert Protection REST API protocol configuration options
To receive events from Seculert, configure a log source to use the Seculert Protection REST
API protocol.
SMB Tail protocol configuration options
You can configure a log source to use the SMB Tail protocol. Use this protocol to watch
events on a remote Samba share and receive events from the Samba share when new lines
are added to the event log.
SNMPv2 protocol configuration options
You can configure a log source to use the SNMPv2 protocol to receive SNMPv2 events.
SNMPv3 protocol configuration options
You can configure a log source to use the SNMPv3 protocol to receive SNMPv3 events.
Sophos Enterprise Console JDBC protocol configuration options
To receive events from Sophos Enterprise Consoles, configure a log source to use the Sophos
Enterprise Console JDBC protocol.
Sourcefire Defense Center eStreamer protocol options
Sourcefire Defense Center eStreamer protocol is now known as Cisco Firepower eStreamer
protocol.
Syslog Redirect protocol overview
The Syslog Redirect protocol is an inbound/passive protocol that is used as an alternative to
the Syslog protocol. Use this protocol when you want QRadar to identify the specific device
name that sent the events. QRadar can passively listen for Syslog events by using TCP or UDP
on any unused port that you specify.
TCP Multiline Syslog protocol configuration options
The TCP Multiline Syslog protocol is a passive inbound protocol that uses regular
expressions to identify the start and end pattern of multiline events.
TLS Syslog protocol configuration options
Configure a TLS Syslog protocol log source to receive encrypted syslog events from up to 50
network devices that support TLS Syslog event forwarding for each listener port.
UDP multiline syslog protocol configuration options
To create a single-line syslog event from a multiline event, configure a log source to use the
UDP multiline protocol. The UDP multiline syslog protocol uses a regular expression to
identify and reassemble the multiline syslog messages into single event payload.
VMware vCloud Director protocol configuration options
To collect events from VMware vCloud Director virtual environments, create a log source
that uses the VMware vCloud Director protocol, which is an active outbound protocol.
Adding a log source to receive events
Use the QRadar® Log Source Management app to add new log sources to receive events from your
network devices or appliances.
Before you begin
Download and install a device support module (DSM) that supports the log source. A DSM is a
software application that contains the event patterns that are required to identify and parse events.
The events are parsed from the original format of the event log to the format that QRadar can use.
You can install a DSM from IBM® Fix Central (https://www-945.ibm.com/support/fixcentral/). For
more information, see the DSM Configuration Guide.
You can also create a custom log source type without a DSM.
Procedure
1. In the QRadar Log Source Management app, click + New Log Source.
2. Click Single Log Source.
3. On the Select a Log Source Type page, select a log source type and click Select Protocol
Type.
4. On the Select a Protocol Type page, select a protocol and click Configure Log Source
Parameters.
5. On the Configure the Log Source parameters page, configure the log source parameters and
click Configure Protocol Parameters.
6. On the Configure the protocol parameters page, configure the protocol-specific parameters.
7. Optional: If the server certificates for the protocol are uploaded to the centralized certificate
store, select the certificate from the Server Certificate Store Alias list.
If your log source requires a server certificate that is not uploaded to the centralized
certificate store, and you have System Administrator permission, you can upload the
certificate from the IBM QRadar Certificate Management app.
If the QRadar Certificate Management app is installed, in the Server Certificate Store
Alias list, select Upload new certificate. The Certificate Management app opens.
o If the QRadar Certificate Management app is not installed, in the Server Certificate
Store Alias list, select Download Certificate Management app to open the IBM
Security App Exchange and download the app.
8. Optional: If your configuration can be tested, the Test Protocol Parameters option is listed in
the Steps pane. When you test your configuration, you can identify any errors with your
protocol parameters. For more information, see Testing log sources. To test your
configuration, follow these steps:
o Click Test Protocol Parameters, and then click Start Test.
o To fix any errors, click Configure Protocol Parameters.
o
On the Configure the protocol parameters page, configure the protocol-specific
parameters, then test your protocol again.
If your configuration can be tested, but you don't want to test it, click Skip Test and
Finish.
9. Click Finish.
Results
Your log source is listed on the Log Sources page.
Adding a quick log source
Use the Quick Log Source option in the QRadar Log Source Management app to add new log
sources in a single screen. Add a quick log source if you want to add your log sources faster than
using the + New Log Source option.
Use the Quick Log Source option in the QRadar® Log Source Management app to add new log
sources in a single screen. Add a quick log source if you want to add your log sources faster than
using the + New Log Source option.
Procedure
1. In the QRadar Log Source Management app, click the + New Log Source drop down
arrow .
2. Click Quick Log Source.
3. Configure the parameters in the Log Source Summary pane and click Create.
What to do next
Test your log sources. For more information, see Testing log sources.
Adding multiple log sources at the same time
Use the QRadar Log Source Management app to add multiple log sources to IBM QRadar at the same
time. You can add as many log sources as you want.
Procedure
1. In the QRadar Log Source Management app, click + New Log Source and then click Multiple
Log Sources.
2. On the Select a Log Source type page, select a log source type and click Select Protocol
Type.
3. On the Select a protocol type page, select a protocol type and click Configure Common Log
Source Parameters.
4. On the Configure the common Log Source parameters page, configure the parameters that
you want to set for all of the log sources.
5. If you have log sources that have different log source parameter values, clear the relevant
check boxes, and then click Configure Common Protocol Parameters.
6. On the Configure the common protocol parameters page, configure the protocol-specific
parameters that you want to set for all of the log sources.
7. If you have log sources that have different protocol parameter values, clear the relevant
check boxes, and then click Configure Individual Parameters.
8. On the Configure the individual parameters page, upload a CSV file that contains the
individual log source parameter values, and click Add.
A log source is created for each line of this file, except for empty lines and comment lines
that begin with a hashtag (#). Each line must contain the comma-separated list of parameter
values for the Log Source Identifier field, and any other deferred parameters, in the order
shown in the deferred parameters table.
9. Click Bulk Template to download the file template and add the parameters that you want to
configure, in order.
For example, if you deferred the Enabled and Groups parameters, the CSV file must contain
the following values:
Enabled, Groups, Log Source Identifier
If you include a comma in a parameter, enclose the value in double quotation marks.
10. If you do not upload a CSV file:
a. Click Manual to specify the values for the parameters that you deferred.
b. Enter a Log Source Identifier for each new log source and click Add.
11. Click Finish.
What to do next
Test your log sources. For more information, see Testing log sources
QRadar: How does coalescing work in QRadar?
Question & Answer
Question
How does event coalescing work for log sources in QRadar? What data is kept and what is
lost when events are coalesced? How are events displayed with coalescing enabled?
Answer
Event Coalescing helps improve performance and reduce storage for non-critical security
events where the full event payload does not need to be saved. As data comes in and is
coalesced, a large burst of events can convert hundreds of thousands of events into only a
few dozen records. This action is done while QRadar maintains the count of the number of
actual events. Coalescing gives QRadar the ability to detect, enumerate, and track an attack
on a huge scale. It also protects the performance of the pipeline by reducing the workload
of the system, including storage requirements for those events. When events are received
that match a specific criteria, QRadar can use coalescing to determine what to store from
the event payload based on the log source settings in QRadar.
For example, a multitude of similar events created during a Denial Of Service attack can be
converted from hundreds of thousands of events into only a few dozen records, while
maintaining the count of the number of actual events received.
How does coalescing work?
Event data received by QRadar is processed in to normalized fields, along with the original
payload. When coalescing is enabled the following five properties are evaluated to
determine if a data source can be coalesced:
•
•
•
•
•
QRadar Identifier (QID)
Source IP
Destination IP
Destination port
Username
Event coalescing starts after three events have been found with matching properties
within a 10 second window. Additional events that occur within the 10 second period are
coalesced together, with a count of the events noted. For each record containing coalesced
events, only the payload of the first coalesced event is retained.
For example, if 1,005 events are received by QRadar within a 10 second window. Each of
the 1,005 events has the same QRadar Identifier (QID), Source IP, Destination IP,
Destination port, and Username and coalescing is enabled for the log source. The Log
Activity tab represents these 1,005 events as follows:
•
•
The first three events display in Log Activity as individual events with unique event
payloads.
Event 1: full event details saved.
Event 2: full event details saved.
Event 3: full event details saved.
The fourth event contains a unique payload; however, the remaining 1,001 events
that also arrived within that 10 second period are coalesced and only the original
payload for the fourth event is retained.
Event 4: full event details saved.
Event 5-1,005: event details are NOT saved to disk for each individual event. The
count for the fourth event displays in the user interface as Multiple (1001). The
value within parenthesis (x) indicates to the user that this log source coalesced a
number of events as the with a duplicate QRadar Identifier (QID), Source IP,
Destination IP, Destination port, and Username in to the fourth event as these all
occurred within the 10 second window. Events 5-1005 do not have unique event
payloads stored on disk.
Note: Rules created by users intended to count events do update the event count
even if the event is coalesced. For example, a user creates a rule with the test and
when at least 5 events are seen with the same Username. The events that occur
within the multiple field (x) update the count tracked in QRadar and coalesced data
can trigger an offense or rule response.
System wide Event Coalescing Settings
QRadar provides the ability to disable coalescing if there is a requirement to retain all
event payloads. This can be done either at system level, or per log source basis.
Procedure:
To disable coalescing at the system level:
1.
2.
3.
4.
5.
6.
on the Admin tab, click the System Settings icon.
Click Advanced.
Under the System Settings heading, find the Coalescing Events setting.
To disable Coalescing Events for all log sources, select No,
Click Save, and close the window.
From the Admin tab click Deploy Changes.
Event coalescing options for a specific log source
Coalescing can be enabled or disabled on each log source. Administrators can set
coalescing when the log source is created or when editing an existing log source.
Procedure
To disable Coalescing for an existing log source:
1. Click the Admin tab.
2. Click the Log Sources icon.
3. Double click on a log source to edit the configuration.
4. Clear the Coalescing Events check box.
What types of log sources should I consider disabling coalescing?
Log sources for DNS systems, Proxy Servers, Anti-Virus systems, Windows servers and
Endpoints can be good candidates for turning coalescing off. These log sources often
include additional event payload information beyond QRadar's normalized fields which
can be unique to the event payload that an administrator would want captured and
searchable for an investigation.
Communication between WinCollect agents
and QRadar
WinCollect agent communication to QRadar Console and Event
Collectors
All WinCollect agents communicate with the QRadar Console and Event Collectors to forward
events to QRadar and request updated information. Managed WinCollect agents also request and
receive updated code and configuration changes. You must ensure firewalls that are between
the QRadar Event Collectors and your WinCollect agents allow traffic on the following ports:
Port 8413
This port is used for managing the WinCollect agents to request and receive code and configuration
updates. Traffic is always initiated from the WinCollect agent, and is sent over TCP.
Communication is encrypted by using the QRadar Console's public key and
the ConfigurationServer.PEM file on the agent.
Port 514
This port is used by the WinCollect agent to forward syslog events to QRadar. You can
configure WinCollect log sources to provide events by using TCP or UDP. You can decide which
transmission protocol to use for each WinCollect log source. Port 514 traffic is always initiated
from the WinCollect agent.
WinCollect agents remotely polling Windows event sources
WinCollect agents that remotely poll other Windows operating systems require extra ports to be
open. These ports need to be open on the WinCollect agent computer and the computer(s) that are
remotely polled, but not on your QRadar appliances. The following table describes the ports that
are used.
Port
ProtocolUsage
135
TCP
Microsoft Endpoint Mapper
137
UDP
NetBIOS name service
138
UDP
NetBIOS datagram service
139
TCP
NetBIOS session service
445
TCP
Microsoft Directory Services for file transfers that use Windows share
49152 – 65535
Note: Exchange
servers are
configured for TCP
a port range of
6005 – 58321
by default.
Default dynamic port range for TCP/IP
Table 1. Port usage for WinCollect remote polling
The MSEVEN protocol uses port 445. The NETBIOS ports (137 - 139) can be used for host name
resolution. When the WinCollect agent polls a remote event log by using MSEVEN6, the initial
communication with the remote machine occurs on port 135 (dynamic port mapper), which assigns
the connection to a dynamic port. The default port range for dynamic ports is between port 49152
and port 65535, but might be different dependent on the server type. For example, Exchange
servers are configured for a port range of 6005 – 58321 by default.
To allow traffic on these dynamic ports, enable and allow the two following inbound rules on the Windows
server that is being polled:
•
•
Remote Event Log Management (RPC)
Remote Event Log Management (RPC-EPMAP)
Important: To limit the number of events that are sent to QRadar, administrators can use exclusion filters
for an event based on the EventID or Process. For more information about WinCollect filtering,
see WinCollect Event Filtering (http://www.ibm.com/support/docview.wss?uid=swg21672656).
Enabling remote log management on Windows
You can enable remote log management only when your log source is configured to remotely poll other
Windows operating systems. You can enable remote log management on Windows 2012 R2 for XPath
queries.
About this task
Note: WinCollect does not support reverting Citrix Virtual Machines that are polled remotely.
Procedure
1.
2.
3.
4.
5.
6.
On your desktop, select Start > Control Panel.
Click the System and Security icon.
Click Allow a program through Windows Firewall.
If prompted, click Continue.
Click Change Settings.
From the Allowed programs and features pane, select Remote Event Log Management.
Depending on your network, you might need to correct or select more network types.
7. Click OK.
Testing log sources
In IBM® QRadar® 7.3.2. Fix Pack 3 or later, test your log source configuration in the QRadar Log
Source Management app to ensure that the parameters that you used are correct. The test runs
from the host that you specify in the Target Event Collector setting, and can collect sample event
data from the target system. The target system is the source of your event data.
Restriction: If the Test tab doesn’t appear for your log source, you can't test the configuration.
In QRadar 7.3.2. Fix Pack 3 or later and QRadar Log Source Management app v5.0.0 or later, only a few
protocols are updated to include test capabilities. Ensure that you install the latest version of your protocols
to get the testing capability when it is available.
To download a Fix Pack, go to Fix Central (https://www-945.ibm.com/support/fixcentral/).
Procedure
1. In the QRadar Log Source Management app, select a log source.
2. On the Log Source Summary pane, click the Test tab, then click Start Test.
If there is high network latency between the QRadar Console and the log source's Target
Event Collector, it might take a moment for the results to appear.
When the test is successful, checkmarks are displayed next to each of the results and sample
event information is generated. If the test is not successful, an X is displayed next to the
result that failed, and no sample event information is generated. When one result fails, the
test of the other results is canceled.
3. Optional: If the test is not successful, click Edit to configure the parameter that caused the
test to fail and test your log source again.
Click the drop-down arrow next to the failed result for more information about the error.
4. Optional: Click the Download icon
5. Click Close.
•
to view the test results in a .txt file.
Protocols available for testing
In QRadar 7.3.2. Fix Pack 3 or later, and QRadar Log Source Management app 5.0.0 or later,
some protocols are updated to include test capabilities. Ensure that you install the latest
version of your protocols to get the testing capability when it is available.
Filtering log sources
Filter your log sources to show only the ones that you need. When you open the QRadar® Log
Source Management app, a list of log sources appears with 20 items. You can click other columns to
change the sorting order, and change the number of items that are displayed in the list.
Procedure
1. On the Admin tab, go to the Apps section and click the QRadar Log Source
Management icon.
2. Search for a log source by using one of the following methods.
o To search by text in the Search bar, enter the full or partial log source name,
description, or log source identifier. Only the log sources that match the search string
are displayed.
o To use the advanced search, in the Search bar, type advanced: <your filter
string> For information about the API filter syntax, see Filter
syntax (https://www.ibm.com/docs/en/qsip/7.5?topic=versions-filter-syntax.html)
For a list of log source fields, see GET
/config/event_sources/log_source_management/log_sources (https://ibmsecuritydo
cs.github.io/qradar_api_19.0/19.0--config-event_sources-log_source_managementlog_sources-GET.html)
o
To search by filters, in the Filter pane, select one or more checkboxes to show only
log sources that match the criteria.
o
To add a column to the list of log sources, click Manage Columns and select the
checkbox for the column that you want to display.
To change the column order, hover over the icon ( ), and drag the columns to
arrange them in the order that you want them to display.
3. Each filter shows a count of the number of options for that filter. Each option in a filter also
has a count, which indicates how many log sources match the option for the filters that you
apply. If the filters exclude log sources that match the option, this number might decrease as
you apply more filters.
TASK: 3.3 Export event and flow data
SUBTASKS:
3.3.1. Export events from QRadar
3.3.2. Export flow data
Exporting events
You can export events in Extensible Markup Language (XML) or Comma-Separated Values (CSV)
format.
Before you begin
The length of time that is required to export your data depends on the number of parameters
specified.
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to pause
streaming.
3. From the Actions list box, select one of the following options:
o Export to XML > Visible Columns - Select this option to export only the columns
that are visible on the Log Activity tab. This is the recommended option.
o Export to XML > Full Export (All Columns) - Select this option to export all event
parameters. A full export can take an extended period of time to complete.
o Export to CSV > Visible Columns - Select this option to export only the columns that
are visible on the Log Activity tab. This is the recommended option.
o Export to CSV > Full Export (All Columns) - Select this option to export all event
parameters. A full export can take an extended period of time to complete.
4. If you want to resume your activities while the export is in progress, click Notify When
Done.
Viewing normalized events
Events are collected in raw format, and then normalized for display on the Log Activity tab.
About this task
Normalization involves parsing raw event data and preparing the data to display readable information
about the tab. When events are normalized, the system normalizes the names as well. Therefore, the name
that is displayed on the Log Activity tab might not match the name that is displayed in the event.
Note: If you selected a time frame to display, a time series chart is displayed. For more information about
using time series charts, see Time series chart overview.
By default, the Log Activity tab displays the following parameters when you view normalized events:
ParameterDescription
The top of the table displays the details of the filters that are applied to the search results. To
Current® clear these filter values, click Clear Filter.
Filters
Note: This parameter is only displayed after you apply a filter.
View
From this list box, you can select the time range that you want to filter for.
When not in Real Time (streaming) or Last Minute (auto refresh) mode, current statistics are
displayed, including:
Note: Click the arrow next to Current Statistics to display or hide the statistics
•
Current
Statistics
•
•
•
•
Total Results - Specifies the total number of results that matched your search
criteria.
Data Files Searched - Specifies the total number of data files searched during the
specified time span.
Compressed Data Files Searched - Specifies the total number of compressed
data files searched within the specified time span.
Index File Count - Specifies the total number of index files searched during the
specified time span.
Duration - Specifies the duration of the search.
Note: Current statistics are useful for troubleshooting. When you contact
Customer Support to troubleshoot events, you might be asked to supply current
statistical information.
Charts
Displays configurable charts that represent the records that are matched by the time interval and
grouping option. Click Hide Charts if you want to remove the charts from your display. The
charts are only displayed after you select a time frame of Last Interval (auto refresh) or above,
and a grouping option to display. For more information about configuring charts, see Chart
management.
Note: If you use Mozilla Firefox as your browser and an ad blocker browser extension is
installed, charts do not display. To displayed charts, you must remove the ad blocker browser
extension. For more information, see your browser documentation.
ParameterDescription
Click this icon to view details of the offense that is associated with this event. For more
information, see Chart management.
Offenses
icon
Note: Depending on your product, this icon is might not be available. You must have IBM®
QRadar® SIEM.
Start Time Specifies the time of the first event, as reported to QRadar by the log source.
Event
Name
Specifies the normalized name of the event.
Log Source
Specifies the log source that originated the event. If there are multiple log sources that are
associated with this event, this field specifies the term Multiple and the number of log sources.
Event
Count
Specifies the total number of events that are bundled in this normalized event. Events are
bundled when many of the same type of event for the same source and destination IP address are
detected within a short time.
Time
Specifies the date and time when QRadar received the event.
Low Level Specifies the low-level category that is associated with this event.
Category
For more information about event categories, see the IBM QRadar Administration Guide.
Specifies the source IP address of the event.
Source IP Note: If you select the Normalized (With IPv6 Columns) display, refer to the Source
IPv6 parameter for IPv6 events.
Source
Port
Specifies the source port of the event.
Specifies the destination IP address of the event.
Destination
Note: If you select the Normalized (With IPv6 Columns) display, refer to the Destination
IP
IPv6 parameter for IPv6 events.
Destination
Specifies the destination port of the event.
Port
Specifies the user name that is associated with this event. User names are often available in
Username authentication-related events. For all other types of events where the user name is not available,
this field specifies N/A.
Magnitude
Specifies the magnitude of this event. Variables include credibility, relevance, and severity. Point
your mouse over the magnitude bar to display values and the calculated magnitude.
Table 1. Log Activity tab - Default (Normalized) parameters
If you select the Normalized (With IPv6 Columns) display, then the Log Activity tab displays the
following extra parameters:
Parameter
Description
Specifies the source IP address of the event.
Source IPv6
Destination
IPv6
Note: IPv4 events display 0.0.0.0.0.0.0.0 in the Source IPv6 and Destination
IPv6 columns.
Specifies the destination IP address of the event.
Note: IPv4 events display 0.0.0.0.0.0.0.0 in the Source IPv6 and Destination
IPv6 columns.
Table 2. Log Activity tab - Normalized (With IPv6 Columns) parameters
Procedure
1. Click the Log Activity tab.
2. Optional: From the Display list box, select Normalized (With IPv6 Columns).
The Normalized (With IPv6 Columns) display shows source and destination IPv6
addresses for IPv6 events.
3. From the View list box, select the time frame that you want to display.
4. Click the Pause icon to pause streaming.
5. Double-click the event that you want to view in greater detail. For more information,
see Event details.
https://www.securitylearningacademy.com/course/view.php?id=6585
Insufficient disk space to export data
38750096 - Insufficient disk space to complete data export request.
Explanation
If the export directory does not contain enough space, the export of event, flow, and offense data is
canceled.
User response
Select one of the following options:
•
•
•
Free some disk space in the /store/exports directory.
Configure the Export Directory property in the System Settings window to use to a
partition that has sufficient disk space.
Configure an offboard storage device.
Exporting flows
You can export flows in Extensible Markup Language (XML) or Comma Separated Values (CSV)
format. The length of time that is required to export your data depends on the number of
parameters specified.
Procedure
1. Click the Network Activity tab.
2. Optional. If you are viewing flows in streaming mode, click the Pause icon to pause
streaming.
3. From the Actions list box, select one of the following options:
o Export to XML > Visible Columns - Select this option to export only the columns
that are visible on the Log Activity tab. This is the recommended option.
o Export to XML > Full Export (All Columns) - Select this option to export all flow
parameters. A full export can take an extended period of time to complete.
o Export to CSV > Visible Columns - Select this option to export only the columns that
are visible on the Log Activity tab. This is the recommended option.
o Export to CSV > Full Export (All Columns) - Select this option to export all flow
parameters. A full export can take an extended period of time to complete.
4. If you want to resume your activities, click Notify When Done.
Results
When the export is complete, you receive notification that the export is complete. If you did not
select the Notify When Done icon, the Status window is displayed.
TASK: 3.4 Vulnerability information source configuration
SUBTASKS:
3.4.1. Understand QRadar vulnerability manager deployments
3.4.2. Add scanners to QVM deployment
3.4.3. Understand QVM
3.4.4. Configure vulnerability scans
3.4.5. Add third-party scanners to QRadar
3.4.6. Install the Java Cryptography Extension on QRadar
3.4.7. Integrate unsupported third-party vulnerability scanners using the AXIS format
Scan policies
Important: The IBM® QRadar® Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package
6, and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
A scan policy provides you with a central location to configure specific scanning requirements.
You must have the correct license capabilities to perform the following scanning operations. You
can use scan policies to specify scan types, ports to be scanned, vulnerabilities to scan for and
scanning tools to use. In IBM QRadar Vulnerability Manager, a scan policy is associated with a scan
profile and is used to control a vulnerability scan. You use the Scan Policies list on the Details tab
of the Scan Profile Configuration page to associate a scan policy with a scan profile.
You can create a new scan policy or copy and modify a pre-configured policy that is distributed
with QRadar Vulnerability Manager.
Pre-configured scan policies
The following pre-configured scan policies are distributed with QRadar Vulnerability Manager:
•
Full scan, Discovery scan, Database scan, Patch scan, PCI scan, Web scan
A description of each pre-configured scan policy is displayed on the Scan Policies page.
•
Scan policy automatic updates for critical vulnerabilities
As part of IBM QRadar Vulnerability Manager daily automatic updates, you receive new scan
policies for tasks such as detecting zero-day vulnerabilities on your assets.
Use scan policies that are delivered by automatic update to create scan profiles to scan for specific
vulnerabilities. To view all scan policies on your system, go to Administrative > Scan
Policies on the Vulnerabilities tab.
You must not edit scan policies that are delivered by automatic update as your changes might be
overwritten by later updates. You can create a copy and edit it.
If you delete a scan policy that is delivered by automatic update, it can be recovered only
by QRadar customer support.
•
Modifying a pre-configured scan policy
In IBM QRadar Vulnerability Manager, you can copy a pre-configured scan policy and modify
the policy to your exact scanning requirements.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scan Policies.
3. On the Scan Policies page, click a pre-configured scan policy.
4.
5.
6.
7.
8.
On the toolbar, click Edit.
Click Copy.
In the Copy scan policy window, type a new name in the Name field and click OK.
Click the copy of your scan policy and on the toolbar, click Edit.
In the Description field, type new information about the scan policy.
Important: If you modify the new scan policy, you must update the information in
the description.
9. To modify your scan policy, use the Port Scan, Vulnerabilities, Tool Groups,
or Tools tabs.
Restriction: Depending on the Scan Type that you select, you cannot use all the tabs
on the Scan Policy window.
•
Configuring a scan policy
In IBM QRadar Vulnerability Manager, you can configure a scan policy to meet any specific
requirements for your vulnerability scans. You can copy and rename a preconfigured scan
policy or you can add a new scan policy. You can't edit a preconfigured scan policy.
Before you begin
You must have the correct license capabilities to perform the following scanning operations.
Procedure
1.
2.
3.
4.
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Policies.
On the toolbar, click Add.
Type the name and description of your scan policy.
To configure a scan policy, you must at least configure the mandatory fields in
the New Scan Policy window, which are the Name and Description fields.
5.
6.
7.
8.
From the Scan Type list, select the scan type.
To manage and optimize the asset-discovery process, click the Asset Discovery tab.
To manage the ports and protocols that are used for a scan, click the Port Scan tab.
To include specific vulnerabilities in your patch scan policy, click
the Vulnerabilities tab.
Note: The Vulnerabilities tab is available only when you select a patch scan.
9. To include or exclude tool groups from your scan policy, click the Tool Groups tab.
Note: The Tool Groups tab is available only when you select a zero-credentialed fullscan or full-scan plus policy.
10. To include or exclude tools from a scan policy, click the Tools tab.
Note: The Tools tab is available only when you select a zero-credentialed Full Scan or
Full Scan Plus policy.
Important: If you do not modify the tools or tool groups, and you select
the Full option as your scan type, then all the tools and tool groups that are
associated with a full scan are included in your scan policy.
11. Click Save.
Risk score details
In IBM® QRadar® Vulnerability Manager, vulnerability risk scores provide an indication of the risk
that a vulnerability poses to your organization.
Using IBM QRadar Risk Manager, you can configure policies that adjust vulnerability risk scores and
draw attention to important remediation tasks.
Risk Score
The Risk Score provides specific network context by using the Common Vulnerability Scoring
System (CVSS) base, temporal, and environmental metrics.
When QRadar Risk Manager is not used to manage risk, the Risk Score column shows the CVSS
environmental metric score with a maximum value of 10.
Risk adjustments
If IBM QRadar Risk Manager is installed and you configured vulnerability risk policies, then the risk
adjustments are listed. The adjustments either increase or decrease the overall risk that is
associated with a vulnerability.
Installations and deployments
Depending on the product that you install and whether you upgrade IBM® QRadar® or install a new
system, the Vulnerabilities tab might not be displayed.
IBM Security QRadar Vulnerability
Manager by using the Vulnerabilities tab:
You access
•
•
If you install QRadar SIEM, the Vulnerabilities tab is enabled by default with a temporary
license key.
If you install QRadar Log Manager, the Vulnerabilities tab is not enabled. You can purchase
the license for QRadar Vulnerability Manager separately and enable it by using a license key.
QRadar Vulnerability Manager license
To use QRadar Vulnerability Manager after an installation or upgrade, you must upload and allocate
a valid license key. The license for QRadar Vulnerability Manager license is applied and processed
in real time to QRadar Vulnerability Manager scanned assets that have at least one IP address.
The QRadar Vulnerability Manager scan must fall within the configured retention time for the IP
address of the asset.
1. From the Admin tab, click the Asset Profiler Configuration
2. Find the Asset IP Retention (In Days) row to edit the asset IP retention value.
3. Change the retention value or check that it is suitable for your needs. The default asset IP
retention value is 120 days.
QRadar Vulnerability Manager and QRadar Risk
Manager licenses
IBM QRadar Vulnerability Manager and IBM QRadar Risk Manager are combined into one offering
and both are enabled through a single base license. The combined offering provides an integrated
network scanning and vulnerability management workflow. With the base license, you are entitled
to use QRadar Vulnerability Manager to view vulnerability dashboards, vulnerabilities detected by
third-party scanners, QRadar Vulnerability Manager filters, and QRadar Vulnerability
Manager reports. You can integrate QRadar Risk Manager with up to 50 standard configuration
sources. If you are entitled to either QRadar Vulnerability Manager or QRadar Risk Manager, you
are automatically entitled to the base license allowance for the other product. You require extra
licenses to integrate with more than 50 configuration sources.
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. If you upgrade to QRadar 7.5.0 Update Package 6,
you cannot scan assets with the base license. For more information, see QRadar Vulnerability Manager: End
of service product notification (https://www.ibm.com/support/pages/node/6853425).
•
Extending the QRadar Vulnerability Manager temporary license period
By default, when you install IBM QRadar SIEM, you can see the Vulnerabilities tab because
a temporary license key is also installed. When the temporary license expires, you can
extend it for an extra four weeks.
Procedure
1. On the navigation menu ( ), click Admin.
2. Click the Vulnerability Manager icon in the Try it out area.
3. To accept the end-user license agreement, click OK.
When the extended license period is finished, you must wait six months before you
can activate the temporary license again. To have permanent access to QRadar
Vulnerability Manager, you must purchase a license.
Common Vulnerability Scoring System (CVSS)
The Common Vulnerability Scoring System (CVSS) is used to rate the severity and risk of computer
system security.
In IBM® QRadar®7.5.0, QRadar Vulnerability Manager supports Common Vulnerability Scoring
System (CVSS) 2.0, 3.0, and 3.1. Scores and metric values are returned for the highest version
available in vulnerability data.
CVSS is an open framework that consists of the following metric groups:
•
•
•
Base
Temporal
Environmental
Base
The base score severity range is 0 - 10 and represents the inherent characteristics of the
vulnerability. The base score has the largest bearing on the final CVSS score, and can be further
divided into the following subscores:
•
Impact
The impact subscore represents metrics for confidentiality impact, integrity impact, and the
availability impact of a successfully exploited vulnerability.
•
Exploitability
In CVSS v2, the exploitability subscore represents metrics for Access Vector, Access
Complexity, and Authentication. The subscore measures how the vulnerability is accessed,
the complexity of the attack, and the number of times an attacker must authenticate to
successfully exploit a vulnerability.
In CVSS v3, the exploitability subscore represents metrics for Attack Vector, Attack
Complexity, Privileges Required, User Interaction, and Scope. The subscore measures how
the vulnerability is accessed, the complexity of the attack, any required privileges, the
interaction needed between the attacker and another user, and the impact on resources
beyond the vulnerable component.
Temporal
The temporal score represents the characteristics of a vulnerability threat that change over time, and
consists of the following metrics:
•
Exploitability (CVSS v2) or Exploit Code Maturity (CVSS v3)
The availability of techniques or code that can be used to exploit the vulnerability, which
changes over time.
•
Remediation Level
The level of remediation that is available for a vulnerability.
•
Report Confidence
The level of confidence in the existence of the vulnerability and the credibility of its technical
details.
Environmental
The environmental score represents characteristics of the vulnerability that are impacted by the
user's environment. Configure the following environmental metrics to highlight the vulnerabilities
of important or critical assets by applying higher environmental metrics. Apply the highest scores
to the most important assets because losses that are associated with these assets have greater
consequences for the organization.
•
Collateral Damage Potential (CDP) (CVSS v2 only)
The potential for loss of life or physical assets through the damage or theft of this asset, or
the economic loss of productivity or revenue.
•
Target Distribution (TD) (CVSS v2 only)
The proportion of vulnerable systems in your user's environment.
•
Confidentiality Requirement (CR)
The level of impact to the loss of confidentiality when a vulnerability is exploited on this
asset.
•
Integrity Requirement (IR)
This metric indicates the level of impact to the loss of integrity when a vulnerability is
successfully exploited on this asset.
•
Availability Requirement (AR)
The level of impact to the asset's availability when a vulnerability is successfully exploited
on this asset.
Deploying a dedicated QRadar
Vulnerability Manager processor
appliance
Important: The IBM® QRadar® Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package
6, and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
You can deploy a dedicated QRadar Vulnerability Manager processor appliance as a managed host.
When you deploy your vulnerability processor to a managed host, all vulnerabilities are processed
on the managed host.
Restriction: After you deploy processing to a dedicated QRadar Vulnerability Manager managed host, any
scan profiles or scan results that are associated with a QRadar console processor are not displayed. You can
continue to search and view vulnerability data on the Manage Vulnerabilities pages.
Before you begin
Ensure that a dedicated QRadar Vulnerability Manager managed host is installed and a valid
processor appliance activation key is applied. For more information, see the Installation Guide for
your product.
Procedure
1. Log in to QRadar Console as an administrator:
https://IP_Address_QRadar
The default user name is admin. The password is the password of the root user account that
was entered during the installation.
2. On the navigation menu ( ), click Admin.
3. In the System Configuration pane, click System and License Management.
4. From the host table, click the QRadar Console host, and click Deployment Actions > Add
Host.
5. Enter the IP address and password for the host.
6. To create an SSH tunnel on port 22, select Encrypt Host Connections.
Important: Do not select Remote Tunnel Initiation for encryption on managed hosts.
7. To enable encryption compression for communications with a host, select Encryption
Compression.
8. To enable NAT for a managed host, select Network Address Translation and add the
following information:
Field Description
If the managed host is on the same subnet as the QRadar Console, select the QRadar
NAT Console that is on the NATed network.
Group
If the managed host is not on the same subnet as the QRadar Console, select the managed
host that is on NATed network.
PublicThe managed host uses this IP address to communicate with other managed hosts in different
IP
networks that use NAT.
Table 1. NAT configuration
9. The NATed network must use static NAT.
10. Click Add.
Note: Don't close the window until the process for adding the host completes.
11. Close the System and License Management window.
12. On the Admin tab toolbar, click Advanced > Deploy Full Configuration.
13. Click OK.
Options for adding scanners to your QRadar
Vulnerability Manager deployment
If you have a large network and require flexible scanning options, you can add more scanners to
your IBM® QRadar® Vulnerability Manager deployment.
Your QRadar Vulnerability Manager processor is automatically deployed with a scanning
component. By deploying more scanners you can increase the flexibility of your scanning
operations. For example, you can scan specific areas of your network with different scanners and at
different scheduled times.
Dynamic vulnerability scans
The vulnerability scanners that you deploy might not have access to all areas of your network.
In QRadar Vulnerability Manager you can assign different scanners to network CIDR ranges. During
a scan, each asset in the CIDR range that you want to scan is dynamically associated with the
correct scanner.
To add more vulnerability scanners, choose any of the following options:
Deploy a dedicated QRadar Vulnerability Manager managed host scanner appliance
You can scan for vulnerabilities by using a dedicated QRadar Vulnerability Manager managed host
scanner appliance.
Important: Do not select Remote Tunnel Initiation for encryption on managed hosts.
To deploy a scanner appliance, you must complete the followings tasks:
1. Install a dedicated QRadar Vulnerability Manager managed host scanner appliance.
2. Add the managed host scanner appliance to your QRadar Console by using
the System and License Management tool on the Admin tab.
Deploy a QRadar Vulnerability Manager scanner to your QRadar console or managed host
If you move your vulnerability processor from your QRadar console to a QRadar Vulnerability
Manager managed host, you can add a scanner to your console.
You can also add a vulnerability scanner to any of the following QRadar managed
hosts: QRadar Console, Event Processor, Flow Processor, Combo Processor, Event Collector, QFlow
Collector, and Data Node.
Note: The vulnerability scanner cannot be added to the App Host, App Node, and QRadar Network
Insights.
Run an automatic update when you add a scanner or other managed host with scanning
capabilities.
Configure access to an IBM hosted scanner and scan your DMZ
You can configure access to an IBM hosted scanner and scan the assets in your DMZ.
•
Deploying a dedicated QRadar Vulnerability Manager scanner appliance
You can deploy a dedicated QRadar Vulnerability Manager managed host scanner appliance.
Before you begin
Ensure that a dedicated QRadar Vulnerability Manager managed host scanner appliance is
installed and a valid appliance activation key is applied.
•
Deploying a vulnerability scanner to a QRadar console or managed host
You can deploy a QRadar Vulnerability Manager scanner to a QRadar console
or QRadar managed host. For example, you can deploy a scanner to a flow collector, flow
processor, event collector, event processor, or data node.
Before you begin
In an All-in-One deployment the controller is used as a built-in scanner. You cannot add a
separate scanner appliance to a QRadar Console when the QRadar Vulnerability
Manager processor is on the QRadar Console. In a non-All-in-One deployment it's a good
practice to move the QRadar Vulnerability Manager processor to a dedicated appliance when
you're scanning more than 50k assets.
To deploy a scanner on your QRadar console, ensure that the vulnerability processor is
moved to a dedicated QRadar Vulnerability Manager managed host appliance.
To deploy scanners on QRadar managed hosts, ensure that you have existing managed hosts
in your deployment
Procedure
1. On the navigation menu ( ), click Admin.
2. Click System and License Management > Deployment Actions > Manage
Vulnerability Deployment.
3. Click Add Additional Vulnerability Scanners.
4. Click the + icon.
5. From the Host list, select the QRadar managed host or console.
Restriction: You cannot add a scanner to a QRadar console when the vulnerability
processor is on the console. You must move the vulnerability processor to a QRadar
Vulnerability Manager managed host.
6. Click Save.
7. Close the System and License Management window.
8. On the Admin tab toolbar, select Advanced > Deploy Full Configuration..
9. Click OK.
10. Check the Scan Server list on the Scan Profiles Configuration page to ensure that the
scanner is added.
For more information, see Creating a scan profile.
What to do next
Run an automatic update after you add the scanner or other managed host with scanning
capabilities. Alternatively, you can scan after the default daily scheduled automatic update
runs. If the automatic updates for other scanners are run earlier, then the automatic updates
for all the scanners might not be fully synchronized until the next daily update.
•
Scanning the assets in your DMZ
In IBM QRadar Vulnerability Manager, you can connect to an external scanner and scan the
assets in your DMZ for vulnerabilities.
If you want to scan the assets in the DMZ for vulnerabilities, you do not need to deploy a
scanner in your DMZ. You must configure QRadar Vulnerability Manager with a
hosted IBM scanner that is located outside your network.
Detected vulnerabilities are processed by the processor on either your QRadar console
or QRadar Vulnerability Manager managed host.
Procedure
1. Configure your network and assets for external scans.
2. Configure QRadar Vulnerability Manager to scan your external assets.
1. Configuring your network and assets for external scans
To scan the assets in a DMZ network, you must configure your network and
inform IBM of the assets that you want to scan.
2. Configuring QRadar Vulnerability Manager to scan your external assets
To scan the assets in your DMZ, you must configure IBM QRadar Vulnerability
Manager by using the System and License Management tool on the Admin tab.
•
Supported web browsers
For the features in IBM QRadar products to work properly, you must use a supported web
browser.
The following table lists the supported web browser versions.
Web
Supported versions
browser
64bit MozillaLatest
Firefox
64-bit
Microsoft Latest
Edge
64bit Google Latest
Chrome
Table 1. Supported web browsers for QRadar products
The Microsoft Internet Explorer web browser is no longer supported on QRadar 7.4.0 or later.
Security exceptions and certificates
If you are using the Mozilla Firefox web browser, you must add an exception to Mozilla
Firefox to log in to QRadar. For more information, see your Mozilla Firefox web browser
documentation.
Navigate the web-based application
When you use QRadar, use the navigation options available in the QRadar Console instead of
your web browser Back button.
Scan configuration
In IBM® QRadar® Vulnerability Manager, all network scanning is controlled by the scan profiles
that you create. You can create multiple scan profiles and configure each profile differently
depending on the specific requirements of your network.
Scan profiles
Use scan profiles to do the following tasks:
•
•
•
•
•
•
•
Specify the network nodes, domains, or virtual domains that you want to scan.
Specify the network assets that you want to exclude from scans.
Create operational windows, which define the times at which scans can run.
Manually run scan profiles or schedule a scan to run at a future date.
Run, pause, resume, cancel, or delete a single or multiple scans.
Use centralized credentials to run Windows, UNIX, or Linux® operating systems.
Scan the assets from a saved asset search.
Creating a scan profile
In IBM QRadar Vulnerability Manager, you configure scan profiles to specify how and when your
network assets are scanned for vulnerabilities.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scan Profiles.
3. On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP Addresses on
the Details tab of the Scan Profile Configuration page. In addition, you can also configure the
following optional settings.
o
o
If you added more scanners to your QRadar Vulnerability Manager deployment,
select a scanner from the Scan Server list. This step is unnecessary if you want to use
dynamic scanning.
To enable this profile for on-demand scanning, click the On Demand Scanning
Enabled check box.
By selecting this option, you make the profile available to use if you want to trigger a
scan in response to a custom rule event. It also enables on-demand vulnerability
scanning by using the right-click menu on the Assets page.
o
By selecting the Dynamic Server Selection check box, you can choose the most
appropriate scanner that is available. Ensure that you define the scanners in
the Administrative > Scanners page.
Security profiles must be updated with an associated domain. Domain-level
restrictions are not applied until the security profiles are updated, and the changes
are deployed.
To scan your network by using a predefined set of scanning criteria, select a scan type
from the Scan Policies list.
o If you configured centralized credentials for assets, click the Use Centralized
Credentials check box. For more information, see the IBM QRadar Administration
Guide.
4. Click Save.
o
•
Creating an external scanner scan profile
In IBM QRadar Vulnerability Manager, you can configure scan profiles to use a hosted
scanner to scan assets in your DMZ.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scan Profiles.
3. On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP
Addresses on the Details tab of the Scan Profile Configuration page. To create an
external scanner profile, you must also follow the remaining steps in this procedure.
4. To create an external scanner profile, use the following procedure.
a. From the Scan Server list, select IbmExternalScanner.
b. From the Scan Policies list, select Full Scan or Web Scan.
c. Click the Domain and Web App tab. In the Virtual Webs pane, enter the
domain and IP address information for the websites and applications that you
want to scan.
d. Click Save.
Important: Authenticated scans are not conducted from the external scanner.
•
Creating a benchmark profile
To create Center for Internet Security compliance scans, you must configure benchmark
profiles. You use CIS compliance scans to test for Windows and Red Hat Enterprise Linux®
CIS benchmark compliance.
Procedure
1.
2.
3.
4.
Click the Vulnerabilities tab.
In the navigation pane, click Administrative > Scan Profiles.
On the toolbar, click Add Benchmark.
If you want to use pre-defined centralized credentials, select the Use Centralized
Credentials checkbox .
Credentials that are used to scan Linux operating systems must have root privileges.
Credentials that are used to scan Windows operating systems must have
administrator privileges.
5. If you are not using dynamic scanning, select a QRadar® Vulnerability
Manager scanner from the Scan Server list.
6. To enable dynamic scanning, click the Dynamic server selection checkbox.
If you configured domains in the Domain Management window in the Admin tab, you
can select a domain from the Domain list. Only assets within the CIDR ranges and
domains that are configured for your scanners are scanned.
7. In the When To Scan tab, set the run schedule, scan start time, and any pre-defined
operational windows.
8. In the Email tab, define what information to send about this scan and to whom to
send it.
9. If you are not using centralized credentials, add the credentials that the scan requires
in the Additional Credentials tab.
Credentials that are used to scan Linux operating systems must have root privileges.
Credentials that are used to scan Windows operating systems must have
administrator privileges.
10. Click Save.
•
Running scan profiles manually
In IBM QRadar Vulnerability Manager you can run one or more scan profile manually.
You can also schedule scans to run at a future date and time.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scan Profiles.
3. On the Scan Profiles page, select the check box on the row assigned to the scan
profiles that you want to run.
Note: To find the scan profiles you want to run, use the toolbar Name field to filter
scan profiles by name.
4. On the toolbar, click Run.
By default, scans complete a fast scan by using the Transmission Control Protocol
(TCP) and User Datagram Protocol (UDP) protocol. A fast scan includes most ports in
the range 1 - 1024.
•
Rescanning an asset by using the right-click menu option
In IBM QRadar Vulnerability Manager, you can quickly rescan an asset by using the rightclick option.
The right-click scan option is also available on the QRadar Offenses tab, and the QRadar Risk
Manager sub-net asset view.
Procedure
1.
2.
3.
4.
5.
Click the Vulnerabilities tab.
In the navigation pane, select Manage Vulnerabilities > By Asset.
On the By Asset page, identify the asset that you want to rescan.
Right-click the IP Address and select Run Vulnerability Scan.
In the Run Vulnerability Scan window, select the scan profile that you want use when
the asset is rescanned.
The scanning process requires a scan profile. The scan profile determines the
scanning configuration options that are used when the scan runs.
To view a scan profile in the Run Vulnerability Scan window, you must select the On
Demand Scanning Enabled check box in the Details tab on the Scan Profile
Configuration page.
Important: The scan profile that you select might be associated with multiple scan
targets or IP address ranges. However, when you use the right-click option, only the
asset that you select is scanned.
6. Click Scan Now.
7. Click Close Window.
8. To review the progress of your right-click scan, in the navigation pane, click Scan
Results.
Right-click scans are identified by the prefix RC:.
•
•
•
Scan profile details
In IBM QRadar Vulnerability Manager, you can describe your scan, select the scanner that
you want to use, and choose from a number of scan policy options.
Scan profile details are specified in the Details tab, in the Scan Profile Configuration page.
See especially the following options:
Options
Description
Use
Specifies that the profile uses pre-defined credentials. Centralized credentials are defined in
Centralized
the Admin > System Configuration > Centralized Credentials window.
Credentials
Scan
Server
The scanner that you select depends on your network configuration. For example, to scan
DMZ assets, then select a scanner that has access to that area of your network.
Options
Description
The Controller scan server is deployed with the vulnerability processor on
your QRadar console or QRadar Vulnerability Manager managed host.
Restriction: You can have only 1 vulnerability processor in your deployment. However, you can
deploy multiple scanners either on dedicated QRadar Vulnerability Manager managed host
scanner appliances or QRadar managed hosts.
On
Demand
Scanning
Enables on-demand asset scanning for the profile. Use the right-click menu on the Assets page to
run on-demand vulnerability scanning. By selecting this option, you also make the profile
available to use if you want to trigger a scan in response to a custom rule event.
By enabling on-demand scanning, you also enable dynamic scanning.
Specifies whether you want to use a separate vulnerability scanner for each CIDR range
that you scan.
Dynamic
server
selection
Bandwidth
Limit
Scan
Policies
During a scan, QRadar Vulnerability Manager automatically distributes the scanning
activity to the correct scanner for each CIDR range that you specify.
If you configured domains in the Domain Management window of the Admin tab, you
can also select the domain that you want to scan.
The scanning bandwidth. The default setting is medium.
Important: If you select a value greater than 1000 kbps, you can affect network performance.
The pre-configured scanning criteria about ports and protocols. For more information,
see Scan policies.
Table 1. Scan profile details configuration options
Scan scheduling
In IBM QRadar Vulnerability Manager, you can schedule the dates and times to scan your network
assets for known vulnerabilities.
Scan scheduling is controlled by using the When To Scan pane, in the Scan Profile
Configuration page. A scan profile that is configured with a manual setting must be run manually.
However, scan profiles that are not configured as manual scans, can also be run manually. When
you select a scan schedule, you can further refine your schedule by using operational windows to
configure allowed scan times.
Choose one of the following scheduling options:
•
Manual, Run Once, Daily, Weekly, Monthly, Advanced
Use cron expressions to create schedules, for example, 9:00 AM every Monday through
Friday, or 3:30 AM the first Friday of every month. Cron expressions give you the ability to
create irregular scan schedules. Schedule a maximum of one scan per day.
Advanced scan schedules that are configured to run between 1:00 AM and 1:59 AM on the 27th of
March 2016 are skipped and do not run. All subsequent scans run at the scheduled times.
•
Scanning domains monthly
In IBM QRadar Vulnerability Manager, you can configure a scan profile to scan the domains
on your network each month.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scan Profiles.
3. On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP
Addresses on the Details tab of the Scan Profile Configuration page. To set up
monthly scans, you must also follow the remaining steps in this procedure.
4. Click the When To Scan pane.
5. In the Run Schedule list, select Monthly.
6. In the Start Time field, select a start date and time for your scan.
7. In the Day of the month field, select a day each month that your scan runs.
8. Click the Domain and Web App tab.
9. In the Domains field, type the URL of the asset that you want to scan and click (> ).
10. Click Save.
11. Optional: During and after the scan, you can monitor scan progress and review
completed scans.
•
Scheduling scans of new unscanned assets
In IBM QRadar Vulnerability Manager, you can configure scheduled scans of newly
discovered, unscanned network assets.
Procedure
1. Click the Assets tab.
2. In the navigation pane, click Asset Profiles, then on the toolbar click Search > New
Search.
3. To specify your newly discovered, unscanned assets, complete the following steps in
the Search Parameters pane:
a. Select Days Since Asset Found, Less than 2 then click Add Filter.
b. Select Days Since Asset Scanned Greater than 2 then click Add Filter.
c. Click Search.
4. On the toolbar, click Save Criteria and complete the following steps:
a. In the Enter the name of this search field, type the name of your asset
search.
b. Click Include in my Quick Searches.
c. Click Share with Everyone.
d. Click OK.
5. Click the Vulnerabilities tab.
6. In the navigation pane, select Administrative > Scan Profiles.
7. On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP
Addresses on the Details tab of the Scan Profile Configuration page. To schedule
scans for unscanned assets, you must also follow the remaining steps in this
procedure.
8. In the Include Saved Searches pane, select your saved asset search from
the Available Saved Searches list and click (>).
9. Click the When To Scan pane and in the Run Schedule list, select Weekly.
10. In the Start Time fields, type or select the date and time that you want your scan to
run on each selected day of the week.
11. Select the check boxes for the days of the week that you want your scan to run.
12. Click Save.
•
Reviewing your scheduled scans in calendar format
In IBM QRadar Vulnerability Manager, the scheduled scan calendar provides a central
location where you can review information about scheduled scans.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scheduled Scans.
3. Optional: Hover your mouse on the scheduled scan to display information about the
scheduled scan.
For example, you can show the time that a scan took to complete.
4. Optional: Double-click a scheduled scan to edit the scan profile.
Network scan targets and exclusions
In IBM QRadar Vulnerability Manager, you can provide information about the assets, domains, or
virtual webs on your network that you want to scan.
Use the Details tab on the Scan Profile Configuration page to specify the network assets that you
want to scan.
You can exclude a specific host or range of hosts that must never be scanned. For example, you
might restrict a scan from running on critical servers that are hosting your production applications.
You might also want to configure your scan to target only specific areas of your network.
QRadar Vulnerability Manager integrates with QRadar by providing the option to scan the assets
that form part of a saved asset search.
Scan targets
You can specify your scan targets by defining a CIDR range, IP address, IP address range, or a
combination of all three.
Domain scanning
You can add domains to your scan profile to test for DNS zone transfers on each of the domains that
you specify.
A host can use the DNS zone transfer to request and receive a full zone transfer for a domain. Zone
transfer is a security issue because DNS data is used to decipher the topology of your network. The
data that is contained in a DNS zone transfer is sensitive and therefore any exposure of the data
might be perceived as a vulnerability. The information that is obtained might be used for malicious
exploitation such as DNS poisoning or spoofing.
Scans that used saved asset searches
You can scan the assets and IP addresses that are associated with a QRadar saved asset search.
Any saved searches are displayed in the Asset Saved Search section of the Details tab.
Exclude network scan targets
In Excluded Assets section of the Domain and Web App tab, you can specify the IP addresses, IP
address ranges, or CIDR ranges for assets that must not be scanned. For example, if you want to
avoid scanning a highly loaded, unstable, or sensitive server, exclude these assets.
When you configure a scan exclusion in a scan profile configuration, the exclusion applies only to
the scan profile.
Virtual webs
You can configure a scan profile to scan different URLs that are hosted on the same IP address.
When you scan a virtual web, QRadar Vulnerability Manager checks each web page for SQL
injection and cross site scripting vulnerabilities.
Excluding assets from all scans
In IBM QRadar Vulnerability Manager, scan exclusions specify the assets in your network that are
not scanned.
About this task
Scan exclusions apply to all scan profile configurations and might be used to exclude scanning
activity from unstable or sensitive servers. Use the IP Addresses field on the Scan Exclusion page
to enter the IP addresses, IP address ranges, or CIDR ranges that you want to exclude from all
scanning. To access the Scan Exclusion page:
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scan Exclusions.
3. On the toolbar, select Actions > Add.
Note: You can also use the Excluded Assets section of
the Vulnerabilities > Administrative > Scan Profiles > Add > Domain and Web App tab
to exclude assets from an individual scan profile.
Managing scan exclusions
In IBM QRadar Vulnerability Manager you can update, delete, or print scan exclusions.
Procedure
1.
2.
3.
4.
5.
Click the Vulnerabilities tab.
In the navigation pane, click Administrative > Scan Exclusions.
From the list on the Scan Exclusions page, click the Scan Exclusion that you want to modify.
On the toolbar, select an option from the Actions menu.
Depending on your selection, follow the on-screen instructions to complete this task.
Scan protocols and ports
In IBM QRadar Vulnerability Manager, you can choose different scan protocols and scan various
port ranges.
You can configure your scan profile port protocols by using TCP and UDP scan options.
Configure scanning protocols and the ports that you want to scan on the Port Scan tab of an
existing or new scan policy configuration window.
Note: You can also configure port scanning from the How To Scan tab in the Scan Profile
Configuration window but this option is only enabled for backwards compatibility. Do not use the How To
Scan tab to configure new port scans.
•
Scanning a full port range
In IBM QRadar Vulnerability Manager, you can scan the full port range on the assets that you
specify.
About this task
Create a scan policy to specify the ports that you want to scan, and then add this scan policy to a scan
profile, which you use to run the scan.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scan Policies.
3. On the toolbar, click Add to create a new scan policy or Edit to edit an existing policy.
4. Click the Settings tab.
a. Enter a name and description for the scan policy.
b. Select the scan type.
5. Click the Port Scan tab.
6. In the Protocol field, select a protocol. The default values are TCP & UDP.
Note: UDP port scans are much slower than TCP port scans because of the way that
UDP works. A UDP port scan can take up to 24 hours to scan all ports (1-65535) on an
asset.
7. In the Range field, type 1-65535.
Restriction: Port ranges must be configured in dash-separated, comma-delimited,
consecutive, ascending, and non-overlapping order. Multiple port ranges must be
separated by a comma. For example, the following examples show the delimiters that
are used to enter port ranges:(1-1024, 1055, 2000-65535).
8. In the Timeout (m) field, type the time in minutes after which you want the scan to
cancel if no scan results are discovered.
Important: You can type any value in the range 1 - 500. Ensure that you do not enter
too short a time, otherwise the port scan cannot detect all running ports. Scan results
that are discovered before the timeout period are displayed.
9. Optional: Configure more options on the other tabs if you want to use the scan policy
to complete more tasks.
10. Click Save.
11. From the Scan Profiles page, create a new scan profile.
a. Add the scan policy that you saved.
b. Configure the remaining parameters for the scan profile and save.
c. From the Scan Profiles page, select the new scan profile, and then click Run on
the toolbar to run the scan.
For more information about creating a scan profile, see Creating a scan profile.
Note: You can also configure port scanning from the How To Scan tab in the Scan
Profile Configuration window but this option is only enabled for backwards
compatibility. Do not use the How To Scan tab to configure new port scans.
•
Scanning assets with open ports
In IBM QRadar Vulnerability Manager, you can configure a scan profile to scan assets with
open ports.
Procedure
1. Click the Assets tab.
2. In the navigation pane, click Asset Profiles then on the toolbar, click Search > New
Search.
3. To specify assets with open ports, configure the following options in the Search
Parameters pane:
a. Select Assets With Open Port, Equals any of 80 and click Add Filter.
b. Select Assets With Open Port, Equals any of 8080 and click Add Filter.
c. Click Search.
4. On the toolbar, click Save Criteria and configure the following options:
a. In the Enter the name of this search field, type the name of your asset
search.
b. Click Include in my Quick Searches.
c. Click Share with Everyone and click OK.
5. Click the Vulnerabilities tab.
6. In the navigation pane, select Administrative > Scan Profiles.
7. On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP
Addresses on the Details tab of the Scan Profile Configuration page. To scan assets
with open ports, you must also follow the remaining steps in this procedure.
8. On the Details tab, select your saved asset search from the Available Saved
Searches list and click >.
When you include a saved asset search in your scan profile, the assets and IP
addresses associated with the saved search are scanned.
9. Click the When To Scan pane and in the Run Schedule list, select Manual.
10. Click the What To Scan pane.
11. Click Save.
For more information about saving an asset search, see the Users Guide for your
product.
Configuring a permitted scan interval
In IBM QRadar Vulnerability Manager, you can create an operational window to specify the times
that a scan can run.
About this task
If a scan does not complete within the operational window, it is paused and continues when the
operational window reopens. To configure an operational window:
Procedure
1.
2.
3.
4.
Click the Vulnerabilities tab.
In the navigation pane, click Administrative > Operational Window.
On the toolbar, click Actions > Add.
Enter a name for the operational window in the Name field.
5.
6.
7.
8.
Choose an operational window schedule from the Schedule list.
Optional: Select the times when scanning is permitted.
Optional: Select your timezone.
If you selected Weekly from the Schedule list, then click the desired days of the week check
boxes in the Weekly area.
9. If you selected Monthly from the Schedule list, then select a day from the Day of the
month list.
10. Click Save.
Operational windows can be associated with scan profiles by using the When To Scan tab
on the Scan Profile Configuration page.
If you assign two overlapping operational windows to a scan profile, the scan profile runs
from the beginning of the earliest operational window to the end of the later operational
window. For example, if you configure two daily operational windows for the periods 1 a.m.
to 6 a.m. and 5 a.m. to 9 a.m., the scan runs between 1 a.m. and 9 a.m.
For operational windows that do not overlap, the scan starts from the earliest operational
window and pauses if there's a gap between the operational windows, and then resumes at
the beginning of the next operational window.
•
Scanning during permitted times
In IBM QRadar Vulnerability Manager, you can schedule a scan of your network assets at
permitted times, by using an operational window.
Scanning during permitted times
In IBM® QRadar® Vulnerability Manager, you can schedule a scan of your network assets at
permitted times, by using an operational window.
About this task
Tip: If you are applying the operational window to an authenticated patch scan, set the minimum
window to 4 hours.
Procedure
1.
2.
3.
4.
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Operational Window.
On the toolbar, select Actions > Add.
Type a name for your operational window, configure a permitted time interval and
click Save.
5. In the navigation pane, select Administrative > Scan Profiles.
6. On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP
Addresses on the Details tab of the Scan Profile Configuration page. To configure
scanning during permitted times, you must also follow the remaining steps in this
procedure.
7. Click the When To Scan tab.
8. In the Run Schedule list, select Daily.
9. In the Start Time fields, type or select the date and time that you want your scan to
run each day.
10. In the Operational Windows pane, select your operational window from the list and
click (>).
11. Click Save.
•
Managing operational windows
In IBM QRadar Vulnerability Manager, you can edit, delete, and print operational windows.
Procedure
1.
2.
3.
4.
5.
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Operational Window.
Select the operational window that you want to edit.
On the toolbar, select an option from the Actions menu.
Follow the instructions in the user interface.
Restriction: You cannot delete an operational window that is associated with a scan
profile. You must first disconnect the operational window from the scan profile.
•
Disconnecting an operational window
If you want to delete an operational window that is associated with a scan profile, you must
disconnect the operational window from the scan profile.
Procedure
1.
2.
3.
4.
5.
6.
7.
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Profiles.
Select the scan profile that you want to edit.
On the toolbar, click Edit.
Click the When To Scan pane.
Select the relevant option from the Run Schedule list as required.
In the Name field, select the operational window that you want to disconnect and
click (<).
8. Click Save.
Dynamic vulnerability scans
In IBM QRadar Vulnerability Manager, you can configure a scan to use certain vulnerability
scanners for specific CIDR ranges in your network. For example, your scanners might have access
only to certain areas of your network.
During a scan, QRadar Vulnerability Manager determines which scanner to use for each CIDR, IP
address, or IP range that you specify in your scan profile.
Dynamic scanning and domains
If you configured domains in the Domain Management window on the Admin tab, you can associate
scanners with the domains that you added.
For example, you might associate different scanners each with a different domain, or with different
CIDR ranges within the same domain. QRadar dynamically scans the configured CIDR ranges that
contain the IP addresses you specify on all domains that are associated with the scanners on your
system. Assets with the same IP address on different domains are scanned individually if the CIDR
range for each domain includes that IP address. If an IP address is not within a configured CIDR
range for a scanner domain, QRadar scans the domain that is configured for the Controller scanner
for the asset.
Setting up dynamic scanning
To use dynamic scanning, you must do the following actions:
1. Add vulnerability scanners to your QRadar Vulnerability Manager deployment. For more
information, see Options for adding scanners to your QRadar Vulnerability Manager
deployment.
2. Associate vulnerability scanners with CIDR ranges and domains.
3. Configure a scan of multiple CIDR ranges and enable Dynamic server selection in
the Details tab of the Scan Profile Configuration page.
•
Associating vulnerability scanners with CIDR ranges
In IBM QRadar Vulnerability Manager, to do dynamic scanning, you must associate
vulnerability scanners with different segments of your network.
Before you begin
You must add extra vulnerability scanners to your deployment. For more information,
see Options for adding scanners to your QRadar Vulnerability Manager deployment.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scanners.
Attention: By default, the Controller scanner is displayed. The Controller scanner is
part of the QRadar Vulnerability Manager processor that is deployed on either
your QRadar Console or on a dedicated QRadar Vulnerability Manager processing
appliance. You can assign a CIDR range to the Controller scanner, but you must
deploy extra scanners to use dynamic scanning.
3. Click a scanner on the Scanners page.
4. On the toolbar, click Edit.
Restriction: You cannot edit the name of the scanner. To edit a scanner name,
click Admin > System and License Management > Deployment Actions > Manage
Vulnerability Deployment.
5. In the CIDR field, type a CIDR range or multiple CIDR ranges that are separated by
commas.
6. Click Save.
•
Scanning CIDR ranges with different vulnerability scanners
In IBM QRadar Vulnerability Manager, you can scan areas of your network with different
vulnerability scanners.
Before you begin
You must configure your network CIDR ranges to use the different vulnerability scanners in
your QRadar Vulnerability Manager deployment. For more information, see Options for
adding scanners to your QRadar Vulnerability Manager deployment.
Procedure
1.
2.
3.
4.
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Profiles.
On the toolbar, click Add.
Click the Dynamic server selection check box.
If you configured domains in the Admin > Domain Management window, you can
select a domain from the Domain list. Only assets within the domain you selected are
scanned.
5. Optional: Add more CIDR ranges.
6. Click Save.
7. Click the check box on the row that is assigned to your scan on the Scan Profiles page
and click Run.
Scan policies
A scan policy provides you with a central location to configure specific scanning requirements.
You can use scan policies to specify scan types, ports to be scanned, vulnerabilities to scan for and
scanning tools to use. In IBM QRadar® Vulnerability Manager, a scan policy is associated with a
scan profile and is used to control a vulnerability scan. You use the Scan Policies list on
the Details tab of the Scan Profile Configuration page to associate a scan policy with a scan profile.
You can create a new scan policy or copy and modify a pre-configured policy that is distributed
with QRadar Vulnerability Manager.
Pre-configured scan policies
The following pre-configured scan policies are distributed with QRadar Vulnerability Manager:
•
Full scan ,Discovery scan, Database scan, Patch scan, PCI scan, Web scan
A description of each pre-configured scan policy is displayed on the Scan Policies page.
•
Scan policy automatic updates for critical vulnerabilities
As part of IBM QRadar Vulnerability Manager daily automatic updates, you receive new scan
policies for tasks such as detecting zero-day vulnerabilities on your assets.
Use scan policies that are delivered by automatic update to create scan profiles to scan for specific
vulnerabilities. To view all scan policies on your system, go to Administrative > Scan Policies on
the Vulnerabilities tab.
You must not edit scan policies that are delivered by automatic update as your changes might be
overwritten by later updates. You can create a copy and edit it.
If you delete a scan policy that is delivered by automatic update, it can be recovered only
by QRadar customer support.
•
Modifying a pre-configured scan policy
In IBM QRadar Vulnerability Manager, you can copy a pre-configured scan policy and modify
the policy to your exact scanning requirements.
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Policies.
On the Scan Policies page, click a pre-configured scan policy.
On the toolbar, click Edit.
Click Copy.
In the Copy scan policy window, type a new name in the Name field and click OK.
Click the copy of your scan policy and on the toolbar, click Edit.
In the Description field, type new information about the scan policy.
Important: If you modify the new scan policy, you must update the information in
the description.
9. To modify your scan policy, use the Port Scan, Vulnerabilities, Tool Groups,
or Tools tabs.
Restriction: Depending on the Scan Type that you select, you cannot use all the tabs
on the Scan Policy window.
•
Configuring a scan policy
In IBM QRadar Vulnerability Manager, you can configure a scan policy to meet any specific
requirements for your vulnerability scans. You can copy and rename a preconfigured scan
policy or you can add a new scan policy. You can't edit a preconfigured scan policy.
Before you begin
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Policies.
On the toolbar, click Add.
Type the name and description of your scan policy.
To configure a scan policy, you must at least configure the mandatory fields in the New Scan
Policy window, which are the Name and Description fields.
From the Scan Type list, select the scan type.
To manage and optimize the asset-discovery process, click the Asset Discovery tab.
To manage the ports and protocols that are used for a scan, click the Port Scan tab.
To include specific vulnerabilities in your patch scan policy, click the Vulnerabilities tab.
Note: The Vulnerabilities tab is available only when you select a patch scan.
To include or exclude tool groups from your scan policy, click the Tool Groups tab.
Note: The Tool Groups tab is available only when you select a zero-credentialed full-scan or fullscan plus policy.
To include or exclude tools from a scan policy, click the Tools tab.
Note: The Tools tab is available only when you select a zero-credentialed Full Scan or Full Scan
Plus policy.
Important: If you do not modify the tools or tool groups, and you select the Full option as your
scan type, then all the tools and tool groups that are associated with a full scan are included in
your scan policy.
Click Save.
https://www.ibm.com/docs/en/SS42VS_DSM/pdf/b_vuln.pdf
Overview of QRadar Vulnerability
Manager
Important: The IBM® QRadar® Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package
6, and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425). In QRadar 7.5.0 Update Package 6 and
later, you can continue to use third-party scanners with your QRadar Vulnerability Manager platform, but
you cannot scan within your DMZ.
IBM QRadar Vulnerability Manager is a third-party scanning platform that detects vulnerabilities
within the applications, systems, and devices on your network.
QRadar Vulnerability Manager uses security intelligence to help you manage and prioritize your
network vulnerabilities. For example, you can use QRadar Vulnerability Manager to continuously
monitor vulnerabilities, improve resource configuration, and identify software patches. You can
also, prioritize security gaps by correlating vulnerability data with network flows, log data, firewall,
and intrusion prevention system (IPS) data.
You can maintain real-time visibility of the vulnerabilities that are detected by third-party scanners.
Third-party scanners are integrated with QRadar and include HCL BigFix®, Guardium®,
AppScan®, Nessus, nCircle, and Rapid 7.
Unless otherwise noted, all references to QRadar Vulnerability Manager refer to IBM QRadar
Vulnerability Manager. All references to QRadar refer to IBM QRadar SIEM and IBM QRadar Log
Manager and all references to SiteProtector refer to IBM Security SiteProtector.
Categories of QRadar Vulnerability Manager vulnerability checks
IBM QRadar Vulnerability Manager checks for multiple types of vulnerabilities in your network.
Vulnerabilities are categorized into the following broad categories:
•
•
•
•
Risky default settings
Software features
Misconfiguration
Vendor flaws
Risky default settings
By leaving some default settings in place, you can make your network vulnerable to attacks. The following
situations are examples that can make your network vulnerable:
•
•
•
•
Leaving sample pages or scripts on an IIS installation
Not changing the default password on a 3Com Hub/Switch
Leaving "public" or "private" as an SNMP community name on an SNMP enabled device
Not setting the sa login password on an MS-SQL server
Software features
Some software settings for systems or applications are designed to aid usability but these settings
can introduce risk to your network. For example, the Microsoft NetBIOS protocol is useful in
internal networks, but if it is exposed to the Internet or an untrusted network segment it introduces
risk to your network.
The following examples are software features or commands that can expose your network to risk:
•
•
•
ICMP time stamp or netmask requests
Sendmail expand or verify commands
Ident protocol services that identify the owner of a running process.
Misconfiguration
In addition to identifying misconfigurations in default settings, QRadar Vulnerability Manager can
identify a broader range of misconfigurations such as in the following cases:
•
•
•
SMTP Relay
Unrestricted NetBios file sharing
DNS zone transfers
•
•
•
FTP World writable directories
Default administration accounts that have no passwords
NFS World exportable directories
Vendor flaws
Vendor flaws is a broad category that includes events such as buffer overflows, string format issues,
directory transversals, and cross-site scripting. Vulnerabilities that require a patch or an upgrade
fix are included in this category.
Checks made by QRadar Vulnerability Manager
QRadar Vulnerability Manager uses a combination of active checks that involves sending packets
and remote probes, and passive correlation checks. The QRadar Vulnerability Manager database
covers approximately 70,000 Network, OS, and Application layer vulnerabilities.
You can search the complete scanning library by CVE, date range, vendor name, product name, product version,
and exposure name from the Research window on the Vulnerabilities tab.
QRadar Vulnerability Manager tests
The following examples are some of the categories that QRadar Vulnerability Manager tests:
•
•
•
•
•
•
•
•
•
•
•
Database checks
Web server checks
Web application server checks
Common web scripts checks
Custom web application checks
DNS server checks
Mail server checks
Application server checks
Wireless access point checks
Common service checks
Obsolete software and systems
The following table describes some checks that are made by QRadar Vulnerability Manager.
Type of
Check
Description
Scans for active hosts and the ports and services that are open on each active host.
Port scan Returns MAC if the host is on the same subnet as the scanner.
Returns OS information.
Checks each web application and web page on a web server by using the following checks:
Web
application File upload
scanning
HTTP directory browsing
Type of
Check
Description
CWE-22 - Improper limitation of a path name to a restricted directory (path traversal)
Interesting file / seen in logs
Auto complete password in Browser
Misconfiguration in default files
Information disclosure
Unencrypted login form
Directory index-able: checks if the server directories can be browsed
HTTP PUT allowed: checks if the PUT option is enabled on server directories
Existence of obsolete files
CGI scanning: common web page checks
Injection (XSS/script/HTML)
Remote file retrieval (server wide)
Command execution from remote shell
SQL injection, including authentication bypass, software identification, and remote
source
Reverse tuning options, except for specified options.
Note: Authenticated web app scanning is not supported. For example, if authentication is
required to access the site, you can't run web app tests.
User name and password disclosure
Access to file systems
Default user names and passwords
OS
Privilege escalation
Denial of service
Remote command execution
Cross site scripting (Microsoft)
Type of
Check
Description
Exploits and open access to databases.
Default passwords
Database Compromised user names and passwords
Denial of service
Admin rights
Known vulnerabilities, exploits, and configuration issues on web servers.
Denial of service
Web serverDefault admin passwords
File system view ability
Cross site scripting
Commonly found web scripts such as CGI
Common E-commerce-related scripts
web scripts
ASP
PHP
Weak password encryption
Denial of service
DNS server
Determine account names
Send emails
Read arbitrary emails and sensitive account information
Get admin access
Default admin account passwords
Wireless
access
point
Default SNMP community names
Plain text password storage
Denial of service
Common
services
Domain name system (DNS)
Type of
Check
Description
File transfer protocol (FTP)
Simple mail transfer protocol (SMTP)
Authentication bypass
Denial of service
ApplicationInformation disclosure
server
Default user names and passwords
Weak file permissions
Cross site scripting
Oval
Client-side vulnerabilities on IE, Chrome, Skype, and others.
Password
Default password testing
testing
Windows
Collects registry key entries, windows services, installed windows applications, and patched
patch
Microsoft bugs.
scanning
UNIX patch
Collects details of installed RPMs
scanning
Table 1. Types of QRadar Vulnerability Manager checks
Web application scanning
QRadar Vulnerability Manager uses unauthenticated scanning for core web application scanning. The
following list describes QRadar Vulnerability Manager web vulnerability checks:
•
SQL Injection Vulnerabilities
SQL injection vulnerabilities occur when poorly written programs accept user-provided data
in a database query without validating the input, which is found on web pages that have
dynamic content. By testing for SQL injection vulnerabilities, QRadar Vulnerability
Manager assures that the required authorization is in place to prevent these exploits from
occurring.
•
Cross-Site Scripting (XSS) Vulnerabilities
Cross-Site Scripting vulnerabilities can allow malicious users to inject code into web pages
that are viewed by other users. HTML and client-side scripts are examples of code that might
be injected into web pages. An exploited cross-site scripting vulnerability can be used by
attackers to bypass access controls such as the same origin policy. QRadar Vulnerability
Manager tests for varieties of persistent and non-persistent cross-site scripting
vulnerabilities to ensure that the web application is not susceptible to this threat.
•
Web Application Infrastructure
QRadar Vulnerability Manager includes thousands of checks that check default
configurations, cgi scripts, installed and supporting application, underlying operating
systems and devices.
•
Web page errors
For in-depth web application scanning, QRadar Vulnerability Manager integrates with IBM®
Security AppScan® to provide greater web application visibility to your vulnerabilities.
Network device scanning
QRadar Vulnerability Manager includes the SNMP plug-in that supports scanning of network
devices. QRadar Vulnerability Manager supports SNMP V1 and SNMP V2. SNMP V3 is not
supported. QRadar Vulnerability Manager uses a dictionary of known community defaults for
various SNMP-enabled devices. You can customize the dictionary.
External scanner checks
The external scanner scans the following OWASP (Open Web Application Security Project) CWEs (Common
Weakness Enumerations):
•
•
•
•
•
•
•
Directory Listing
Path Traversal, Windows File Parameter Alteration, UNIX File Parameter Alteration, Poison
Null Byte Windows Files Retrieval, Poison Null Byte UNIX Files Retrieval
Cross-Site Scripting, DOM-Based Cross-Site Scripting
SQL Injection, Blind SQL Injection, Blind SQL Injection (Time Based)
Autocomplete HTML Attribute Not Disabled for Password Field
Unencrypted Login Request, Unencrypted Password Parameter
Remote Code Execution, Parameter System Call Code Injection, File Parameter Shell
Command Injection, Format String Remote Command Execution
Database scanning
QRadar Vulnerability Manager detects vulnerabilities on major databases by using unauthenticated
scanning of target hosts. In addition, QRadar Vulnerability Manager targets several databases by
using plug-ins.
Operating system checks
Operating system
Vulnerability
scanning
Patch scanning
Configuration
Windows
Yes
Yes
Yes
AIX® UNIX
Yes
Yes
No
CentOS Linux®
Yes
Yes
No
Debian Linux
Yes
Yes
No
Operating system
Vulnerability
scanning
Patch scanning
Configuration
Fedora Linux
Yes
Yes
No
Red Hat Linux
Yes
Yes
No
Sun Solaris
Yes
Yes
No
HP-UX
Yes
Yes
No
Suse Linux
Yes
Yes
No
Ubuntu Linux
Yes
Yes
No
CISCO
No
No
No
AS/400® / iSeries No
No
No
Table 2. Operating system checks
OVALs and operating systems
OVAL definitions are supported on the following operating systems:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Microsoft Windows 10
Microsoft Windows 8.1
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Vista
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008
Microsoft Windows Server 2003
CentOS versions 3 - 7
IBM AIX versions 4-7
RHEL versions 3 - 7
SUSE versions 10 - 11
Ubuntu versions 6-14
Red Hat 9
Solaris versions 2.6, 7 - 10
Vulnerability management dashboard
You can display vulnerability information on your QRadar dashboard.
IBM® QRadar Vulnerability Manager is distributed with a default vulnerability dashboard so that
you can quickly review the risk to your organization.
You can create a new dashboard, manage your existing dashboards, and modify the display settings
of each vulnerability dashboard item.
•
Reviewing vulnerability data on the default vulnerability management dashboard
You can display default vulnerability management information on the QRadar dashboard.
The default vulnerability management dashboard contains risk, vulnerability, and scanning information.
You can configure your own dashboard to contain different elements like saved searches.
Procedure
1. Click the Dashboard tab.
2. On the toolbar, in the Show Dashboard list, select Vulnerability Management.
•
Creating a customized vulnerability management dashboard
In QRadar you can create a vulnerability management dashboard that is customized to your
requirements.
Procedure
1.
2.
3.
4.
5.
•
Click the Dashboard tab.
On the toolbar, click New Dashboard.
Type a name and description for your vulnerability dashboard.
Click OK.
Optional: On the toolbar select Add Item > Vulnerability Management. If you want
to show default saved searches on your dashboard, select Vulnerability Searches.
Creating a dashboard for patch compliance
Create a dashboard that shows the most effective patch to use to remediate vulnerabilities
that are found on the network.
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
9.
Click the Dashboard tab.
On the toolbar, click New Dashboard.
Type a name and description for your vulnerability dashboard.
Click OK.
On the toolbar, select Add Item > Vulnerability Management > Vulnerability
Searches and choose the default saved search that you want to show on your
dashboard.
On the header of the new dashboard item, click the yellow Settings icon.
Select Patch from the Group By list and then select one of the following options from
the Graph By list:
o If you want to see how many assets need to a have the patch applied,
select Asset Count.
o If you want to see the cumulative risk score by patch, select Risk Score.
o If you want to see the number of vulnerabilities that are covered by a patch,
select Vulnerability Count.
Click Save.
To view vulnerability details on the Manage Vulnerabilities > By
Vulnerability page on the Vulnerabilities tab, click the View in By
Vulnerability link at the bottom of the dashboard item.
QRadar Vulnerability
Manager deployments
Locate and manage the vulnerabilities in your network. Enhance your network security by
integrating add-on features such as HCL BigFix® and IBM Security SiteProtector.
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425). In IBM QRadar 7.5.0 Update Package 6
and later, you cannot integrate QRadar Vulnerability Manager with IBM Security SiteProtector.
IBM QRadar Vulnerability Manager discovers vulnerabilities on your network devices, applications,
and software adds context to the vulnerabilities, prioritizes asset risk in your network, and
supports the remediation of discovered vulnerabilities.
You can integrate QRadar Risk Manager for added protection, which provides network topology,
active attack paths and high-risk assets risk-score adjustment on assets based on policy
compliance. QRadar Vulnerability Manager and QRadar Risk Manager are combined into one
offering and both are enabled through a single base license.
Depending on the product that you install, and whether you upgrade IBM QRadar or install a new
system, the Vulnerabilities tab might not be displayed. Access IBM QRadar Vulnerability
Manager by using the Vulnerabilities tab. If you install IBM QRadar SIEM, the Vulnerabilities tab
is enabled by default with a temporary license key. If you install QRadar Log Manager,
the Vulnerabilities tab is not enabled. You can use the Try it Out option to try out QRadar
Vulnerability Manager for 30 days. You can purchase the license for QRadar Vulnerability
Manager separately and enable it by using a license key.
QRadar Vulnerability Manager components
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
The following information describes the QRadar Vulnerability Manager Processor.
•
•
•
•
The scan processor is responsible for the scheduling and managing scans, and delegating
work to the scanners that might be distributed throughout your network.
You can have only one scan processor in a QRadar deployment.
When you install and license QRadar Vulnerability Manager on an All-in-One system, a
vulnerability processor is automatically deployed on your QRadar Console and includes a
scanning component.
The vulnerability processor provides a scanning component by default. If required, you can
move the vulnerability processor to a different managed host in your deployment.
•
•
•
If you add a 600 managed host appliance, and QRadar Vulnerability Manager is used for the
first time, then the scan processor is assigned to the 600 managed host appliance.
The scanning processor is governed by the processing license, which determines the
maximum number of assets that can be processed by QRadar Vulnerability Manager.
The scan processor can run on the QRadar Console or a managed host.
The following information describes the QRadar Vulnerability Manager scanner.
•
•
•
•
You can deploy a scanner on a virtual machine or as software only.
You can deploy a QRadar Vulnerability Manager scanner dedicated scanner appliance, which
is a 610 appliance.
You can deploy a scanner on a QRadar Console or on the following managed hosts: Flow
Collector, Flow Processor Event Collector, Event Processor, or Data Node.
The number of assets that you can scan with a scanner is determined by the scanner
capacity and is not impacted by licensing.
Components and scan process
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
Scan jobs are completed by a processor and a scanner component. The following diagram shows the
scan components and the processes that run.
Figure 1. Scan components and process
The following list describes the steps in the scan process:
1. You create a scan job by specifying parameters such as IP addresses of assets, type of scan,
and required credentials for authenticated scans.
2. The scan job is accepted by the processor, logged, and added to the database along with
scheduling information to determine when the job runs.
3. The scheduler component manages the scheduling of scans. When the scheduler initiates a
scan, it determines the list of tools that are required and queues them for invocation, and
then the tools are assigned to the relevant scanner.
4. Scanners poll the scan processor continuously for scan tools that it must run by sending a
unique scanner ID. When the scheduler has queued tools that are relevant to the specific
scanner the tools are sent to the scanner for invocation.
QRadar Vulnerability Manager uses an attack tree methodology to manage scans and to
determine which tools are launched. The phases are: asset discovery, port/service
discovery, service scan, and patch scan.
5. The dispatcher runs and manages each scan tool in the list. For each tool that is run, the
dispatcher sends a message to the processor that indicates when a scan tool starts and
finishes.
6. The output from the scan tool is read by the result writer, which then passes these results
back to the processor.
7. The result dispatcher processes the raw results from the scan tools and records them into
the Postgres database.
8. The result exporter finds completed scans in the processor database and exports the results
to the QRadar Console.
9. The exported results are added to the QRadar database where users can view and manage
the scan results.
All-in-one deployment
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
You can run QRadar Vulnerability Manager from an All-in-one system, where the scanning and processing
functions are on the Console. The following information describes what you can do with a basic setup:
•
•
•
•
•
•
Scan up to 255 assets.
Unlimited discovery scans.
Use hosted scanner for DMZ scanning.
Manage scan data from third-party scanners that are integrated with QRadar.
Deploy a scanner on any managed host.
Deploy unlimited stand-alone software or virtual scanners.
Expanding a deployment
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
As your deployment grows, you might need to move the processing function off the QRadar
Console to free up resources, and you might want to deploy scanners closer to your assets.
The following list describes reasons to add scanners to your deployment:
•
•
•
To scan assets in a different geographic region than the QRadar Vulnerability
Manager processor.
If you want to scan many assets concurrently within a short time frame.
You might want to add a scanner to avoid scanning through a firewall that is a log source.
You might also consider adding the scanner directly to the network by adding an interface
on the scanner host that by-passes the firewall.
The following diagram shows a scanning deployment with external scanning and scanners
deployed on managed hosts.
Figure 2. Scanning deployment
DMZ hosted scanner
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
A hosted scanner scans your DMZ from the internet by using your public IP address. If you want to
scan the assets in the DMZ for vulnerabilities, you do not need to deploy a scanner in your DMZ. You
must configure QRadar Vulnerability Manager with a hosted IBM scanner that is located outside
your network.
QRadar Vulnerability Manager integrations
IBM QRadar Vulnerability Manager integrates with HCL BigFix to help you filter and prioritize the
vulnerabilities that can be fixed. BigFix provides shared visibility and control between IT
operations and security. BigFix applies Fixlets to high priority vulnerabilities that are identified and
sent by QRadar Vulnerability Manager to BigFix. Fixlets are packages that you deploy to your assets
or endpoints to remediate specific vulnerabilities.
QRadar Vulnerability Manager integrates with IBM Security SiteProtector to help direct intrusion
prevention system (IPS) policy. When you configure IBM Security SiteProtector, the vulnerabilities
that are detected by scans are automatically forwarded to IBM Security SiteProtector. IBM Security
SiteProtector receives vulnerability data from QRadar Vulnerability Manager scans that are run
only after the integration is configured. Connecting to IBM Security SiteProtector.
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425). In IBM QRadar 7.5.0 Update Package 6
and later, you cannot integrate QRadar Vulnerability Manager with IBM Security SiteProtector.
Third-party scanners
QRadar Vulnerability Manager delivers an effective vulnerability management platform, regardless
of the source of the scan data. QRadar Vulnerability Manager integrates seamlessly with third-party
scanners such as Nessus, nCircle, and Rapid 7.
You require QRadar Vulnerability Manager scanning to get the following options:
•
•
•
•
Event driven and on-demand scanning
Asset database and watchlist based scanning
Scanning from existing QRadar appliances and managed hosts
Detection of newly published vulnerabilities that are not present in any scan results
You require QRadar Risk Manager to get the following options:
•
•
Asset, vulnerability, and traffic-based vulnerability management
Adjusted vulnerability scores and context aware risk scoring.
•
QRadar Risk Manager and QRadar Vulnerability Manager
Enhance your network security by integrating IBM QRadar Risk Manager with IBM QRadar
Vulnerability Manager. Data sources, such as scan data, enable QRadar Risk Manager to
identify security, policy, and compliance risks in your network and calculate the probability
of risk exploitation.
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425). In IBM QRadar 7.5.0 Update Package 6
and later, QRadar Risk Manager cannot identify compliance risks or complete compliance assessments.
QRadar Vulnerability Manager and QRadar Risk Manager are combined into one offering and
both are enabled through a single base license.
Add a QRadar Risk Manager 700 appliance to get the following capabilities:
•
•
•
•
•
•
•
Compliance assessment
Risk policies that are based on vulnerability data and risk scores that help you quickly
identify high-risk vulnerabilities.
Visibility into potential exploit paths from potential threats and untrusted networks through
the network topology view.
Risk policy-based filtering.
Topology visualization
False positives reduction in vulnerability assessments.
Visibility into what vulnerabilities are blocked by firewalls and Intrusion Prevention
Systems (IPS).
QRadar Risk Manager appliance
Install QRadar Risk Manager separately on a QRadar Risk Manager 700 appliance.
You must install IBM QRadar Console before you set up and configure the QRadar Risk
Manager appliance. It is a good practice to install QRadar and QRadar Risk Manager on the same
network switch.
You require only one QRadar Risk Manager appliance per deployment.
The following diagram shows a deployment that has a scanner and QRadar Risk Manager.
Figure 1. Scanning deployment with Risk Manager
Use Risk Manager to complete the following tasks:
•
•
•
•
•
•
•
•
•
•
•
•
Centralized risk management.
View and filter your network topology
Import and compare device configurations
View connections between network devices.
Search firewall rules.
View existing rules and the event count for triggered rules.
Search devices and paths
Query network connections
Simulate the possible outcomes of updating device configurations.
Monitor and audit your network to ensure compliance.
Simulate threats or attacks against a virtual model.
Search for vulnerabilities.
TASK: 3.5 Manage custom event and flow properties
SUBTASKS:
3.5.1. Understand custom event and flow properties
3.5.2. Create a custom property
3.5.3. Modify or delete a custom property
3.5.4. Define custom properties using expressions
Custom log source types
Use the DSM Editor to create and configure a custom log source type to parse your events. If you
create a log source type for your custom applications and systems that don't have a supported
DSM, QRadar® analyzes the data in the same way that it does for supported DSMs.
You can select events from the Log Activity tab and send them directly to the DSM Editor to be
parsed. Or you can open the DSM Editor from the Admin tab to create and configure a new log
source type.
Complete the fields in the DSM Editor with the correct structured data to parse relevant
information from the events. QRadar uses the Event Category and Event ID fields to map a
meaning to the event. The Event ID is a mandatory field that defines the event, and the category
breaks down the event further. You can set the Event Category to the Device Type name, or you
can leave it as unknown. If you leave the Event Category as unknown, you must set it to unknown
for any event mappings that you create for this log source type.
Use the DSM Editor to map your Event ID/Event Category combinations that you are parsing from
your events. Enter the Event ID/Event Category combination into the new entry in the Event
Mapping tab. You can choose a categorization of the previously created QID map entry that is
relevant to your event, or click Choose QID to create a new map entry.
Creating a custom log source type to parse events
If you have events that are imported into QRadar, you can select the events on which you want to
base your custom log source type and send them directly to the DSM Editor.
Procedure
1. Click the Log Activity tab.
2. Pause the incoming results and then highlight one or more events.
Important: You can select only a single log source type, and only the events from log activity
that match the selected log source type are automatically added to the workspace.
3. On the navigation menu, select Actions > DSM Editor, and choose one of the following
options:
o If you are parsing known events, select your log source type from the list.
o If you are parsing stored events, click Create New. Enter a name for your log source
type in the Log Source Type Name field and click Save.
4. In the Properties tab, select the Override system properties checkbox for the properties
that you want to edit.
Identity properties for event mappings
Identity data is a special set of system properties that includes Identity Username, Identity
IP, Identity NetBIOS Name, Identity Extended Field, Identity Host
Name, Identity MAC, Identity Group Name.
When identity properties are populated by a DSM, the identity data is forwarded to the asset
profiler service that runs on the IBM® QRadar® console. The asset profiler is used to update the
asset model, either by adding new assets or by updating the information on existing assets,
including the Last User and User Last Seen asset fields when an Identity Username is
provided.
IBM QRadar DSMs can populate identity data for certain events, such as those that establish an
association or disassociation between identity properties. This association or disassociation is for
performance and also for certain events that provide new or useful information that is needed for
asset updates. For example, a login event establishes a new association between a user name and an
asset (an IP address, a MAC address, or a host name, or a combination of them). The DSM generates
identity data for any login events that it parses, but subsequent events of different types that
involve the same user, provide no new association information. Therefore, the DSM does not
generate identity for other event types.
Also, the DSMs for DHCP services can generate identity data for DHCP assigned events because
these events establish an association between an IP address and a MAC address. DSMs for DNS
services generate identity information for events that represents DNS lookups because these events
establish an association between an IP address and a host name or DNS name.
You can configure the DSM Editor to override the behavior of the identity properties. However,
unlike other system properties, overridden identity property has no effect unless it is linked to
specific Event ID or Event Category combinations (event mappings). When identity property
overrides are configured, you can go to the Event Mappings tab and select an event mapping to
configure specific identity properties for that event. Only identity properties that are available and
captured by the configured property regex or json are populated for an event.
Note: The Identity Username property is unique and cannot be independently configured. If
any identity properties are enabled for a particular event mapping, then the Identity
Username property is automatically populated for the event from the
available Username property value.
Referencing capture strings by using format
string fields
Use the Format String field on the Property Configuration tab to reference capture groups
that you defined in the regex. Capture groups are referenced in their order of precedence.
About this task
A capture group is any regex that is enclosed within parenthesis. A capture group is referenced with
an $n notation, where n is a group number that contains a regular expression (regex). You can
define multiple capture groups.
For example, you have a payload with company and host name variables.
"company":"ibm", "hostname":"localhost.com"
"company":"ibm", "hostname":"johndoe.com"
You can customize the host name from the payload to display ibm.hostname.com by using
capture groups.
Procedure
1. In the regex field, enter the following regular
expression: "company":"(.*?)".*"hostname":"(.*?)"
2. In the Format String field, enter the capture group $1.$2 where $1 is the value for the
company variable (in this case ibm) and $2 is the value for the host name in the payload. The
following output is given:
ibm.localhost.com ibm.johndoe.com
Creating a custom log source type to parse
events
If you have events that are imported into QRadar®, you can select the events on which you want to
base your custom log source type and send them directly to the DSM Editor.
Procedure
1. Click the Log Activity tab.
2. Pause the incoming results and then highlight one or more events.
Important: You can select only a single log source type, and only the events from log activity
that match the selected log source type are automatically added to the workspace.
3. On the navigation menu, select Actions > DSM Editor, and choose one of the following
options:
o If you are parsing known events, select your log source type from the list.
o If you are parsing stored events, click Create New. Enter a name for your log source
type in the Log Source Type Name field and click Save.
4. In the Properties tab, select the Override system properties checkbox for the properties
that you want to edit.
TASK: 3.7 Manage data obfuscation
SUBTASKS:
3.7.1. Understand data obfuscation
• profiles
• expressions
3.7.2. Create a data obfuscation profile
3.7.3. Create a data obfuscation expression
3.7.4. View deobfuscated data
3.7.5. Edit or disable obfuscation expressions created in previous releases
Data obfuscation expressions
Data obfuscation expressions identify the data to hide. You can create data obfuscation expressions
that are based on field-based properties or you can use regular expressions.
Field-based properties
Use a field-based property to hide user names, group names, host names, and NetBIOS names.
Expressions that use field-based properties obfuscate all instances of the data string. The data is
hidden regardless of its log source, log source type, event name, or event category.
If the same data value exists in more than one of the fields, the data is obfuscated in all fields that
contain the data even if you configured the profile to obfuscate only one of the four fields. For
example, if you have a host name that is called IBMHost and a group name that is called IBMHost, the
value IBMHost is obfuscated in both the host name field and the group name field even if the data
obfuscation profile is configured to obfuscate only host names.
Regular expressions
Use a regular expression to obfuscate one data string in the payload. The data is hidden only if it
matches the log source, log source type, event name, or category that is defined in the expression.
You can use high-level and low-level categories to create a regular expression that is more specific than a
field-based property. For example, you can use the following regex patterns to parse user names:
Example regex patterns
Matches
[email protected],
usrName=([0-9a-zA-Z]([-.\w]*[0-9a-zA-Z])*@([[email protected],
9
a-zA-Z][-\w]*[0-9a-zA-Z]\.)+[a-zA-Z]{2,20})$ [email protected]
john.smith, John.Smith, john,
usrName=(^([\w]+[^\W])([^\W]\.?)([\w]+[^\W]$))jon_smith
usrName=^([a-zA-Z])[a-zA-Z_-]*[\w_]*[\S]$|^([a
-zA-Z])[0-9_-]*[\S]$|^[a-zA-Z]*[\S]$
johnsmith, Johnsmith123,
john_smith123, john123_smith,
john-smith
usrName=(/S+)
Matches any non-white space after the equal, =,
sign. This regular expression is non-specific
and can lead to system performance issues.
msg=([0-9a-zA-Z]([-.\w]*[0-9a-zAZ]))*@\b(([01]
Matches users with IP address. For
?\d?\d|2[0-4]\d|25[0-5])\.){3}([01]?\d?\d|2[0-example, [email protected]
4
]\d|25[0-5])\b
src=\b(([01]?\d?\d|2[0-4]\d|25[0Matches IP address formats.
5])\.){3}([01]
?\d?\d|2[0-4]\d|25[0-5])\b
host=^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\]*[a
hostname.example.com,
-zA-Z0-9])\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za- hostname.co.uk
z09\-]*[A-Za-z0-9])$
Table 1. Regex user name parsing
Deobfuscating data so that it can be viewed in
the console
When data obfuscation is configured on an IBM® QRadar® system, the masked version of the data
is shown throughout the application. You must have both the corresponding keystore and the
password to deobfuscate the data so that it can be viewed.
Before you begin
You must be an administrator and have the private key and the password for the key before you
can deobfuscate data. The private key must be on your local computer.
About this task
Before you can see the obfuscated data, you must upload the private key. After the key is uploaded,
it remains available on the system for the duration of the current session. The session ends when
you log out of QRadar, when the cache is cleared on the QRadar Console, or when there is an
extended period of inactivity. When the session ends, the private keys that were uploaded in the
previous session are no longer visible.
QRadar can use the keys available in the current session to automatically deobfuscate data. With
auto-deobfuscation enabled, you do not have to repeatedly select the private key on
the Obfuscation Session Key window each time that you want to view the data. Auto-deobfuscate is
automatically disabled when the current session ends.
Procedure
1. On the Event Details page, find the data that you want to deobfuscate.
2. To deobfuscate identity-based data:
a. Click the lock icon next to the data that you want to deobfuscate.
b. In the Upload Key section, click Select File and select the keystore to upload.
c. In the Password box, type the password that matches the keystore.
d. Click Upload.
The Deobfuscation window shows the event payload, the profile names that are
associated with the keystore, the obfuscated text, and the deobfuscated text.
e. Optional: Click Toggle Auto Deobfuscate to enable auto-deobfuscation.
After you toggle the auto-deobfuscation setting, you must refresh the browser
window and reload the event details page for the changes to appear.
3. To deobfuscate payload data that is not identity-based:
a. On the toolbar on the Event Details page, click Obfuscation > Deobfuscation keys.
b. In the Upload Key section, click Select File and select the private key to upload.
c. In the Password box, type the password that matches the private key and
click Upload.
d. In the Payload information box, select and copy the obfuscated text to the clipboard.
e. On the toolbar on the Event Details page, click Obfuscation > Deobfuscation.
f. Paste the obfuscated text in to dialog box.
g. Select the obfuscation profile from the drop-down list and click Deobfuscate.
Editing or disabling obfuscation expressions
created in previous releases
When you upgrade to IBM® QRadar® V7.2.6, data obfuscation expressions that were created in
previous releases are automatically carried forward and continue to obfuscate data. These
expressions appear in a single data obfuscation profile, named AutoGeneratedProperty.
Although you can see the expressions, you cannot edit or disable data obfuscation expressions that
were created in earlier versions. You must manually disable them and create a data obfuscation
profile that contains the revised expressions.
About this task
To disable an old expression, you must edit the xml configuration file that defines the attributes for
the expression. You can then run the obfuscation_updater.sh script to disable it.
Ensure that you disable old expressions before you create new expressions that obfuscate the same
data. Multiple expressions that obfuscate the same data cause the data to be obfuscated twice. To
decrypt data that is obfuscated multiple times, each keystore that is used in the obfuscation process
must be applied in the order that the obfuscation occurred.
Procedure
1. Use SSH to log in to your QRadar Console as the root user.
2. Edit the obfuscation expressions .xml configuration file that you created when you
configured the expressions.
3. For each expression that you want to disable, change the Enabled attribute to false.
4. To disable the expressions, run the obfuscation_updater.sh script by typing the
following command:
<path_to_private_key>] [<path_to_obfuscation_xml_config_file>]
obfuscation_updater.sh [-p
e
The obfuscation_updater.sh script is in the /opt/qradar/bin directory, but you
can run the script from any directory on your QRadar Console.
Sensitive data protection
Configure a data obfuscation profile to prevent unauthorized access to sensitive or personal
identifiable information in IBM® QRadar®.
Data obfuscation is the process of strategically hiding data from QRadar users. You can hide custom
properties, normalized properties such as user names, or you can hide the content of a payload,
such as credit card or social security numbers.
The expressions in the data obfuscation profile are evaluated against the payload and normalized
properties. If the data matches the obfuscation expression, the data is hidden in QRadar. The data
might be hidden to all users, or only to users belonging to particular domains or tenants. Affected
users who try to query the database directly can’t see the sensitive data. The data must be reverted
to the original form by uploading the private key that was generated when the data obfuscation
profile was created.
To ensure that QRadar can still correlate the hidden data values, the obfuscation process is
deterministic. It displays the same set of characters each time the data value is found.
How does data obfuscation work?
Before you configure data obfuscation in your IBM QRadar deployment, you must understand how
it works for new and existing offenses, assets, rules, and log source extensions.
Existing event data
When a data obfuscation profile is enabled, the system masks the data for each event as it is
received by QRadar. Events that are received by the appliance before data obfuscation is configured
remain in the original unobfuscated state. The older event data is not masked and users can see the
information.
Assets
When data obfuscation is configured, the asset model accumulates data that is masked while the
pre-existing asset model data remains unmasked.
To prevent someone from using unmasked data to trace the obfuscated information, purge the
asset model data to remove the unmasked data. QRadar will repopulate the asset database with
obfuscated values.
Offenses
To ensure that offenses do not display data that was previously unmasked, close all existing
offenses by resetting the SIM model. For more information, see Resetting SIM.
Rules
You must update rules that depend on data that was previously unmasked. For example, rules that
are based on a specific user name do not fire when the user name is obfuscated.
Log source extensions
Log source extensions that change the format of the event payload can cause issues with data
obfuscation.
Data obfuscation profiles
The data obfuscation profile contains information about which data to mask. It also tracks the
keystore that is required to decrypt the data.
Enabled profiles
Enable a profile only when you are sure that the expressions correctly target the data
that you want to obfuscate. If you want to test the regular expression before you
enable the data obfuscation profile, you can create a regex-based custom property.
A profile that is enabled immediately begins obfuscating data as defined by the enabled
expressions in the profile. The enabled profile is automatically locked. Only the user who has
the private key can disable or change the profile after it is enabled.
To ensure that obfuscated data can be traced back to an obfuscation profile, you cannot
delete a profile that was enabled, even after you disable it.
Locked profiles
A profile is automatically locked when you enable it, or you can lock it manually.
A locked profile has the following restrictions:
•
•
•
•
You cannot edit it.
You cannot enable or disable it. You must provide the keystore and unlock the profile
before you can change it.
You cannot delete it, even after it is unlocked.
If a keystore is used with a profile that is locked, all other profiles that use that
keystore are automatically locked.
The following table shows examples of profiles that are locked or unlocked:
Scenario
Result
Profile A is locked.
It was created by
using keystore A.
Profile B is automatically locked.
Profile B is also
created by using
keystore A.
Profile A is created
Profile A is automatically locked.
and enabled.
Profile A, Profile B,
and Profile C are
currently locked. All
were created by
using keystore A. Profile A, Profile B, and Profile C are all unlocked.
Profile B is selected
and Lock/Unlock is
clicked.
Table 1. Locked profile examples
Data obfuscation expressions
Data obfuscation expressions identify the data to hide. You can create data obfuscation expressions
that are based on field-based properties or you can use regular expressions.
Field-based properties
Use a field-based property to hide user names, group names, host names, and NetBIOS names.
Expressions that use field-based properties obfuscate all instances of the data string. The data is
hidden regardless of its log source, log source type, event name, or event category.
If the same data value exists in more than one of the fields, the data is obfuscated in all fields that
contain the data even if you configured the profile to obfuscate only one of the four fields. For
example, if you have a host name that is called IBMHost and a group name that is called IBMHost, the
value IBMHost is obfuscated in both the host name field and the group name field even if the data
obfuscation profile is configured to obfuscate only host names.
Regular expressions
Use a regular expression to obfuscate one data string in the payload. The data is hidden only if it
matches the log source, log source type, event name, or category that is defined in the expression.
You can use high-level and low-level categories to create a regular expression that is more specific than a
field-based property. For example, you can use the following regex patterns to parse user names:
Example regex patterns
Matches
[email protected],
usrName=([0-9a-zA-Z]([-.\w]*[0-9a-zA-Z])*@([[email protected],
9
a-zA-Z][-\w]*[0-9a-zA-Z]\.)+[a-zA-Z]{2,20})$ [email protected]
john.smith, John.Smith, john,
usrName=(^([\w]+[^\W])([^\W]\.?)([\w]+[^\W]$))jon_smith
usrName=^([a-zA-Z])[a-zA-Z_-]*[\w_]*[\S]$|^([a
-zA-Z])[0-9_-]*[\S]$|^[a-zA-Z]*[\S]$
johnsmith, Johnsmith123,
john_smith123, john123_smith,
john-smith
usrName=(/S+)
Matches any non-white space after the equal, =,
sign. This regular expression is non-specific
and can lead to system performance issues.
msg=([0-9a-zA-Z]([-.\w]*[0-9a-zAZ]))*@\b(([01]
Matches users with IP address. For
?\d?\d|2[0-4]\d|25[0-5])\.){3}([01]?\d?\d|2[0-example, [email protected]
4
]\d|25[0-5])\b
src=\b(([01]?\d?\d|2[0-4]\d|25[0Matches IP address formats.
5])\.){3}([01]
?\d?\d|2[0-4]\d|25[0-5])\b
Example regex patterns
Matches
host=^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\]*[a
-zA-Z0-9])\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Zaz09\-]*[A-Za-z0-9])$
hostname.example.com,
hostname.co.uk
Table 1. Regex user name parsing
Scenario: Obfuscating user names
You are an IBM QRadar administrator. Your organization has an agreement with the workers union
that all personal identifiable information must be hidden from QRadar users. You want to
configure QRadar to hide all user names.
Use the Data Obfuscation Management feature on the Admin tab to configure QRadar to hide the data:
1. Create a data obfuscation profile and download the system-generated private key. Save the
key in a secure location.
2. Create the data obfuscation expressions to target the data that you want to hide.
3. Enable the profile so that the system begins to obfuscate the data.
4. To read the data in QRadar, upload the private key to deobfuscate the data.
•
Creating a data obfuscation profile
IBM QRadar uses data obfuscation profiles to determine which data to mask, and to ensure
that the correct keystore is used to unmask the data.
About this task
You can create a profile that creates a new keystore or you can use an existing keystore. If
you create a keystore, it must be downloaded and stored in a secure location. Remove the
keystore from the local system and store it in a location that can be accessed only by users
who are authorized to view the unmasked data.
Configuring profiles that use different keystores is useful when you want to limit data access
to different groups of users. For example, create two profiles that use different keystores
when you want one group of users to see user names and another group of users to see host
names.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Data Sources section, click Data Obfuscation Management.
3. To create a new profile, click Add and type a unique name and description for the
profile.
4. To create a new keystore for the profile, complete these steps:
a. Click System generate keystore.
b. In the Provider list box, select IBMJCE.
c. In the Algorithm list box, select JCE and select whether to generate 512-bit or
1024-bit encryption keys.
In the Keystore Certificate CN box, the fully qualified domain name for
the QRadar server is auto-populated.
d. In the Keystore password box, enter the keystore password.
The keystore password is required to protect the integrity of the keystore. The
password must be at least 8 characters in length.
e. In the Verify keystore password, retype the password.
5. To use an existing keystore with the profile, complete these steps:
a. Click Upload keystore.
b. Click Browse and select the keystore file.
c. In the Keystore password box, type the password for the keystore.
6. Click Submit.
7. Download the keystore.
Remove the keystore from your system and store it in a secure location.
•
Creating data obfuscation expressions
The data obfuscation profile uses expressions to specify which data to hide from IBM
QRadar users. The expressions can use either field-based properties or regular expressions.
About this task
After an expression is created, you cannot change the type. For example, you cannot create a
property-based expression and then later change it to a regular expression.
You cannot hide a normalized numeric field, such as port number or an IP address.
Multiple expressions that hide the same data cause data to be hidden twice. To decrypt data
that is hidden multiple times, each keystore that is used in the obfuscation process must be
applied in the order that the obfuscation occurred.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Data Sources section, click Data Obfuscation Management.
3. Click the profile that you want to configure, and click View Contents.
You cannot configure profiles that are locked.
4. To create a new data obfuscation expression, click Add and type a unique name and
description for the profile.
5. Select the Enabled check box to enable the profile.
6. Optional: To apply the obfuscation expression to specific domains or tenants, select
them from the Domain field. Or select All Domains to apply the obfuscation
expression to all domains and tenants.
7. To create a field-based expression, click Field Based and select the field type to
obfuscate.
8. To create a regular expression, click RegEx and configure the regex properties.
9. Click Save.
•
Deobfuscating data so that it can be viewed in the console
When data obfuscation is configured on an IBM QRadar system, the masked version of the
data is shown throughout the application. You must have both the corresponding keystore
and the password to deobfuscate the data so that it can be viewed.
Before you begin
You must be an administrator and have the private key and the password for the key before
you can deobfuscate data. The private key must be on your local computer.
About this task
Before you can see the obfuscated data, you must upload the private key. After the key is
uploaded, it remains available on the system for the duration of the current session. The
session ends when you log out of QRadar, when the cache is cleared on the QRadar Console,
or when there is an extended period of inactivity. When the session ends, the private keys
that were uploaded in the previous session are no longer visible.
QRadar can use the keys available in the current session to automatically deobfuscate data.
With auto-deobfuscation enabled, you do not have to repeatedly select the private key on
the Obfuscation Session Key window each time that you want to view the data. Autodeobfuscate is automatically disabled when the current session ends.
Procedure
1. On the Event Details page, find the data that you want to deobfuscate.
2. To deobfuscate identity-based data:
a. Click the lock icon next to the data that you want to deobfuscate.
b. In the Upload Key section, click Select File and select the keystore to upload.
c. In the Password box, type the password that matches the keystore.
d. Click Upload.
The Deobfuscation window shows the event payload, the profile names that
are associated with the keystore, the obfuscated text, and the deobfuscated
text.
e. Optional: Click Toggle Auto Deobfuscate to enable auto-deobfuscation.
After you toggle the auto-deobfuscation setting, you must refresh the browser
window and reload the event details page for the changes to appear.
3. To deobfuscate payload data that is not identity-based:
a. On the toolbar on the Event Details page, click Obfuscation > Deobfuscation
keys.
b. In the Upload Key section, click Select File and select the private key to
upload.
c. In the Password box, type the password that matches the private key and
click Upload.
d. In the Payload information box, select and copy the obfuscated text to the
clipboard.
e. On the toolbar on the Event Details page, click Obfuscation > Deobfuscation.
f. Paste the obfuscated text in to dialog box.
g. Select the obfuscation profile from the drop-down list and click Deobfuscate.
•
Editing or disabling obfuscation expressions created in previous releases
When you upgrade to IBM QRadar V7.2.6, data obfuscation expressions that were created in
previous releases are automatically carried forward and continue to obfuscate data. These
expressions appear in a single data obfuscation profile, named AutoGeneratedProperty.
About this task
To disable an old expression, you must edit the xml configuration file that defines the attributes for the
expression. You can then run the obfuscation_updater.sh script to disable it.
Ensure that you disable old expressions before you create new expressions that obfuscate
the same data. Multiple expressions that obfuscate the same data cause the data to be
obfuscated twice. To decrypt data that is obfuscated multiple times, each keystore that is
used in the obfuscation process must be applied in the order that the obfuscation occurred.
Procedure
1. Use SSH to log in to your QRadar Console as the root user.
2. Edit the obfuscation expressions .xml configuration file that you created when you
configured the expressions.
3. For each expression that you want to disable, change the Enabled attribute to false.
4. To disable the expressions, run the obfuscation_updater.sh script by typing
the following command:
<path_to_private_key>] [<path_to_obfuscation_xml_config_file>]
obfuscation_updater.sh [-p
e
The obfuscation_updater.sh script is in the /opt/qradar/bin directory,
but you can run the script from any directory on your QRadar Console.
Section 4: Accuracy Tuning
This section accounts for 10% of the exam (6 out of 62 questions).
TASK: 4.1 Understand and implement ADE rules
SUBTASKS:
4.1.1. Understand anomaly rules
4.1.2. Understand threshold rules
4.1.3. Understand behavior rules
4.1.4. Create an anomaly detection rule
Anomaly detection rules
Anomaly detection rules test the results of saved flow or events searches to detect when unusual
traffic patterns occur in your network.
Anomaly detection rules require a saved search that is grouped around a common parameter, and a
time series graph that is enabled. Typically the search needs to accumulate data before the anomaly
rule returns any result that identifies patterns for anomalies, thresholds, or behavior changes.
Anomaly rules
Test event and flow traffic for changes in short-term events when you are comparing against a
longer timeframe. For example, new services or applications that appear in a network, a web server
crashes, firewalls that all start to deny traffic.
Example: You want to be notified when one of your firewall devices is reporting more often than it usually
does because your network might be under attack. You want to be notified when you receive twice as many
events in 1 hour. You follow these steps:
1. Create and save a search that groups by log source, and displays only the count column.
2. Apply the saved search to an anomaly rule, and add the rule test, and when the average
value (per interval) of count over the last 1 hour is at least 100% different from the
average value (per interval) of the same property over the last 24 hours.
Threshold rules
Test events or flows for activity that is greater than or less than a specified range. Use these rules to
detect bandwidth usage changes in applications, failed services, the number of users connected to a
VPN, and detecting large outbound transfers.
Example: A user who was involved in a previous incident has large outbound transfer.
When a user is involved in a previous offense, automatically set the Rule response to add to the
Reference set. If you have a watch list of users, add them to the Reference set. Tune acceptable
limits within the Threshold rule.
A reference set, WatchUsers, and Key:username are required for your search.
Complete the following search, and then apply it to a Threshold rule.
select assetuser(sourceip, now()) as 'srcAssetUser',
Applicationname(applicationid)as 'AppName', long(sum(sourcebytes
+destinationbytes)) as 'flowsum' from flows where flowdirection = 'L2R' and
REFERENCESETCONTAINS('Watchusers', username)group by 'srcAssetUser',
applicationid order by 'flowsum' desc last 24 hours
Behavioral rules
Test events or flows for volume changes that occur in regular patterns to detect outliers. For
example, a mail server that has an open relay and suddenly communicates with many hosts, or an
IPS (intrusion protection system) that starts to generate numerous alert activities.
A behavioral rule learns the rate or volume of a property over a pre-defined season. The season
defines the baseline comparison timeline for what you're evaluating. When you set a season of 1
week, the behavior of the property over that 1 week is learned and then you use rule tests to alert
you to any significant changes.
After a behavioral rule is set, the season adjusts automatically. When the data in the season is
learned, it is continually evaluated so that business growth is profiled within the season; you do not
have to change your rules. The longer a behavioral rule runs, the more accurate it becomes. You can
then adjust the rule responses to capture more subtle changes.
The following table describes the behavioral rule test parameter options.
Rule test parameter
Season
Current traffic level
Current traffic trend
Description
The most important value. The season defines the baseline behavior of
the property that you are testing and which the other rule tests use. To
define a season, consider the type of traffic that you are monitoring. For
example, for network traffic or processes that include human interaction,
1 week is a good season timeframe. For tracking automated services
where patterns are consistent, you might want to create a season as
short as 1 day to define that pattern of behavior.
Weight of the original data with seasonal changes and random error
accounted for. This rule test asks the question, "Is the data the same as
yesterday at the same time?"
The weight must be in the range of 1 to 100. A higher value places more
weight on the previously recorded value.
Weight of changes in the data for each time interval. This rule test asks
the question, "How much does the data change when it compares this
minute to the minute before?"
Rule test parameter
Description
Current traffic behavior
The weight must be in the range of 1 to 100. A higher value places more
weight on traffic trends than the calculated behavior.
Weight of the seasonal effect for each period. This rule test asks the
question, "Did the data increase the same amount from week 2 to week 3,
as it did from week 1 to week 2?"
The weight must be in the range of 1 to 100. A higher value places more
weight on the learned behavior.
Use predicted values to scale baselines to make alerting more or less
sensitive.
Predicted value
The sensitivity must be in the range of 1 to 100. A value of 1 indicates
that the measured value cannot be outside the predicted value. A value of
100 indicates that the traffic can be more than four times larger than the
predicted value.
Table 1. Behavioral rule test definitions
The forecast for value from (n+1)th interval is calculated by using the following formula:
Fn+1 = Bn + Tn + Tn+1-s
Where F is the predicted value, B is the base value for interval n, T is the trend value for interval n,
and T is the trend value for season intervals ago and s is the number of intervals within the season.
The base value is calculated by using the following formula:
Bn+1 = (0.2 + 0.3*(<Current traffic level> / 100.0))*(value n+1 – Tn+1-s) + (1 – (0.2 +
0.3*(<Current traffic level> / 100.0)))*T n
The trend value is calculated by using the following formula:
Tn+1 = (0.2 + 0.3*(<Current traffic trend> / 100.0))*(B n+1 - Bn) + (1 - (0.2 +
0.3*(<Current traffic trend> / 100.0)))*T n
Smoothed deviation D is calculated by using the following formula:
Dn+1 = (0.2 + 0.3*(<Current traffic behavior> / 100.0))*|value n+1 – Fn+1| + (1 – (0.2 +
0.3*(<Current traffic behavior> / 100.0)))*D n+1-s
The behavioral rule produces an alert for the interval if the following expression is false:
F – (1 + (sensitivity / 100.0)*3)*D <= value <= F + (1 + ( sensitivity / 100.0)*3)*D
During the first season, the behavioral rule learns for future calculations and doesn't produce any
alerts.
•
Creating an anomaly detection rule
Anomaly detection rules test the result of saved flow or event searches to search for unusual
traffic patterns that occur in your network. Behavioral rules test event and flow traffic
according to "seasonal" traffic levels and trends. Threshold rules test event and flow traffic
for activity less than, equal to, or greater than a configured threshold or within a specified
range.
Before you begin
To create anomaly detection rules on the Log Activity tab, you must have the Log
Activity Maintain Custom Rules role permission.
To create anomaly detection rules on the Network Activity tab, you must have the Network
Activity Maintain Custom Rules role permission.
To manage default and previously created anomaly detection rules, use the Rules page on
the Offenses tab.
About this task
When you create an anomaly detection rule, the rule is populated with a default test stack, based on
your saved search criteria. You can edit the default tests or add tests to the test stack. At least
one Accumulated Property test must be included in the test stack.
By default, the Test the [Selected Accumulated Property] value of each [group]
separately option is selected on the Rule Test Stack Editor page.
An anomaly detection rule tests the selected accumulated property for each event or flow group
separately. For example, if the selected accumulated value is UniqueCount(sourceIP), the rule
tests each unique source IP address for each event or flow group.
The Test the [Selected Accumulated Property] value of each [group] separately option is
dynamic. The [Selected Accumulated Property] value depends on the option that you select for
the this accumulated property test field of the default test stack. The [group] value depends on
the grouping options that are specified in the saved search criteria. If multiple grouping options are
included, the text might be truncated. Move your mouse pointer over the text to view all groups.
Procedure
1. Click the Log Activity or Network Activity tab.
2. Perform an aggregated search.
You can add a property to the group by in a new historical search or select a property from
the Display list on the current search page.
3. On the search result page, click Configure , and then configure the following options:
a. Select a property from the Value to Graph list.
b. Select time series as the chart type from the Value to Graph list
c.
d.
e.
f.
Enable the Capture Time Series Data check box.
Click Save, and then enter a name for your search.
Click OK.
Select last 5 minutes from the Time Range list, while you wait for the time series
graph to load.
You must have time series data for the property that you selected in the Value to Graph list
to run a rule test on that accumulated property.
4. From the Rules menu, select the rule type that you want to create.
a. Add Anomaly Rule
b. Add Threshold Rule
c. Add Behavioral Rule
5. On the Rule Test Stack Editor page, in the enter rule name here field, type a unique name
that you want to assign to this rule.
6. To apply your rule by using the default test, select the first rule in the anomaly Test
Group list.
You might need to set the accumulated property parameter to the property that you selected
from the Value to Graph list that you saved in the search criteria. If you want to see the
result sooner, set the percentage to a lower value, such as 10%. Change last 24 hours to a
lesser time period, such as 1 hour. Because an anomaly detection tests on aggregated fields
in real time to alert you of anomalous network activity, you might want to increase or
decrease events or flows in your network traffic.
7. Add a test to a rule.
a. To filter the options in the Test Group list, type the text that you want to filter for in
the Type to filter field.
b. From the Test Group list, select the type of test that you want to add to this rule.
c. Optional: To identify a test as an excluded test, click and at the beginning of the test
in the Rule pane. The and is displayed as and not.
d. Click the underlined configurable parameters to customize the variables of the test.
e. From the dialog box, select values for the variable, and then click Submit.
8. To test the total selected accumulated properties for each event or flow group, disable Test
the [Selected Accumulated Property] value of each [group] separately.
9. In the groups pane, enable the groups you want to assign this rule to.
10. In the Notes field, type any notes that you want to include for this rule, and then Click Next.
11. On the Rule Responses page, configure the responses that you want this rule to generate.
Learn more about rule response page parameters for anomaly detection rules:
The following table provides the Rule Response page parameters if the rule type is Anomaly.
Parameter
Description
Dispatch New
Event
Specifies that this rule dispatches a new event with the original event or flow,
which is processed like all other events in the system. By default, this check box is
selected and cannot be cleared.
Parameter
Description
If you want the Event Name information to contribute to the name of the
offense, select the This information should contribute to the name of
the associated offense(s) option.
Offense Naming
If you want the configured Event Name to contribute to the offense, select the This
information should set or replace the name of the associated offense(s).
Note: After you replace the name of the offense, the name won't change until the
offense is closed. For example, if an offense is associated with more than one rule,
and the last event doesn't trigger the rule that is configured to override the name
of the offense, the offense's name won't be updated by the last event. Instead, the
offense name remains the name that is set by the override rule.
Severity
The severity level that you want to assign to the event. The range is 0 (lowest) to
10 (highest) and the default is 5. The Severity is displayed in the Annotations
pane of the event details.
Credibility
The credibility that you want to assign to the log source. For example, is the log
source noisy or expensive? Using the list boxes, select the credibility of the event.
The range is 0 (lowest) to 10 (highest) and the default is 5. Credibility is
displayed in the Annotations pane of the event details.
Relevance
The relevance that you want to assign to the weight of the asset. For example,
how much do you care about the asset? Using the list boxes, select the relevance
of the event. The range is 0 (lowest) to 10 (highest) and the default is 5.
Relevance is displayed in the Annotations pane of the event details.
Ensure that the
As a result of this rule, the event is forwarded to the magistrate. If an
dispatched event is offense exists, this event is added. If no offense was created on the
part of an offense Offenses tab, a new offense is created.
Notify
Send to Local
SysLog
Events that generate as a result of this rule are displayed in the System
Notifications item in the Dashboard tab. If you enable notifications, configure
the Response Limiter parameter.
Select this check box if you want to log the event or flow locally. By default, the
check box is clear.
Note: Only normalized events can be logged locally on a QRadar® appliance. If
you want to send raw event data, you must use the Send to Forwarding
Destinations option to send the data to a remote syslog host.
Adds events that are generated as a result of this rule to a reference set.
You must be an administrator to add data to a reference set.
Add to Reference
Set
To add data to a reference set, follow these steps:
a. From the first list, select the property of the event or flow that you
want to add.
b. From the second list, select the reference set to which you want to
add the specified data.
Parameter
Description
Add to Reference
To use this rule response, you must create the reference data collection.
Data
If you want this rule to remove data from a reference set, select this check box.
To remove data from a reference set, follow these steps:
Remove from
Reference Set
Remove from
Reference Data
a. From the first list, select the property of the event or flow that you
want to remove.
b. From the second list, select the reference set from which you want
to remove the specified data.
To use this rule response, you must have a reference data collection.
You can write scripts that do specific actions in response to network events. For
example, you might write a script to create a firewall rule that blocks a particular
source IP address from your network in response to repeated login failures.
Execute Custom
Action
Select this check box and select a custom action from the Custom action
to execute list.
You add and configure custom actions by using the Define Actions icon on
the Admin tab.
Publish on the IF- If the IF-MAP parameters are configured and deployed in the system settings,
MAP Server
select this option to publish the offense information about the IF-MAP server.
Response Limiter
Select this check box and use the list boxes to configure the frequency with which
you want this rule to respond
Enable Rule
Select this check box to enable this rule. By default, the check box is selected.
Table 1. Anomaly Detection Rule Response page parameters
An SNMP notification might resemble:
"Wed Sep 28 12:20:57 GMT 2005, Custom Rule Engine Notification Rule 'SNMPTRAPTst' Fired. 172.16.20.98:0 -> 172.16.60.75:0 1, Event Name:
ICMP Destination Unreachable Communication with Destination Host is
Administratively Prohibited, QID: 1000156, Category: 1014, Notes:
Offense description"
A syslog output might resemble:
Sep 28 12:39:01 localhost.localdomain ECS:
Rule 'Name of Rule' Fired: 172.16.60.219:12642
-> 172.16.210.126:6666 6, Event Name: SCAN SYN FIN, QID:
1000398, Category: 1011, Notes: Event description
2. Click Next.
3. Click Finish.
TASK: 4.2 Manage and use building blocks
SUBTASKS:
4.2.1. Tune building blocks
4.2.2. Review the building blocks in the use case manager
4.2.3. Add servers to building blocks
Tuning building blocks
You can edit building blocks to reduce the number of false positives that are generated by IBM®
QRadar®.
About this task
To edit building blocks, you must add the IP address or IP addresses of the server or servers into
the appropriate building blocks.
Procedure
1.
2.
3.
4.
5.
6.
Click the Offenses tab.
On the navigation menu, click Rules.
From the Display list, select Building Blocks.
Double-click the building block that you want to edit.
Update the building block.
Click Finish.
The following table describes editable building blocks.
Building Block
BB:NetworkDefinition:
NAT Address Range
BB:HostDefinition:
Network Management
Servers
Description
Edit the and where either the source or destination IP is one of the
following test to include the IP addresses of the Network Address
Translation (NAT) servers.
Edit this building block only if you have a detection in the nonNATd address space. Editing this building block means that offenses are
not created for attacks that are targeted or sourced from this IP address
range.
Network management systems create traffic, such as ICMP (Internet
Control Message Protocol) sweeps to discover hosts. QRadar SIEM might
consider this threatening traffic. To ignore this behavior and define
network management systems, edit the and when either the source or
destination IP is one of the following test to include the IP addresses of
the Network Management Servers (NMS), and other hosts that normally
perform network discovery or monitoring.
Building Block
Description
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of the proxy servers.
BB:HostDefinition: Proxy Edit this building block if you have sufficient detection on the proxy
Servers
server. Editing this building block prevents offense creation for attacks
BB:HostDefinition: VA
Scanner Source IP
that are targeted or sourced from the proxy server. This adjustment is
useful when hundreds of hosts use a single proxy server and that single IP
address of the proxy server might be infected with spyware.
Vulnerability assessment products launch attacks that can result in
offense creation. To avoid this behavior and define vulnerability
assessment products or any server that you want to ignore as a source,
edit the and when the source IP is one of the following test to include
the IP addresses of the following scanners:
o
o
VA Scanners
Authorized Scanners
BB:HostDefinition: Virus Edit the and when either the source or destination IP is one of the
Definition and Other
following test to include the IP addresses of virus protection and update
Update Servers
function servers.
Edit the and when the source is located in test to include geographic
BB:Category Definition: locations that you want to prevent from accessing your network. This
Countries with no Remote change enables the use of rules, such as anomaly: Remote Access from
Access
Foreign Country to create an offense when successful logins are detected
from remote locations.
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of servers that are used for
BB:ComplianceDefinition:Gramm-Leach-Bliley Act (GLBA) compliance. By populating this building
GLBA Servers
block, you can use rules such as Compliance: Excessive Failed Logins to
Compliance IS, which create offenses for compliance and regulationbased situations.
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of servers that are used for
BB:ComplianceDefinition:Health Insurance Portability and Accountability Act (HIPAA) compliance.
HIPAA Servers
By populating this building block, you can use rules, such as Compliance:
Excessive Failed Logins to Compliance IS, which create offenses for
compliance and regulation-based situations.
Edit the and when either the source or destination IP is one of the
following test to include the IP addresses of servers that are used for SOX
BB:ComplianceDefinition:(Sarbanes-Oxley Act) compliance. By populating this building block, you
SOX Servers
can use rules, such as Compliance: Excessive Failed Logins to
Compliance IS, which create offenses for compliance and regulationbased situations.
Edit the and when either the source or destination IP is one of the
BB:ComplianceDefinition:following test to include the IP addresses of servers that are used for PCI
PCI DSS Servers
DSS (Payment Card Industry Data Security Standards) compliance. By
populating this building block, you can use rules such as Compliance:
Building Block
BB:NetworkDefinition:
Broadcast Address Space
Description
Excessive Failed Logins to Compliance IS, which creates offenses for
compliance and regulation-based situations.
Edit the and when either the source or destination IP is one of the
following test to include the broadcast addresses of your network. This
change removes false positive events that might be caused by the use of
broadcast messages.
BB:NetworkDefinition:
Client Networks
Edit the and when the local network is test to include workstation
networks that users are operating.
BB:NetworkDefinition:
Server Networks
Edit the when the local network is test to include any server networks.
Edit the and when the local network is test to include the IP addresses
that are considered to be a dark net. Any traffic or events that are directed
towards a dark net is considered suspicious.
Edit the and when the any IP is a part of any of the following test to
BB:NetworkDefinition: include the remote services that might be used to obtain information from
DLP Addresses
the network. This change can include services, such as WebMail hosts or
file sharing sites.
BB:NetworkDefinition:
Darknet Addresses
BB:NetworkDefinition:
DMZ Addresses
Edit the and when the local network test to include networks that are
considered to be part of the network’s DMZ.
BB:PortDefinition:
Authorized L2R Ports
Edit the and when the destination port is one of the following test to
include common outbound ports that are allowed on the network.
BB:NetworkDefinition:
Watch List Addresses
Edit the and when the local network is to include the remote networks
that are on a watch list. This change helps to identify events from hosts
that are on a watch list.
BB:FalsePositive: User
Edit this building block to include any categories that you want to
Defined Server Type False consider as false positives for hosts that are defined in
Positive Category
the BB:HostDefinition: User Defined Server Type building block.
BB:FalsePositive: User
Edit this building block to include any events that you want to consider as
Defined Server Type False false positives for hosts that are defined in the BB:HostDefinition: User
Positive Events
Defined Server Type building block.
Edit this building block to include the IP address of your custom server
type. After you add the servers, you must add any events or categories
BB:HostDefinition: User that you want to consider as false positives to this server, as defined in
Defined Server Type
the BB:FalsePositives: User Defined Server Type False Positive Category
or the BB:False Positives: User Defined Server Type False Positive
Events building blocks.
Table 1. Building blocks to edit.
You can include a CIDR range or subnet in any of the building blocks instead of listing the IP
addresses. For example, 192.168.1/24 includes addresses 192.168.1.0 to 192.168.1.255. You
can also include CIDR ranges in any of the BB:HostDefinition building blocks.
QRadar Use Case Manager app
Use the guided tips in the IBM® QRadar® Use Case Manager app to help you ensure that IBM
QRadar is optimally configured to accurately detect threats throughout the attack chain.
QRadar Use Case Manager includes a use case explorer that offers flexible reports that are related
to your rules. QRadar Use Case Manager also exposes pre-defined mappings to system rules and
helps you map your own custom rules to MITRE ATT&CK tactics and techniques.
Explore rules through visualization and generated reports
•
•
•
Explore the rules through different filters to ensure that they work as intended.
Generate reports from predefined templates, such as searches based on rule response and
actions, log source coverage, and many others.
Customize reports to see only the information that is critical to your analysis.
Tune your environment based on built-in analysis
•
•
•
Gain tuning recommendations unique to your environment right within the app.
Identify the topmost offense-generating or CRE-generating rules, and then follow the guide
to tune them.
Reduce the number of false positives by reviewing the most common configuration steps.
Easily update network hierarchy, building blocks, and server discovery based on
recommendations.
Visualize threat coverage across the MITRE ATT&CK framework
•
•
•
Visually understand your ability to detect threats based on ATT&CK tactics and techniques.
View predefined QRadar tactic and technique mappings and add your own custom mappings
to help ensure complete coverage.
Use new insights to prioritize the rollout of new use cases and apps to effectively strengthen
your security posture.
What's new and changed in QRadar Use Case Manager
Stay up to date with the new features that are available in the IBM QRadar Use Case
Manager app so that you get the most out of your use case management experience.
Version 3.8.0
•
Added support for MITRE ATT&CK v13.1, which updates Techniques, Groups,
Campaigns and Software for Enterprise, Mobile, and ICS. The biggest changes in
ATT&CK v13 are the addition of detailed detection guidance to some Techniques in
ATT&CK for Enterprise, Mobile Data Sources, and two new types of changelogs to
help identify more precisely what has changed in ATT&CK. For more information,
see https://attack.mitre.org/resources/updates/updates-april-2023/index.html.
•
•
Improved the rule offense contribution API performance to reduce out of memory
issues.
Added a condition to set the number of reference set elements that trigger a finding if
the number is exceeded. For more information, see Configuring QRadar Use Case
Manager.
Version 3.7.0
•
•
•
•
Added support for MITRE ATT&CK v12.1, which updates techniques, groups, and
software for Enterprise. For more information,
see https://attack.mitre.org/resources/updates/updates-october-2022/index.html.
Enabled the Empty reference set tuning finding after product fix.
In the Rule details page, changed the coloring of the diagram arrows to make it
clearer when the AND and AND NOT operators are used for test definitions.
Defect and performance fixes.
Known issues
The IBM QRadar Use Case Manager app has required information for known issues.
The IBM® QRadar® Use Case Manager app has required information for known issues.
The following table lists the known issues.
Important: When an issue is resolved, the table is updated to reflect which version contains the fix.
Video demonstrations
Watch video tutorials to learn how to use the workflows and features in IBM QRadar Use Case
Manager.
Watch video tutorials to learn how to use the workflows and features in IBM® QRadar® Use Case
Manager.
Video demonstrations on YouTube
Tutorials and general overview of QRadar Use Case Manager.
Version 3.0.0
•
•
•
•
•
•
•
•
•
Version 3 Overview (https://youtube.com/watch?v=4ZpEPzLnN-o)
Tutorial: Intro and Navigation (https://youtu.be/ndnhNacHrkk)
Tutorial: Recommended Apps and Log Sources (https://youtu.be/6N9zeUJ2wCk)
Tutorial: Improving my QRadar without spending a penny (https://youtu.be/Ux_0cHIstsg)
Tutorial: Making the case for additional log sources (https://youtu.be/H2HjxTGmC28)
Tutorial: Log sources per Rule (https://youtu.be/C36nALRfxOI)
Tutorial: Using filters (https://youtu.be/IbJLvXQuw2M)
Tutorial: MITRE Part One (https://youtu.be/iTVOhYpp7Dc)
Tutorial: MITRE Part Two (https://youtu.be/WwywPCFN4wo)
Version 2.1 - 2.3
•
•
QRadar Use Case Manager v2.2 + 2.3
updates (https://www.securitylearningacademy.com/enrol/index.php?id=5675)
MITRE ATT&CK Framework (https://youtu.be/933JZ262OVU)
Version 2.0.0
•
•
QRadar Use Case Manager
Overview (https://www.securitylearningacademy.com/enrol/index.php?id=5143)
2.0 Overview (https://www.youtube.com/watch?v=VOVZ6Rm6M)
Version 1.0.0
•
•
•
•
•
Part One: Tune the most active rules (https://youtu.be/GzgY4_bcHyw)
Part Two: Tune the active rules that generate CRE events (https://youtu.be/aiUEhQJE5qc)
Part Three: Review network hierarchy (https://youtu.be/ot5FdH80yH0)
Part Four: Review building blocks (https://youtu.be/6GeXj0IZXdM)
Part Five: Installation script (https://youtu.be/7KFiGH5SFbU)
Videos within the app
Learn how to investigate rules and tune them to prevent false positive offenses. Watch a short video
before you begin investigating rules in the rule wizard. For more information about accessing the
video, see Tuning the active rules that generate offenses.
A well-defined and maintained network hierarchy can help prevent the generation of false positive
offenses. Watch tuning videos to learn more about your network hierarchy and how to keep it up to
date. For more information about accessing the video, see Reviewing your network hierarchy.
Supported environments for QRadar Use Case Manager
For the features in IBM QRadar products to work properly, you must use the supported
environments.
Supported versions of
QRadar
QRadar
Use Case QRadar
Manager
3.4.1
7.3.3 Fix Pack 6 or later
7.4.2 Fix Pack 3 or later
7.3.3 Fix Pack 6 or later
3.2.0 to 7.4.1 Fix Pack 2 or later
3.4.0
7.4.2 or later
QRadar
Use Case QRadar
Manager
Important: QRadar Use Case Manager 3.2.0 or later is not supported on QRadar 7.4.0.
3.1.0 or
7.3.2 or later
earlier
QRadar on Cloud
1.1.0 or
Important: You must use a SaaS Admin token during configuration, and assign the Security
later
Administrator role to your administrative users.
Supported browsers
The QRadar Use Case Manager app is supported on Google Chrome and Mozilla Firefox.
Supported languages
The following languages are supported based on QRadar user preferences: English, Simplified
Chinese, Traditional Chinese, French, German, Korean, Portuguese, Russian, Spanish, Italian, and
Japanese.
Installation and configuration checklist for QRadar Use Case Manager
As you install the IBM QRadar Use Case Manager app, review and complete all of the necessary
tasks on the installation checklist.
Installation and configuration checklist
for QRadar Use Case Manager
As you install the IBM® QRadar® Use Case Manager app, review and complete all of the necessary
tasks on the installation checklist.
•
•
•
•
•
•
•
•
Review the supported environments. See Supported environments for QRadar Use Case
Manager.
Ensure that you have an IBM ID. If you don't have one, you can sign up on the IBM
Security App Exchange (https://exchange.xforce.ibmcloud.com/hub).
Install the QRadar Use Case Manager app. See Installing QRadar Use Case Manager.
Create an authorized service token. See Creating an authorized service token.
Configure the use case explorer page. See Configuring QRadar Use Case Manager.
Assign user permissions. See Assigning user permissions for QRadar Use Case Manager.
Create custom report content templates. See Customizing report content templates
Create custom rule attributes. See Creating custom rule attributes.
•
•
•
•
•
•
•
•
•
•
•
•
Installing QRadar Use Case Manager
Use the IBM QRadar Extensions Management tool or the IBM QRadar Assistant app to install
the IBM QRadar Use Case Manager app on your QRadar Console.
Creating an authorized service token
Before you can configure the IBM QRadar Use Case Manager app, you must create an
authorized service token.
Configuring QRadar Use Case Manager
The Use Case Explorer uses QID records and DSM event-mapping information to help
determine rule coverage by log source type. The Use Case Explorer loads automatically, but
you can refresh the settings at any time. If required, configure a proxy connection, app
performance related to offenses, and tuning findings.
Assigning user permissions for QRadar Use Case Manager
After you install the IBM QRadar Use Case Manager app, you can share the app with nonadministrative users by adding it to a user role.
Customizing user preferences
Customizable user preferences include color themes, table row height options, and MITRE
ATT&CK platform support. Themes control the background color display for the IBM QRadar
Use Case Manager app. Table row height options reduce empty white space to control the
amount of data you can display in a table. Platform support affects MITRE ATT&CK
visualizations, and the contents of related filter controls.
Predefined report content templates
Predefined content templates define the filters and columns of the rule reports, including
column order and sorting options.
Customizing report content templates
The IBM QRadar Use Case Manager app includes several predefined content templates that
define the filters and columns of the rule reports, including column order and sorting
options. You can also create custom templates by using an existing template and modify it as
necessary, or create new ones.
Custom rule attributes
A custom rule attribute represents a specific piece of information that you can attach to a
rule that doesn't fit into existing rule attributes. For example, the use case the rule belongs
to, the team who is responsible for creating or maintaining the rule, or who reviewed the
rule.
Creating custom rule attributes
Create, edit, or delete custom rule attributes and their values. Then, you can assign the
custom attribute values to a rule and add the custom attribute as a report column on the Use
Case Explorer page. An attribute can be any string, and can have one or more values on the
rule.
Exporting and importing custom rule attributes
Export or import custom rule attribute data, including rule mappings, in a JSON file. Sharing
the data between colleagues or QRadar deployments helps to streamline your workflow by
eliminating work effort.
Upgrading QRadar Use Case Manager
To take advantage of new capabilities, defect fixes, and updated workflows, upgrade to new
versions of the IBM® QRadar® Use Case Manager app. Use either the Extensions
Management tool in IBM QRadar or the IBM QRadar Assistant app to upgrade the app.
Uninstalling QRadar Use Case Manager
Use the IBM QRadar Extensions Management tool to uninstall the IBM QRadar Use Case
Manager app from your QRadar Console.
MITRE ATT&CK mapping and visualization
The MITRE ATT&CK framework represents adversary tactics that are used in a security attack. It
documents common tactics, techniques, and procedures that can be used in advanced persistent
threats against enterprise networks.
The following phases of an attack are represented in the MITRE ATT&CK framework:
MITRE
ATT&CK
Tactic
Description
Collection
Gather data.
Command and Contact controlled systems.
Control
Credential
Access
Steal login and password information.
Defense
Evasion
Avoid detection.
Discovery
Figure out your environment.
Execution
Run malicious code.
Exfiltration
Steal data.
Impact
Tries to manipulate, interrupt, or destroy systems and data.
Initial Access
Gain entry to your environment.
Lateral
Movement
Move through your environment.
Persistence
Maintain foothold.
Privilege
Escalation
Gain higher-level permissions.
ReconnaissanceGather information to use in future malicious operations.
This tactic displays in the MITRE reports only when the PRE platform is selected in
your user preferences.
Resource
Development
Establish resources to support malicious operations.
This tactic displays in the MITRE reports only when the PRE platform is selected in
your user preferences.
Tactics, techniques, and sub-techniques
Tactics represent the goal of an ATT&CK technique or sub-technique. For example, an adversary
might want to get credential access to your network.
Techniques represent how an adversary achieves their goal. For example, an adversary might dump
credentials to get credential access to your network.
Sub-techniques provide a more specific description of the behavior an adversary uses to achieve
their goal. For example, an adversary might dump credentials by accessing the Local Security
Authority (LSA) Secrets.
Workflow for MITRE ATT&CK mapping and visualization
Create your own rule and building block mappings in IBM® QRadar® Use Case Manager, or
modify IBM QRadar default mappings to map your custom rules and building blocks to specific
tactics and techniques.
Save time and effort by editing multiple rules or building blocks at the same time, and by sharing
rule-mapping files between QRadar instances. Export your MITRE mappings (custom and IBM
default) as a backup of custom MITRE mappings in case you uninstall the app and then decide later
to reinstall it. For more information, see Uninstalling QRadar Use Case Manager.
After you finish mapping your rules and building blocks, organize the rule report and then visualize
the data through diagrams and heat maps. Current® and potential MITRE coverage data is available
in the following reports: Detected in timeframe report, Coverage map and report, and Coverage
summary and trend.
•
•
•
•
•
•
•
Editing MITRE mappings in a rule or building block
Create your own rule and building block mappings or modify IBM QRadar default mappings
to map your custom rules and building blocks to specific tactics and techniques.
Editing MITRE mappings in multiple rules or building blocks
Save time and effort by editing multiple rules or building blocks at the same time. Export
your mappings to a JSON file to share with other colleagues.
Sharing MITRE-mapping files
Save time and effort when mapping rules and building blocks to tactics and techniques by
sharing rule-mapping files between QRadar instances.
Visualizing MITRE tactic and technique coverage in your environment
Visualize the coverage of MITRE ATT&CK tactics and techniques that the rules provide
in IBM QRadar. After you organize the rule report, you can visualize the data through
diagrams and heat maps and export the data to share with others.
Visualizing MITRE coverage summary and trends
The MITRE summary and trend reports provide an overview of the different tactics that are
covered by QRadar Use Case Manager. You can analyze the summary data in table, bar, and
radar charts. Only the number of enabled mappings to enabled rules are counted in the
charts because disabled mappings don't contribute to your security posture.
Visualizing MITRE tactics and techniques that are detected in a specific timeframe
See which MITRE ATT&CK tactics and techniques were detected in your environment based
on the offenses that were updated within a specific timeframe. QRadar Use Case
Manager displays a list of the offenses and their related rules that were found within that
timeframe, along with the tactics and techniques that are mapped to those rules.
MITRE heat map calculations
The colors in the MITRE heat maps are calculated based on the number of rule mappings to a
tactic or technique plus the level of mapping confidence (low, medium, or high).
Investigating tuning findings
Sometimes, rules or building blocks might be incorrectly defined. Use the Tuning Finding report to
investigate whether the rule or building block needs to be edited for more robust information, or if
the rule is working as designed. Then, you can hide the finding if it’s not relevant (for example you
set the rule up that way) or is a false positive.
Sometimes, rules or building blocks might be incorrectly defined. Use the Tuning Finding
report to investigate whether the rule or building block needs to be edited for more robust
information, or if the rule is working as designed. Then, you can hide the finding if it’s not
relevant (for example you set the rule up that way) or is a false positive.
About this task
IBM® QRadar® Use Case Manager detects the following findings and displays them in the report:
Disabled custom property
The rule references a disabled custom property. A custom property expression is disabled if the
custom property expression has performance problems. Rules, reports, or searches that use this
property, and which rely on the disabled expression to populate it, stop working properly.
Disabled dependency
Disabled rules prevent all the data from being detected, and stop the rest of the rule-dependent chain
from triggering properly.
Empty reference set
A reference set contains unique values that you can use in searches, filters, rule test conditions, and
rule responses. An empty reference set doesn’t have the criteria to trigger the rule properly.
Host definition uses only the default IP value
The host definition linked to the rule should not be the default value; otherwise, the rule won't work,
because incoming logs use the IP addresses and host information that aren't the default value
(127.0.0.1).
Host definition uses only the default value for destination IP
The destination IP that is linked to the rule should not be the default IP. If a content pack update
changes any of the IP addresses in the rules, some dependent rules might not work. Go to the
BB's Host Definition page to check each dependent.
Host definition uses only the default value for source IP
The source IP that is linked to the rule should not be the default IP. If a content pack update changes
any of the IP addresses in the rules, some dependent rules might not work. Go to the BB's Host
Definition page to check each dependent.
No original system rule
The rule has an Override origin but no linked original System rule, which can occur if the System rule
is deleted by mistake. QRadar Use Case Manager cannot open the rule.
Orphaned building block
The building block has no dependents. Building blocks group commonly used tests and can contain
important information about your organization. For example, you might create a building block that
includes the IP addresses of all mail servers in your network, then use that building block in another
rule to exclude those hosts. An orphaned BB is not referenced by any rules, which can result in
important information that is excluded from searches. Delete the building block or reference it by
another rule.
Rule uses performance-intensive tests that are not at the end of the test list.
Rule performance might not be optimal because the rule contains regex, payload, counter or
sequence tests that are not at the end of the list. Make sure that these definitions are at the end of the
test list so that they run only if all other tests in the list pass.
Rule performance may not be best when reference sets have too many elements.
On the Configuration page, set the number of reference set elements that trigger a finding if
the number is exceeded. The default is 5000.
Procedure
1. From the QRadar Use Case Manager main menu, click Tuning Finding Report.
2. To scan for updated rule findings from IBM QRadar, click the Refresh findings report icon.
It might take a few minutes to update the report.
Tip: The scan results automatically update overnight. Update the rules manually when you
make changes and you want to verify that they updated correctly in QRadar Use Case
Manager.
3. Sort the Tuning Finding column to investigate similar finding types together.
4. To hide findings in the report, select the checkboxes for the relevant findings and click Hide
findings.
The selected tuning findings are flagged as hidden. When you hide a finding, the tuning
findings don't appear in the rule details for the rule when you access it from any other
report. Any warning icons for the rule are also hidden in other reports the rule might appear
in.
5. Fine-tune the view by showing or hiding the selected findings.
Click Show hidden findings to see all the findings in the report.
6. To clear the hidden flags from a finding so that you always see it in the report, click Show
hidden findings. Select the checkboxes for the relevant findings, and then click Remove
hidden flag.
The hidden findings are updated to display in the report.
7. Click the rule name to further investigate and edit if necessary on the Rule Details page. Full
details appear in the Tuning Finding section.
a. Click Edit in rule wizard to make your changes. For example, if a rule is enabled but
a rule in its dependency tree is disabled, you can enable it in the rule wizard.
b. Select the finding and click Hide findings.
c. In the Tuning Finding report, click the refresh icon to update the report display.
8. After you make your changes, refresh the report to see that your changes are implemented.
Accessing report data by using APIs
As an alternative to using the interface in IBM QRadar Use Case Manager, you can use APIs to
interact with the data. Use the interactive API documentation interface to test the APIs before you
use them.
About this task
The following public APIs are available for use:
•
•
•
Use Case Explorer: Generate and download report data in CSV or JSON formats.
Log Source Coverage: Get information about rule-log source type activity and coverage.
MITRE Endpoints: Get information about rule mappings. Create custom adversary groups
and map them to existing tactics and techniques. Upload custom MITRE group-technique
files.
Tip: Make sure that the mapping file is in JSON format and contains the following data
format:
{ "Technique_ID_1": ["group1"], "Technique_ID_2": ["group1", "group2"] }
Each time you upload a custom mapping file, the previous file is replaced.
•
Tuning Findings: Get information about tuning findings.
Procedure
1. From the Admin tab, click Apps > QRadar Use Case Manager > API Docs.
2. Select an endpoint and click Try it out.
3. Click Execute to send the API request to your console and receive a properly formatted
HTTPS response.
4. Review and gather the information that you need to integrate with QRadar.
•
•
•
Public API endpoints
IBM QRadar Use Case Manager provides APIs that you can use to interact with the data.
Public Use Case Manager API workflows
Use these workflows to download report data to CSV or JSON files. For JSON format, you can
choose to generate a paginated format or a full report. Paginated files are useful for places
where you need JSON, like the user interface, and you need to paginate through the results.
You can request page by page and not the whole result set. Full report files are faster to
download than the JSON body, but pagination is not available in the file download format.
Downloading report data
•
•
•
Example API workflow script
Use the script in this example to download a Use Case Explorer report in CSV format.
Use Case Explorer filters
Use these filters in the example script to download a Use Case Explorer report in CSV format.
Report column codes for report APIs
Use the report column codes in the tables in the following APIs: POST
/api/use_case_explorer/{reportId}/download_csv, POST
/api/use_case_explorer/{reportId}/download_json, or GET
/api/use_case_explorer/{reportId}/result.
Servers and building blocks
IBM® QRadar® automatically discovers and classifies servers in your network, providing a faster
initial deployment and easier tuning when network changes occur.
To ensure that the appropriate rules are applied to the server type, you can add individual devices or
entire address ranges of devices. You can manually enter server types that do not conform to unique
protocols into their respective Host Definition Building Block. For example, adding the following server
types to building blocks reduces the need for further false positive tuning:
•
•
•
•
Add network management servers to the BB:HostDefinition: Network Management
Servers building block.
Add proxy servers to the BB:HostDefinition: Proxy Servers building block.
Add virus and Windows update servers to the BB:HostDefinition: Virus Definition and
Other Update Servers building block.
Add vulnerability assessment (VA) scanners to the BB-HostDefinition: VA Scanner Source
IP building block.
The Server Discovery function uses the asset profile database to discover several types of servers
on your network. The Server Discovery function lists automatically discovered servers and you can
select which servers you want to include in building blocks.
Using Building blocks, you can reuse specific rule tests in other rules. You can reduce the number of
false positives by using building blocks to tune QRadar and enable extra correlation rules.
•
Adding servers to building blocks automatically
The Server Discovery function uses the asset profile database to discover different server
types that are based on port definitions. Then, you can select the servers to add to a servertype building block for rules.
Procedure
1. Click Assets > Server Discovery.
2. In the Server Type list, select the server type that you want to discover.
Keep the remaining parameters as default.
3. Click Discover Servers.
4. In the Matching Servers pane, select the checkbox of all servers you want to assign to
the server role.
5. Click Approve Selected Servers.
Remember: You can right-click any IP address or host name to display DNS
resolution information.
•
Adding servers to building blocks manually
If a server is not automatically detected, you can manually add the server to its
corresponding Host Definition Building Block.
Procedure
1.
2.
3.
4.
Click the Offenses tab.
In the navigation pane, click Rules.
In the Display list, select Building Blocks.
In the Group list, select Host Definitions.
The name of the building block corresponds with the server type. For
example, BB:HostDefinition: Proxy Servers applies to all proxy servers in your
environment.
5. To manually add a host or network, double-click the corresponding Host Definition Building
Block appropriate to your environment.
6. In the Building Block field, click the underlined value for the source or destination IP
address.
7. In the Enter an IP address or CIDR field, type the host names or IP address ranges that you
want to assign to the building block.
8. Click Add > Submit.
9. Click Finish.
10. Repeat these steps for each server type that you want to add.
TASK: 4.3 Manage content packs
SUBTASKS:
4.3.1. Understand the types of security content
4.3.2. Install extensions using extensions management
4.3.3. Synchronize dashboard templates from content extensions
4.3.4. Uninstall a content extension
4.3.5. Install Threat Monitoring extensión
QRadar Assistant app
Use the IBM® QRadar® Assistant app to manage your app and content extension inventory, view
app and content extension recommendations, follow the QRadar Twitter feed, and get links to
useful information.
Tip: After upgrading the QRadar Assistant app, you may need to clear your browser cache to see the new
Assistant app icon and application content.
Attention: Use Extensions Management rather than the QRadar® Assistant app to manage extensions that
have dependencies.
The QRadar Assistant app consists of the following sections:
Guide Center
The QRadar Assistant Guide Center is a central point that links to a wide collection
of QRadar information resources. From the Guide Center, you can view tuning and use cases videos
that are recorded by QRadar experts, watch previously recorded open mic sessions, access a wide
variety of QRadar technical tips, view IBM Security Community information, and watch video
tutorials provided by IBM Learning Academy.
Featured Applications
Featured applications are the most recently recommended applications that are featured by IBM.
Twitter and Support
View the IBM QRadar Twitter feed from IBMSecurity (https://twitter.com/IBMSecurity).
Support Forum
View the latest QRadar related questions from IBM developerWorks forums.
Applications page
Search, sort, and filter available apps by various categories. You can see a quick view of the app,
then expand to see the full description and download the app. See which apps have updates
available.
When you select an app to download, it appears in the download drawer.
Open the drawer to see a list of apps that are queued for download or installation. You can
place up to five apps in the download queue at one time. To keep the download drawer open,
click the pin icon.
From Version 2.3.0, you can also view the list of currently installed QRadar extensions and
contents.
Watson Integration
On the Watson Integration page, you can learn how the IBM QRadar Advisor with Watson works
with QRadar to investigate and respond to threats. You can review requirements for
your QRadar system to install and run the Advisor app. You can also download and
install QRadar Advisor with Watson directly from the Assistant app.
For more information about QRadar Advisor with Watson, see the Advisor documentation
here: https://www.ibm.com/docs/en/qradar-common?topic=apps-qradar-advisor-watsonapp
•
•
•
•
•
•
•
•
Configuring the QRadar Assistant app
The QRadar Assistant app is included in QRadar installations of version 7.3.1 and later. You
can download the app from the IBM Security App
Exchange (https://exchange.xforce.ibmcloud.com/) for those versions. An Admin user must
configure certain options to enable the Assistant app in your QRadar environment.
Managing installed extensions
You can use the Installed section on the Applications page to view and manage currently
installed QRadar extensions and contents.
Managing multitenant apps
IBM QRadar Assistant app 3.0.0 supports multitenant environments in QRadar 7.4.0 Fix Pack
1 or later.
Downloading apps with the QRadar Assistant app
On the Applications page, you can download and install apps from the IBM X-Force®
Exchange.
Phone Home
QRadar Assistant app V 1.1.5 and later include a new Phone Home feature, which
anonymously shares data with the IBM X-Force Exchange to monitor QRadar and detect
issues early.
Configure URL access on firewalls
If your IBM QRadar Console is behind a restricted firewall, you must allow traffic to specific
URLs to use the full features of the Assistant app.
Running the Assistant app in offline mode
Admin can run the QRadar Assistant app V3.1.0 or later in offline mode to manage installed
extensions.
Installing extensions by using an admin level authorized service token
Administrators can create an admin level authorized service token that enables IBM QRadar
Assistant to install extensions in the background.
Types of security content
IBM® QRadar® content is bundled into two types: content packs and extensions.
Content packs
Security content packs contain enhancements to specific types of security content. Often,
they include content for third-party integrations or operating systems. For example, a
security content pack for a third-party integration might contain new custom event
properties that make information in the event payload searchable for the log source and
available for reporting.
Extensions
IBM and other vendors write security extensions that enhance or extend QRadar capabilities.
An extension can contain apps, content items, such as custom rules, report templates, saved
searches, or contain updates to existing content items. For example, an extension might
include an app to add a tab in QRadar that provides visualizations for an offense.
On IBM Security App Exchange, extensions are known as apps. You can
download QRadar apps from IBM Security App Exchange and use the Extensions
Management tool to install them. Apps are not available as part of an auto-update.
Sources of security content
QRadar content is available from the following sources:
IBM Security App Exchange
IBM Security App Exchange (https://apps.xforce.ibmcloud.com) is an app store and portal where
you can browse and download QRadar extensions. It is a new way to share code, visualizations,
reports, rules, and applications.
IBM Fix Central
IBM Fix Central (www.ibm.com/support/fixcentral) provides fixes and updates to your system
software, hardware, and operating system. You can download security content packs and
extensions from IBM Fix Central.
QRadar deployments
You export custom content from a QRadar deployment as an extension and then import it into
another system when you want to reuse the content. For example, you can export content from
your development environment to your production environment. You can use the content
management script to export all content, or you can choose to export only some custom content.
Installing extensions by using Extensions
Management
Use the Extensions Management tool to add security extensions to IBM® QRadar®. The Extensions
Management tool allows you to view the content items in the extension and specify the method of
handling content updates before you install the extension.
Before you begin
Extensions must be on your local computer before you install them in QRadar.
You can download QRadar extensions from the IBM Security App
Exchange (https://apps.xforce.ibmcloud.com/) and from IBM Fix
Central (www.ibm.com/support/fixcentral/).
About this task
An extension is a bundle of QRadar functions. An extension can include content such as rules,
reports, searches, reference sets, and dashboards. It can also include applications that enhance
QRadar functions.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Extensions Management.
3. To upload a new extension to the QRadar console, follow these steps:
a. Click Add.
b. Click Browse and navigate to find the extension.
c. Optional: Click Install immediately to install the extension without viewing the
contents. Go to 5.b.
d. Click Add.
4. To view the contents of the extension, select it from the extensions list and click More
Details.
5. To install the extension, follow these steps:
a. Select the extension from the list and click Install.
b. To assign a user to the app, select the User Selection menu, and select a user.
For example, you might want to associate the app with a specified user that is listed
in the User Selection menu who has the defined permissions.
Note:
This screen appears only if any of the apps in the extension that you are installing are
configured to request authentication for background processes.
c. If the extension does not include a digital signature, or it is signed but the signature is
not associated with the IBM Security Certificate Authority (CA), you must confirm
that you still want to install it. Click Install to proceed with the installation.
d. Review the changes that the installation makes to the system.
e. Select Preserve Existing Items or Replace Existing Items to specify how to handle
existing content items.
Note: If the extension contains overridden system rules, select Replace Existing
Items to ensure that the rules are imported correctly.
f. Click Install.
g. Review the installation summary and click OK.
IBM QRadar Security Threat
Monitoring Content Extension
The IBM® QRadar® Security Threat Monitoring Content Extension on the IBM Security App
Exchange (https://exchange.xforce.ibmcloud.com/hub) contains rules, building blocks, and custom
properties that are intended for use with X-Force® feed data.
The X-Force data includes a list of potentially malicious IP addresses and URLs with a
corresponding threat score. You use the X-Force rules to automatically flag any security event or
network activity data that involves the addresses, and to prioritize the incidents before you begin to
investigate them.
The following list shows examples of the types of incidents that you can identify using the X-Force rules:
•
•
•
when the [source IP|destinationIP|anyIP] is part of any of the
following [remote network locations]
when [this host property] is categorized by X-Force as [Anonymization
Servers|Botnet C&C|DynamicIPs|Malware|ScanningIPs|Spam] with
confidence value [equal to] [this amount]
when [this URL property] is categorized by X-Force
as [Gambling|Auctions|Job Search|Alcohol|Social Networking|Dating]
QRadar downloads approximately 30 MB of IP reputation data per day when you enable the XForce Threat Intelligence feed for use with the IBM QRadar Security Threat Monitoring Content
Extension.
Installing the IBM QRadar Security Threat Monitoring Content Extension application
The IBM QRadar Security Threat Monitoring Content Extension application contains IBM
QRadar content, such as rules, building blocks, and custom properties, that are designed specifically
for use with X-Force data. The enhanced content can help you to identify and to remediate
undesirable activity in your environment before it threatens the stability of your network.
Before you begin
Download the IBM QRadar Security Threat Monitoring Content Extension application from the IBM Security
App
Exchange (https://exchange.xforce.ibmcloud.com/hub/extension/IBMQRadar:IBMContentPackageInternalThreat
).
About this task
To use X-Force data in QRadar rules, offenses, and events, you must configure IBM QRadar to
automatically load data from the X-Force servers to your QRadar appliance.
To load X-Force data locally, enable the X-Force Threat Intelligence feed in the system settings. If
new information is available when X-Force starts, the IP address reputation or URL database is
updated. These updates are merged into their own databases and the content is replicated from
the QRadar Console to all managed hosts in the deployment.
The X-Force rules are visible in the product even if the application is later uninstalled.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Extensions Management.
3. Upload the application to the QRadar console by following these steps:
a. Click Add.
b. Click Browse to find the extension.
c. Optional: Click Install immediately to install the extension without viewing the
contents.
d. Click Add.
4. To view the contents of the extension, select it from the extensions list and click More
Details.
5. To install the extension, follow these steps:
a. Select the extension from the list and click Install.
b. If the extension does not include a digital signature, or it is signed but the signature is
not associated with the IBM Security certificate authority (CA), you must confirm that
you still want to install it. Click Install to proceed with the installation.
c. Review the changes that the installation makes to the system.
d. Select Overwrite or Keep existing data to specify how to handle existing content
items.
e. Click Install.
f. Review the installation summary and click OK.
The rules appear under the Threats group in the Rules List window. They must be
enabled before they are used.
Synchronizing dashboard templates from
content extensions
Administrators synchronize dashboard templates that are included in content extensions or apps.
For example, the QRadar® DNS Analyzer app contains a dashboard that helps SOC analysts identify
DNS trends and investigate suspicious activities such as squatting attempts. After the dashboard
templates are synchronized, users can use the dashboards in their own workspace.
Before you begin
A content extension with a QRadar Pulse dashboard must be installed. For more information,
see Installing content extensions to use in QRadar Pulse.
Procedure
1. On the Admin tab, go to Apps > Pulse - Dashboard and click the Pulse - Dashboard app
icon.
2. On the Pulse Dashboard Templates page, click Synchronize to set the new or updated
dashboard content in QRadar Pulse, and then close the page.
Uninstalling a content extension
Remove a content extension that isn't useful anymore or that adversely impacts the system. You
can remove rules, custom properties, reference data, and saved searches. You might not be able to
remove some content if another content item depends on it.
About this task
When you uninstall a content extension, any rules, custom properties, and reference data that were
installed by the content extension are removed or reverted to their previous state. Saved searches
can't be reverted. They can only be removed.
For example, if you've edited custom rules in an app that you now want to uninstall, you can
preserve the changes you made for each customized rule. If the custom rule previously existed on
the system, you can revert the rule to its previous state. If the custom rule didn't previously exist,
you can remove it.
Note:
If you have introduced an outside dependency on a content extension that is installed by the
app, QRadar® doesn't remove that piece of content when you uninstall the app. For example, if you
create a custom rule that uses one of the app's custom properties, that custom property isn't
removed when you uninstall the app.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Extensions Management.
3. Select the extension that you want to uninstall and click Uninstall.
QRadar checks for any applications, rules, custom properties, reference data, and saved
searches that are installed by the content extension that can be removed.
4. If you have manually altered any rules, custom properties, or reference data after you
installed the app, choose whether to Preserve or Remove/Revert that content extension.
5. Click Uninstall, and then click OK.
TASK: 4.4 Distinguish native information sources
SUBTASKS:
4.4.1. Manage remote networks and remote services
4.4.2. Install and manage the QRadar Threat Intelligence app
4.4.3. Configure a threat feed to populate a reference set
4.4.4. Review network hierarchy
4.4.5. Understand building blocks role
Threat intelligence feeds
Threat intelligence feeds are a continuous stream of threat data that is sent to a SIEM. Security
analysts then analyze them for potential global threats and attacks and plan remediation actions.
Adding threat intelligence feeds
You can add and configure the threat intelligence feeds you want to add to QRadar.
Before you begin
You must configure an authorized service token before you can configure a TAXII feed. See Configuring the
Threat Feeds Downloader.
Procedure
1. From the navigation menu on the Threat Intelligence dashboard, click the Feeds
Downloader icon (
).
2. Click
Add Threat Feed, and then click Add TAXII Feed.
3. On the Add TAXII Feed window, click the Connection tab, and configure the following
options:
Option
Description
TAXII
Endpoint
Type the URL of the TAXII server you want to use.
Existing TAXII endpoints in your deployment appear in a list. If you choose an
existing endpoint, the corresponding options are prepopulated.
Note: For getting collections from TAXII 2.0 servers, see TAXII™ API - Collections.
Option
Description
Version
Select either TAXII 1.x orTAXII 2.0.
AuthenticationSelect the authentication that you want to use and complete the corresponding
Method
options based on your choice.
The available authentication method varies depending on the TAXII version you
select.
o
o
Client
Certificate
Client Key
TAXII 1.x: None, HTTP Basic, JSON Web Token.
TAXII 2.0: None, HTTP Basic.
If you want to use a client certificate with the TAXII server, click Choose file in
the Client Certificate area to select the file you want to upload. Only the .pem file
type is supported.
If your client certificate requires a key file, click Choose file in the Client Key area
to browse to the file's location and upload it.
4. Click Discover.
5. On the Add TAXII Feed window, click the Parameter tab, and configure the following
options:
Option
Description
Collections
Observable
Type
Polling
Intervals
Poll Initial
Date
Reference
Set
The TAXII data collection set you want use.
An observable is a STIX schema component that specifies a suspicious object.
Only observables of this type are used. All others are ignored.
How often QRadar Threat Intelligence polls the TAXII server. The default
polling interval is hourly.
The time period that is covered by the initial poll. You can choose to poll data
in increments of minutes, hours, or daily.
If you want to add elements that are based on a new TAXII feed to a dedicated
reference set, you must set it up in advance. For more information about
reference sets, see the IBM QRadar Administration Guide.
6. Click Add. You can add unlimited multiple collections to the same TAXII endpoint, or you can
continue to create this feed.
7. When you finish creating the feeds, click Next.
8. On the Add TAXII Feed window, click the Summary tab to check your configuration
parameters before you implement the threat intelligence feed, and then click Save.
Results
The threat feed collections display on the Threat Feeds Downloader page. The Am I Affected feature
compares STIX/TAXII feed indicators that are stored in the reference set with QRadar logs. Matches are
displayed on the event list. Click the View Result icon
to see the events.
Editing threat intelligence feeds
You can edit the threat intelligence feeds that exist in the IBM QRadar UI.
Procedure
1. On the Threat Intelligence page, click Edit for the feed you want to change.
2. On the Edit a TAXII Feed page, enter your Password. Make your changes, such as
uploading a client certificate or client key, and click Discover.
3. On the Parameters tab, make your changes and click Next through each configuration page
until you get to the end of the wizard.
Note: If you plan to change the reference set or the collection in the Parameters tab, these
changes affect only polling that is run going forward from the date of the edit. Data from
previous polling isn't affected. In this case, create a new threat feed instead.
4. Click Save, and close the Threat Intelligence page.
5. On the Admin tab, click Deploy Changes.
Creating rule actions
You can create rule actions that post information on threats on your system to a TAXII inbox
service.
Procedure
1. From the Admin tab, click Apps > Threat Intelligence, and click the STIX/TAXII
Configuration icon.
2. Click Create Rule Action > Create A TAXII Rule Action.
3. On the Connection tab of the Create TAXII Rule Action window, enter the URL of the TAXII
Endpoint you want to upload to.
Existing TAXII Endpoints in your deployment appear in a list. When you choose an existing
endpoint, the corresponding Authentication Method, Client Certificate, and Ignore
Certificate options are prepopulated.
4. Select the relevant Authentication Method and add the Username and Password for basic
HTTP authentication or a token string for JSON Web Token authentication.
5. If you want to use a client certificate with the TAXII inbox service, click Choose File to locate
the certificate on your system, and upload it to QRadar®. Only the .pem file type is
supported.
6. If you want to add a key file, click Choose File to locate the key on your system, and upload
it to QRadar.
7. On the Parameters tab, use the following guidelines to define the rule action parameters.
o Enter the name of the TAXII inbox service that you want to post event data to in
the Collection field.
o Enter values for the Indicator Source Name and the Action Name.
o Select a network event property from the Property lists.
Network event properties are dynamic Ariel properties that are generated by events.
For example, the network event property sourceip provides a parameter that
matches the source IP address of the triggered event. Parameters are passed to the
rule in the order in which you added them.
For more information about Ariel properties, see the IBM® QRadar Ariel Query
Language Guide.
o
Select the STIX observable type and indicator type relevant to the threat from
the Indicator type lists.
Select the observable type appropriate to the event you want post to the TAXII
server. No validation is done on the custom response by QRadar.
8. Click Save.
9. On the Admin tab main toolbar, click Deploy Changes.
The rule actions that you create are added to the QRadar Custom Actions window.
Click Define Actions on the Admin tab to view. You can edit or delete a rule action from
the Custom Actions window and the changes are reflected in the Threat Intelligence app.
Editing configured rule actions
You edit rule actions that post information on threats on your system to a TAXII inbox service.
Procedure
1. In the Configured Rule Actions section of the page, click Edit for the rule action you want
to modify.
2. On the Connection tab in the Edit a TAXII Rule Action window, enter your Password, and
click Discover.
3. Make your changes and click Next through each configuration window until you get to the
end of the wizard.
4. Click Save, and close the Threat Intelligence page.
5. On the Admin tab, click Deploy Changes.
Polling TAXII feeds
To maximize performance, TAXII feeds can poll only one feed at a time, but you can override the
polling interval if necessary.
1. From the navigation menu on the Threat Intelligence dashboard, click the Feeds
Downloader icon (
).
2. In the Configured Threat Intelligence Feeds section, click Poll Now on the relevant feed to
override the predefined polling interval.
The polling start time, date, and status displays during polling. The end date displays after
the polling is finished.
Refetching data from TAXII data collections
If you recently started to follow a new XFE Public Collections I follow collection, you
can refetch all its previous data. Without refetching, you get only the data added to the collection
from the time you started to follow it.
About this task
If you choose to refetch the data from a specific date, the following conditions apply:
•
•
•
That date is set as the new start date for the feed.
The signature counts are reset to 0.
Data that is already collected by this feed remains intact in the reference set.
Procedure
1.
2.
3.
4.
Click the Admin tab.
Click Plug-ins > Threat Intelligence > STIX/TAXII Configuration.
In the Configured Threat Intelligence Feeds section, click Refetch on the relevant feed.
On the Refetch data page, select the timeframe for refetching the data, and click Refetch.
QRadar Threat Intelligence app
IBM® QRadar® Threat Intelligence pulls in threat intelligence feeds by using the open standard
STIX and TAXII formats, and to deploy the data to create custom rules for correlation, searching,
and reporting. For example, you can use the app to import public collections of dangerous IP
addresses from IBM X-Force Exchange and create a rule to raise the magnitude of any offense that
includes IP addresses from that watch list.
Beginning with version 2.0.0 of the app, you can search for and browse Recent Collections, EarlyWarning Collections, Public Collections, and view IBM Advanced Threat Protection Feeds in the
Threat Intelligence dashboard on the QRadar Console. You can also configure settings to conduct
scanning in your QRadar environment to see whether any threats that are identified in X-Force
Exchange collections can affect your environment.
Note:
•
You must have IBM Advanced Threat Protection Feed license to use associated
capabilities such as the Am I Affected scan.
For more information about the Trusted Automated Exchange of Intelligence Information (TAXII™),
see the Introduction to TAXII website (https://oasis-open.github.io/ctidocumentation/taxii/intro).
For more information about the Structured Threat Information Expression (STIX™) language that is
used by TAXII, see the Introduction to STIX website (https://oasis-open.github.io/ctidocumentation/stix/intro).
•
•
•
What's new in QRadar Threat Intelligence
Learn about the new features in each IBM QRadar Threat Intelligence app release.
Known issues
Learn about the known issues in each QRadar Threat Intelligence app release.
Supported threat languages and specifications
IBM QRadar Threat Intelligence supports different methods for sharing threat intelligence
information.
QRadar Threat Intelligence is supported on QRadar 7.4.3 or later.
The following table lists the supported versions of threat languages and specifications.
Threat
language or Supported version
specification
STIX
1.2
TAXII
1.1
Table 1. Supported threat languages and specifications
Note:
IBM QRadar Threat Intelligence does not support SWIFT feeds due to the extra
authentication process required by the SWIFT feeds compared to normal feeds.
•
•
•
•
QRadar Threat Intelligence installation checklist
As you install IBM QRadar Threat Intelligence, review and complete all of the necessary
tasks on the installation checklist.
Threat Intelligence dashboard
Use the IBM QRadar Threat Intelligence dashboard to pull the IBM Advanced Threat
Protection Feed from IBM X-Force Exchange through the HTTPS protocol. The encryption is
used for the HTTPS communication between the app and X-Force Exchange.
Threat intelligence feeds
Threat intelligence feeds are a continuous stream of threat data that is sent to a SIEM.
Security analysts then analyze them for potential global threats and attacks and plan
remediation actions.
Troubleshooting QRadar Threat Intelligence
Use the troubleshooting and support information to isolate and resolve problems with IBM
QRadar Threat Intelligence.
Reviewing your network hierarchy
A well-defined and maintained network hierarchy can help prevent the generation of false positive
offenses. The network hierarchy is used to define which IP addresses and subnets are part of your
network. Ensure that all internal address spaces, both routable and non-routable, are defined
within your IBM® QRadar® network hierarchy. QRadar can then distinguish your local network
from the remote network. Event and flow context is based on whether the source and destination
IPs are local or remote. Event and flow context, and data from your network hierarchy are used in
rule tests.
Procedure
1. From the navigation menu, click Network Hierarchy.
2. Optional: Watch tuning videos to learn more about your network hierarchy and how to keep
it up to date.
3. Check the network hierarchy list to see which parts of your network hierarchy are not yet
updated.
4. Check for R2R (Remote to Remote) events. The report identifies events with R2R direction
or context. When an event has R2R direction, both its source and destination IPs are remote
and aren’t part of your local network. It means that there’s external traffic from a remote
network to another remote network, and indicates a possible network hierarchy
misconfiguration.
a. Consider whether either one or both of the event IPs are local and add them to the
network hierarchy.
b. Use the Source IP, Source Company, Destination IP, and Destination
Company columns in the report to identify IPs that are local to your network.
c. After you identify the local IP addresses, either add them from the Network
Hierarchy page from the Admin tab or select them in the report to add them in the
app.
d. On the Admin tab, click Deploy changes.
5. Explore the rules that use your network hierarchy either directly or indirectly. Review and
update any rules or building blocks that are out of date.
a. To review rules in detail, select one from the list and then zoom in on the diagram.
Drag the rule and BB icons on the pane.
b. In the right pane of the window, click List view and then toggle between filtered BBs
and non-filtered BBs to fine-tune the list. "Filtered BBs" displays the dependencies for
the selected rule that have network tests. "All BBs" displays all the BBs that are used
by the selected rule.
c. Click Show dependency tree to see the dependencies and the dependents of the
selected BB.
Dependencies are referenced by the selected building block either directly or
indirectly. If you update any of the dependencies, the building block is affected.
Dependents reference the selected BB either directly or indirectly. If you update the
building block, its dependents are affected.
Remote networks and services configuration
Use remote network and service groups to represent traffic activity on your network for a specific
profile. Remote networks groups display user traffic that originates from named remote networks.
All remote network and service groups have group levels and leaf object levels. You can edit remote
network and service groups by adding objects to existing groups or changing preexisting properties
to suit your environment.
If you move an existing object to another group, the object name moves from the existing group to
the newly selected group. However, when the configuration changes are deployed, the object data
that is stored in the database is lost and the object ceases to function. To resolve this issue, create a
new view and re-create the object that exists with another group.
You can group remote networks and services for use in the custom rules engine, flow, and event
searches. You can also group networks and services in IBM® QRadar® Risk Manager, if it is
available.
Default remote network groups
IBM QRadar includes default remote network groups.
Group
Description
Specifies traffic that originates from BOT applications.
BOT
Bogon
HostileNets
Neighbours
For more information, see Botnet Command and Control drop rules on the
Emerging Threats
website (http://rules.emergingthreats.net/blockrules/emerging-botcc.rules)
Specifies traffic that originates from unassigned IP addresses.
For more information, see bogon reference on the Team CYMRU
website (http://www.team-cymru.org/Services/Bogons/bogon-bn-nonagg.txt).
Specifies traffic that originates from known hostile networks.
HostileNets has a set of 20 (rank 1 - 20 inclusive) configurable CIDR ranges.
For more information, see HostileNets reference on the DShield
website (http://www.dshield.org/ipsascii.html?limit=20)
Specifies traffic that originates from nearby networks that your organization has
network peering agreements with.
This group is blank by default. You must configure this group to classify traffic that
originates from neighboring networks.
Specifies traffic that originates from smurf attacks.
Smurfs
Superflows
A smurf attack is a type of denial-of-service attack that floods a destination system
with spoofed broadcast ping messages.
This group is non-configurable.
A superflow is a flow that is an aggregate of a number of flows that have a similar
predetermined set of elements.
Group
Description
Specifies traffic from trusted networks, including business partners that have
remote access to your critical applications and services.
TrustedNetworksThis group is blank by default.
Watchlists
You must configure this group to classify traffic that originates from trusted
networks.
Classifies traffic that originates from networks that you want to monitor.
This group is blank by default.
Table 1. Default remote network groups
Groups and objects that include superflows are only for informational purposes and cannot be
edited. Groups and objects that include bogons are configured by the automatic update
function.
Note: You can use reference sets instead of remote networks to provide some of this functionality. Although
you can assign a confidence level to an IP value in a reference table, reference sets are used only with single
IPs and cannot be used with CIDR ranges. You can use a CIDR value after a remote network update, but not
with weight or confidence levels.
Default remote service groups
IBM QRadar includes the default remote service groups.
The following table describes the default remote service groups.
Parameter
IRC_Servers
Description
Specifies traffic that originates from addresses commonly known as chat servers.
Specifies traffic that originates from addresses commonly known online services
Online_Services
that might involve data loss.
Specifies traffic that originates from addresses commonly known to contain explicit
Porn
pornographic material.
Proxies
Specifies traffic that originates from commonly known open proxy servers.
Reserved_IP_
Specifies traffic that originates from reserved IP address ranges.
Ranges
Specifies traffic that originates from addresses commonly known to produce SPAM
Spam
or unwanted email.
Specifies traffic that originates from addresses commonly known to contain
Spy_Adware
spyware or adware.
Specifies traffic that originates from addresses commonly known to produce
Superflows
superflows.
Specifies traffic that originates from addresses commonly known to contain pirated
Warez
software.
Table 1. Default remote network groups
Guidelines for network resources
Given the complexities and network resources that are required for IBM QRadar SIEM in large
structured networks, follow the suggested guidelines.
The following list describes some of the suggested practices that you can follow:
•
Bundle objects and use the Network Activity and Log Activity tabs to analyze your network
data.
Fewer objects create less input and output to your disk.
•
Typically, for standard system requirements, do not exceed more than 200 objects per
group.
More objects might impact your processing power when you investigate your traffic.
Managing remote networks objects
After you create remote network groups, you can aggregate flow and event search results on
remote network groups. You can also create rules that test for activity on remote network groups.
Use the Remote Networks window, you can add or edit a remote networks object.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the Remote Networks and Services Configuration section, click Remote Networks
and Services.
3. To add a remote networks object, click Add and enter values for the parameters.
4. To edit a remote networks object, follow these steps:
a. Double-click the group name.
b. Select the profile and click the edit icon ( ) to edit the remote profile.
5. Click Save.
6. Click the previous icon ( ) to go back to the Remote Networks and Services window .
7. On the Admin tab, click Deploy Changes.
Managing remote services objects
Remote services groups organize traffic that originates from user-defined network ranges or
the IBM automatic update server. After you create remote service groups, you can aggregate flow
and event search results, and create rules that test for activity on remote service groups.
Use the Remote Services window to add or edit a remote services object.
Procedure
1. On the navigation menu (
), click Admin.
2. In the Remote Networks and Services Configuration section, click Remote Networks
and Services.
3. To add a remote services object, click Add and enter the parameter values.
4. To edit a remote services object, click the group that you want displayed, click the Edit icon
and change the values.
5. Click Save.
6. Click Return.
7. Close the Remote Services window.
8. On the Admin tab menu, click Deploy Changes.
TASK: 4.5 Configure integrations
SUBTASKS:
4.5.1. Configure MaxMind
4.5.2. Manage X-Force integration
4.5.3. Install and configure IBM X-Force Exchange plug-in for QRadar
4.5.4. Enable the X-Force Threat Intelligence feed
IBM X-Force integration
IBM®X-Force® security experts use a series of international data centers to collect tens of thousands of
malware samples, analyze web pages and URLs, and run analysis to categorize potentially malicious IP
addresses and URLs. IBM X-Force Exchange is the platform for sharing this data, which can be used in IBM
QRadar®.
X-Force Threat Intelligence feed
You can integrate IBM X-Force Exchange data into IBM QRadar to help your organization stay ahead
of emerging threats by identifying and remediating undesirable activity in your environment before
it threatens the stability of your network.
For example, you can identify and prioritize these types of incidents:
•
•
•
•
A series of attempted logins for a dynamic range of IP addresses
An anonymous proxy connection to a Business Partner portal
A connection between an internal endpoint and a known botnet command and control
Communication between an endpoint and a known malware distribution site
Note: IBM X-Force integration allows you to use the X-Force Threat Intelligence data in QRadar correlation
rules and AQL queries. Access to the IBM X-Force Exchange REST API is not included.
•
Enabling the X-Force Threat Intelligence feed
You must enable the X-Force Threat Intelligence feed before you can use the enhanced
content that is installed with the IBM QRadar Security Threat Monitoring Content
Extension application.
About this task
QRadar downloads approximately 30 MB of IP reputation data per day when you enable
the X-Force Threat Intelligence feed.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click System Settings.
3. Ensure that Yes is selected in the Enable X-Force Threat Intelligence Feed field.
•
Updating X-Force data in a proxy server
IBM QRadar uses a reverse proxy lookup through an Apache server to collect data directly
from IBM Security X-Force Threat Intelligence servers on the Internet.
About this task
All QRadar appliances in a deployment contact the Apache server to send cached requests.
After the data is received by the IBM QRadar Console, the result is cached and replayed for
all other managed hosts that make a request for new IP reputation data.
If a proxy is configured in your network, you must update the configuration to receive the XForce data.
Restriction: NTLM authentication is not supported.
Procedure
1. Use SSH to log in to the QRadar Console.
2. Open the /etc/httpd/conf.d/ssl.conf file in a text editor.
3. Add the following lines before </VirtualHost>:
ProxyRemote https://license.xforce-security.com/
http://PROXY_IP:PROXY_PORT
ProxyRemote https://update.xforce-security.com/
http://PROXY_IP:PROXY_PORT
4. Update the IP address and port of the corporate proxy server to allow an anonymous
connection to the X-Force security servers.
5. Save the changes to the ssl.conf file.
6. Restart the Apache server by typing the following command:
apachectl restart
Restarting the Apache server on the QRadar Console logs out all users and the
managed hosts might produce error messages. Restart the Apache server during
scheduled maintenance windows.
•
Preventing X-Force data from downloading data locally
QRadar downloads approximately 30 MB of IP reputation data per day. To stop QRadar from
downloading the X-Force data to your local system, disable the X-Force Threat
Intelligence feed.
Before you begin
Before you disable the X-Force feed, ensure that the X-Force rules are disabled, and that you
are not using X-Force functions in saved searches.
About this task
After the X-Force Threat Intelligence feed is disabled, the X-Force content is still visible
in QRadar, but you cannot use the X-Force rules or add X-Force functions to AQL searches.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click System Settings.
3. Select No in the Enable X-Force Threat Intelligence Feed field.
IBM QRadar Security Threat Monitoring Content Extension
The IBM QRadar Security Threat Monitoring Content Extension on the IBM Security App
Exchange (https://exchange.xforce.ibmcloud.com/hub) contains rules, building blocks, and custom
properties that are intended for use with X-Force feed data.
The X-Force data includes a list of potentially malicious IP addresses and URLs with a
corresponding threat score. You use the X-Force rules to automatically flag any security event or
network activity data that involves the addresses, and to prioritize the incidents before you begin to
investigate them.
The following list shows examples of the types of incidents that you can identify using the X-Force rules:
•
•
•
when the [source IP|destinationIP|anyIP] is part of any of the
following [remote network locations]
when [this host property] is categorized by X-Force as [Anonymization
Servers|Botnet C&C|DynamicIPs|Malware|ScanningIPs|Spam] with
confidence value [equal to] [this amount]
when [this URL property] is categorized by X-Force
as [Gambling|Auctions|Job Search|Alcohol|Social Networking|Dating]
QRadar downloads approximately 30 MB of IP reputation data per day when you enable the XForce Threat Intelligence feed for use with the IBM QRadar Security Threat Monitoring Content
Extension.
•
Installing the IBM QRadar Security Threat Monitoring Content Extension application
The IBM QRadar Security Threat Monitoring Content Extension application contains IBM
QRadar content, such as rules, building blocks, and custom properties, that are designed
specifically for use with X-Force data. The enhanced content can help you to identify and to
remediate undesirable activity in your environment before it threatens the stability of your
network.
Before you begin
Download the IBM QRadar Security Threat Monitoring Content Extension application from the IBM
Security App
Exchange (https://exchange.xforce.ibmcloud.com/hub/extension/IBMQRadar:IBMContentPackageIntern
alThreat).
About this task
To use X-Force data in QRadar rules, offenses, and events, you must configure IBM QRadar to
automatically load data from the X-Force servers to your QRadar appliance.
To load X-Force data locally, enable the X-Force Threat Intelligence feed in the system
settings. If new information is available when X-Force starts, the IP address reputation or
URL database is updated. These updates are merged into their own databases and the
content is replicated from the QRadar Console to all managed hosts in the deployment.
The X-Force rules are visible in the product even if the application is later uninstalled.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Extensions Management.
3. Upload the application to the QRadar console by following these steps:
a. Click Add.
b. Click Browse to find the extension.
c. Optional: Click Install immediately to install the extension without viewing
the contents.
d. Click Add.
4. To view the contents of the extension, select it from the extensions list and click More
Details.
5. To install the extension, follow these steps:
a. Select the extension from the list and click Install.
b. If the extension does not include a digital signature, or it is signed but the
signature is not associated with the IBM Security certificate authority (CA),
you must confirm that you still want to install it. Click Install to proceed with
the installation.
c. Review the changes that the installation makes to the system.
d. Select Overwrite or Keep existing data to specify how to handle existing
content items.
e. Click Install.
f. Review the installation summary and click OK.
The rules appear under the Threats group in the Rules List window. They
must be enabled before they are used.
IBM X-Force Exchange plug-in for QRadar
IBM® X-Force® Exchange is a sharing platform for threat intelligence that is used by security
analysts, network security specialists, and security operations center teams.
The IBM X-Force Exchange (XFE) plug-in provides the option to search the information on the IBM
X-Force Exchange website for IP addresses, URLs, CVEs, and web applications that are found
in QRadar®.
For example, you can right-click a URL from a QRadar event to see what data the X-Force Exchange
contains about the URL.
You can also use the right-click lookup option to submit IP addresses or URL data
from QRadar searches, offenses, and rules to a public or private collection. The collection stores the
information in one place as you use the data for more research.
Collections also contain a section that serves as a wiki-style notepad, where you can add comments
or any free text that is relevant. You can use the collection to save X-Force reports, text comments,
or any other content. An X-Force report has both a version of the report from the time that it was
saved and a link to the current version of the report.
•
Installing the IBM X-Force Exchange plug-in
Install the IBM X-Force Exchange plug-in on your QRadar Console so that you have rightclick functionality to access data in IBM X-Force Exchange.
Before you begin
This procedure requires a web server restart from the Admin tab to load the plug-in after the RPM is
installed. Restarting the web server logs out all QRadar users, so it is advised that you install this plug-in
during scheduled maintenance.
About this task
If your QRadar system is version 7.2.3 or later, the plug-in is already installed.
Administrators can verify that the plug-in is installed by right-clicking on any IP address
in QRadar, and selecting More Options > Plugin options. If the IBM X-Force
Exchange lookup is displayed, then the plug-in is installed.
Procedure
1. Download the X-Force Exchange right-click plug-in from IBM Fix
Central (https://ibm.biz/BdX4BW).
a. Copy the RPM file to the QRadar Console.
b. Type the following command to install the plug-in: rpm -Uvh RightClickXFE-7.2.<version>.x86_64.rpm
2. Log in to the QRadar Console as an admin user.
3. On the navigation menu ( ), click Admin.
4. Select Advanced > Restart Web Server.
After the web server restarts, the X-Force right-click plug-in is enabled for IP
addresses in QRadar for URL fields in the Log Activity tab.
5. Log in to the pop-up window for the X-Force Exchange website by using your IBMid,
or continue as a guest.
Guest users are not able to use all features on the X-Force Exchange website.
6. Close the browser window after the initial login to the IBM X-Force Exchange website.
QRadar: Configuring a MaxMind account for
geographic data updates (APAR IJ21884)
Troubleshooting
Problem
GeoLite2 data is required to resolve geographic locations from IP addresses in QRadar. As
of 30 December 2019, a MaxMind account must be configured by the administrator in
QRadar System Settings. The default userid and license key values can no longer be used
to receive geographic data updates.
Symptom
Administrators who use the default userid and license value receive a '401 Unauthorized'
error in QRadar when geographic data attempts to update. When this issue occurs,
the geodata_update.sh utility displays the following error message:
[Example-console-lab#/]/opt/qradar/bin/geodata_update.sh
Result: 401 Unauthorized at /opt/qradar/bin/geoipupdate-pureperl.pl line 222, <$fh>
line 37
Cause
The default geographic account included in QRadar requires a unique userid and license
key to allow updates after 30 December 2019. Administrators must create a MaxMind
account and update Admin > System Settings > Geographic Settings to continue to
receive geographic location lookup data for IP addresses.
Environment
QRadar V7.3.1 and later.
Resolving The Problem
This procedure requires an Admin user to create a MaxMind account and update System
Settings to ensure that geographic location data updates can complete successfully.
1. Create a free MaxMind account: https://www.maxmind.com/en/geolite2/signup
2. After your account is created, an email is provided by MaxMind.
3. Create a password for your account.
4. After you assign an account password, use the credentials you created to sign in.
5. Click Manage License Keys.
6. Click Generate new license key.
7. Configure the following values:
o In the License key description, type: QRadar License Key.
o For QRadar 7.5.0 UP4 or newer versions, select Generate a license key and
config file for geoipupdate versions 3.1.1 or newer.
o For QRadar 7.5.0 UP3 or earlier versions, Maxmind no longer
issuing license key for geoipupdate version 3.1.0 or older since 2023
March 27th.
Open a case with QRadar Support to get your system upgraded to use license
version 3.1.1. Include this documentation in the case.
o
o
Click Confirm.
Record the Account and User ID and License Key information.
Important: If you exit the license key screen without recording the
information, you must generate a new license key from Step 4.
8. Configure in QRadar
o Log in to QRadar as an administrator.
o Click the Admin tab.
o Click the System Settings icon.
o Navigate to Geographic Settings.
o Update the User ID and License Key values from Step 5.
o
Click Save.
o
From the Admin tab, click Deploy Changes.
Results
After the deploy changes completes, geographic data settings are updated for the QRadar
deployment. Administrators can confirm their MaxMind geographic settings from the
command line of the QRadar Console.
IBM X-Force Exchange plug-in
for QRadar
The IBM X-Force Exchange (XFE) plug-in provides the option to search the information on the IBM
X-Force Exchange website for IP addresses, URLs, CVEs, and web applications that are found
in QRadar®.
For example, you can right-click a URL from a QRadar event to see what data the X-Force Exchange
contains about the URL.
You can also use the right-click lookup option to submit IP addresses or URL data
from QRadar searches, offenses, and rules to a public or private collection. The collection stores the
information in one place as you use the data for more research.
Collections also contain a section that serves as a wiki-style notepad, where you can add comments
or any free text that is relevant. You can use the collection to save X-Force reports, text comments,
or any other content. An X-Force report has both a version of the report from the time that it was
saved and a link to the current version of the report.
Installing the IBM X-Force Exchange plug-in
Install the IBM X-Force Exchange plug-in on your QRadar Console so that you have right-click
functionality to access data in IBM X-Force Exchange.
Before you begin
This procedure requires a web server restart from the Admin tab to load the plug-in after the RPM is
installed. Restarting the web server logs out all QRadar users, so it is advised that you install this
plug-in during scheduled maintenance.
About this task
If your QRadar system is version 7.2.3 or later, the plug-in is already installed. Administrators can
verify that the plug-in is installed by right-clicking on any IP address in QRadar, and selecting More
Options > Plugin options. If the IBM X-Force Exchange lookup is displayed, then the plug-in is
installed.
Procedure
1. Download the X-Force Exchange right-click plug-in from IBM Fix
Central (https://ibm.biz/BdX4BW).
a. Copy the RPM file to the QRadar Console.
b. Type the following command to install the plug-in: rpm -Uvh RightClick-XFE7.2.<version>.x86_64.rpm
2. Log in to the QRadar Console as an admin user.
3. On the navigation menu ( ), click Admin.
4. Select Advanced > Restart Web Server.
After the web server restarts, the X-Force right-click plug-in is enabled for IP addresses
in QRadar for URL fields in the Log Activity tab.
5. Log in to the pop-up window for the X-Force Exchange website by using your IBMid, or
continue as a guest.
Guest users are not able to use all features on the X-Force Exchange website.
6. Close the browser window after the initial login to the IBM X-Force Exchange website.
Section 5: User Management
TASK: 5.1 Manage users
SUBTASKS:
5.1.1. Understand how to create a user account
• Understand different parameters:
o User role
o Security profile
o Override system inactivity timeout
5.1.2. Validate user account creation requirements
• Deploy after user creation
5.1.3. Understand how to edit a user account
• User Management window
• Use of the Advanced Filter to search by user role or security profile when editing
5.1.4. Validate user account edition requirements
• Deploy after user edit
5.1.5. Disable a user account
5.1.6. Delete a user account
5.1.7. Delete saved searches of a deleted user
Configuring inactivity timeout for a user
If you have users who require longer periods of inactivity before they are logged out of the system,
you can configure their inactivity timeout threshold individually.
Procedure
1.
2.
3.
4.
On the Admin tab, click Users.
Select a user from the list and click Edit.
In the User Details pane, enable the Override System Inactivity Timeout setting.
Enter the number of minutes of inactivity before the user is logged out, and click Save.
Deleting saved searches of a deleted user
If the saved searches of a deleted user are no longer necessary, you can delete the searches.
About this task
Saved searches that were created by a deleted user remain associated with the user until you delete
the searches.
Procedure
1. On the Log Activity or Network Activity tab, click Search > Manage Search Results.
2. Click the Status column to sort the saved searches.
3. Select the saved searches with a status of “ERROR!”, then click Delete.
Editing a user account
You can edit account information for the current user through the main product interface. To
quickly locate the user account you want to edit on the User Management window, type the user
name in the Search User text box on the toolbar.
Procedure
1. On the Admin tab, click Users.
2. In the User Management window, select the user that you want to edit.
You can use the Advanced Filter to search by User Role or Security Profile.
3.
4.
5.
6.
7.
In the User Details window, click Edit.
Edit the account information for the user.
Click Save.
Close the User Management window.
On the Admin tab, click Deploy Changes.
Creating a user account
When you create a new user account, you must assign access credentials, a user role, and a security
profile to the user. User roles define what actions the user has permission to perform. Security
profiles define what data the user has permission to access.
Before you begin
Before you can create a user account, you must ensure that the required user role and security
profile are created.
About this task
You can create multiple user accounts that include administrative privileges; however, any user
role with Administrator Manager privileges can create other administrative user accounts.
Procedure
1. On the Admin tab, click Users.
The User Management window opens.
2. Click Add.
3. Enter values for the following parameters:
Parameter Description
User Name Enter a unique username for the new user. The username must contain 1 - 60 characters.
User
Enter a description for the user. The description cannot contain more than 2048 characters.
Description
Email
Enter an email address to be associated with this user. The address cannot contain more than
255 characters, and cannot contain spaces.
New
Enter a new password for the user to gain access. The password must meet the minimum length
Password and complexity requirements that are enforced by the password policy.
Parameter Description
Confirm
New
Enter the new password again.
Password
User Role Select a role for this user from the list.
Security
Profile
Select a security profile for this user from the list.
Override
System
Enable this setting to configure the inactivity timeout threshold for the user account.
Inactivity
Timeout
4. Click Save.
5. Close the User Management window.
6. On the Admin tab, click Deploy Changes.
Deleting a user account
If a user account is no longer necessary, you can delete the user account. After you delete a user, the
user no longer has access to the user interface. If the user attempts to log in, a message is displayed
to inform the user that the username and password is no longer valid.
About this task
To quickly locate the user account you want to delete on the User Management window, type the
username in the Search text box.
Procedure
1. On the Admin tab, click Users.
2. In the User Management window, select the user that you want to delete.
You can use the Advanced Filter to search by User Role or Security Profile.
3. In the User Details window, click Delete.
A search for dependents begins.
4.
5.
6.
7.
8.
9.
In the Found Dependents window, click Delete or Re-Assign dependents.
When the user has no dependents, click Delete User.
In the Confirm Delete window, click Delete > OK.
Click Delete.
Close the User Management window.
On the Admin tab, click Deploy Changes.
Disabling a user account
You can disable a user account to restrict a user from accessing QRadar. The option to disable a
user account temporarily revokes a user's access without deleting the account.
About this task
If the user with the disabled account attempts to log in, a message informs them that the user name
and password are no longer valid. Items that they created, such as saved searches and reports,
remain associated with the user.
Procedure
1. On the Admin tab, click Users.
2. In the User Management window, select the user account that you want to disable.
You can use the Advanced Filter to search by User Role or Security Profile.
3.
4.
5.
6.
7.
Click Edit.
From the User Details window, select Disabled from the User Role list.
Click Save.
Close the User Management window.
On the Admin tab, click Deploy Changes.
TASK: 5.2 Create and update security profiles
SUBTASKS:
5.2.1. Understand security profiles
• Domains
• Permission precedence
5.2.2. Create a security profile
5.2.3. Edit a security profile
5.2.4. Duplicate a security profile
5.2.5. Delete a security profile
Security profiles
Security profiles define which networks, log sources, and domains that a user can access.
QRadar® includes one default security profile for administrative users. The Admin security profile
includes access to all networks, log sources, and domains.
Before you add user accounts, you must create more security profiles to meet the specific access
requirements of your users.
Domains
Security profiles must be updated with an associated domain. You must define domains on
the Domain Management window before the Domains tab is shown on the Security Profile
Management window. Domain-level restrictions are not applied until the security profiles are
updated, and the changes are deployed.
Domain assignments take precedence over all settings on the Permission Precedence, Networks,
and Log Sources tabs.
If the domain is assigned to a tenant, the tenant name appears in brackets beside the domain name
in the Assigned Domains window.
Permission precedence
Permission precedence determines which security profile components to consider when the system
displays events in the Log Activity tab and flows in the Network Activity tab.
Choose from the following restrictions when you create a security profile:
•
•
•
•
No Restrictions - This option does not place restrictions on which events are displayed in
the Log Activity tab, and which flows are displayed in the Network Activity tab.
Network Only - This option restricts the user to view only events and flows that are
associated with the networks that are specified in this security profile.
Log Sources Only - This option restricts the user to view only events that are associated
with the log sources that are specified in this security profile.
Networks AND Log Sources - This option allows the user to view only events and flows that
are associated with the log sources and networks that are specified in this security profile.
For example, if the security profile allows access to events from a log source but the
destination network is restricted, the event is not displayed in the Log Activity tab. The
event must match both requirements.
•
Networks OR Log Sources - This option allows the user to view events and flows that are
associated with either the log sources or networks that are specified in this security profile.
For example, if a security profile allows access to events from a log source but the destination
network is restricted, the event is displayed on the Log Activity tab if the permission
precedence is set to Networks OR Log Sources. If the permission precedence is set
to Networks AND Log Sources, the event is not displayed on the Log Activity tab.
Permission precedence for offense data
Security profiles automatically use the Networks OR Log Sources permission when offense data is
shown. For example, if an offense has a destination IP address that your security profile permits
you to see, but the security profile does not grant permissions to the source IP address, the Offense
Summary window shows both the destination and source IP addresses.
Creating a security profile
To add user accounts, you must first create security profiles to meet the specific access
requirements of your users.
About this task
IBM® QRadar® SIEM includes one default security profile for administrative users. The Admin
security profile includes access to all networks, log sources, and domains.
To select multiple items on the Security Profile Management window, hold the Control key while
you select each network or network group that you want to add.
If after you add networks, log sources or domains you want to remove one or more before you save
the configuration, you can select the item and click the Remove (<) icon. To remove all items,
click Remove All.
Procedure
1. On the Admin tab, click Security Profiles.
2. On the Security Profile Management window toolbar, click New.
3. Configure the following parameters:
a. In the Security Profile Name field, type a unique name for the security profile. The
security profile name must meet the following requirements: minimum of 3
characters and maximum of 30 characters.
b. OptionalType a description of the security profile. The maximum number of
characters is 255.
4. Click the Permission Precedence tab.
5. In the Permission Precedence Setting pane, select a permission precedence option.
See Permission precedence.
6. Configure the networks that you want to assign to the security profile:
a. Click the Networks tab.
b. From the navigation tree in the left pane of the Networks tab, select the network that
you want this security profile to have access to.
c. Click the Add (>) icon to add the network to the Assigned Networks pane.
d. Repeat for each network you want to add.
7. Configure the log sources that you want to assign to the security profile:
a. Click the Log Sources tab.
b. From the navigation tree in the left pane, select the log source group or log source
you want this security profile to have access to.
c. Click the Add (>) icon to add the log source to the Assigned Log Sources pane.
d. Repeat for each log source you want to add.
8. Configure the domains that you want to assign to the security profile:
Domains must be configured before the Domains tab appears.
a. Click the Domains tab.
b. From the navigation tree in the left pane, select the domain that you want this
security profile to have access to.
c. Click the Add (>) icon to add the domain to the Assigned Domains pane.
d. Repeat for each domain that you want to add.
9. Click Save.
Note: The log sources and domains that are assigned to the security profile must match. If
the log sources and domains do not match, you cannot save the security profile .
10. Close the Security Profile Management window.
11. On the Admin tab, click Deploy Changes.
Editing a security profile
You can edit an existing security profile to update which networks and log sources a user can access
and the permission precedence.
About this task
To quickly locate the security profile you want to edit on the Security Profile Management window,
type the security profile name in the Type to filter text box.
Procedure
1.
2.
3.
4.
5.
6.
Option
On the Admin tab, click Security Profiles.
In the left pane, select the security profile that you want to edit.
On the toolbar, click Edit.
Update the parameters as necessary.
Click Save.
If the Security Profile Has Time Series Data window opens, select one of the following
options:
Description
Keep Old Data and Select this option to keep previously accumulated time series data. If you choose this
option, users with this security profile might see previous data that they no longer have
Save
permission to see when they view time series charts.
Hide Old Data and Select this option to hide the time series data. If you choose this option, time series data
Save
accumulation restarts after you deploy your configuration changes.
7. Close the Security Profile Management window.
8. On the Admin tab, click Deploy Changes.
Duplicating a security profile
If you want to create a new security profile that closely matches an existing security profile, you can
duplicate the existing security profile and then modify the parameters.
About this task
To quickly locate the security profile you want to duplicate on the Security Profile
Management window, type the security profile name in the Type to filter text box.
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
On the Admin tab, click Security Profiles.
In the left pane, select the security profile that you want to duplicate.
On the toolbar, click Duplicate.
In the Confirmation window, type a unique name for the duplicated security profile.
Click OK.
Update the parameters as necessary.
Close the Security Profile Management window.
On the Admin tab, click Deploy Changes.
Deleting a security profile
If a security profile is no longer required, you can delete the security profile.
About this task
If user accounts are assigned to the security profiles you want to delete, you must reassign the user
accounts to another security profile. IBM® QRadar® automatically detects this condition and
prompts you to update the user accounts.
To quickly locate the security profile you want to delete on the Security Profile
Management window, type the security profile name in the Type to filter text box.
Procedure
1.
2.
3.
4.
On the Admin tab, click Security Profiles.
In the left pane, select the security profile that you want to delete.
On the toolbar, click Delete.
Click OK.
o If user accounts are assigned to this security profile, the Users are Assigned to this
Security Profile window opens. Go to Deleting a user role.
o If no user accounts are assigned to this security profile, the security profile is
successfully deleted. Go to Deleting a user role.
5. Reassign the listed user accounts to another security profile:
o From the User Security Profile to assign list box, select a security profile.
o Click Confirm.
6. Close the Security Profile Management window.
7. On the Admin tab, click Deploy Changes.
TASK: 5.3 Create and update user roles
SUBTASKS:
5.3.1. Understand user roles
• QRadar functions that the user can access
5.3.2. Create a user role
5.3.3. Edit a user role
5.3.4. Delete a user role
User roles
A user role defines the functions that a user can access in IBM® QRadar®.
During the installation, four default user roles are defined: Admin, All, WinCollect, and Disabled.
Before you add user accounts, you must create the user roles to meet the permission requirements
of your users.
Creating a user role
Create user roles to manage the functions that a user can access in IBM QRadar. By default, your
system provides a default administrative user role, which provides access to all areas of QRadar.
About this task
Users who are assigned an administrative user role cannot edit their own account. This restriction
applies to the default Admin user role. Another administrative user must make any account
changes.
Procedure
1.
2.
3.
4.
Click the Admin tab.
In the User Management section, click User Roles and then click New.
In the User Role Name field, type a unique name.
Select the permissions that you want to assign to the user role.
The permissions that are visible on the User Role Management window depend on
which QRadar components are installed.
Important: If you select a user role that has Admin privileges, you must also grant that user
role the Admin security profile. See Creating a security profile.
Permission
Description
Grants administrative access to the user interface. You can grant specific Admin
permissions.
Users with System Administrator permission can access all areas of the user interface.
Users who have this access cannot edit other administrator accounts.
Administrator Manager
Grants users permission to create and edit other administrative user accounts.
Remote Networks and Services Configuration
Admin
Grants users access to the Remote Networks and Services icon on the Admin tab.
System Administrator
Grants users permission to access all areas of user interface. Users with this access
are not able to edit other administrator accounts.
Manage Local Only
Grants permission to assign and manage Local Only authentication. For more
information about Local Only authentication, see Assigning Local Only
authentication.
Grant users permissions to perform limited administrative functions. In a multi-tenant
Delegated
environment, tenant users with Delegated Administration permissions can see only data
Administration for their own tenant environment. If you assign other administrative permissions that are
not part of Delegated Administration, tenant users can see data for all tenants.
Grants administrative access to all functions on the Offenses tab.
Offenses
Users must have administrative access to create or edit a search group on
the Offenses tab.
User roles must have the Maintain Custom Rules permission to create and edit
custom rules.
Grants access to functions in the Log Activity tab. You can also grant specific permissions:
Maintain Custom Rules
Grants permission to create or edit rules that are displayed on the Log Activity tab.
Log Activity
Manage Time Series
Grants permission to configure and view time series data charts.
User Defined Event Properties
Grants permission to create custom event properties.
View Custom Rules
Permission
Description
Grants permission to view custom rules. If granted to a user role that does not also
have the Maintain Custom Rules permission, the user role cannot create or edit
custom rules.
Grants access to all the functions in the Network Activity tab. You can grant specific access
to the following permissions:
Maintain Custom Rules
Grants permission to create or edit rules that are displayed on the Network
Activity tab.
Manage Time Series
Grants permission to configure and view time series data charts.
Network
Activity
User Defined Flow Properties
Grants permission to create custom flow properties.
View Custom Rules
Grants permission to view custom rules. If the user role does not also have
the Maintain Custom Rules permission, the user role cannot create or edit custom
rules.
View Flow Content
Grants permission to view source payload and destination payload in the flow data
details.
This permission is displayed only if IBM QRadar Vulnerability Manager is installed on your
system.
Grants access to the function in the Assets tab. You can grant specific permissions:
Perform VA Scans
Grants permission to complete vulnerability assessment scans. For more
information about vulnerability assessment, see the Managing Vulnerability
Assessment Guide.
Assets
Remove Vulnerabilities
Grants permission to remove vulnerabilities from assets.
Server Discovery
Grants permission to discover servers.
View VA Data
Grants permission to vulnerability assessment data. For more information about
vulnerability assessment, see the Managing Vulnerability Assessment guide.
Reports
Grants permission to access all of the functions on the Reports tab.
Permission
Description
Distribute Reports via Email
Grants permission to distribute reports through email.
Maintain Templates
Grants permission to edit report templates.
Risk Manager
Grants users permission to access QRadar Risk Manager functions. QRadar Risk
Manager must be activated.
Grants permission to QRadar Vulnerability Manager function. QRadar Vulnerability
Manager must be activated.
Vulnerability
Manager
For more information, see the IBM QRadar Vulnerability
Manager (https://www.ibm.com/docs/en/SS42VS_7.5/com.ibm.qradar.doc/c_qvm_
vm_ov.html).
Grants permission to QRadar Incident Forensics capabilities.
Forensics
Create cases in Incident Forensics
Grants permission to create cases for collections of imported document and pcap
files.
IP Right Click
Menu
Grants permission to options added to the right-click menu.
Extensions
Grants permission to Platform Configuration services.
Dismiss System Notifications
Grants permission to hide system notifications from the Messages tab.
Platform
View Reference Data
Configuration
Grants permission to view reference data when it is available in search results.
View System Notifications
Grants permission to view system notifications from the Messages tab.
QRadar Log
Source
Management
Grants permission to the QRadar Log Source Management app.
Pulse Dashboard
Grants permission to dashboards in the IBM QRadar Pulse app.
Pulse - Threat
Grants permission to Threat Globe dashboard in the IBM QRadar Pulse app.
Globe
QRadar
Assistant
Grants permission to the IBM QRadar Assistant app.
Permission
Description
QRadar Use
Grants permission to the QRadar Use Case Manager app.
Case Manager
Table 1. User Role Management window permissions
5. In the Dashboards section of the User Role Management page, select the dashboards that you
want the user role to access, and click Add.
Tip: A dashboard displays no information when the user role does not have permission to
view dashboard data. If a user modifies the displayed dashboards, the defined dashboards
for the user role appear at the next login.
6. Click Save and close the User Role Management window.
7. On the Admin tab menu, click Deploy Changes.
Editing a user role
You can edit an existing role to change the permissions that are assigned to the role.
About this task
To quickly locate the user role you want to edit on the User Role Management window, you can
type a role name in the Type to filter text box.
Procedure
1. On the Admin tab, click User Roles.
2. In the left pane of the User Role Management window, select the user role that you want to
edit.
3. In the right pane, update the permissions as necessary.
4. Modify the Dashboards options for the user role as necessary.
5. Click Save.
6. Close the User Role Management window.
7. On the Admin tab, click Deploy Changes.
Deleting a user role
If a user role is no longer required, you can delete the user role.
About this task
If user accounts are assigned to the user role you want to delete, you must reassign the user
accounts to another user role. The system automatically detects this condition and prompts you to
update the user accounts.
You can quickly locate the user role that you want to delete on the User Role Management window.
Type a role name in the Type to filter text box, which is located above the left pane.
Procedure
1.
2.
3.
4.
On the Admin tab, click User Roles.
In the left pane of the User Role Management window, select the role that you want to delete.
On the toolbar, click Delete.
Click OK.
o If user accounts are assigned to this user role, the Users are Assigned to this User
Role window opens. Go to Step 7.
o If no user accounts are assigned to this role, the user role is successfully deleted. Go
to Step 8.
5. Reassign the listed user accounts to another user role:
o From the User Role to assign list box, select a user role.
o Click Confirm.
6. Close the User Role Management window.
7. On the Admin tab, click Deploy Changes.
TASK: 5.4 Manage user authentication and authorization
SUBTASKS:
5.4.1. User authentication
5.4.2. System authentication
5.4.3. RADIUS authentication
5.4.4. TACACS authentication
5.4.5. LDAP
5.4.6. SAML single sign-on authentication
User authentication
When authentication is configured and a user enters an invalid username and password
combination, a message is displayed to indicate that the login was invalid.
If the user attempts to access the system multiple times with invalid information, the user must
wait the configured amount of time before they can attempt to access the system again. You can
configure console settings to determine the maximum number of failed logins and other related
settings.
IBM® QRadar® supports the following authentication types:
•
•
•
System authentication - Users are authenticated locally. System authentication is the
default authentication type.
RADIUS authentication - Users are authenticated by a Remote Authentication Dial-in User
Service (RADIUS) server. When a user attempts to log in, QRadar encrypts the password
only, and forwards the username and password to the RADIUS server for authentication.
TACACS authentication - Users are authenticated by a Terminal Access Controller Access
Control System (TACACS) server. When a user attempts to log in, QRadar encrypts the
username and password, and forwards this information to the TACACS server for
•
•
•
authentication. TACACS Authentication uses Cisco Secure ACS Express as a TACACS
server. QRadar supports up to Cisco Secure ACS Express 4.3.
Removed in 7.4.2 Microsoft Active Directory - Users are authenticated by a Lightweight
Directory Access Protocol (LDAP) server that uses Kerberos.
LDAP - Users are authenticated by an LDAP server.
SAML single sign-on authentication - Users can easily integrate QRadar with your
corporate identity server to provide single sign-on, and eliminate the need to
maintain QRadar local users. Users who are authenticated to your identity server can
automatically authenticate to QRadar. They don't need to remember separate passwords or
type in credentials every time they access QRadar.
Prerequisite checklist for external authentication providers
Before you can configure an external authentication type, you must complete the following tasks:
•
•
•
•
Configure the authentication server before you configure authentication in QRadar.
Ensure that the server has the appropriate user accounts and privilege levels to
communicate with QRadar..
Ensure that the time of the authentication server is synchronized with the time of
the QRadar server.
Ensure that all users have appropriate user accounts and roles to allow authentication
with the vendor servers.
Changing QRadar user passwords
IBM QRadar occasionally changes the password policy to align with current security standards.
When the password policy is updated, users who have local passwords are prompted to update
their password the first time that they log in after the upgrade. In very few situations, some
users may not be prompted to change their password after the upgrade, and you will have to
change it for them.
To change SIEM user passwords, complete the following steps:
1. On the Admin tab, click Users.
2. Select a user from the list and click Edit.
3. In the User Details pane, enter the new password for the user, and click Save.
To change PCAP user passwords, complete the following steps:
1.
2.
3.
4.
5.
6.
On the Admin tab, click System and License Management.
Select Systems View from the Display list.
Highlight your QRadar Incident Forensics device.
On the Deployment Actions menu, click Edit Host.
Select the Component Management icon.
In the PCAP Device Management window, reenter or change the login password for the user
and click Save.
7. On the Admin tab, click Advanced > Deploy Full Configuration for the changes to take
effect.
To change FTP user passwords, complete the following steps:
1.
2.
3.
4.
5.
On the Admin tab, click Forensics User Permissions.
Select a user from the Users list on the left side of the window.
In the Edit User pane, check the Enable FTP access box.
Reenter or change the password for the user.
Under Assigned Cases, click Save User.
Configuring inactivity timeout for a user
If you have users who require longer periods of inactivity before they are logged out of the system,
you can configure their inactivity timeout threshold individually.
Procedure
1.
2.
3.
4.
On the Admin tab, click Users.
Select a user from the list and click Edit.
In the User Details pane, enable the Override System Inactivity Timeout setting.
Enter the number of minutes of inactivity before the user is logged out, and click Save.
External authentication guidelines
You can configure an external authentication provider to allow IBM QRadar to authenticate users
without QRadar storing passwords locally for those users.
Warning: You cannot configure more than one external authentication provider for QRadar at a time. If you
have set up one external authentication provider and you set up another external authentication provider,
the configuration for the first external authentication provider is deleted.
When you choose to use an external authentication provider, consider these points:
•
•
•
•
•
•
Ensure that your external provider is trustworthy because you are delegating an important
security decision to this external provider. A compromised provider might allow access to
your QRadar system to unintended parties.
Ensure that the connection to the external provider is secure. Choose only secure
communications protocols, by using LDAPS instead of LDAP, for example.
Consider whether you want to enable a local authentication fallback in case the external
provider is unavailable. If the external provider is compromised, it might be used as a denial
of access attack.
The decision to configure an external authentication provider applies to all administrator
and non-administrator QRadar users.
If you enable auto-provisioning of QRadar accounts, a compromised provider might be used
to force the creation of a rogue QRadar account, so use caution when you are combining
these features.
QRadar users that do not have an entry in the external provider are relying on the fallback
feature to check the local password. A compromised external authentication provider might
be used to create a “shadow” for an existing QRadar account, providing an alternative
password for authentication.
Local authentication fallback
Each non-administrator user can be configured for local authentication fallback. Local
authentication fallback is turned off by default. If enabled, a non-administrator QRadar user can
access the system by using the locally stored password even if the external provider is unavailable,
or if the password in the external provider is locked out or is unknown to the user. This also means
that a rogue QRadar administrator might change the locally stored password and log in as that user,
so ensure that your QRadar administrators are trustworthy. This is also the case if an external
authentication provider is not configured.
The default administrator account, named admin, is always configured for local authentication
fallback by default. This prevents the administrative user from being locked out of the system, but
also means you must ensure that the configured external authentication provider has the correct
entry for the admin user, and that the password is known only to the
authorized QRadar administrator. If you cannot maintain control of the admin entry in the external
authentication provider, disable the admin account within QRadar to prevent unauthorized users
from logging in to QRadar as admin. When you enable auto-provisioning, such as when you use
LDAP group authentication, any user account that matches the LDAP query are created or
reactivated with the appropriate roles as mapped. To prevent this from happening, disable autoprovisioning by using LDAP local.
For other privileged QRadar users (users with the admin role), you can choose on a user-by-user
basis whether to enable local authentication fallback. The ENABLE_FALLBACK_ALL_ADMINS setting
(disabled by default) can be used to force all privileged users to use local authentication fallback. If
local authentication fallback is configured, the same considerations apply as for the admin account.
When you configure an external authentication provider and create a new user, that user doesn't
automatically have a local password set for QRadar. If a user needs a local password, then you must
configure local authentication fallback for that user. Local authentication fallback allows a user to
authenticate locally if external authentication fails for any reason, including invalid passwords.
Fallback users can then access QRadar regardless of the state of the external authentication.
Even if local authentication fallback is enabled for a user account, QRadar first attempts to
authenticate the user to the external authentication module before it attempts local authentication.
When external authentication fails, QRadar automatically attempts to authenticate locally if local
authentication fallback is enabled for that user. User accounts cannot be configured only to
authenticate locally when an external authentication provider is configured. For this reason, it is
important that all QRadar user accounts correspond to an external authentication provider account
of the same name associated with the same authorized user.
Ensure that the external authentication provider is trustworthy, as this configuration outsources a
security decision and a rogue authentication admin can allow unauthorized access to
your QRadar system. Make this connection in a secure way, by using the secure version of protocols
(for example by using LDAPS rather than LDAP).
Local authentication fallback is not available with SAML authentication. No users are able to
authenticate locally when you use SAML authentication.
When offboarding users, disable local authentication fallback for that user before you remove their
authentication access from the external authentication provider.
Local Only authentication
The Administration Manager or a System Manager with the Manage Local Only authentication role
can assign Local Only authentication. Setting Local Only authentication to true ensures that the user
authenticates to QRadar locally rather than through external authentication.
Assigning Local Only authentication
Local Only authentication is a setting that is used when external authentication is enabled on
IBM QRadar. Setting Local Only authentication to true for a user ensures that the user authenticates
to QRadar locally rather than through external authentication. Local Only authentication prevents
unintended access to QRadar from the accounts that are configured in the external authentication
repository.
Before you begin
Only an Administration Manager or a System Manager with the Manage Local Only authentication role can
manage Local Only authentication.
About this task
When you upgrade to QRadar 7.5.0 Update Package 2 or later, the Manage Local Only
Authentication role is added to manage the Local Only authentication for users. Any user or
authorized service that has the Administration Manager user role inherits this new capability. To
add the Manage Local Only Authentication role, see Creating a user role.
The following table shows the different permissions for when the Local Only authentication is
enabled or disabled.
Manage Local
Only
AuthenticationUser
Setting
capability
•
•
Enabled
•
•
Authorized Service
Create and modify users with
any local only setting
Create or delete a user or
authorized service with any
user role
Modify a user or
authenticated service role to
assign or remove the Manage
Local Only Authentication
setting capability
Assign user roles to any user
when their original role is
deleted
•
•
•
•
Create users without the Local Only
setting enabled
Create or delete users or authorized
services with any user role
Modify a user or authenticated service
role to assign or remove the Manage
Local Only Authentication setting
capability
Cannot modify a user's Local Only setting
Manage Local
Only
AuthenticationUser
Setting
capability
Authorized Service
•
Delete user roles with any
capability
•
Can create new users with
the same Local Only setting
as their own
Can create or delete users or
authorized services with
user roles that do not contain
the Manage Local Only
Authentication setting
capability
Cannot modify a user's Local
Only setting
Cannot modify a user or
authenticated service role to
assign or remove the Manage
Local Only Authentication
setting capability
Cannot assign user roles
with the Manage Local Only
Authentication setting
capability when their
original role is deleted
Cannot delete user roles with
the Manage Local Only
Authentication setting
capability
•
•
•
Not enabled
•
•
•
•
•
•
Create users without the Local Only
setting enabled
Can create or delete users or authorized
services with user roles that do not
contain the Manage Local Only
Authentication setting capability
Cannot modify a user's Local Only setting
Cannot modify a user or authenticated
service role to assign or remove the
Manage Local Only Authentication
setting capability
Table 1. Managing Local Only Authentication permission
Important:
•
•
•
If users or authorized services must not inherit Manage Local Only authentication role, then
a new user role must be assigned.
The default administration account is automatically set to Manage Local Only authentication.
Only an Administration manager or a System manager with the Manage Local Only
authentication role can create or delete a user role with Manage Local Only authentication.
Procedure
1. On the Admin tab, click Users.
2. Locate the user to be assigned Local Only authentication and switch the Local Only
authentication to On.
The user can use only Local Only authentication to log in.
Configuring system authentication
You can configure local authentication on your IBM QRadar system. You can specify length,
complexity, and expiry requirements for local passwords.
About this task
The local authentication password policy applies to local passwords for administrative users. The
policy also applies to non-administrative users if no external authentication is configured.
When the local authentication password policy is updated, users are prompted to change their
password if they log in with a password that does not meet the new requirements.
Procedure
1. On the Admin tab, click Authentication.
2. Click Authentication Module Settings.
3. Optional: From the Authentication Module list, select System Authentication.
System authentication is the default authentication module. If you change from another
authentication module, then you must deploy QRadar before you do the next steps.
4.
5.
6.
7.
Click Save Authentication Module.
Click Home.
Click Local Password Policy Configuration.
Select the password complexity settings for local authentication.
Learn more about password complexity settings:
Password
complexity Description
setting
Minimum Specifies the minimum number of characters that must be in a password.
Password
Length
Important: To provide adequate security, passwords should contain at least 8 characters.
Use
Requires that passwords meet a number of complexity rules, such as containing uppercase
Complexity
characters, lowercase characters, special characters, or numbers.
Rules
Number of The number of complexity rules that individual passwords must meet. Must be between
rules
one and the number of enabled complexity rules. For example, if all four complexity
required rules are enabled and individual passwords must meet any three of them, then enter 3.
Password
complexity Description
setting
Contain an
uppercase Requires that passwords contain at least one uppercase character.
character
Contain a
lowercase Requires that passwords contain at least one lowercase character.
character
Contain a
Requires that passwords contain at least one number.
digit
Contain a
Requires that passwords contain at least one space or other character that is not a letter
special
character or number (for example, "$%&'()*,-./:;<=>?@[\]_`|~).
Not
contain
Disallows more than two repeating characters. For example, abbc is allowed but abbbc is
repeating not allowed.
characters
Password Prevents passwords from being reused for a number of days. The number of days is
calculated by Unique password count multiplied by Days before password will
History
expire.
Unique
password This parameter displays when Password History is selected. The number of password
changes before a previous password can be reused.
count
Days
before
This parameter displays when Password History is selected. The number of days
password before a password must be changed.
will expire
Table 1. Password Complexity settings
8. Click Update Password Policy.
Configuring RADIUS authentication
You can configure RADIUS authentication on your IBM QRadar system.
Procedure
1.
2.
3.
4.
On the Admin tab, click Authentication.
Click Authentication Module Settings.
From the Authentication Module list, select RADIUS Authentication.
Configure the parameters:
a. In the RADIUS Server field, type the host name or IP address of the RADIUS server.
b. In the RADIUS Port field, type the port of the RADIUS server.
c. From the Authentication Type list box, select the type of authentication you want to
perform.
Choose from the following options:
CHAP
Challenge Handshake Authentication Protocol (CHAP) establishes a Point-to-Point Protocol
(PPP) connection between the user and the server.
MSCHAP
Microsoft Challenge Handshake Authentication Protocol (MSCHAP) authenticates remote
Windows workstations.
PAP
Password Authentication Protocol (PAP) sends clear text between the user and the server.
d. In the Shared Secret field, type the shared secret that QRadar uses to encrypt
RADIUS passwords for transmission to the RADIUS server.
5. Click Save Authentication Module.
Configuring TACACS authentication
You can configure TACACS authentication on your IBM QRadar system.
Procedure
1.
2.
3.
4.
On the Admin tab, click Authentication.
Click Authentication Module Settings.
From the Authentication Module list, select TACACS Authentication.
Configure the parameters:
a. In the TACACS Server field, type the host name or IP address of the TACACS server.
b. In the TACACS Port field, type the port of the TACACS server.
c. From the Authentication Type list box, select the type of authentication you want to
perform.
Choose from the following options:
Option Description
ASCII
American Standard Code for Information Interchange (ASCII) sends the user name and password in
clear text.
PAP
Password Authentication Protocol (PAP) sends clear text between the user and the server. PAP is
the default authentication type.
CHAP
Challenge Handshake Authentication Protocol (CHAP) establishes a Point-to-Point Protocol (PPP)
connection between the user and the server.
MSCHAPMicrosoft Challenge Handshake Authentication Protocol (MSCHAP) authenticates remote Windows
workstations.
d. In the Shared Secret field, type the shared secret that QRadar uses to encrypt
TACACS passwords for transmission to the TACACS server.
5. Click Save Authentication Module.
What to do next
For TACACS user authentication, you must create a local QRadar user account that is the same as
the TACACS account on the authentication server.
Configuring Active Directory authentication
Removed in 7.4.2 You can configure Microsoft Active Directory authentication on your IBM
QRadar system.
About this task
Important: As of QRadar 7.4.2, you can no longer use Kerberos-based Active Directory (AD) authentication.
For more information, see https://www.ibm.com/support/pages/node/6253911.
Procedure
1.
2.
3.
4.
On the Admin tab, click Authentication.
Click Authentication Module Settings.
From the Authentication Module list, select Active Directory.
Click Add, and configure parameters for the Active Directory Repository.
The following table describes the parameters to configure:
Parameter Description
Repository The Repository ID is an identifier or alias that uniquely represents the server
ID
that is entered in the Server URL field and the domain from the Domain field.
Use the Repository ID when you enter your login details.
For example, you might use AD_1 to represent server_A on Domain_A in one
Active Directory Repository, and AD_2 to represent server_B on Domain_A in
your second repository.
Server URL The URL that is used to connect to the LDAP server. For example,
type ldaps://host_name:port.
Note: If you specify a secure LDAP connection, the password is secure but the username
is passed in clear text.
Context
Context that you want to use; for example, DC=QRADAR,DC=INC.
Domain
Domain that you want to use, for example; qradar.inc.
5. Enter the user name and password that you use to authenticate with the repository.
6. To test connectivity to the repository, click Test Connection.
Note: When you enable Active Directory, ensure that port 88 is open to allow Kerberos
connections from the QRadar Console.
7. To edit or remove a repository, select the repository, and then click Edit or Remove.
8. Click Save.
Users can log in by using the Domain\user or Repository_ID\user login formats.
The login request that uses Repository_ID\user is attempted on a specific server that is
linked to a specific domain. For example, Server A on Domain A, which is more specific
than the Domain\user login request format.
The login request that uses the Domain\user format is attempted on servers that are
linked to the specified domain until a successful login is achieved. For example, there might
be more that one server on a specific domain.
Note: For Active Directory user authentication, you must create a local QRadar user account
that is the same as the Active Directory (AD) account on the authentication server.
9. On the Admin page, click Deploy Changes.
LDAP authentication
You can configure IBM QRadar to use supported Lightweight Directory Access Protocol (LDAP)
providers for user authentication and authorization.
In geographically dispersed environments, performance can be negatively impacted if the LDAP
server and the QRadar Console are not geographically close to each other. For example, user
attributes can take a long time to populate if the QRadar Console is in North America and the LDAP
server is in Europe.
You can use the LDAP authentication with an Active Directory server.
•
Configuring LDAP authentication
You can configure LDAP authentication on your IBM QRadar system.
Before you begin
If you plan to use SSL encryption or use TLS authentication with your LDAP server, you must
import the SSL or TLS certificate from the LDAP server to
the /opt/qradar/conf/trusted_certificates directory on your QRadar Console.
If you are using group authorization, you must configure a QRadar user role or security
profile on the QRadar console for each LDAP group that is used by QRadar.
Every QRadar user role or security profile must have at least one Accept group. The
mapping of group names to user roles and security profiles is case-sensitive.
About this task
Authentication establishes proof of identity for any user who attempts to log in to
the QRadar server. When a user logs in, the username and password are sent to the LDAP
directory to verify whether the credentials are correct. To send this information securely,
configure the LDAP server connection to use Secure Socket Layer (SSL) or Transport Layer
Security (TLS) encryption.
Authorization is the process of determining what access permissions a user has. Users are
authorized to perform tasks based on their role assignments. You must have a valid bind
connection to the LDAP server before you can select authorization settings.
The user base DN is where QRadar queries and finds users. Enable query permissions to
allow your users to query against the user base DN.
User attribute values are case-sensitive. The mapping of group names to user roles and
security profiles is also case-sensitive.
Procedure
1.
2.
3.
4.
On the Admin tab, click Authentication.
Click Authentication Module Settings.
From the Authentication Module list, select LDAP.
Click Add and complete the basic configuration parameters.
There are three configuration types and each has specific requirements for
the Server URL, SSL Connection, and TLS Authentication parameters:
Secure LDAP (LDAPS)
The Server URL parameter must use ldaps:// as the protocol, and specify an LDAP
over SSL encrypted port (typically 636). For
example ldaps://ldap1.example.com:636
If you are using Global Catalog because you're using multiple domains, use port 3269.
For example ldaps://ldap1.example.com:3269
The SSL Connection parameter must be set to “True” and the TLS
Authentication parameter must be set to “False”.
LDAP with StartTLS
The Server URL parameter must use ldap:// as the protocol, and specify an LDAP
unencrypted port that supports the StartTLS option (typically 389). For
example ldap://ldap1.example.com:389
The SSL Connection parameter must be set to “False” and the TLS
Authentication must be set to “True”.
TLS 1.2 using StartTLS is not the same as the LDAP SSL port.
TLS Authentication does not support referrals, so referrals must be set to “ignore”,
and the LDAP server must include a complete structure to search.
Unencrypted
An unencrypted LDAP configuration is not recommended.
The Server URL parameter must use the ldap:// protocol and specify an unencrypted
port (typically 389). For example ldap://ldap1.example.com:389
The SSL Connection parameter and the TLS Authentication parameter must both be
set to “False”.
Parameter Description
The Repository ID is an alias for the User Base DN (distinguished name)
that you use when you enter your login details to avoid having to type a
long string. When you have more than one repository in your network, you
can place the User Base DN before the user name or you can use the
shorter Repository ID.
For example, the User Base DN is: CN=Users,DC=IBM,DC=com. You create a
repository ID such as UsersIBM that is an alias for the user base DN.
You can type the short repository ID UsersIBM instead of typing the
following example of a complete User Base DN CN=Users,DC=IBM,DC=com
Here's an example where you configure the repository ID to use as an alias for the
User Base DN.Figure 1. LDAP repository
Repository
ID
When you enter your user name on the login page, you can enter the
Repository ID UsersIBM\<username>, instead of typing the full User Base
DN.
Note: The Repository ID and User Base DN must be unique.
Select True to search all subdirectories of the specified Directory Name
(DN).
Search
entire base Select False to search only the immediate contents of the Base DN. The
subdirectories are not searched. This search is faster than one which
searches all directories.
The user field identifier that you want to search on.
LDAP User
Field
You can specify multiple user fields in a comma-separated list to allow
users to authenticate against multiple fields. For example, if you
Parameter Description
specify uid,mailid, a user can be authenticated by providing either their
user ID or their mail ID.
The Distinguished Name (DN) of the node where the search for a user would
start. The User Base DN becomes the start location for loading users. For
User Base performance reasons, ensure that the User Base DN is as specific as possible.
DN
For example, if all of your user accounts are on the directory server in the
Users folder, and your domain name is ibm.com, the User Base DN value
would be cn=Users,dc=ibm,dc=com.
Referral
Select Ignore or Follow to specify how referrals are handled.
Table 1. LDAP Basic Configuration parameters
5. Under Connection Settings, select the type of bind connection.
Bind
connection
type
Description
Anonymous
bind
Use anonymous bind to create a session with the LDAP directory server that
doesn't require that you provide authentication information.
Use authenticated bind when you want the session to require a valid user
name and password combination. A successful authenticated bind authorizes
the authenticated user to read the list of users and roles from the LDAP
directory during the session. For increased security, ensure that the user ID
Authenticated that is used for the bind connection does not have permissions to do anything
bind
other than reading the LDAP directory.
Provide the Login DN and Password. For example, if the login name
is admin and the domain is ibm.com, the Login DN would
be cn=admin,dc=ibm,dc=com.
Table 2. LDAP bind connections
6. Click Test connection to test the connection information.
You must provide user information to authenticate against the user attributes that
you specified in the LDAP User Field. If you specified multiple values in the LDAP
User Field, you must provide user information to authenticate against the first
attribute that is specified.
Note: The Test connection function tests the ability of QRadar to read the LDAP
directory, not whether you can log in to the directory.
7. Select the authorization method to use.
Authorization
method
parameter
Description
Local
The user name and password combination is verified for each user that logs in,
but no authorization information is exchanged between the LDAP server
and QRadar server. If you chose Local authorization, you must create each user on
the QRadar console.
Choose User Attributes when you want to specify which user role and security
profile attributes can be used to determine authorization levels.
User attributes
You must specify both a user role attribute and a security profile attribute.
The attributes that you can use are retrieved from the LDAP server, based
on your connection settings. User attribute values are case-sensitive.
Choose Group Based when you want users to inherit role-based access
permissions after they authenticate with the LDAP server. The mapping of group
names to user roles and security profiles is case-sensitive.
Important: If you map an Active Directory group to the Admin user role, you
must map the same Active Directory group to the Admin security profile, or the
user will not be able to log in.
Group base DN
Specifies the start node in the LDAP directory for loading groups.
For example, if all of your groups are on the directory server in
the Groups folder, and your domain name is ibm.com, the Group Base
DN value might be cn=Groups,dc=ibm,dc=com.
Query limit enabled
Group based
Sets a limit on the number of groups that are returned.
Query result limit
The maximum number of groups that are returned by the query. By
default, the query results are limited to show only the first 1000 query
results.
By member
Select By Member to search for groups based on the group members. In
the Group Member Field box, specify the LDAP attribute that is used to
define the users group membership.
For example, if the group uses the memberUid attribute to determine
group membership, type memberUid in the Group Member Field box.
By query
Authorization
method
parameter
Description
Select By Query to search for groups by running a query. You provide the
query information in the Group Member Field and Group Query
Field text boxes.
For example, to search for all groups that have at least
one memberUid attribute and that have a cn value that starts with the
letter “s”, type memberUid in Group Member Field and
type cn=s* in Group Query Field.
Table 3. LDAP authorization methods
8. If you specified Group Based authorization, click Load Groups and click the plus (+)
or minus (-) icon to add or remove privilege groups.
The user role privilege options control which QRadar components the user has access
to. The security profile privilege options control the QRadar data that each user has
access to.
Note: Query limits can be set by selecting the Query Limit Enabled checkbox or the
limits can be set on the LDAP server. If query limits are set on the LDAP server, you
might receive a message that indicates that the query limit is enabled even if you did
not select the Query Limit Enabled checkbox.
9. Click Save.
10. Click Manage synchronization to exchange authentication and authorization
information between the LDAP server and the QRadar console.
a. If you are configuring the LDAP connection for the first time, click Run
Synchronization Now to synchronize the data.
b. Specify the frequency for automatic synchronization.
c. Click Close.
11. Repeat the steps to add more LDAP servers, and click Save Authentication
Module when complete.
•
•
•
•
•
Configuring an unencrypted connection to the LDAP server
Configure a Lightweight Directory Access Protocol (LDAP) repository in IBM QRadar.
Configuring an SSL certificate
Configure a Secure Sockets Layer (SSL) certificate to build a chain of trust.
Configuring LDAPS authentication
Configure a Server LDAP (LDAPS) authentication repository for your IBM QRadar system.
Synchronizing data with an LDAP server
You can manually synchronize data between the IBM QRadar server and the LDAP
authentication server.
Configuring SSL or TLS certificates
If you use an LDAP directory server for user authentication and you want to enable SSL
•
•
•
encryption or TLS authentication, you must configure your SSL or TLS certificate. QRadar
LDAP authentication uses TLS 1.2.
Displaying hover text for LDAP information
You create an LDAP properties configuration file to display LDAP user information as hover
text. This configuration file queries the LDAP database for LDAP user information that is
associated with events, offenses, or assets (if available).
Multiple LDAP repositories
You can configure IBM QRadar to map entries from multiple LDAP repositories into a single
virtual repository.
Example: Least privileged access configuration and set up
Grant users only the minimum amount of access that they require to do their day-to-day
tasks.
SAML single sign-on authentication
Security Assertion Markup Language (SAML) is a framework for authentication and authorization
between a service provider (SP) and an identity provider (IDP) where authentication is exchanged
using digitally signed XML documents. The service provider agrees to trust the identity provider to
authenticate users. In return, the identity provider generates an authentication assertion, which
indicates that a user has been authenticated.
By using the SAML authentication feature, you can easily integrate QRadar® with your corporate
identity server to provide single sign-on, and eliminate the need to maintain QRadar local users.
Users who are authenticated to your identity server can automatically authenticate to QRadar. They
don't need to remember separate passwords or type in credentials every time they access QRadar.
QRadar is fully compatible with SAML 2.0 web SSO profile as a service provider. It supports both SP
and IDP initiated single sign-on and single logout.
Configuring SAML authentication
You can configure IBM® QRadar to use the Security Assertion Markup Language (SAML) 2.0 single
sign-on framework for user authentication and authorization.
Importing a new certificate for signing and decrypting
The QRadar SAML 2.0 feature has options to use an x509 certificate other than the
provided QRadar_SAML certificate for signing and encryption.
Setting up SAML with Microsoft Active Directory Federation Services
After you configure SAML in QRadar, you can configure your Identity Provider by using the XML
metadata file that you created during that process. This example includes instructions for
configuring Microsoft Active Directory Federation Services (AD FS) to communicate
with QRadar using the SAML 2.0 single sign-on framework.
Troubleshooting SAML authentication
Use the following information to troubleshoot errors and issues when using SAML 2.0 with QRadar.
SAML single sign-on authentication
Security Assertion Markup Language (SAML) is a framework for authentication and authorization
between a service provider (SP) and an identity provider (IDP) where authentication is exchanged
using digitally signed XML documents. The service provider agrees to trust the identity provider to
authenticate users. In return, the identity provider generates an authentication assertion, which
indicates that a user has been authenticated.
By using the SAML authentication feature, you can easily integrate QRadar® with your corporate
identity server to provide single sign-on, and eliminate the need to maintain QRadar local users.
Users who are authenticated to your identity server can automatically authenticate to QRadar. They
don't need to remember separate passwords or type in credentials every time they access QRadar.
QRadar is fully compatible with SAML 2.0 web SSO profile as a service provider. It supports both SP
and IDP initiated single sign-on and single logout.
•
•
•
•
Configuring SAML authentication
You can configure IBM® QRadar to use the Security Assertion Markup Language (SAML) 2.0
single sign-on framework for user authentication and authorization.
Importing a new certificate for signing and decrypting
The QRadar SAML 2.0 feature has options to use an x509 certificate other than the
provided QRadar_SAML certificate for signing and encryption.
Setting up SAML with Microsoft Active Directory Federation Services
After you configure SAML in QRadar, you can configure your Identity Provider by using the
XML metadata file that you created during that process. This example includes instructions
for configuring Microsoft Active Directory Federation Services (AD FS) to communicate
with QRadar using the SAML 2.0 single sign-on framework.
Troubleshooting SAML authentication
Use the following information to troubleshoot errors and issues when using SAML 2.0
with QRadar.
Configuring TACACS authentication
You can configure TACACS authentication on your IBM® QRadar® system.
Procedure
1.
2.
3.
4.
On the Admin tab, click Authentication.
Click Authentication Module Settings.
From the Authentication Module list, select TACACS Authentication.
Configure the parameters:
a. In the TACACS Server field, type the host name or IP address of the TACACS server.
b. In the TACACS Port field, type the port of the TACACS server.
c. From the Authentication Type list box, select the type of authentication you want to
perform.
Choose from the following options:
Option Description
ASCII
American Standard Code for Information Interchange (ASCII) sends the user name
and password in clear text.
PAP
Password Authentication Protocol (PAP) sends clear text between the user and the
server. PAP is the default authentication type.
CHAP
Challenge Handshake Authentication Protocol (CHAP) establishes a Point-to-Point
Protocol (PPP) connection between the user and the server.
MSCHAPMicrosoft Challenge Handshake Authentication Protocol (MSCHAP) authenticates
remote Windows workstations.
d. In the Shared Secret field, type the shared secret that QRadar uses to encrypt
TACACS passwords for transmission to the TACACS server.
5. Click Save Authentication Module.
What to do next
For TACACS user authentication, you must create a local QRadar user account that is the same as
the TACACS account on the authentication server.
Section 6: Reporting, Searching, and Offense Management
This section accounts for 13% of the exam (8 out of 62 questions).
TASK: 6.1 Manage reports
SUBTASKS:
6.1.1. Create reports with different chart types
• Chart types - data types
6.1.2. Create custom reports
• Selecting frequency of report generation
• Options for different distribution channels
6.1.3. Explain difference between scheduled reports and reports run on raw data
Chart types
When you create a report, you must choose a chart type for each chart you include in your report.
The chart type determines how the data and network objects appear in your report.
You can use any of the following types of charts:
Chart Type
Description
None
Use this option if you need white space in your report. If you select the None option for any
container, no further configuration is required for that container.
Use this chart to view vulnerability data for each defined asset in your deployment. You can
Asset
generate Asset Vulnerability charts when vulnerabilities have been detected by a VA scan.
Vulnerabilities
This chart is available after you install IBM® QRadar® Vulnerability Manager.
Connections
This chart option is only displayed if you purchased and licensed IBM QRadar Risk
Manager. For more information, see the IBM QRadar Risk Manager User Guide.
Device Rules
This chart option is only displayed if you purchased and licensed IBM QRadar Risk
Manager. For more information, see the IBM QRadar Risk Manager User Guide.
Device Unused This chart option is only displayed if you purchased and licensed IBM QRadar Risk
Objects
Manager. For more information, see the IBM QRadar Risk Manager User Guide.
Events/Logs
Use this chart to view event information. You can base a chart on data from saved searches
on the Log Activity tab. You can configure the chart to plot data over a configurable period
of time to detect event trends. For more information about saved searches, see Event and
flow searches.
Log Sources
Use this chart to export or report on log sources. Select the log sources and log source
groups that you want to appear in the report. Sort log sources by report columns. Include
log sources that are not reported for a defined time period. Include log sources that were
created in a specified time period.
Flows
Use this chart to view flow information. You can base a chart on data from saved searches
on the Network Activity tab. You can configure the chart to plot flow data over a
configurable period of time to detect flow trends. For more information about saved
searches, see Event and flow searches.
Top Destination
Use this chart to display the top destination IPs in the network locations you select.
IPs
Top Offenses
Use this chart to display the top offenses that occur at present time for the network
locations you select.
Offenses Over
Time
Use this chart to display all offenses that have a start time within a defined time span for the
network locations you select.
Top Source IPs
Use this chart to display and sort the top offense sources (IP addresses) that attack your
network or business assets.
The Vulnerabilities option is only displayed when the IBM QRadar Vulnerability
Vulnerabilities Manager was purchased and licensed. For more information, see the IBM QRadar
Vulnerability Manager User Guide.
Table 1. Chart Types
Chart Type
Description
None
Use this option if you need white space in your report. If you select the None option for any
container, no further configuration is required for that container.
Chart Type
Description
Use this chart to view vulnerability data for each defined asset in your deployment. You can
Asset
generate Asset Vulnerability charts when vulnerabilities have been detected by a VA scan.
Vulnerabilities
This chart is available after you install IBM QRadar Vulnerability Manager.
The Vulnerabilities option is only displayed when the IBM QRadar Vulnerability
Vulnerabilities Manager was purchased and licensed. For more information, see the IBM QRadar
Vulnerability Manager User Guide.
Table 2. Chart Types
Report tab toolbar
You can use the toolbar to perform a number of actions on reports.
The following table identifies and describes the Reports toolbar options.
Option
Description
Group
Manage
Groups
Click Manage Groups to manage report groups. Using the Manage Groups feature, you can
organize your reports into functional groups. You can share report groups with other users.
Click Actions to perform the following actions:
•
•
•
•
•
Actions
•
•
•
•
Create - Select this option to create a new report.
Edit - Select this option to edit the selected report. You can also double-click a
report to edit the content.
Duplicate - Select this option to duplicate or rename the selected report.
Assign Groups - Select this option to assign the selected report to a report
group.
Share - Select this option to share the selected report with other users. You
must have administrative privileges to share reports.
Toggle Scheduling - Select this option to toggle the selected report to the
Active or Inactive state.
Run Report - Select this option to generate the selected report. To generate
multiple reports, hold the Control key and click on the reports you want to
generate.
Run Report on Raw Data - Select this option to generate the selected report
using raw data. This option is useful when you want to generate a report before
the required accumulated data is available. For example, if you want to run a
weekly report before a full week has elapsed since you created the report, you
can generate the report using this option.
Delete Report - Select this option to delete the selected report. To delete
multiple reports, hold the Control key and click on the reports you want to
delete.
Option
Description
•
Hide
Interactive
Reports
Delete Generated Content - Select this option to delete all generated content
for the selected rows. To delete multiple generated reports, hold the Control
key and click on the generate reports you want to delete.
Select this check box to hide inactive report templates. The Reports tab automatically
refreshes and displays only active reports. Clear the check box to show the hidden inactive
reports.
Type your search criteria in the Search Reports field and click the Search
Reports icon. A search is run on the following parameters to determine which match
your specified criteria:
Search
Reports
•
•
•
•
•
Report Title
Report Description
Report Group
Report Groups
Report Author User Name
Table 1. Report toolbar options
Creating custom reports
Use the Report wizard to create and customize a new report.
Before you begin
You must have appropriate network permissions to share a generated report with other users.
For more information about permissions, see the IBM® QRadar® Administration Guide.
About this task
The Report wizard provides a step-by-step guide on how to design, schedule, and generate reports.
The wizard uses the following key elements to help you create a report:
•
•
•
Layout - Position and size of each container
Container - Placeholder for the featured content
Content - Definition of the chart that is placed in the container
After you create a report that generates weekly or monthly, the scheduled time must elapse before
the generated report returns results. For a scheduled report, you must wait the scheduled time
period for the results to build. For example, a weekly search requires seven days to build the data.
This search will return results after 7 days.
When you specify the output format for the report, consider that the file size of generated reports
can be one to 2 megabytes, depending on the selected output format. PDF format is smaller in size
and does not use a large quantity of disk storage space.
Procedure
1.
2.
3.
4.
Click the Reports tab.
From the Actions list box, select Create.
On the Welcome to the Report wizard! window, click Next.
Select one of the following options:
Option
Description
ManuallyBy default, the report generates 1 time. You can generate the report as often as you
Hourly
Daily
want.
Schedules the report to generate at the end of each hour. The data from the
previous hour is used.
From the list boxes, select a time frame to begin and end the reporting cycle. A
report is generated for each hour within this time frame. Time is available in halfhour increments. The default is 1:00 a.m for both the From and To fields.
Schedules the report to generate at the end of each day. The data from the previous
day is used.
From the list boxes, select the time and the days of the week that you want the
report to run.
Weekly Schedules the report to generate weekly using the data from the previous calendar
week, from Monday to Sunday.
Select the day that you want to generate the report. The default is Monday. From
the list box, select a time to begin the reporting cycle. Time is available in half-hour
increments. The default is 1:00 a.m.
Monthly Schedules the report to generate monthly using the data from the previous
calendar month.
From the list box, select the date that you want to generate the report. The default
is the first day of the month. Select a time to begin the reporting cycle. Time is
available in half-hour increments. The default is 1:00 a.m.
5. In the Allow this report to generate manually pane, Yes or No.
6. Configure the layout of your report:
a. From the Orientation list box, select Portrait or Landscape for the page orientation.
b. Select one of the six layout options that are displayed on the Report wizard.
c. Click Next .
7. Specify values for the following parameters:
Parameter
Values
Report Title
The title can be up to 60 characters in length. Do not use special characters.
Parameter
Values
Logo
From the list box, select a logo.
Pagination
Options
From the list box, select a location for page numbers to display on the report. You can
choose not to have page numbers display.
Report
Type a classification for this report. You can type up to 75 characters in length. You
Classification can use leading spaces, special characters, and double byte characters. The report
classification displays in the header and footer of the report. You might want to
classify your report as confidential, highly
confidential, sensitive, or internal.
8. Configure each container in the report:
a. From the Chart Type list box, select a chart type.
b. On the Container Details window, configure the chart parameters.
Note: You can also create asset saved searches. From the Search to use list box,
select your saved search.
c. Click Save Container Details.
d. If you selected more than one container, repeat steps a to c.
e. Click Next .
9. Preview the Layout Preview page, and then click Next.
10. Select the check boxes for the report formats you want to generate, and then click Next.
Important: Extensible Markup Language is only available for tables.
11. Select the distribution channels for your report, and then click Next. Options include the
following distribution channels:
Option
Description
Report Console
Select this check box to send the generated report to
the Reports tab. Report Console is the default distribution channel.
Select the users that
This option displays after you select the Report Console check
should be able to view the box.
generated report.
Select all users
Email
From the list of users, select the users that you want to grant
permission to view the generated reports.
This option is only displayed after you select the Report
Console check box. Select this check box if you want to grant
permission to all users to view the generated reports.
You must have appropriate network permissions to share the
generated report with other users.
Select this check box if you want to distribute the generated
report by email.
Option
Description
Enter the report
distribution email
address(es)
This option is only displayed after you select the Email check box.
Type the email address for each generated report recipient;
separate a list of email addresses with commas. The maximum
characters for this parameter are 255.
Email recipients receive this email from
no_reply_reports@qradar.
Include Report as
attachment (non-HTML
only)
This option is only displayed after you select the Email check box. Select
this check box to send the generated report as an attachment.
Include link to Report
Console
This option is only displayed after you select the Email check box.
Select this check box to include a link to the Report Console in the
email.
12. On the Finishing Up page, enter values for the following parameters.
Option
Description
Report Description
Type a description for this report. The description is displayed
on the Report Summary page and in the generated report
distribution email.
Please select any groups you
would like this report to be a
member of
Select the groups to which you want to assign this report. For
more information about groups, see Report groups.
Would you like to run the report Select this check box if you want to generate the report when
now?
the wizard is complete. By default, the check box is selected.
13. Click Next to view the report summary.
14. On the Report Summary page, select the tabs available on the summary report to preview
your report configuration.
Results
The report immediately generates. If you cleared the Would you like to run the report now check
box on the final page of the wizard, the report is saved and generates at the scheduled time. The
report title is the default title for the generated report. If you reconfigure a report to enter a new
report title, the report is saved as a new report with the new name; however, the original report
remains the same.
Deleting generated content
When you delete generated content, all reports that have generated from the report template are
deleted, but the report template is retained.
Procedure
1. Click the Reports tab.
2. Select the reports for which you want to delete the generated content.
3. From the Actions list box, click Delete Generated Content.
Manually generating a report
A report can be configured to generate automatically, however, you can manually generate a report
at any time.
About this task
While a report generates, the Next Run Time column displays one of the three following messages:
•
•
•
Generating - The report is generating.
Queued (position in the queue) - The report is queued for generation. The message
indicates the position that the report is in the queue. For example, 1 of 3.
(x hour(s) x min(s) y sec(s)) - The report is scheduled to run. The message is a count-down
timer that specifies when the report will run next.
You can select the Refresh icon to refresh the view, including the information in the Next Run
Time column.
Procedure
1. Click the Reports tab.
2. Select the report that you want to generate.
3. Click Run Report.
What to do next
After the report generates, you can view the generated report from the Generated Reports column.
TASK: 6.2 Utilize different search types
SUBTASKS:
6.2.1. Save search criteria for further use
6.2.2. Use AQL for searches
6.2.3. When to use quick search
6.2.4. Query with dynamic search
Querying with dynamic search
Use the dynamic search API to search for data that involves aggregated functions, such
as COUNT, SUM, MAX, and AVG. For example, you can count the number of asset IDs per asset
hostname by using the COUNT_PER function.
About this task
You can build your query on the following data sources:
•
•
•
Assets
Offenses
Vulninstances
You can add a field without a function as a simple field, or you can add a field with a function as a
complex field to build columns. You can also add conditions to filter your data.
Procedure
1.
2.
3.
4.
5.
Click the Admin tab.
In the Dynamic Search section, click Dynamic Search.
Select a Data Source.
Complete the Available Columns and Available Filters sections.
To add a name, description, range of the search, retention period, or search type to your
query, enable one or more Extra Search Properties.
6. To copy your JSON script, click Generate JSON.
Your results appear in the JSON generated by your query section. Click Copy to
Clipboard to copy your JSON script.
7. To reset your selections, click Reset.
8. Click Run Query.
Results
The results of your query are listed in plain text or link format. For example, if you chose to query
the ASSET_ID field, you can click the results to view the Asset Summary window for each asset ID.
Converting a saved search to an AQL string
Convert a saved search to an AQL string and modify it to create your own searches to quickly find
the data you want. Now you can create searches faster than by typing the search criteria. You can
also save the search for future use.
Procedure
1. Click the Log Activity or Network Activity tab.
2.
3.
4.
5.
6.
7.
8.
9.
From the Search list, select New Search or Edit Search.
Select a previously saved search.
Click Show AQL.
From the AQL window, click Copy to Clipboard.
In the Search Mode section, click Advanced Search.
Paste the AQL string text into the Advanced Search text box.
Modify the string to include the data you want to find.
Click Search to display the results.
What to do next
Save the search criteria so that the search appears in your list of saved searches and can be reused.
AQL search string examples
Use the Ariel Query Language (AQL) to retrieve specific fields from the events, flows, and simarc
tables in the Ariel database.
Note: When you build an AQL query, if you copy text that contains single quotation marks from any
document and paste the text into IBM® QRadar®, your query will not parse. As a workaround, you can paste
the text into QRadar and retype the single quotation marks, or you can copy and paste the text from the IBM
Knowledge Center.
Reporting account usage
Different user communities can have different threat and usage indicators.
Use reference data to report on several user properties, for example, department, location, or
manager. You can use external reference data.
The following query returns metadata information about the user from their login events.
SELECT
REFERENCETABLE('user_data','FullName',username) as 'Full Name',
REFERENCETABLE('user_data','Location',username) as 'Location',
REFERENCETABLE('user_data','Manager',username) as 'Manager',
DISTINCTCOUNT(username) as 'Userid Count',
DISTINCTCOUNT(sourceip) as 'Source IP Count',
COUNT(*) as 'Event Count'
FROM events
WHERE qidname(qid) ILIKE '%logon%'
GROUP BY 'Full Name', 'Location', 'Manager'
LAST 1 days
Insight across multiple account identifiers
In this example, individual users have multiple accounts across the network. The organization
requires a single view of a users activity.
Use reference data to map local user IDs to a global ID.
The following query returns the user accounts that are used by a global ID on events that are
flagged as suspicious.
SELECT
REFERENCEMAP('GlobalID Mapping',username) as 'Global ID',
REFERENCETABLE('user_data','FullName', 'Global ID') as 'Full Name',
DISTINCTCOUNT(username),
COUNT(*) as 'Event count'
FROM events
WHERE RULENAME(creEventlist) ILIKE '%suspicious%'
GROUP BY 'Global ID'
LAST 1 days
The following query shows the activities that are completed by a global ID.
SELECT
QIDNAME(qid) as 'Event name',
starttime as 'Time',
sourceip as 'Source IP', destinationip as 'Destination IP',
username as 'Event Username',
REFERENCEMAP('GlobalID_Mapping', username)as 'Global User'
FROM events
WHERE 'Global User' = 'John Doe'
LAST 1 days
Identify suspicious long-term beaconing
Many threats use command and control to communicate periodically over days, weeks, and months.
Advanced searches can identify connection patterns over time. For example, you can query
consistent, short, low volume, number of connections per day/week/month between IP addresses,
or an IP address and geographical location.
The following query detects potential instances of hourly beaconing.
SELECT sourceip, destinationip,
DISTINCTCOUNT(DATEFORMAT(starttime,'HH')) as 'different hours',
COUNT(*) as 'total flows'
FROM flows
WHERE flowdirection = 'L2R'
GROUP BY sourceip, destinationip
HAVING "different hours" > 20
AND "total flows" < 25
LAST 24 hours
Tip: You can modify this query to work on proxy logs and other event types.
The following query detects potential instances of daily beaconing.
SELECT sourceip, destinationip,
DISTINCTCOUNT(DATEFORMAT(starttime,'dd'))as 'different days',
COUNT(*) as 'total flows'
FROM flows
WHERE flowdirection='L2R'
GROUP BY sourceip, destinationip
HAVING "different days" > 4
AND "total flows" < 14
LAST 7 days
The following query detects daily beaconing between a source IP and a destination IP. The
beaconing times are not at the same time each day. The time lapse between beacons is short.
SELECT
sourceip,
LONG(DATEFORMAT(starttime,'hh')) as hourofday,
(AVG( hourofday*hourofday) - (AVG(hourofday)^2))as variance,
COUNT(*) as 'total flows'
FROM flows
GROUP BY sourceip, destinationip
HAVING variance < 01 and "total flows" < 10
LAST 7 days
The following query detects daily beaconing to a domain by using proxy log events. The beaconing
times are not at the same time each day. The time lapse between beacons is short.
SELECT sourceip,
LONG(DATEFORMAT(starttime,'hh')) as hourofday,
(AVG(hourofday*hourofday) - (AVG(hourofday)^2)) as variance,
COUNT(*) as 'total events'
FROM events
WHERE LOGSOURCEGROUPNAME(devicegrouplist) ILIKE '%proxy%'
GROUP BY url_domain
HAVING variance < 0.1 and "total events" < 10
LAST 7 days
The url_domain property is a custom property from proxy logs.
External threat intelligence
Usage and security data that is correlated with external threat intelligence data can provide
important threat indicators.
Advanced searches can cross-reference external threat intelligence indicators with other security
events and usage data.
This query shows how you can profile external threat data over many days, weeks, or months to
identify and prioritize the risk level of assets and accounts.
Select
REFERENCETABLE('ip_threat_data','Category',destinationip) as 'Category',
REFERENCETABLE('ip_threat_data','Rating', destinationip) as 'Threat Rating',
DISTINCTCOUNT(sourceip) as 'Source IP Count',
DISTINCTCOUNT(destinationip) as 'Destination IP Count'
FROM events
GROUP BY 'Category', 'Threat Rating'
LAST 1 days
Asset intelligence and configuration
Threat and usage indicators vary by asset type, operating system, vulnerability posture, server
type, classification, and other parameters.
In this query, advanced searches and the asset model provide operational insight into a location.
The Assetproperty function retrieves property values from assets, which enables you to include
asset data in the results.
SELECT
ASSETPROPERTY('Location',sourceip) as location,
COUNT(*) as 'event count'
FROM events
GROUP BY location
LAST 1 days
The following query shows how you can use advanced searches and user identity tracking in the
asset model.
The AssetUser function retrieves the user name from the asset database.
SELECT
APPLICATIONNAME(applicationid) as App,
ASSETUSER(sourceip, now()) as srcAssetUser,
COUNT(*) as 'Total Flows'
FROM flows
WHERE srcAssetUser IS NOT NULL
GROUP BY App, srcAssetUser
ORDER BY "Total Flows" DESC
LAST 3 HOURS
Network LOOKUP function
You can use the Network LOOKUP function to retrieve the network name that is associated with
an IP address.
SELECT NETWORKNAME(sourceip) as srcnet,
NETWORKNAME(destinationip) as dstnet
FROM events
Rule LOOKUP function
You can use the Rule LOOKUP function to retrieve the name of a rule by its ID.
SELECT RULENAME(123) FROM events
The following query returns events that triggered a specific rule name.
SELECT * FROM events
WHERE RULENAME(creEventList) ILIKE '%my rule name%'
Full TEXT SEARCH
You can use the TEXT SEARCH operator to do full text searches by using the Advanced
search option.
In this example, there are a number of events that contain the word "firewall" in the payload. You
can search for these events by using the Quick filter option and the Advanced search option on
the Log Activity tab.
•
•
To use the Quick filter option, type the following text in the Quick filter box: 'firewall'
To use the Advanced search option, type the following query in the Advanced search box:
SELECT QIDNAME(qid) AS EventName, * from events where TEXT SEARCH
'firewall'
Custom property
You can access custom properties for events and flows when you use the Advanced search option.
The following query uses the custom property "MyWebsiteUrl" to sort events by a particular web URL:
SELECT "MyWebsiteUrl", * FROM events ORDER BY "MyWebsiteUrl"
TASK: 6.3 Manage offenses
SUBTASKS:
6.3.1. Understand how offense renaming works
• Hot and Cold rules
6.3.2. Demonstrate how offense indexing Works
6.3.3. Demonstrate how offense indexing is related to offense chaining
6.3.4. Set offense prioritization with rule action options
6.3.5. Implement Soft Clean SIM data clean
6.3.6. Understand how and why to protect offenses
Offense chaining
IBM® QRadar® chains offenses together to reduce the number of offenses that you need to review,
which reduces the time to investigate and remediate the threat.
Offense chaining helps you find the root cause of a problem by connecting multiple symptoms
together and showing them in a single offense. By understanding how an offense changed over
time, you can see things that might be overlooked during your analysis. Some events that would not
be worth investigating on their own might suddenly be of interest when they are correlated with
other events to show a pattern.
Offense chaining is based on the offense index field that is specified on the rule. For example, if your
rule is configured to use the source IP address as the offense index field, there is only one offense
that has that source IP address for while the offense is active.
You can identify a chained offense by looking for preceded by in the Description field on
the Offense Summary page. In the following example, QRadar combined all of the events that
fired for each of the three rules into one offense, and appended the rule names to
the Description field:
Exploit Followed By Suspicious Host Activity - Chained
preceded by Local UDP Scanner Detected
preceded by XForce Communication to a known Bot Command and Control
Offense indexing
Offense indexing provides the capability to group events or flows from different rules indexed on
the same property together in a single offense.
IBM® QRadar® uses the offense index parameter to determine which offenses to chain together.
For example, an offense that has only one source IP address and multiple destination IP addresses
indicates that the threat has a single attacker and multiple victims. If you index this type of offense
by the source IP address, all events and flows that originate from the same IP address are added to
the same offense.
You can configure rules to index an offense based on any piece of information. QRadar includes a
set of predefined, normalized fields that you can use to index your offenses. If the field that you
want to index on is not included in the normalized fields, create a custom event or a custom flow
property to extract the data from the payload and use it as the offense indexing field in your rule.
The custom property that you index on can be based on a regular expression, a calculation, or an
AQL-based expression.
Offense indexing considerations
It is important to understand how offense indexing impacts your IBM QRadar deployment.
System performance
Ensure that you optimize and enable all custom properties that are used for offense indexing. Using
properties that are not optimized can have a negative impact on performance.
When you create a rule, you cannot select non-optimized properties in the Index offense based
on field. However, if an existing rule is indexed on a custom property, and then the custom property
is de-optimized, the property is still available in the offense index list. Do not de-optimize custom
properties that are used in rules.
Rule action and response
When the indexed property value is null, an offense is not created, even when you select the Ensure
the detected event is part of an offense check box in the rule action. For example, if a rule is
configured to create an offense that is indexed by host name, but the host name in the event is
empty, an offense is not created even though all of the conditions in the rule tests are met.
When the response limiter uses a custom property, and the custom property value is null, the limit
is applied to the null value. For example, if the response is Email, and the limiter says Respond no
more than 1 time per 1 hour per custom property, if the rule fires a second time with a null
property within 1 hour, an email will not be sent.
When you index using a custom property, the properties that you can use in the rule index and
response limiter field depends on the type of rule that you are creating. An event rule accepts
custom event properties in the rule index and response limiter fields, while a flow rule accepts only
custom flow properties. A common rule accepts either custom event or custom flow properties in
the rule index and response limiter fields.
You cannot use custom properties to index an offense that is created by a dispatched event.
Payload contents
Offenses that are indexed by the Ariel Query Language (AQL), a regular expression (regex), or by a
calculated property include the same payload as the initial event that generated the offense.
Offenses that are indexed by a normalized event field, such as Source IP or Destination IP, include
the event name and description as the custom rules engine (CRE) payload.
Example: Detecting malware outbreaks based on the MD5 signature
As a network security analyst for a large organization, you use QRadar to detect when a malware
outbreak occurs. You set the criteria for an outbreak as a threat that occurs across 10 hosts within 4
hours. You want to use the MD5 signature as the basis for this threat detection.
You configure IBM® QRadar to evaluate the incoming logs to determine whether a threat exists, and
then you group all of the fired rules that contain the same MD5 signature into a single offense.
1. Create a custom property to extract the MD5 signature from the logs. Ensure that the custom
property is optimized and enabled.
2. Create a rule and configure the rule to create an offense that uses the MD5 signature custom
property as the offense index field. When the rule fires, an offense is created. All fired rules
that have the same MD5 signature are grouped into one offense.
3. You can search by offense type to find the offenses that are indexed by the MD5 signature
custom property.
TASK: 6.4 Sharing content among users
SUBTASKS:
6.4.1. Share reports with other users
• Understand the available sharing options
6.4.2. Sharing dashboard items with other users
• Requirement to share a dashboard
• Available Parameters
6.4.3. How to share a search criterio
Sharing report groups
You can share report groups with other users.
Before you begin
You must have administrative permissions to share a report group with other users.
For more information about permissions, see the IBM® QRadar® Administration Guide.
You cannot use the Content Management Tool (CMT) to share report groups.
For more information about the CMT, see the IBM QRadar Administration Guide
About this task
On the Report Groups window, shared users can see the report group in the report list.
To view a generated report, the user must have permission to view the report.
Procedure
1. Click the Reports tab.
2. On the Reports window, click Manage Groups.
3. On the Report Groups window, select the report group that you want to share and
click Share.
4. On the Sharing Options window, select one of the following options.
Option
Description
Default (inherit from parent)
The report group is not shared.
Any copied report group or generated report remains in the
users report list.
Share with Everyone
Each report in the group is assigned any parent report
sharing option that was configured.
The report group is shared with all users.
Restriction: You must have the Admin security profile to share
search requirements.
Share with users matching the
following criteria...
The report group is shared with specific users.
User Roles
Select from the list of user roles and press the add icon
(+).
Option
Description
Security Profiles
Select from the list of security profiles and press the add
icon (+).
5. Click Save.
Results
On the Report Groups window, shared users see the report group in the report list. Generated reports
display content based on security profile setting.
QRadar: Sharing Dashboard Items
Question & Answer
Question
How do I create and share a custom Dashboard Item that can be shared with other users?
Answer
To create a Dashboard Item that can be shared with other users, there are three main
steps that need to be taken:
1. Create and share the Search Criteria, that the Dashboard Item will use.
2. Have Users modify the shared Search Criteria for use on their Dashboards.
3. Have Users add the shared Search Criteria as a Dashboard Item.
Create and share the Search Criteria, that the Dashboard Item will use
The following steps can be used to create a search that can be used as a Dashboard Item
for all users:
Note: The user account initiating this process must be in the Admin User Role. Only users
in the Admin User Role have the ability to share saved Search Criteria.
Parameter
Description
Search Name
Type the unique name that you want to assign to this search criteria. You will provide
this Search Name to other users that might want to use the search for their Dashboard
Item.
Select the check box for the group you want to assign this saved search. If you do not
Assign Search to
select a group, this saved search is assigned to the Other group by default. For more
Group(s)
information, see Managing search groups.
Manage Groups
If you want to manage search groups, click Manage Groups. For more information,
see Managing search groups.
Choose one of the following options:
Last Interval (auto refresh) - Select this option to filter your search results
while in auto-refresh mode. The Log Activity and Network Activity tabs
refreshes at one-minute intervals to display the most recent information.
• Recent - Select this option and from this list box, select the time range that you
want to filter for.
• Specific Interval - Select this option and from the calendar, select the date and
time range you want to filter for.
Include in my
If you want to include this search in your Quick Search list box on the toolbar, select this
Quick Searches check box.
•
Timespan
options:
Include in my
Dashboard
This check box must be checked to include the data from your saved search on the
Dashboard tab. For more information about the Dashboard tab, see Dashboard
management.
Note: This parameter is only displayed if the search is grouped.
Set as Default
If you want to set this search as your default search, select this check box.
Share with
Everyone
This check box must be checked to share the search criteria with all users.
1. Choose one of the following options:
o Click the Log Activity tab.
o Click the Network Activity tab.
2. Perform a search that uses at least one Group By option.
3. Click Search.
4. Click Save Criteria.
5. Enter a Search Name.
6. Assign the search to a Group.
7. Click Include in my Dashboard.
8. Click OK.
Have Users modify the shared Search Criteria for use on their Dashboards
The following steps are required by the Users that want to use the previously shared
Search Criteria as a Dashboard Item:
1. Choose one of the following options:
o To add a Flow search Dashboard Item, click the Network Activity tab.
o To add an Event search Dashboard Item, click the Log Activity tab
Note: If the Log Activity, or Network Activity tabs are not visible, the User
does not have proper permissions to view searches assigned to their User
account.
2. Navigate to Search > New Search.
3. Select the Search Name of the shared search that was provided by the User in the
Admin Role, from the Available Saved Searches list.
4. Click the Load icon.
5. Click any of the Search icons. The search results are displayed.
6. Enter a new name for the search.
7. Check the Include in my Dashboard check box.
8. Click Save Criteria.
9. Click OK.
Have Users add the shared Search Criteria as a Dashboard Item
Each user that wants to add the shared search as a Dashboard Item needs to do the
following:
1. Click the Dashboard tab.
2. In the Show Dashboard list, select the Dashboard you want to add the new
Dashboard Item to.
3. Choose one of the following options:
o To add a Log Activity search Dashboard Item, navigate to Add Item > Log
Activity > Event Searches.
o To add a Network Activity search Dashboard Item, navigate to Add Item >
Network Activity > Flow Searches.
4. Select the Search Name of the shared search, that was provided by the User in the
Admin Role, from the list. The new Dashboard Item is now added to the Dashboard
that you are currently on.
Section 7: Tenants and Domains
This section accounts for 8% of the exam (5 out of 62 questions).
TASK: 7.1 Differentiate network hierarchy and domain definition
SUBTASKS:
7.1.1. Assign parts of the network hierarchy to specific domains
7.1.2. Show that an event is assigned to a domain
• A single log source may provide events to multiple domains
7.1.3. Understand constraints for defining the network hierarchy
Domain segmentation
Segmenting your network into different domains helps to ensure that relevant information is available
only to those users that need it.
You can create security profiles to limit the information that is available to a group of users within
that domain. Security profiles provide authorized users access to only the information that is
required to complete their daily tasks. You modify only the security profile of the affected users,
and not each user individually.
You can also use domains to manage overlapping IP address ranges. This method is helpful when
you are using a shared IBM® QRadar® infrastructure to collect data from multiple networks. By
creating domains that represent a particular address space on the network, multiple devices that
are in separate domains can have the same IP address and still be treated as separate devices.
Figure 1. Domain segmentation
Overlapping IP addresses
An overlapping IP address is an IP address that is assigned to more than one device or logical unit,
such as an event source type, on a network. Overlapping IP address ranges can cause significant
problems for companies that merge networks after corporate acquisitions, or for Managed Security
Service Providers (MSSPs) who are bringing on new clients.
IBM® QRadar® must be able to differentiate events and flows that come from different devices and
that have the same IP address. If the same IP address is assigned to more than one event source,
you can create domains to distinguish them.
For example, let's look at a situation where Company A acquires Company B and wants to use
a shared instance of QRadar to monitor the new company's assets. The acquisition has a
similar network structure that results in the same IP address being used for different log
sources in each company. Log sources that have the same IP address cause problems with
correlation, reporting, searching, and asset profiling.
To distinguish the origin of the events and flows that come in to QRadar from the log source,
you can create two domains and assign each log source to a different domain. If required, you
can also assign each event collector and flow collector to the same domain as the log source
that sends events to them.
To view the incoming events by domain, create a search and include the domain information in
the search results.
Domain definition and tagging
Domains are defined based on IBM QRadar input sources. When events and flows come
into QRadar, the domain definitions are evaluated and the events and flows are tagged with the
domain information.
Specifying domains for events
The following diagram shows the precedence order for evaluating domain criteria for events.
Figure 1. Precedence order for events
These are the ways to specify domains for events:
Custom properties
You can apply custom properties to the log messages that come from a log source.
Important: When you create your custom event property, ensure that the Enable for use in Rules,
Forwarding Profiles and Search Indexing check box is selected.
To determine which domain that specific log messages belong to, the value of the custom
property is looked up against a mapping that is defined in the Domain Management editor.
This option is used for multi-address-range or multi-tenant log sources, such as file servers
and document repositories.
Disconnected Log Collector
You can use a Disconnected Log Collector (DLC) for domain mapping. DLCs append their universally
unique identifiers (UUIDs) to the Log Source Identifier value of the events they collect. Appending
the UUID to the Log Source Identifier value ensures that the Log Source Identifier is unique.
Log sources
You can configure specific log sources to belong to a domain.
This method of tagging domains is an option for deployments in which an Event
Collector can receive events from multiple domains.
Log source groups
You can assign log source groups to a specific domain. This option allows broader control over the
log source configuration.
Any new log sources that are added to the log source group automatically get the domain
tagging that is associated with the log source group.
Event collectors
If an event collector is dedicated to a specific network segment, IP address range, tenant, geographic
location, or business unit, you can flag that entire event collector as part of that domain.
All events that arrive at that event collector belong to the domain that the event collector is
assigned to, unless the log source for the event belongs to another domain based on other
tagging methods higher in precedence, such as a custom property.
Important:
If a log source is redirected from one event collector to another in a different domain, you
must add a domain mapping to the log source to ensure that events from that log source are
still assigned to the right domain.
Unless the log source is mapped to the right domain, nonadmin users with domain
restrictions might not see offenses that are associated with the log source.
Specifying domains for flows
The following diagram shows the precedence order for evaluating domain criteria for flows.
Figure 2. Precedence order for flows
These are the ways to specify domains for flows:
Flow collectors
You can assign specific QFlow collectors to a domain.
All flow sources that arrive at that flow collector belong to the domain; therefore, any new
auto-detected flow sources are automatically added to the domain.
Flow sources
You can designate specific flow sources to a domain.
This option is useful when a single QFlow collector is collecting flows from multiple network
segments or routers that contain overlapping IP address ranges.
Flow VLAN ID
You can designate specific VLANs to a domain.
This option is useful when you collect traffic from multiple network segments, often with
overlapping IP ranges. This VLAN definition is based on the Enterprise and Customer VLAN
IDs.
The following information elements are sent from QFlow when flows that contain VLAN information
are analyzed. These two fields can be assigned in a domain definition:
•
•
PEN 2 (IBM), element ID 82: Enterprise VLAN ID
PEN 2 (IBM), element ID 83: Customer VLAN ID
Specifying domains for scan results
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
You can also assign vulnerability scanners to a specific domain so that scan results are properly
flagged as belonging to that domain. A domain definition can consist of all QRadar input sources.
For more information about assigning your network to preconfigured domains, see Network
hierarchy.
Precedence order for evaluating domain criteria
When events and flows come into the QRadar system, the domain criteria is evaluated based on the
granularity of the domain definition.
If the domain definition is based on an event, the incoming event is first checked for any custom
properties that are mapped to the domain definition. If the result of a regular expression that is
defined in a custom property does not match a domain mapping, the event is automatically
assigned to the default domain.
If the event does not match the domain definition for custom properties, the following order of
precedence is applied:
1.
2.
3.
4.
DLC
Log source
Log source group
Event Collector
If the domain is defined based on a flow, the following order of precedence is applied:
1. Flow source
2. Flow Collector
If a scanner has an associated domain, all assets that are discovered by the scanner are
automatically assigned to the same domain as the scanner.
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0 Update Package 6,
and is no longer supported in any version of IBM QRadar. For more information, see QRadar Vulnerability
Manager: End of service product notification (https://www.ibm.com/support/pages/node/6853425).
Forwarding data to another
QRadar system
Domain information is removed when data is forwarded to another QRadar system. Events and
flows that contain domain information are automatically assigned to the default domain on the
receiving QRadar system. To identify which events and flows are assigned to the default domain,
you can create a custom search on the receiving system. You might want to reassign these
events and flows to a user-defined domain.
Creating domains
Use the Domain Management window to create domains based on IBM QRadar input sources.
About this task
Use the following guidelines when you create domains:
•
•
•
Everything that is not assigned to a user-defined domain is automatically assigned to the
default domain. Users who have limited domain access should not have administrative
privileges because this privilege grants unlimited access to all domains.
You can map the same custom property to two different domains, however the capture
result must be different for each one.
You cannot assign a log source, log source group, or event collector to two different domains.
When a log source group is assigned to a domain, each of the mapped attributes is visible in
the Domain Management window.
Security profiles must be updated with an associated domain. Domain-level restrictions are not
applied until the security profiles are updated, and the changes deployed.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Domain Management.
3. To add a domain, click Add and type a unique name and description for the domain.
Tip: You can check for unique names by typing the name in the Input domain name search
box.
4. Depending on the domain criteria to be defined, click the appropriate tab.
o To define the domain based on a custom property, log source group, log source, or
event collector, click the Events tab.
o To define the domain based on a flow source, flow collector, or data gateway, click
the Flows tab.
o To define the domain based on a scanner, including IBM QRadar Vulnerability
Manager scanners, click the Scanners tab.
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in
7.5.0 Update Package 6, and is no longer supported in any version of IBM QRadar. For
more information, see QRadar Vulnerability Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
5. To assign a custom property to a domain, in the Capture Result box, type the text that
matches the result of the regular expression (regex) filter.
Important: You must select the Optimize parsing for rules, reports, and searches check
box in the Custom Event Properties window to parse and store the custom event property.
Domain segmentation will not occur if this option is not checked.
6. From the list, select the domain criteria and click Add.
7. After you add the source items to the domain, click Create.
What to do next
Create security profiles to define which users have access to the domains. After you create the first domain in
your environment, you must update the security profiles for all non-administrative users to specify the domain
assignment. In domain-aware environments, non-administrative users whose security profile does not specify a
domain assignment will not see any log activity or network activity.
Review the hierarchy configuration for your network, and assign existing IP addresses to the
proper domains. For more information, see Network hierarchy.
Creating domains for VLAN flows
Use the Domain Management window to create domains based on IBM QRadar VLAN flow sources.
Creating domains for VLAN flows
Use the Domain Management window to create domains based on IBM® QRadar® VLAN flow
sources.
About this task
In QRadar, you can assign domains to incoming flows based on the VLAN information that is
contained in the flow. The incoming flows are mapped to domains that contain the same VLAN
definition.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Domain Management.
3. Click Add and type a unique name and description for the domain.
Tip: You can check for unique names by typing the name in the Input domain name search
box.
Figure 1. Input domain name
4. Click the Flows tab, and then select Flow VLAN IDs.
5. Select the enterprise VLAN ID and Customer VLAN ID values that match the values on the
incoming flows, and then click Add.
Notes:
o
o
The Enterprise VLAN ID (IE): 82 is specified by Private Enterprise Number (PEN): 2,
Information Element (IE) on incoming flows.
The Customer VLAN ID is specified by PEN: 2 and IE: 83 on incoming flows.
Figure 2. New Domain
6. In the Name field, type a unique name for the domain and then click Create.
Results
The domain definition is created and incoming flows are mapped. Tenant assignment to a domain
occurs as normal.Figure 3. Domain definition created
Domain privileges that are derived from security profiles
You can use security profiles to grant domain privileges and ensure that domain restrictions are
respected throughout the entire IBM QRadar system. Security profiles also make it easier to manage
privileges for a large group of users when your business requirements suddenly change.
Users can see only data within the domain boundaries that are set up for the security profiles
that are assigned to them. Security profiles include domains as one of the first criteria that is
evaluated to restrict access to the system. When a domain is assigned to a security profile, it
takes priority over other security permissions. After domain restrictions are evaluated,
individual security profiles are assessed to determine network and log permissions for that
particular profile.
For example, a user is given privileges to Domain_2 and access to network 10.0.0.0/8. That
user can see only events, offenses, assets, and flows that come from Domain_2 and contain an
address from the 10.0.0.0/8 network.
As a QRadar administrator, you can see all domains and you can assign domains to nonadministrative users. Do not assign administrative privileges to users whom you want to limit
to a particular domain.
Security profiles must be updated with an associated domain. Domain-level restrictions are
not applied until the security profiles are updated, and the changes are deployed.
When you assign domains to a security profile, you can grant access to the following types of
domains:
User-defined domains
You can create domains that are based on input sources by using the Domain Management tool.
For more information, see Creating domains.
Default domain
Everything that is not assigned to a user-defined domain is automatically assigned to the default
domain. The default domain contains system-wide events.
Note: Users who have access to the default domain can see system-wide events without restriction.
Ensure that this access is acceptable before you assign default domain access to users. All
administrators have access to the default domain.
Any log source that gets auto-discovered on a shared event collector (one that is not
explicitly assigned to a domain), is auto-discovered on the default domain. These log sources
require manual intervention. To identify these log sources, you must periodically run a
search in the default domain that is grouped by log source.
All domains
Users who are assigned to a security profile that has access to All Domains can see all active
domains within the system, the default domain, and any domains that were previously deleted
across the entire system. They can also see all domains that are created in the future.
Important: If you need to assign a user to a security profile which has a different domain profile, delete the
user account and recreate it.
If you delete a domain, it cannot be assigned to a security profile. If the user has the All
domains assignment, or if the domain was assigned to the user before it was deleted, the
deleted domain is returned in historical search results for events, flows, assets, and offenses.
You can't filter by deleted domains when you run a search.
Administrative users can see which domains are assigned to the security profiles on
the Summary tab in the Domain Management window.
Rule modifications in domain-aware environments
Rules can be viewed, modified, or disabled by any user who has both the Maintain Custom
Rules and View Custom Rules permissions, regardless of which domain that user belongs to.
Important: When you add the Log Activity capability to a user role, the Maintain Custom Rules and View
Custom Rules permissions are automatically granted. Users who have these permissions have access to all
log data for all domains, and they can edit rules in all domains, even if their security profile settings have
domain-level restrictions. To prevent domain users from being able to access log data and modify rules in
other domains, edit the user role and remove the Maintain Custom Rules and View Custom
Rules permissions.
Domain-aware searches
You can use domains as search criteria in custom searches. Your security profile controls which
domains you can search against.
System-wide events and events that are not assigned to a user-defined domain are automatically
assigned to the default domain. Administrators, or users who have a security profile that provides
access to the default domain, can create a custom search to see all events that are not assigned to a
user-defined domain.
The default domain administrator can share a saved search with other domain users. When the
domain user runs that saved search, the results are limited to their domain.
Domain-specific rules and offenses
A rule can work in the context of a single domain or in the context of all domains. Domain-aware
rules provide the option of including the And Domain Is test.
The following diagram shows an example using multiple domains.
Figure 1. Domain aware rules
You can restrict a rule so that it is applied only to events that are happening within a specified
domain. An event that has a domain tag that is different from the domain that is set on the rule
does not trigger an event response.
In an IBM® QRadar® system that does not have user-defined domains, a rule creates an
offense and keeps contributing to it each time the rule fires. In a domain-aware environment, a
rule creates a new offense each time the rule is triggered in the context of a different domain.
Rules that work in the context of all domains are referred to as system-wide rules. To create a
system-wide rule that tests conditions across the entire system, select Any Domain in the
domain list for the And Domain Is test. An Any Domain rule creates an Any Domain offense.
Single-domain rule
If the rule is a stateful rule, the states are maintained separately for each domain. The rule
is triggered separately for each domain. When the rule is triggered, offenses are created
separately for each domain that is involved and the offenses are tagged with those
domains.
Single-domain offense
The offense is tagged with the corresponding domain name. It can contain only events that
are tagged with that domain.
System-wide rule
If the rule is a stateful rule, a single state is maintained for the whole system and domain
tags are ignored. When the rule runs, it creates or contributes to a single system-wide
offense.
System-wide offense
The offense is tagged with Any Domain. It contains only events that are tagged with all
domains.
The following table provides examples of domain-aware rules. The examples use a system that
has three domains that are defined: Domain_A, Domain_B, and Domain_C.
The rule examples in the following table may not be applicable in your QRadar environment.
For example, rules that use flows and offenses are not applicable in IBM QRadar Log Manager.
Domain text
domain is one of:
Domain_A
domain is one of:
Domain_A and a
stateful test that is
defined as when
HTTP flow is
detected 10 times
within 1 minute
Explanation
Rule response
Looks only at events that are tagged
Creates or contributes to an
with Domain_A and ignores rules that are offense that is tagged
with Domain_A.
tagged with other domains.
Creates or contributes to an
Looks only at events that are tagged
offense that is tagged
with Domain_A and ignores rules that are with Domain_A. A single state, an
tagged with other domains.
HTTP flow counter, gets
maintained for Domain_A.
For data that is tagged
with Domain_A, it creates or
Looks only at events that are tagged
contributes to a single domain
with Domain_A and Domain_B and ignores
offense that is tagged
events that are tagged with Domain_C.
with Domain_A.
domain is one of:
Domain_A, Domain_B This rule behaves as two independent
instances of a single domain rule, and
creates separate offenses for different
domains.
domain is one of:
Domain_A,
Domain_B and a
stateful test that is
defined as when
HTTP flow is
detected 10 times
within 1 minute
For data that is tagged
with Domain_B, it creates or
contributes to a single domain
offense that is tagged
with Domain_B.
When the rule detects 10 HTTP
flows that are tagged
Looks only at events that are tagged
with Domain_A within a minute, it
with Domain_A and Domain_B and ignores creates or contributes to an
events that are tagged with Domain_C.
offense that is tagged
with Domain_A.
This rule behaves as two independent
instances of a single domain rule, and
When the rule detects 10 HTTP
flows that are tagged
maintains two separate states (HTTP
with Domain_B within a minute, it
flow counters) for two different
domains.
creates or contributes to an
offense that is tagged
with Domain_B.
Domain text
Explanation
Rule response
Each independent domain has
Looks at events that are tagged with all
offenses that are generated for it,
No domain test defineddomains and creates or contributes to
but offenses do not contain
offenses on a per-domain basis.
contributions from other domains.
A rule has a stateful
test that is defined
as when HTTP flow is
Maintains separate states and
Looks at events that are tagged
detected 10 times
creates separate offenses for each
with Domain_A, Domain_B, or Domain_C.
within 1 minute and
domain.
no domain test is
defined
Creates or contributes to a single
domain is one of: Any Looks at all events, regardless of which
system-wide offense that is tagged
Domain
domain it is tagged with.
with Any Domain.
Creates or contributes to a single
system-wide offense that is tagged
with Any Domain.
domain is one of: Any
For example, if it detects 3 events
Domain and a stateful
Looks at all events, regardless of which
that are tagged with Domain_A, 3
test that is defined
domain it is tagged with, and it
as when HTTP flow is
events that are tagged
maintains a single state for all domains.
with Domain_B, and 4 events that
detected 10 times
within 1 minute
are tagged with Domain_C within 1
minute, it creates an offense
because it detected 10 events in
total.
When the domain test includes Any
domain is one of: Any Works the same as a rule that
Domain, any single domains that
Domain, Domain_A has domain is one of: Any Domain.
are listed are ignored.
Table 1. Domain-aware rules
When you view the offense table, you can sort the offenses by clicking the Domain column.
The Default Domain is not included in the sort function so it does not appear in alphabetical
order. However, it appears at the top or bottom of the Domain list, depending on whether the
column is sorted in ascending or descending order. Any Domain does not appear in the list of
offenses.
Example: Domain privilege assignments based on custom properties
If your log files contain information that you want to use in a domain definition, you can expose the
information as a custom event property.
You assign a custom property to a domain based on the capture result. You can assign the
same custom property to multiple domains, but the capture results must be different.
For example, a custom event property, such as userID, might evaluate to a single user or a list
of users. Each user can belong to only one domain.
In the following diagram, the log sources contain user identification information that is
exposed as a custom property, userID. The event collector returns two user files, and each
user is assigned to only one domain. In this case, one user is assigned to Domain: 9 and the
other user is assigned to Domain: 12.
Figure 1. Assigning domains by using custom event property
If the capture results return a user that is not assigned to a specific user-defined domain, that
user is automatically assigned to the default domain. Default domain assignments require
manual intervention. Perform periodic searches to ensure that all entities in the default domain
are correctly assigned.
Important: Before you use a custom property in a domain definition, ensure that Optimize
parsing for rules, reports, and searches is checked on the Custom Event Properties window.
This option ensures that the custom event property is parsed and stored when IBM®
QRadar® receives the event for the first time. Domain segmentation doesn't occur if this option is
not checked.
Guidelines for defining your network hierarchy
Building a network hierarchy in IBM® QRadar® is an essential first step in configuring your
deployment. Without a well configured network hierarchy, QRadar cannot determine flow
directions, build a reliable asset database, or benefit from useful building blocks in rules.
Consider the following guidelines when you define your network hierarchy:
•
Organize your systems and networks by role or similar traffic patterns.
For example, you might organize your network to include groups for mail servers,
departmental users, labs, or development teams. Using this organization, you can
differentiate network behavior and enforce behaviour-based network management security
policies. However, do not group a server that has unique behavior with other servers on
your network. Placing a unique server alone provides the server greater visibility in QRadar,
and makes it easier to create specific security policies for the server.
•
•
Place servers with high volumes of traffic, such as mail servers, at the top of the group. This
hierarchy provides you with a visual representation when a discrepancy occurs.
Avoid having too many elements at the root level.
Large numbers of root level elements can cause the Network hierarchy page to take a long
time to load.
•
Do not configure a network group with more than 15 objects.
Large network groups can cause difficulty when you view detailed information for each
object. If your deployment processes more than 600,000 flows, consider creating multiple
top-level groups.
•
Conserve disk space by combining multiple Classless Inter-Domain Routings (CIDRs) or
subnets into a single network group.
For example, add key servers as individual objects, and group other major but related
servers into multi-CIDR objects.
Group
1
2
Description
Marketing
Sales
IP addresses
10.10.5.0/24
10.10.8.0/21
10.10.1.3/32
3
Database Cluster
10.10.1.4/32
10.10.1.5/32
Table 1. Example of multiple CIDRs and subnets in a single network group
•
Define an all-encompassing group so that when you define new networks, the appropriate
policies and behavior monitors are applied.
In the following example, if you add an HR department network, such as 10.10.50.0/24, to
the Cleveland group, the traffic displays as Cleveland-based and any rules you apply to the
Cleveland group are applied by default.
Group Subgroup
IP address
ClevelandCleveland miscellaneous10.10.0.0/16
ClevelandCleveland Sales
10.10.8.0/21
ClevelandCleveland Marketing
10.10.1.0/24
Table 2. Example of an all-encompassing group
•
In a domain-enabled environment, ensure that each IP address is assigned to the
appropriate domain.
Domains and log sources in multitenant
environments
Use domains to separate overlapping IP addresses, and to assign sources of data, such as events and
flows, into tenant-specific data sets.
When events or flows come into IBM® QRadar®, QRadar evaluates the domain definitions that are
configured, and the events and flows are assigned to a domain. A tenant can have more than one
domain. If no domains are configured, the events and flows are assigned to the default domain.
Domain segmentation
Domains are virtual buckets that you use to segregate data based on the source of the data. They are the
building blocks for multitenant environments. You configure domains from the following input sources:
•
•
•
•
•
Event and flow collectors
Flow sources
Log sources and log source groups
Custom properties
Scanners
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0
Update Package 6, and is no longer supported in any version of IBM QRadar. For more
information, see QRadar Vulnerability Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
A multitenant deployment might consist of a basic hardware configuration that includes
one QRadar Console, one centralized event processor, and then one event collector for each
customer. In this configuration, you define domains at the collector level, which then automatically
assigns the data that is received by QRadar to a domain.
To consolidate the hardware configuration even further, you can use one collector for multiple
customers. If log or flow sources are aggregated by the same collector but belong to different
tenants, you can assign the sources to different domains. When you use domain definitions at the
log source level, each log source name must be unique across the entire QRadar deployment.
If you need to separate data from a single log source and assign it to different domains, you can
configure domains from custom properties. QRadar looks for the custom property in the payload,
and assigns it to the correct domain. For example, if you configured QRadar to integrate with a
Check Point Provider-1 device, you can use custom properties to assign the data from that log
source to different domains.
Automatic log source detection
When domains are defined at the collector level and the dedicated event collector is assigned to a
single domain, new log sources that are automatically detected are assigned to that domain. For
example, all log sources that are detected on Event_Collector_1 are assigned to Domain_A. All log
sources that are automatically collected on Event_Collector_2 are assigned to Domain_B.
When domains are defined at the log source or custom property level, log sources that are
automatically detected and are not already assigned to a domain are automatically assigned to the
default domain. The MSSP administrator must review the log sources in the default domain and
allocate them to the correct client domains. In a multitenant environment, assigning log sources to a
specific domain prevents data leakage and enforces data separation across domains.
Network hierarchy updates in a multitenant
deployment
IBM® QRadar® uses the network hierarchy to understand and analyze the network traffic in
your environment. Tenant administrators who have the Define network hierarchy permission
can change the network hierarchy within their own tenant.
Network hierarchy changes require a full configuration deployment to apply the updates in
the QRadar environment. Full configuration deployments restart all QRadar services, and data
collection for events and flows stops until the deployment completes. Tenant administrators must
contact the Managed Security Service Provider (MSSP) administrator to deploy the changes. MSSP
administrators can plan the deployment during a scheduled outage, and notify all tenant
administrators in advance.
In a multitenant environment, the network object name must be unique across the entire
deployment. You cannot use network objects that have the same name, even if they are assigned to
different domains.
https://www.youtube.com/watch?v=Xrn7q9v3vAk
TASK: 7.2 Manage domains and tenants
SUBTASKS:
7.2.1. Understand domains and log sources in multi-tenant environments
• Domain segmentation
• Automatic log source detection
7.2.2. Create domains
7.2.3. Configure Apps in a multi-tenant environment
7.2.4. Manage retention policies in a multi-tenant environment
Creating domains
Use the Domain Management window to create domains based on IBM® QRadar® input sources.
About this task
Use the following guidelines when you create domains:
•
•
•
Everything that is not assigned to a user-defined domain is automatically assigned to the
default domain. Users who have limited domain access should not have administrative
privileges because this privilege grants unlimited access to all domains.
You can map the same custom property to two different domains, however the capture
result must be different for each one.
You cannot assign a log source, log source group, event collector, or data gateway to two
different domains. When a log source group is assigned to a domain, each of the mapped
attributes is visible in the Domain Management window.
Security profiles must be updated with an associated domain. Domain-level restrictions are not
applied until the security profiles are updated, and the changes deployed.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Domain Management.
3. To add a domain, click Add and type a unique name and description for the domain.
Tip: You can check for unique names by typing the name in the Input domain name search
box.
4. Depending on the domain criteria to be defined, click the appropriate tab.
o To define the domain based on a custom property, log source group, log source, event
collector, or data gateway, click the Events tab.
o To define the domain based on a flow source, click the Flows tab.
o To define the domain based on a scanner, including IBM QRadar Vulnerability
Manager scanners, click the Scanners tab.
5. To assign a custom property to a domain, in the Capture Result box, type the text that
matches the result of the regular expression (regex) filter.
Important: You must select the Optimize parsing for rules, reports, and searches check
box in the Custom Event Properties window to parse and store the custom event property.
Domain segmentation will not occur if this option is not checked.
6. From the list, select the domain criteria and click Add.
7. After you add the source items to the domain, click Create.
What to do next
Create security profiles to define which users have access to the domains. After you create the first
domain in your environment, you must update the security profiles for all non-administrative users to
specify the domain assignment. In domain-aware environments, non-administrative users whose
security profile does not specify a domain assignment will not see any log activity or network activity.
Review the hierarchy configuration for your network, and assign existing IP addresses to the
proper domains. For more information, see Network hierarchy.
Provisioning a new tenant
As a Managed Security Services Provider (MSSP) administrator, you are using a single instance
of IBM® QRadar® to provide multiple customers with a unified architecture for threat detection
and prioritization.
In this scenario, you are onboarding a new client. You provision a new tenant and create a tenant
administrator account that does limited administrative duties within their own tenant. You limit
the access of the tenant administrator so that they can't see or edit information in other tenants.
Before you provision a new tenant, you must create the data sources, such as log sources or flow
collectors, for the customer and assign them to a domain.
Complete the following tasks by using the tools on the Admin tab to provision the new tenant in QRadar:
1. To create the tenant, click Tenant Management.
For information about setting events per second (EPS) and flows per minute (FPM) limits for
each tenant, see Monitoring license usage in multitenant deployments.
2. To assign domains to the tenant, click Domain Management.
3. To create the tenant administrator role and grant the Delegated
Administration permissions, click User Roles.
In a multitenant environment, tenant users with Delegated administration permissions
can see only data for their own tenant environment. If you assign other administrative
permissions that are not part of Delegated Administration, access is no longer restricted to
that domain.
4. To create the tenant security profiles and restrict data access by specifying the tenant
domains, click Security Profiles.
5. To create the tenant users and assign the user role, security profile, and tenant, click Users.
Retention policies for tenants
You can configure up to 10 retention buckets for shared data, and up to 10 retention buckets for
each tenant. The default retention period is 30 days; then, the tenant data is automatically deleted.
To keep tenant data for longer than 30 days, you must configure a retention bucket. Until you
configure a retention bucket, all events or flows are stored in the default retention bucket for each
tenant.
If your QRadar® deployment has more than 10 tenants, you can configure a shared data retention
policy and use the domain filter to create a domain-based retention policy for each of the domains
within the tenant. Adding the domains specifies that the policy applies only to the data for that
tenant.
Creating domains
Use the Domain Management window to create domains based on IBM® QRadar® input sources.
About this task
Use the following guidelines when you create domains:
•
•
•
Everything that is not assigned to a user-defined domain is automatically assigned to the
default domain. Users who have limited domain access should not have administrative
privileges because this privilege grants unlimited access to all domains.
You can map the same custom property to two different domains, however the capture
result must be different for each one.
You cannot assign a log source, log source group, or event collector to two different domains.
When a log source group is assigned to a domain, each of the mapped attributes is visible in
the Domain Management window.
Security profiles must be updated with an associated domain. Domain-level restrictions are not
applied until the security profiles are updated, and the changes deployed.
Procedure
1. On the navigation menu ( ), click Admin.
2. In the System Configuration section, click Domain Management.
3. To add a domain, click Add and type a unique name and description for the domain.
Tip: You can check for unique names by typing the name in the Input domain name search
box.
4. Depending on the domain criteria to be defined, click the appropriate tab.
o To define the domain based on a custom property, log source group, log source, or
event collector, click the Events tab.
o To define the domain based on a flow source, flow collector, or data gateway, click
the Flows tab.
o To define the domain based on a scanner, including IBM QRadar Vulnerability
Manager scanners, click the Scanners tab.
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in
7.5.0 Update Package 6, and is no longer supported in any version of IBM QRadar. For
more information, see QRadar Vulnerability Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
5. To assign a custom property to a domain, in the Capture Result box, type the text that
matches the result of the regular expression (regex) filter.
Important: You must select the Optimize parsing for rules, reports, and searches check
box in the Custom Event Properties window to parse and store the custom event property.
Domain segmentation will not occur if this option is not checked.
6. From the list, select the domain criteria and click Add.
7. After you add the source items to the domain, click Create.
What to do next
Create security profiles to define which users have access to the domains. After you create the first
domain in your environment, you must update the security profiles for all non-administrative users to
specify the domain assignment. In domain-aware environments, non-administrative users whose
security profile does not specify a domain assignment will not see any log activity or network activity.
Review the hierarchy configuration for your network, and assign existing IP addresses to the
proper domains. For more information, see Network hierarchy.
QRadar apps overview
Download and install apps that extend QRadar® functionality from the IBM Security App Exchange.
The IBM Security App Exchange is a community-based sharing hub, that you use to share apps across IBM
Security products. By participating in App Exchange, you can use the rapidly assembled, innovative
workflows, visualizations, analytics, and use cases that are packaged into apps to address specific security
requirements. To detect and remediate against threats, you can use the security components from realtime correlation and behavioral modeling to custom responses and reference data. Easy-to-use solutions
are developed by partners, consultants, developers to address key security challenges.
Note: The combined memory requirements of all the apps that are installed on a QRadar Console cannot
exceed 10 per cent of the total available memory. If you install an app that causes the 10 per cent memory
limit to be exceeded, the app does not work.
QRadar apps workflow
IBM® QRadar apps are created by developers. After a developer creates an app, IBM certifies and
publishes it in the IBM Security App Exchange. QRadar administrators can then browse and
download the apps and then install the apps into QRadar to address specific security requirements.
The following diagram shows the workflow for an app and the role who is typically responsible for
the work.
Figure 1. App workflow
Installing apps in a multi-tenant environment
QRadar V7.4.0 and later includes support for multi-tenanted apps. A number of out of the box apps,
such as Pulse, Assistant, and Log Source Management, can be used in a multi-tenant environment.
Developers can also create and test apps that support multi-tenancy. To install apps in a multitenant environment, use the QRadar Assistant App.
FAQs about apps
Find out more about the apps that work with IBM QRadar, such as how to share your app, or find
out how to download apps from the IBM Security App Exchange.
FAQs about apps
Find out more about the apps that work with IBM® QRadar®, such as how to share your app, or
find out how to download apps from the IBM Security App Exchange.
•
•
•
•
•
•
•
•
What is an app?
Who can create an app?
How do I share my app?
How do I get an app that I downloaded into QRadar?
Where do I get help for an app?
How do I contact customer support for an app?
How much memory does an app need?
What is the difference between an app, an extension, and a content extension?
What is an app?
Apps create or add new functionality in QRadar by providing new tabs, API methods,
dashboard items, menus, toolbar buttons, configuration pages, and more within
the QRadar user interface. You download apps from the IBM Security App Exchange. Apps
that are created by using the GUI Application Framework Software Development Kit
integrate with the QRadar user interface to deliver new security intelligence capabilities or
extend the current functionality.
Every downloaded file from the IBM Security App Exchange is known as an extension. An
extension can consist of an app or security product enhancement (content extension) that is
packaged as an archive (.zip) file, which you can deploy on QRadar by using the Extensions
Management tool on the Admin tab.
Who can create an app?
You can use the GUI Application Framework Software Development Kit to create apps. For
more information about the GUI Application Framework Software Development Kit, see
the IBM Security QRadar App Framework Guide.
You download (https://exchange.xforce.ibmcloud.com/hub/extension/517ff786d70b6dfa3
9dde485af6cbc8b) the SDK from IBM developerWorks®.
How do I share my app?
Only certified content is shared in the IBM Security App Exchange, a new platform for
collaborating where you can respond quickly and address your security and platform
enhancement requirements. In the IBM Security App Exchange, you can find available apps,
discover their purpose, and what they look like, and learn what other users say about the
apps.
How do I get an app that I downloaded into QRadar?
A QRadar administrator downloads an extension, imports it into QRadar by using
the Extensions Management tool that is used to upload the downloaded extension from a
local source.
Where do I get help for an app?
You can see information about an app in the overview section when you download the app
from the IBM Security App Exchange. For apps developed solely by IBM, you can find
information in the IBM Knowledge Center.
In the Additional Information section in the IBM Security App Exchange, a link to the
documentation for the app provides you with up-to-date help.
How do I contact customer support for an app?
From the X-Force Application Exchange or from the QRadar Assistant app, select the app. On the
right side of the page, a Support section contains information about how to contact customer
support for apps that are created by IBM or by an IBM Business Partner.
How much memory does an app need?
The combined memory requirements of all the apps that are installed on a QRadar Console cannot
exceed 10 per cent of the total available memory. If you install an app that causes the 10 per cent
memory limit to be exceeded, the app does not work.
If your app requires a minimum memory allocation, you must provide information about it
in your app's documentation.
What is the difference between an app, an extension, and a content extension?
An extension is a term that is used for everything that you download from the IBM Security App
Exchange. Extensions that contain content only, such as rules, reports, searches, reference sets, and
dashboards, are referred to as content extensions. Some extensions contain apps that enhance the
features and functions of QRadar. Extensions that contain apps often include new content that is
designed to help you get the maximum benefit from the app features.
QRadar apps troubleshooting
If an IBM QRadar app is not working as expected, there are a number of troubleshooting techniques
and tools that you can use to help you find and fix issues. You can also use the log files for the app to
help you troubleshoot issues.
QRadar apps troubleshooting
If an IBM® QRadar® app is not working as expected, there are a number of troubleshooting
techniques and tools that you can use to help you find and fix issues. You can also use the log files
for the app to help you troubleshoot issues.
QRadar apps are installed in docker containers, and each app has their own logs, which are
separate from the QRadar logs. The QRadar logs contain messages and errors about the container
infrastructure.
Use the following table to help you find more troubleshooting information about apps:
Title
Link
Basic App Troubleshooting Before Opening
a QRadar Support Ticket
https://www.ibm.com/support/pages/node/716891
App Troubleshooting
https://www.ibm.com/support/pages/qradar-apptroubleshooting
QRadar application error: 'Cannot establish secure
connection to the console. Check if
https://www.ibm.com/support/pages/node/6217361
your QRadar Certificates are setup properly'
•
Running the recon tool
Use the recon tool to help find and fix IBM QRadar app issues, ranging from deployment
problems to the container environment and networking issues. Because it has access to
potentially modify your system, the tool requires root access to run.
Restrictions:
The recon tool is not available for IBM QRadar on Cloud.
The recon tool is available in QRadar V7.3.2 and later.
Before you begin
You need the latest auto updates bundle to run the recon tool. If auto updates are not enabled, follow
these steps:
1. Download the latest auto updates bundle from Fix
Central (https://www.ibm.com/support/fixcentral/).
2. Install the auto updates bundle by following the instructions in QRadar: How to
Manually Install the QRadar Weekly Auto Update
Bundle (https://www.ibm.com/support/docview.wss?uid=swg22003034).
About this task
Run the recon tool on the computer where your apps are running, either on the QRadar
Console or App Host.
Procedure
To run the recon tool, type the following command:
/opt/qradar/support/recon ps
If no issues are detected, the recon command output might look like the following example:
App-ID Name
Managed Host ID Workload ID
Name AB Container Name CDEGH Port IJKL
1001
QRadar Assistant 53
apps
++ qapp-1001
+++++ 5000 ++++
Service
qapp-1001
Legend:
Symbols:
n - Not Applicable
- - Failure
* - Warning
+ - Success
Checks:
Service:
A - Service exists in the workload file
B - Service is set to started
Container:
C - Container
D - Container
E - Container
G - Container
H - Container
is in ConMan workload file
environment file exists
image is in si-registry
Systemd Units are started
exists and is running in Docker
Port:
I - Container
J - Container
K - Container
L - Container
IP are in firewall main filter rules
IP and port is in iptables NAT filter rules
port has routes through Traefik
port is responsive on debug path
If a failure is detected, remediation steps are displayed.
Results
If the results of the recon command show that an app is not started, you must ensure that
the app is set to RUNNING in the API.
You can use the qappmanager support utility. For more information,
see https://www.ibm.com/support/pages/qradar-about-qappmanager-support-utility.
Domains and log sources in multitenant
environments
Use domains to separate overlapping IP addresses, and to assign sources of data, such as events and
flows, into tenant-specific data sets.
When events or flows come into IBM® QRadar®, QRadar evaluates the domain definitions that are
configured, and the events and flows are assigned to a domain. A tenant can have more than one
domain. If no domains are configured, the events and flows are assigned to the default domain.
Domain segmentation
Domains are virtual buckets that you use to segregate data based on the source of the data. They are the
building blocks for multitenant environments. You configure domains from the following input sources:
•
•
•
•
•
Event and flow collectors
Flow sources
Log sources and log source groups
Custom properties
Scanners
Important: The IBM QRadar Vulnerability Manager scanner is end of life (EOL) in 7.5.0
Update Package 6, and is no longer supported in any version of IBM QRadar. For more
information, see QRadar Vulnerability Manager: End of service product
notification (https://www.ibm.com/support/pages/node/6853425).
A multitenant deployment might consist of a basic hardware configuration that includes
one QRadar Console, one centralized event processor, and then one event collector for each
customer. In this configuration, you define domains at the collector level, which then automatically
assigns the data that is received by QRadar to a domain.
To consolidate the hardware configuration even further, you can use one collector for multiple
customers. If log or flow sources are aggregated by the same collector but belong to different
tenants, you can assign the sources to different domains. When you use domain definitions at the
log source level, each log source name must be unique across the entire QRadar deployment.
If you need to separate data from a single log source and assign it to different domains, you can
configure domains from custom properties. QRadar looks for the custom property in the payload,
and assigns it to the correct domain. For example, if you configured QRadar to integrate with a
Check Point Provider-1 device, you can use custom properties to assign the data from that log
source to different domains.
Automatic log source detection
When domains are defined at the collector level and the dedicated event collector is assigned to a
single domain, new log sources that are automatically detected are assigned to that domain. For
example, all log sources that are detected on Event_Collector_1 are assigned to Domain_A. All log
sources that are automatically collected on Event_Collector_2 are assigned to Domain_B.
When domains are defined at the log source or custom property level, log sources that are
automatically detected and are not already assigned to a domain are automatically assigned to the
default domain. The MSSP administrator must review the log sources in the default domain and
allocate them to the correct client domains. In a multitenant environment, assigning log sources to a
specific domain prevents data leakage and enforces data separation across domains.
TASK: 7.3 Allocate licenses for multi-tenant
SUBTASKS:
7.3.1. Monitor license usage in multi-tenant deployments
• How to view EPS rates per log source
• How to view EPS rates per domain
• How to view the EPS rate for an individual log source
• How to view the EPS rate for an individual domain
• Show that there is no spillover handling for per-tenant EPS limits
Monitoring license usage in multitenant
deployments
As the Managed Security Service Provider (MSSP) administrator, you monitor the event and flow
rates across the entire IBM® QRadar® deployment.
When you create a tenant, you can set limits for both events per second (EPS) and flows per minute
(FPM). By setting EPS and FPM limits for each tenant, you can better manage license capacities
across multiple clients. If you have a processor that is collecting events or flows for a single
customer, you do not need to assign tenant EPS and FPM limits. If you have a single processor that
collects events or flows for multiple customers, you can set EPS and FPM limits for each tenant.
If you set the EPS and FPM limits to values that exceed the limits of either your software licenses or
the appliance hardware, the system automatically throttles the events and flows for that tenant to
ensure that the limits are not exceeded. If you do not set EPS and FPM limits for tenants, each
tenant receives events and flows until either the license limits or the appliance limits are reached.
The licensing limits are applied to the managed host. If you regularly exceed the license limitations,
you can get a different license that is more suitable for your deployment.
Viewing the cumulative license limits in your deployment
The EPS and FPM rates that you set for each tenant are not automatically validated against your license
entitlements. To see the cumulative limits for the software licenses that are applied to the system as
compared to the appliance hardware limits, do these steps:
1. On the navigation menu ( ), click Admin to open the admin tab.
2. In the System Configuration section, click System and License Management.
3. Expand Deployment Details and hover your mouse pointer over Event Limit or Flow
Limit.
Viewing EPS rates per log source
Use the Advanced Search field to enter an Ariel Query Language (AQL) query to view the EPS rates
for log sources.
1. On the Log Activity tab, select Advanced Search from the list on the Search toolbar.
2. To view the EPS per log source, type the following AQL query in the Advanced Search field:
3. select logsourcename(logsourceid) as LogSource, sum(eventcount) /
(24*60*60) as EPS from events
4. group by logsourceid
5. order by EPS desc
last 24 hours
Viewing EPS rates per domain
Use the Advanced Search field to enter an Ariel Query Language (AQL) query to view the EPS rates
for domains.
1. On the Log Activity tab, select Advanced Search from the drop-down list box on
the Search toolbar.
2. To view the EPS per domain, type the following AQL query in the Advanced Search field:
3. select DOMAINNAME(domainid) as LogSource, sum(eventcount) / (24*60*60) as
EPS from events
4. group by domainid
5. order by EPS desc
last 24 hours
If you want to view average EPS rates for log sources only, click Log Sources in the Data
Sources pane on the Admin tab. You can use this to quickly identify configuration issues with log
sources that are failing to report.
Viewing individual license limits in your deployment
The EPS and FPM rates that you set for each tenant are not automatically validated against your
license entitlements. To see the individual limits for the software licenses that are applied to the
system as compared to the appliance hardware limits, do these steps:
1. On the navigation menu ( ), click Admin to open the admin tab.
2. In the System Configuration section, click System and License Management.
3. Expand Deployment Details and hover your mouse over Event Limit or Flow Limit.
Viewing the EPS rate for an individual log source
Use the Advanced Search field to enter an Ariel Query Language (AQL) query to view the EPS rate
for an individual log source.
1. On the Log Activity tab, select Advanced Search from the list on the Search toolbar.
2. To get a log source ID, type the following AQL query in the Advanced Search field:
select domainid,logsourceid,LOGSOURCENAME(logsourceid) from events GROUP BY
domainid,logsourceid order by domainid ASC last 1 HOURS
3. To view the EPS rate for your selected log source, type the following AQL query in
the Advanced Search field:
4. select logsourcename(logsourceid) as LogSource, sum(eventcount) /
(24*60*60) as EPS from events
5. where logsourceid= logsourceid
6. group by logsourceid
7. order by EPS desc
last 24 hours
Viewing the EPS rate for an individual domain
Use the Advanced Search field to enter an Ariel Query Language (AQL) query to view the EPS rate
for an individual domain.
1. On the Log Activity tab, select Advanced Search from the list on the Search toolbar.
2. To to get a domain ID, type the following AQL query in the Advanced Search field:
select domainid, DOMAINNAME(domainid) from events GROUP BY domainid last 1
HOURS
3. To view the EPS rate for your selected domain, type the following AQL query in
the Advanced Search field:
4. select DOMAINNAME(domainid) as LogSource, sum(eventcount) / (24*60*60) as
EPS from events
5. where domainid=domainid
6. group by domainid
7. order by EPS desc
last 24 hours
•
Detecting dropped events and flows
Events and flows are dropped when the IBM QRadar processing pipeline can't handle the
volume of incoming events and flows, or when the number of events and flows exceeds the
license limits for your deployment. You can look at the QRadar log file messages when these
situations occur.
SUBTASKS:
7.4.1. Understand user roles in a multi-tenant environment
• Service provider
• Tenants
7.4.2. Partition data by use of security profiles
User roles
A user role defines the functions that a user can access in IBM® QRadar®.
During the installation, four default user roles are defined: Admin, All, WinCollect, and Disabled.
Before you add user accounts, you must create the user roles to meet the permission requirements
of your users.
Creating a user role
Create user roles to manage the functions that a user can access in IBM QRadar. By default, your
system provides a default administrative user role, which provides access to all areas of QRadar.
About this task
Users who are assigned an administrative user role cannot edit their own account. This restriction
applies to the default Admin user role. Another administrative user must make any account
changes.
Procedure
1.
2.
3.
4.
Click the Admin tab.
In the User Management section, click User Roles and then click New.
In the User Role Name field, type a unique name.
Select the permissions that you want to assign to the user role.
The permissions that are visible on the User Role Management window depend on
which QRadar components are installed.
Important: If you select a user role that has Admin privileges, you must also grant that user
role the Admin security profile. See Creating a security profile.
Permission Description
Grants administrative access to the user interface. You can grant specific Admin
permissions.
Admin
Users with System Administrator permission can access all areas of the user interface.
Users who have this access cannot edit other administrator accounts.
Administrator Manager
Permission Description
Grants users permission to create and edit other administrative user accounts.
Remote Networks and Services Configuration
Grants users access to the Remote Networks and Services icon on
the Admin tab.
System Administrator
Grants users permission to access all areas of user interface. Users with this
access are not able to edit other administrator accounts.
Manage Local Only
Grants permission to assign and manage Local Only authentication. For more
information about Local Only authentication, see Assigning Local Only
authentication.
Grant users permissions to perform limited administrative functions. In a multi-tenant
Delegated environment, tenant users with Delegated Administration permissions can see only
Administrat data for their own tenant environment. If you assign other administrative permissions
that are not part of Delegated Administration, tenant users can see data for all
ion
tenants.
Grants administrative access to all functions on the Offenses tab.
Offenses
Users must have administrative access to create or edit a search group on
the Offenses tab.
User roles must have the Maintain Custom Rules permission to create and edit
custom rules.
Grants access to functions in the Log Activity tab. You can also grant specific
permissions:
Maintain Custom Rules
Grants permission to create or edit rules that are displayed on the Log
Activity tab.
Manage Time Series
Log Activity
Grants permission to configure and view time series data charts.
User Defined Event Properties
Grants permission to create custom event properties.
View Custom Rules
Grants permission to view custom rules. If granted to a user role that does not
also have the Maintain Custom Rules permission, the user role cannot create
or edit custom rules.
Network
Activity
Grants access to all the functions in the Network Activity tab. You can grant specific
access to the following permissions:
Permission Description
Maintain Custom Rules
Grants permission to create or edit rules that are displayed on the Network
Activity tab.
Manage Time Series
Grants permission to configure and view time series data charts.
User Defined Flow Properties
Grants permission to create custom flow properties.
View Custom Rules
Grants permission to view custom rules. If the user role does not also have
the Maintain Custom Rules permission, the user role cannot create or edit
custom rules.
View Flow Content
Grants permission to view source payload and destination payload in the flow
data details.
This permission is displayed only if IBM QRadar Vulnerability Manager is installed on
your system.
Grants access to the function in the Assets tab. You can grant specific permissions:
Perform VA Scans
Grants permission to complete vulnerability assessment scans. For more
information about vulnerability assessment, see the Managing Vulnerability
Assessment Guide.
Assets
Remove Vulnerabilities
Grants permission to remove vulnerabilities from assets.
Server Discovery
Grants permission to discover servers.
View VA Data
Grants permission to vulnerability assessment data. For more information
about vulnerability assessment, see the Managing Vulnerability Assessment
guide.
Grants permission to access all of the functions on the Reports tab.
Distribute Reports via Email
Reports
Grants permission to distribute reports through email.
Maintain Templates
Grants permission to edit report templates.
Permission Description
Risk
Manager
Grants users permission to access QRadar Risk Manager functions. QRadar Risk
Manager must be activated.
Grants permission to QRadar Vulnerability Manager function. QRadar
Vulnerability Manager must be activated.
Vulnerabilit
y Manager For more information, see the IBM QRadar Vulnerability
Manager (https://www.ibm.com/docs/en/SS42VS_7.5/com.ibm.qradar.doc/c_
qvm_vm_ov.html).
Grants permission to QRadar Incident Forensics capabilities.
Forensics
Create cases in Incident Forensics
Grants permission to create cases for collections of imported document and
pcap files.
IP Right
Click Menu Grants permission to options added to the right-click menu.
Extensions
Grants permission to Platform Configuration services.
Dismiss System Notifications
Grants permission to hide system notifications from the Messages tab.
Platform
Configuratio View Reference Data
n
Grants permission to view reference data when it is available in search results.
View System Notifications
Grants permission to view system notifications from the Messages tab.
QRadar Log
Source
Grants permission to the QRadar Log Source Management app.
Managemen
t
Pulse Grants permission to dashboards in the IBM QRadar Pulse app.
Dashboard
Pulse Threat
Globe
Grants permission to Threat Globe dashboard in the IBM QRadar Pulse app.
QRadar
Assistant
Grants permission to the IBM QRadar Assistant app.
QRadar Use
Case
Grants permission to the QRadar Use Case Manager app.
Manager
Table 1. User Role Management window permissions
5. In the Dashboards section of the User Role Management page, select the dashboards that you
want the user role to access, and click Add.
Tip: A dashboard displays no information when the user role does not have permission to
view dashboard data. If a user modifies the displayed dashboards, the defined dashboards
for the user role appear at the next login.
6. Click Save and close the User Role Management window.
7. On the Admin tab menu, click Deploy Changes.
Editing a user role
You can edit an existing role to change the permissions that are assigned to the role.
Editing a user role
You can edit an existing role to change the permissions that are assigned to the role.
About this task
To quickly locate the user role you want to edit on the User Role Management window, you can
type a role name in the Type to filter text box.
Procedure
1. On the Admin tab, click User Roles.
2. In the left pane of the User Role Management window, select the user role that you want to
edit.
3. In the right pane, update the permissions as necessary.
4. Modify the Dashboards options for the user role as necessary.
5. Click Save.
6. Close the User Role Management window.
7. On the Admin tab, click Deploy Changes.
Deleting a user role
If a user role is no longer required, you can delete the user role.
Deleting a user role
If a user role is no longer required, you can delete the user role.
About this task
If user accounts are assigned to the user role you want to delete, you must reassign the user
accounts to another user role. The system automatically detects this condition and prompts you to
update the user accounts.
You can quickly locate the user role that you want to delete on the User Role Management window.
Type a role name in the Type to filter text box, which is located above the left pane.
Procedure
1.
2.
3.
4.
On the Admin tab, click User Roles.
In the left pane of the User Role Management window, select the role that you want to delete.
On the toolbar, click Delete.
Click OK.
o If user accounts are assigned to this user role, the Users are Assigned to this User
Role window opens. Go to Step 7.
o If no user accounts are assigned to this role, the user role is successfully deleted. Go
to Step 8.
5. Reassign the listed user accounts to another user role:
o From the User Role to assign list box, select a user role.
o Click Confirm.
6. Close the User Role Management window.
7. On the Admin tab, click Deploy Changes.
Security profiles
Security profiles define which networks, log sources, and domains that a user can access.
QRadar® includes one default security profile for administrative users. The Admin security profile
includes access to all networks, log sources, and domains.
Before you add user accounts, you must create more security profiles to meet the specific access
requirements of your users.
Domains
Security profiles must be updated with an associated domain. You must define domains on
the Domain Management window before the Domains tab is shown on the Security Profile
Management window. Domain-level restrictions are not applied until the security profiles are
updated, and the changes are deployed.
Domain assignments take precedence over all settings on the Permission Precedence, Networks,
and Log Sources tabs.
If the domain is assigned to a tenant, the tenant name appears in brackets beside the domain name
in the Assigned Domains window.
Permission precedence
Permission precedence determines which security profile components to consider when the system
displays events in the Log Activity tab and flows in the Network Activity tab.
Choose from the following restrictions when you create a security profile:
•
•
•
•
No Restrictions - This option does not place restrictions on which events are displayed in
the Log Activity tab, and which flows are displayed in the Network Activity tab.
Network Only - This option restricts the user to view only events and flows that are
associated with the networks that are specified in this security profile.
Log Sources Only - This option restricts the user to view only events that are associated
with the log sources that are specified in this security profile.
Networks AND Log Sources - This option allows the user to view only events and flows that
are associated with the log sources and networks that are specified in this security profile.
For example, if the security profile allows access to events from a log source but the
destination network is restricted, the event is not displayed in the Log Activity tab. The
event must match both requirements.
•
Networks OR Log Sources - This option allows the user to view events and flows that are
associated with either the log sources or networks that are specified in this security profile.
For example, if a security profile allows access to events from a log source but the destination
network is restricted, the event is displayed on the Log Activity tab if the permission
precedence is set to Networks OR Log Sources. If the permission precedence is set
to Networks AND Log Sources, the event is not displayed on the Log Activity tab.
Permission precedence for offense data
Security profiles automatically use the Networks OR Log Sources permission when offense data is
shown. For example, if an offense has a destination IP address that your security profile permits
you to see, but the security profile does not grant permissions to the source IP address, the Offense
Summary window shows both the destination and source IP addresses.
Creating a security profile
To add user accounts, you must first create security profiles to meet the specific access
requirements of your users.
About this task
IBM® QRadar® SIEM includes one default security profile for administrative users. The Admin
security profile includes access to all networks, log sources, and domains.
To select multiple items on the Security Profile Management window, hold the Control key while
you select each network or network group that you want to add.
If after you add networks, log sources or domains you want to remove one or more before you save
the configuration, you can select the item and click the Remove (<) icon. To remove all items,
click Remove All.
Procedure
1. On the Admin tab, click Security Profiles.
2. On the Security Profile Management window toolbar, click New.
3. Configure the following parameters:
a. In the Security Profile Name field, type a unique name for the security profile. The
security profile name must meet the following requirements: minimum of 3
characters and maximum of 30 characters.
b. OptionalType a description of the security profile. The maximum number of
characters is 255.
4. Click the Permission Precedence tab.
5. In the Permission Precedence Setting pane, select a permission precedence option.
See Permission precedence.
6. Configure the networks that you want to assign to the security profile:
a. Click the Networks tab.
b. From the navigation tree in the left pane of the Networks tab, select the network that
you want this security profile to have access to.
c. Click the Add (>) icon to add the network to the Assigned Networks pane.
d. Repeat for each network you want to add.
7. Configure the log sources that you want to assign to the security profile:
a. Click the Log Sources tab.
b. From the navigation tree in the left pane, select the log source group or log source
you want this security profile to have access to.
c. Click the Add (>) icon to add the log source to the Assigned Log Sources pane.
d. Repeat for each log source you want to add.
8. Configure the domains that you want to assign to the security profile:
Domains must be configured before the Domains tab appears.
a. Click the Domains tab.
b. From the navigation tree in the left pane, select the domain that you want this
security profile to have access to.
c. Click the Add (>) icon to add the domain to the Assigned Domains pane.
d. Repeat for each domain that you want to add.
9. Click Save.
Note: The log sources and domains that are assigned to the security profile must match. If
the log sources and domains do not match, you cannot save the security profile .
10. Close the Security Profile Management window.
11. On the Admin tab, click Deploy Changes.
Editing a security profile
You can edit an existing security profile to update which networks and log sources a user can access
and the permission precedence.
Editing a security profile
You can edit an existing security profile to update which networks and log sources a user can access
and the permission precedence.
About this task
To quickly locate the security profile you want to edit on the Security Profile Management window,
type the security profile name in the Type to filter text box.
Procedure
1.
2.
3.
4.
5.
6.
On the Admin tab, click Security Profiles.
In the left pane, select the security profile that you want to edit.
On the toolbar, click Edit.
Update the parameters as necessary.
Click Save.
If the Security Profile Has Time Series Data window opens, select one of the following
options:
Option
Description
Keep Old
Data and
Save
Select this option to keep previously accumulated time series data. If you choose this
option, users with this security profile might see previous data that they no longer have
permission to see when they view time series charts.
Hide Old
Data and
Save
Select this option to hide the time series data. If you choose this option, time series data
accumulation restarts after you deploy your configuration changes.
7. Close the Security Profile Management window.
8. On the Admin tab, click Deploy Changes.
Duplicating a security profile
If you want to create a new security profile that closely matches an existing security profile, you can
duplicate the existing security profile and then modify the parameters.
About this task
To quickly locate the security profile you want to duplicate on the Security Profile
Management window, type the security profile name in the Type to filter text box.
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
On the Admin tab, click Security Profiles.
In the left pane, select the security profile that you want to duplicate.
On the toolbar, click Duplicate.
In the Confirmation window, type a unique name for the duplicated security profile.
Click OK.
Update the parameters as necessary.
Close the Security Profile Management window.
On the Admin tab, click Deploy Changes.
Deleting a security profile
If a security profile is no longer required, you can delete the security profile.
About this task
If user accounts are assigned to the security profiles you want to delete, you must reassign the user
accounts to another security profile. IBM® QRadar® automatically detects this condition and
prompts you to update the user accounts.
To quickly locate the security profile you want to delete on the Security Profile
Management window, type the security profile name in the Type to filter text box.
Procedure
1.
2.
3.
4.
On the Admin tab, click Security Profiles.
In the left pane, select the security profile that you want to delete.
On the toolbar, click Delete.
Click OK.
o If user accounts are assigned to this security profile, the Users are Assigned to this
Security Profile window opens. Go to Deleting a user role.
If no user accounts are assigned to this security profile, the security profile is
successfully deleted. Go to Deleting a user role.
5. Reassign the listed user accounts to another security profile:
o From the User Security Profile to assign list box, select a security profile.
o Click Confirm.
6. Close the Security Profile Management window.
7. On the Admin tab, click Deploy Changes.
o
Section 8: Troubleshooting
This section accounts for 16% of the exam (10 out of 62 questions).
TASK: 8.1 Review and respond to system notifications
SUBTASKS:
8.1.1. Create system notifications
• System Notification Rule (or any rule with 'Notification' Response)
8.1.2. Locate system notifications
• Under the bell icon on GUI
• Custom Rule is System: Notification events in Log Activity
8.1.3. React to system notifications
License expired
38750123 - An allocated license has expired and is no longer valid.
Explanation
When a license expires on the console, a new license must be applied. When a license expires on a
managed host, the appliance continues to process events and flows up to the rate that is allocated
from the shared license pool.
When the license contributes EPS and FPM capacity to the shared license pool, the expiry might
force the shared license pool into a deficit where it does not have enough capacity to meet the
requirements of the deployment. In a deficit situation, functionality on the Network
Activity and Log Activity tabs is blocked.
User response
1. Determine which appliance has the expired license.
a. On the Admin tab, click System and License Management.
b. In the Display box, select Licenses.
Expired licenses are shown in the License Information Messages section.
2. If the expired license is on the console, replace it.
3. If the expired license is on a managed host, review the shared license pool to ensure that the
system has enough EPS and FPM capacity.
a. If the shared license pool is over-allocated, replace the expired license with a new
license that has enough EPS and FPM to meet the system capacity requirements.
b. If the license pool has enough capacity, delete the expired license. In
the License table, select the row for the expired license (shown nested beneath the
managed host summary row), and select Actions > Delete License.
Accumulator is falling behind
38750099 - The accumulator was unable to aggregate all events/flows for this
interval.
Explanation
This message appears when the system is unable to accumulate data aggregations within a 60second interval.
Every minute, the system creates data aggregations for each aggregated search. The data
aggregations are used in time-series graphs and reports and must be completed within a 60-second
interval. If the count of searches and unique values in the searches are too large, the time that is
required to process the aggregations might exceed 60 seconds. Time-series graphs and reports
might be missing columns for the time period when the problem occurred.
You do not lose data when this problem occurs. All raw data, events, and flows are still written to
disk. Only the accumulations, which are data sets that are generated from stored data, are
incomplete.
User response
The following factors might contribute to the increased workload that is causing the accumulator to fall
behind:
Frequency of the incomplete accumulations
If the accumulation fails only once or twice a day, the drops might be caused by increased system
load due to large searches, data compression cycles, or data backup.
Infrequent failures can be ignored. If the failures occur multiple times per day, during all
hours, you might want to investigate further.
High system load
If other processes use many system resources, the increased system load can cause the
aggregations to be slow. Review the cause of the increased system load and address the cause, if
possible.
For example, if the failed accumulations occur during a large data search that takes a long
time to complete, you might prevent the accumulator drops by reducing the size of the saved
search.
Large accumulator demands
If the accumulator intervals are dropped regularly, you might need to reduce the workload.
The workload of the accumulator is driven by the number of aggregations and the number of
unique objects in those aggregations. The number of unique objects in an aggregation
depends on the group-by parameters and the filters that are applied to the search.
For example, a search that aggregates for services filters the data by using a local network
hierarchy item, such as DMZ area. Grouping by IP address might result in a search that
contains up to 200 unique objects. If you add destination ports to the search, and each server
hosts 5 - 10 services on different ports, the new aggregate of destination.ip +
destination.port can increase the number of unique objects to 2000. If you add the source
IP address to the aggregate and you have thousands of remote IP addresses that hit each
service, the aggregated view might have hundreds of thousands of unique values. This
search creates a heavy demand on the accumulator.
To review the aggregated views that put the highest demand on the accumulator:
1. On the Admin tab, click Aggregated Data Management.
2. Click the Data Written column to sort in descending order and show the largest
views.
3. Review the business case for each of the largest aggregations to see whether they are
still required.
Maximum active offenses reached
38750050 - MPC: Unable to create new offense. The maximum number of
active offenses has been reached.
Explanation
The system is unable to create offenses or change a dormant offense to an active offense. The
default number of active offenses that can be open on your system is limited to 2500. An active
offense is any offense that continues to receive updated event counts in the past five days or less.
User response
Select one of the following options:
•
•
Change low security offenses from open or active to closed, or to closed and protected.
Tune your system to reduce the number of events that generate offenses.
To prevent a closed offense from being removed by your data retention policy, protect the
closed offense.
Disk usage system notifications
IBM® QRadar® disk sentry monitors the /, /store, /storetmp, /transient,
and /var/log partitions before the partitions reach a pre-defined usage threshold.
The following topics can help you identify and resolve common problems in your IBM
QRadar deployment. The following table displays the host context system notifications that depend
on the disk usage of each monitored partition.
Notification
Disk Sentry:
Disk Usage
exceeded
warning
threshold.
Disk Sentry:
Disk Usage
exceeded max
threshold.
Disk sentry:
System disk
usage back to
normal
levels.
Description
Suggested action
Disk usage is at 90% for a monitored
partition. QRadar is not affected when the partition
reaches this threshold. Continue to monitor your
partition levels.
See Disk usage exceeded warning
threshold.
Disk usage is at 95% for a monitored
partition. QRadar data collection and search processes See Disk usage exceeded max
are shut down to protect the file system from reaching threshold.
100%.
After disk usage reaches a threshold of 95%, it must
return to 92% before QRadar automatically restarts
data collection and search processes.
To lower the disk usage
threshold, manually remove data
from the affected partitions.
See Disk usage returned to
normal.
Table 1. Disk usage notifications
Backup unable to complete a request
38750033 - Backup: Not enough free disk space to perform the backup.
Explanation
Disk Sentry is responsible for monitoring system disk and storage issues. Before a backup begins,
Disk Sentry checks the available disk space to determine whether the backup can complete
successfully. If the free disk space is less than two times the size of the last backup, the backup is
canceled. By default, backups are stored in /store/backup.
User response
To resolve this issue, select one of the following options:
•
•
•
Free up disk space on your appliance to allow enough space for a backup to complete
in /store/backup.
Configure your existing backups to use a partition with free disk space.
Configure more storage for your appliance. For more information, see the Offboard Storage
Guide.
QRadar: How to deal with unwanted system
notifications
Question & Answer
Question
Is it possible to suppress QRadar system notifications?
Answer
How to edit the system notification rule to add a response limiter
System notifications are generated based on a primary System Notification rule in QRadar.
Administrators who want to prevent a system notification from ever displaying in QRadar
can edit the primary rule to remove a value, which prevents the system from ever creating
the notification. Disabling a notification is not recommended as several important system
notifications are generated by QRadar. To prevent unwanted or repetitive system
notifications is to copy the system notification rule and modify it with a rule response
limiter to generate a system notification on a specific interval by minutes or hours when an
issue occurs. The response limiter can be used to postpone system notifications for several
days, when nuisance notifications occur.
Procedure
1. Click the Offenses tab
2. Click the Rules icon.
3. In the list of rules, select the System: Notification rule.
4. Click Actions > Duplicate.
5. Type a name for the new rule and click OK.
6. Double-click the rule you duplicated to start the Rule Wizard.
7. Click the list of event QIDs in the rule.
8. Edit the rule to include the QIDs that you want to limit responses on. In this
example, we are going to limit 'License Nearing Expiration' notifications.
9. Click Next.
10. In the Response Limiter field, set a time frame for the rule.
11. Click the Enable Rule check box.
12. Click Next to view a summary of the rule.
13. Click Finish.
Now that the new rule is created, we must edit the original System Notification rule
to remove the License Nearing Expiration QID to ensure that the original rule is
updated.
14. Double-click the original System: Notification rule.
15. Click the list of event QIDs in the rule.
16. Edit the rule to remove the value (38750124) License Nearing Expiration, which
is the event QID we are limiting the response for in our other rule.
17. Click Finish.
Results
A new rule is enabled with a response limiter for 48 hours. The original system
notification is updated to remove the QID for the license message as it is a repetitive
system notification.
QRadar system notifications
Use the system notifications that are generated by IBM® QRadar® to monitor the status and health
of your system. Software and hardware tools and processes continually monitor
the QRadar appliances and deliver information, warning, and error messages to users and
administrators.
System notifications are displayed on the QRadar dashboard or in the notification window when
unexpected system behavior occurs. You can troubleshoot the most common QRadar notifications.
Disk usage system notifications
IBM QRadar disk sentry monitors the /, /store, /storetmp, /transient,
and /var/log partitions before the partitions reach a pre-defined usage threshold.
Asset notifications for QRadar appliances
•
Asset change discarded
38750106 - Asset Changes Aborted.
Explanation
An asset change exceeded the change threshold and the asset profile manager ignores the
asset change request.
The asset profile manager includes an asset persistence process that updates the profile
information for assets. The process collects new asset data and then queues the information
before the asset model is updated. When a user attempts to add or edit an asset, the data is
stored in temporary storage and added to the end of the change queue. If the change queue
is large, the asset change can time out and the temporary storage is deleted.
User response
Select one of the following options:
•
•
•
Add or edit the asset a second time.
Adjust or stagger the start time for your vulnerability scans or reduce the size of your
scans.
Asset growth deviations detected
38750137 - The system detected asset profiles that exceed the normal
size threshold.
Explanation
The system detected one or more asset profiles in the asset database that show deviating or
abnormal growth. Deviating growth occurs when a single asset accumulates more IP
addresses, DNS host names, NetBIOS names, or MAC addresses than the system thresholds
allow. When growth deviations are detected, the system suspends all subsequent incoming
updates to these asset profiles.
User response
Determine the cause of the asset growth deviations:
•
•
•
Hover your mouse over the notification description to review the notification
payload. The payload shows a list of the top five most frequently deviating assets. It
also provides information about why the system marked each asset as a growth
deviation and the number of times that the asset attempted to grow beyond the asset
size threshold.
In the notification description, click Review a report of these assets to see a
complete report of asset growth deviations over the last 24 hours.
Review Updates to asset
data (https://www.ibm.com/docs/en/qsip/7.4?topic=management-updates-assetdata).
•
•
Blocklist notification
38750136 - The Asset Reconciliation Exclusion rules added new asset
data to the asset blocklists.
External scan of an unauthorized IP address or range
38750126 - An external scan execution tried to scan an unauthorized
IP address or address range.
Automatic update notifications for QRadar appliances
•
•
•
•
•
Auto update installed with errors
38750067 - Automatic updates installed with errors. See the Auto
Update Log for details.
Automatic update error
38750066 - Automatic updates could not complete installation. See
the Auto Update Log for details.
Automatic update successful
38750070 - Automatic updates completed successfully.
Automatic updates successfully downloaded
38750068 - Automatic updates successfully downloaded. See the Auto
Updates log for details.
Deployment of an automatic update
38750069 - Automatic updates installed successfully. In the Admin
tab, click Deploy Changes.
Custom rules notifications for QRadar appliances
Disk notifications for QRadar appliances
Event and flow notifications for QRadar appliances
Failure notifications for QRadar appliances
Failure notifications for QRadar apps
High Availability notifications for QRadar appliances
License notifications for QRadar appliances
Limit notifications for QRadar appliances
These limit notifications are related to thresholds, usage, maximums, stability, and reaching and
returning to normal limits.
Log and log source notifications for QRadar appliances
Memory and backup notifications for QRadar appliances
Offense notifications for QRadar appliances
Repair notifications for QRadar appliances
Vulnerability scan notifications for QRadar appliances
TASK: 8.2 Troubleshoot common documented issues
SUBTASKS:
8.2.1. Scenarios from the "Technical Notes 101" page
Cleaning the SIM data model
Cleaning the SIM data model ensures that offenses are based on the most current rules, discovered
servers, and network hierarchy. When the tuning process is complete, clean the SIM data model to
ensure that IBM® QRadar® displays only recent offenses.
About this task
When you clean the SIM data model, all existing offenses are closed. Cleaning the SIM data model
does not affect existing events and flows.
False positive offenses might occur before you complete the tuning tasks. Clean the SIM data model
to ensure that each host on the network creates new offenses based on the current configuration.
The SIM data model can be cleaned by both of the following methods:
Soft Clean
Closes all offenses, but does not remove them from the system.
Hard Clean
Closes all offenses, and completely erases them from the system.
Note:
Don't do a Hard Clean of your SIM Model unless SupportQRadar directs you to.
After a hard clean or a soft clean, the console web server restarts.
Procedure
1.
2.
3.
4.
5.
On the navigation menu ( ), click Admin.
From the Admin toolbar, click Advanced > Clean SIM Model.
Click Soft Clean.
Select the Are you sure you want to reset the data model? check box.
Click Proceed.
Depending on the volume of data in your system, this process might take several minutes.
6. When the SIM reset process is complete, refresh your browser.
If you attempt to go to other areas of the console during the SIM reset process, an error
message is displayed.
https://www.ibm.com/docs/en/SS42VS_7.5/pdf/b_qradar_system_notifications.pdf
Getting Help: What information should be
submitted with a QRadar service request?
Question & Answer
Question
QRadar support cases often require logs to investigate and resolve issues. This technical
note explains how users can collect and submit information for IBM support cases for
QRadar software issues depending on the nature of the issue they are facing.
Cause
Quick links
1. What information do I need to submit to QRadar support for software issues?
o 1a. How to collect log files for QRadar support from the user interface
o 1b. How to collect log files for QRadar from the command-line interface
(get_logs.sh)
o 1c. How to collect log files for QRadar on Cloud
2. What information do I submit for event parsing issues?
o 2a. How to verify what DSM is version installed
o 2b. How to export events for review by support
3. What information do I submit to QRadar support for hardware issues?
o 3a. How to determine whether an appliance is IBM xSeries or Dell?
o 3b. IBM xSeries appliances: How to run a Dynamic System Analysis (DSA)
report
o 3c. IBM xSeries appliances: How to run a Dynamic System Analysis (DSA)
report for a nonbooting appliance
o 3d. How to run an IMM log for non-hard disk issues
o 3e. Dell appliances: How to open a Dell Hardware Case and Generate logs by
using the iDRAC.
4. What information do I submit for WinCollect agent issues?
5. What information do I submit for Event Pipeline issues?
Answer
1. What information do I submit to QRadar support for software issues?
The following information can be submitted with customer service requests when you
report software issues in QRadar:
•
•
•
•
•
A detailed description of the issue, including the steps taken or changes made
before the issue occurred.
A screen captures showing the issue or on-screen error message.
The steps taken by the user or administrator to try to resolve the problem.
Logs exported from QRadar (see 1a).
Product version and build number. To view your version, from the
QRadar Dashboard, open the hamburger menu then click About. Example:
Related article: In my case, do I need to submit logs from multiple hosts when
an error occurs?
1a. How to collect log files for QRadar support from the user interface
Procedure
1.
2.
3.
4.
Log in to your QRadar console as an admin.
Click the Admin tab.
Click System & License Management.
Select the QRadar appliances that you want to collect logs from in the user interface.
Note: You can use Shift + click or Ctrl + click to get logs from multiple appliances.
If you do not select any appliance, the default action is to collect logs from the
QRadar Console. If you are troubleshooting application issues on an App Host
appliance, select both the App Host and Console appliance then collect logs for your
case.
5. Select Actions > Collect Log Files.
6. In most cases, unless you are experiencing application or extension issues, the
default options can be used. If you are troubleshooting an issue with an application,
such as an installation issue or apps that fail to start, you must open the Advanced
Options and check the box Include Application Extension Logs.
Advanced Options
o Unless advised by QRadar Support, there is no need to enable the Include
Debug Logs check box.
o If you are having issues with a QRadar extension or installing an application,
select the Include Application Extension Logs check box.
o If you recently upgraded your appliance, installed software updates, or are
having issues with managed hosts, select the Include Setup Logs (Current
Version) check box.
o Most administrators can leave the Collect Logs for this Many Days to the
default of 1 day, but if you know the issue occurred before then, adjust the
period accordingly. Be aware that if you have many hosts and select many
days, it takes longer to collect the logs.
Encryption of log files now prompts for a user-defined password. If this
option is selected the password must be passed onto IBM Support to
facilitate decryption of the log files.
7. Click Collect Log Files.
o
The log collection process starts and the status bar updates when log collection is
complete.
8. Click Download and save the file.
Results
Attach the log to your support ticket. Administrators who experience issues
downloading the file from the user interface can attempt to download the file by
using WinSCP or another secure copy utility to move the backup from
the /var/log directory. Root access is required for the appliance to use
the get_logs.sh utility or secure copy files from an appliance.
1b. How to collect log files for QRadar from the command-line interface (get_logs.sh)
To collect logs from the command-line, root access is required. The get_logs.sh utility
is available on every version of QRadar and can be run on each appliance individually to
collect logs. If you are having user interface issues, use this utility as a backup when the
QRadar Console to submit logs for your appliance.
Procedure
1. SSH in to the Console appliance as the root user.
2. Type the following command:
/opt/qradar/support/get_logs.sh
The script informs you that the log was created and provides the name and the
location, which is always the /store/LOGS/ directory.
Note: For administrators having application or extension issues, use the -a option
to collect application logs with your Console log information.
3. Copy the tar.bz2 file to a system that has access to an external network to upload
your log file.
4. For DLC appliances, compress the files from /var/log/dlc/* by using the
command:
tar -zcvf DLC_logs.tar.gz /var/log/dlc/*
5. Copy the tar.gz file to a system that has access to an external network to upload
your log file.
Results
Attach the log files and provide an explanation of which events appear to be parsing
incorrectly in your ticket.
1c. How to collect log files for QRadar on Cloud
To collect logs from Data Gateways or QRadar Network Insights that you have access,
follow 1b. How to collect log files for QRadar from the command-line interface
(get_logs.sh)
For any other appliance that you do not have access, follow the steps for Requesting a log
bundle for QRadar on Cloud.
2. What information do I submit for DSM parsing issues?
To receive support for DSM parsing issues submit the following information:
• The name of the appliance or software that generated the unknown, stored event,
or incorrectly categorized event.
• A screen capture of the log source configuration. Double-click the log source to open
the edit screen and take a screen capture.
• A screen capture of the incorrect event. Double-click an event in the Log Activity tab
to view the Event Summary and submit a screen capture.
•
•
•
The version of the software that is generating the events. If multiple appliances
versions are in your network, list all versions.
The DSM version installed on the customer's QRadar Console (see the following
instructions).
A Full XML export from the Log Activity tab on the Console (see the following
instructions).
2a. How to verify what DSM is version installed
1. SSH into the QRadar Console as the root user.
2. To find the installed version enter the following command:
yum info| grep -i nameofDSM
Result
Example output:
yum info| grep -i 3Com
Name
: DSM-3ComSwitch
From repo
: /DSM-3ComSwitch-7.4-20200303185634.noarch
Summary
: DSM 3Com 8800 Series Switch Install
Description : This program installs a 3Com 8800 Series Switch DSM plugin.
This version information can be compared to what is posted on IBM Fix Central,
but included it in your support request.
2b. How to export events for review by support
1. Log in to the QRadar UI.
2. Click the Log Activity tab.
3. Click Add Filter.
4. For the Parameter, select Log Source [Indexed] > Equals > Name of the log
source with the parsing issue.
Note: If your log source is not assigned to a group yet, select Other, which displays
all ungrouped log sources.
5. Click Add Filter.
6. Click the View drop-down and select a time interval. For example, 7 hours.
7. Review the filtered events to ensure that it contains your issue or concern.
8. From the navigation menu, select Actions > Export to XML > Full Export (All
Columns).
Note: XML is the preferred format for event reviews.
Results
Attach the XML event export and provide an explanation of the events that appear
to be parsing incorrectly in the description of your service request.
3. What information do I submit to QRadar support for hardware issues?
3a. How to determine whether an appliance is IBM xSeries or Dell?
Some administrators have a mix of appliance types in their network. When hardware
issues occur, it is helpful to understand what type of appliance you are working with to
determine whether you need to provide QRadar Support with a DSA file (xSeries
hardware). Dell hardware might not display a result.
To verify your hardware manufacturer:
1. Log in to the appliance as the root user directly or by using SSH.
2. To determine the hardware manufacturer, type the following command:
dmidecode -t system
Result
Example output:
# dmidecode 2.12
# SMBIOS entry point at 0x7f6be000
SMBIOS 2.5 present.
Handle 0x0030, DMI type 1, 27 bytes
System Information
Manufacturer: IBM
Product Name: System x3650 M3 -[7945AC1]Version: 00
Serial Number: KQ35RWH
UUID: 09E10B2B-16C9-3B91-888B-73C34F82FC1D
Wake-up Type: Other
SKU Number:
Family: System x
Review the output on screen for the manufacturer information. See
the Manufacturer value to determine whether it is IBM or Dell.
3b. IBM xSeries appliances: How to run a Dynamic System Analysis (DSA) report
Administrators who experience hardware issues on xSeries appliances can run the DSA
utility and submit a report with the hardware support request.
Before you begin
The QRadar Appliance ships with the DSA utility installed. If you see a message "This
system is not supported by this version of DSA", an updated build of the DSA might be
required for your appliance. Refer to this link for the correct update of the DSA utility for
your Appliance.
Versions of the DSA utility required for my QRadar Appliance
Procedure
1. Using SSH, log in to the remote QRadar appliance that is experiencing the hardware
error.
Note: You must first SSH to the Console, then open another SSH session to a
managed host in the deployment.
2. To change directory to the support folder, type:
cd /opt/qradar/support
3. To verify the permissions on the DSA utility, type:
ls -l *dsa*
4. If the permissions are rw-r-r-, you must change the permissions to be able to run
the DSA utility. To change permissions, type:
chmod 755 <DSA_build>_x86-64.bin
5. To run a DSA report for your appliance, type:
./<DSA_build>_x86-64.bin
Result
The DSA utility creates a .gz file in /var/log/IBM_Support with the machine
type, serial number, and date.xml.gz. For
example: /var/log/IBM_Support/7944AC1_KQ97NYC_20150927-163515.xml.gz
Copy this file from the remote host and upload it to your support case.
Note: If your system will not boot, follow the instructions in the next section (3c)
for non-booting appliances.
3c. How to run a Dynamic System Analysis (DSA) report for a nonbooting appliance
Administrators who experience hardware issues on xSeries appliances can run the DSA
utility and submit a report with the hardware support request. The following procedure
outlines how an administrator can collect a hardware report for an appliance that does
not boot properly. This hardware report is required and must be submitted with the
service request. This procedure can be followed for appliances that are suspended or
frozen due to a hardware or software issue.
Procedure
1.
2.
3.
4.
Restart the QRadar Appliance.
Select F2 to enter diagnostics.
Hit ESC to stop memory test if it starts.
After a menu appears, arrow over to Quit, then select Quit to DSA.
5. Choose command-line option CMD.
6. Insert a Fat 32 formatted USB flash drive. The output file is typically under 1 MB.
7. Choose to collect DSA with no other options needed. Choose option 1 to collect DSA
diagnostics.
8. After 2 passes complete, exit back to the previous menu.
9. Choose the option copy to local media.
10. If USB flash drive is not seen, reseat and try again. If the USB flash drive is still not
seen, try a different USB device.
Note: The DSA can sometimes take a long time to start and run, which might appear to
administrators that the DSA program is not functioning. However, do not interrupt this
process as it can take up to 5 minutes between steps to collect the information and
complete the report before writing data to the USB flash drive.
Results
After the data is collected on the appliance, the files are saved to the USB flash device. The
process of writing the files to the USB drive takes a few seconds.
3d. How to run a Dynamic System Analysis (DSA) report for a nonbooting appliance
Administrators who experience non-hard disk hardware issues on xSeries appliances can
run the Download Service option from the IMMDSA utility and submit a report with the
hardware support request in addition to the DSA For this procedure, refer to the following
Lenovo link: Download service data option.
3e. Dell appliances: How to open a Dell Hardware Case and Generate logs by using the
iDRAC
Administrators who experience hardware issues on Dell appliances use the integrated Dell
Remote Access Controller (iDRAC) card to generate a system report. The administrator
can submit the system report to QRadar Support for review. The following content is
required in your case for QRadar Support to review a Dell hardware issue:
1. A description of the hardware issue.
2. A screen cap or provide the text of the error message.
If we require logs or additional information, your ticket is updated to include further
details and the status is set to Awaiting your Feedback. If you have questions about this
procedure, you can always ask in our forums: ibm.biz/qradarforums.
To generate logs by using the integrated Dell Remote Access Controller (iDRAC) refer to
these Dell links:
•
PowerEdge - How to generate servers logs with the iDRAC?
•
How to export a SupportAssist Collection and the RAID Controller Log from iDRAC 7
and 8?
4. What information do I submit for WinCollect agent issues?
Administrators who experience issues with WinCollect agents can submit the following
information with the support ticket:
•
•
A .zip file that contains the /config and /logs directory for the WinCollect agent.
A description of the issue, Windows operating systems, and any hostnames or IP
addresses that are affected. Reference these example support queries:
o I'm having an issue collecting events from 4 Hyper-V computers with Windows
Server 2008 R2. The WinCollect agent name is _____ and the hostnames I'm
trying to collect events from are hostA (198.51.100.1), hostB (198.51.100.2),
hostC (198.51.100.3), and hostD (198.51.100.4). These Windows systems are in
our DMZ.
o I added 250 log sources by using the log source bulk add feature with
WinCollect, and they recently stopped sending events. The last event time is The
WinCollect agent name is ____ and the log sources that I want investigated are
hostA (198.51.100.1), hostB (198.51.100.2), hostC (198.51.100.3), and hostD
(198.51.100.4). Here is a screen capture of the log source configuration.
o I installed a new WinCollect agent on hostnameX with the command
prompt installer, but it did not work. I tried several more times, but the
WinCollect agent does not automatically create my log source. Attached is a
text file with the installation command I used, see WC_install.txt.
Collect WinCollect 7 configs and logs
1. Log in to the Windows operating system that hosts the WinCollect agent.
2. Click Start > All Programs > Administrative tools > Services.
3. Select the WinCollect service.
4. Click Stop.
5. Click Start > All Programs > Accessories > Windows Explorer.
6. Navigate to the WinCollect installation directory. The default path is C:\Program
Files\IBM\WinCollect
7. To select multiple folders, press Ctrl and select the config and logs folders.
8. Right-click on one of the selected folders and select Send to >
Compressed (zipped) folder.
Results
Attach the log files and provide an explanation of your issue.
Collect WinCollect 10 configs and logs
1. Log in to the Windows operating system that hosts the WinCollect agent.
2. Open the WinCollect 10 console.
3. Click the gear icon to open the settings window.
4. Enable the Advanced UI.
5. Click Collect Support Files.
6. Click Collect and compress files.
7. Open the file path provided and copy them.
Results
Attach the log files and provide an explanation of your issue.
5. What information do I submit for Event Pipeline agent issues?
QRadar Support offers two tools that can be run from the Console appliance:
the findExpensiveCustomProperties.sh and findExpensiveCustomRules.sh
tools.
Procedure
1. SSH into the QRadar console.
2. Enter one or both of the following commands depending on whether you are having
issues with custom properties, rules, or both. If you are unsure, run both.
3. /opt/qradar/support/findExpensiveCustomProperties.sh
/opt/qradar/support/findExpensiveCustomRules.sh
Result
The output of the tools is generated in the directory where you ran the tool. A file is
output as Custom(Properties|Rules)-{date}-(..).tar.gz. Upload the
results of the find expensive tools to your support case.
TASK: 8.3 Configure, manage and troubleshoot applications
SUBTASKS:
8.3.1. Use "recon" to troubleshoot apps
8.3.2. Configure Use Case Manager
8.3.3. Configure QDI
REFERENCES:
QRadar Deployment Intelligence app
The IBM® QRadar® Deployment Intelligence app monitors the health of your QRadar
deployment. QRadar Deployment Intelligence consolidates historical data on a per-host basis,
including status, up-time, notifications, event and flow rates, system performance metrics,
and QRadar specific metrics. Investigate specific hosts and see detailed health and status
information at the application, middleware, and system level.
•
•
•
•
•
•
•
•
•
What's new in QRadar Deployment Intelligence
Stay up to date with the new features that are available in each QRadar Deployment
Intelligence app release so that you get the most out of your QRadar health monitoring
experience.
Use cases for QRadar Deployment Intelligence
Use IBM QRadar Deployment Intelligence to monitor the health of your deployment, prevent
and troubleshoot performance problems, and size your QRadar deployment.
Supported environments for QRadar Deployment Intelligence
For the features in IBM® QRadar® products to work properly, you must use the supported
environments.
Installing QRadar Deployment Intelligence
Use the IBM QRadar Assistant app to install the IBM QRadar Deployment Intelligence app
archive on your QRadar Console.
Customizing your charts and dashboard
You can customize how you view dashboards by arranging charts and adding or removing
charts as you need them. You can also customize each chart on the dashboard and download
the information from each chart as a CSV file.
Overview dashboard
The Overview page in QRadar Deployment Intelligence shows the cumulative health details
of the entire deployment and can be used as a starting point for detailed analysis.
Visualization of the status of QRadar hosts
The Hosts dashboard helps you visualize the health and status of each host and the overall
health and status of your deployment.
Visualizing deployment health
Use the Advanced Health Query page in QRadar Deployment Intelligence to access health
metrics of your deployment during a time interval that you select. Multiple charts can be
loaded, stacked, closed, and added. The data from these charts can be exported as a CSV file.
You can generate more than one chart to appear on the page so that you can compare the
results of your query.
Tuning QRadar Deployment Intelligence to improve performance
Improve the performance of your IBM QRadar Deployment Intelligence app by creating
indexes in QRadar based on Health Metrics log source properties.
•
•
Generating a QRadar Deployment Intelligence report
IBM QRadar Deployment Intelligence can generate a report of your deployment that you can
download to maintain performance records and share with colleagues who don't have
access to the app. These reports are auto generated by the app once per day at 11:00 PM.
Troubleshooting QRadar Deployment Intelligence
A common issue in QRadar Deployment Intelligence is that the app does not show any
health-related data. This issue can occur for several reasons:
https://www.ibm.com/support/pages/qradar-how-use-recon-troubleshoot-qradar-applications
Configuring QRadar Use Case Manager
The Use Case Explorer uses QID records and DSM event-mapping information to help determine
rule coverage by log source type. The Use Case Explorer loads automatically, but you can refresh
the settings at any time. If required, configure a proxy connection, app performance related to
offenses, and tuning findings.
Procedure
1. On the Admin tab, click QRadar Use Case Manager > Configuration.
2. To sync with the data in QRadar®, click Sync QID Records. This process might take
approximately 30 minutes to complete. You can still use the app while the records are
syncing, but the data you work with might not be accurate.
3. To manually refresh event mappings, click Sync DSM event mappings.
When you install the app for the first time, it automatically syncs after installation. If you
upgrade to QRadar Use Case Manager 2.0.0 or later, you don't need to sync.
4. To back up your MITRE mappings (custom and IBM default), click Export MITRE mappings.
You can then import this backup file later on the Use Case Explorer page.
Only the custom mappings are imported from the file.
5. If you're upgrading to QRadar Use Case Manager 3.1.0 or later, you might see a section that
is called Report on migration from MITRE v6.3 to vx.x. This report appears if there were
MITRE mappings in the previous version of the app that are now deprecated with the
support for MITRE v8.1 or later. All custom mappings that were created in previous versions
of the app are automatically migrated to the new version. Mappings to techniques that are
now deprecated or don't exist under a particular tactic are deleted and included in the
migration report. Consider creating new mappings to these rules.
When you've noted the mappings that are affected, you can click Clear migration report to
permanently remove the report notification. Nonadministrative users can see the report
migration notification on the Use Case Explorer page.
6. To configure a proxy server, expand the Proxy configuration section and enter the
following information for your proxy server:
o Protocol
o Address or hostname
o Port
o Username
o Password
7. To configure offense contributions, expand the Performance configuration section, modify
the following options, and then click Submit.
Offense contribution
The default is enabled. When this option is disabled, the following features are disabled:
o
o
o
Inactive reports in Use Case Explorer are disabled, including the access point to the
'Tune inactive rules' card on the Tuning home page.
Rule offense contribution trend on the Active Rules page is not visible.
Event count column on the Active Rules page report table is removed.
Offense contribution in days
The default is 90 days. This setting takes effect only when the Offense contribution option
is enabled. The rule offense contribution trend and event count trend charts on the Active
Rules page are visible, but you can see only the data for the past (number of) days. Data that
is already stored in the database is not cleared when you change the number of days. Only
new data is affected by an update to this setting.
8. If you experience unexpected performance problems that are caused by generating the
tuning findings, such as a long time to load QRadar Use Case Manager or the app stops
responding, complete the following steps:
o Disable individual tuning findings in the Tuning findings configuration section.
o Set the number of reference set elements that trigger a finding if the number is
exceeded. The default is 5000.
o Click Submit and then refresh the Tuning Finding report or restart the app to
implement the updated changes.
9. Click Submit and then close the Settings pag
TASK: 8.4 Perform healthchecks
SUBTASKS:
8.4.1. Perform Daily Tasks
8.4.2. Perform Weekly Tasks
chromeextension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.ibm.com/support/pages/system/files/inlin
e-files/$FILE/OpenMic_MaintainingQRadar101_updated2.pdf
https://www.securitylearningacademy.com/course/view.php?id=4159
QRadar: Using ThreadTop to determine QRadar
process load
Troubleshooting
Problem
How to determine what QRadar processes are using the most resources.
Symptom
The system is running a little slower than usual, and you need to determine which process
is taking up the most resources.
Resolving The Problem
If you need to determine which QRadar process is consuming the most resources, there is
a Top like tool that specifically works with QRadar processes called theadTop. This tool
monitors QRadar processes, and can give an indication of performance issues.
To initiate threadTop
1. SSH into the QRadar Console as the root user.
2. Type the following command:
/opt/qradar/support/threadTop.sh
Example:
Results
Processes that are over 1700 milliseconds for more than a few intervals, might be
an indicator of an issue.
3. If you need more specific results, try watching the output for the single service only
on the specific port.
4. For example, if you are interested more in the ecs-ep service you can use the
following syntax:
/opt/qradar/support/threadTop.sh -p 7799
Where -p is the port on which a particular service is running.
5. The list of ports and services available for the appliance (it depends on the
component in the deployment) you can retrieve by using this command:
grep JMXPORT /opt/qradar/systemd/env/*
Wincollect Agent error message: 'configuration
file fingerprints don't match'
Troubleshooting
Problem
The error message: 'WinCollect Agent mismatch. RetrieveConfigurationUpdate
succeeded, but the configuration file fingerprints don't match' is generated when a
version mismatch exists between the QRadar Console and a managed WinCollect agent.
Administrators who experience this error message can confirm software versions are
identical between their QRadar appliance and managed WinCollect agents.
Cause
The WinCollect version on the QRadar Console displays a different version than what is
installed on the Windows host and generates an error. In most cases, this is due to the
Windows hosts being updated using the EXE. There are two methods to confirm the error
message:
1. To view error messages from an individual agent, administrators can select the
QRadar Admin tab and click the WinCollect icon. Select your agent and click Show
Events to display all log activity search for all status messages from the WinCollect
agent sorted by newest event. Status messages from the WinCollect agent will
include information, warning, and error messages from the selected WinCollect
agent.
2. Administrators who have access to the remote Windows host should verify the
following message in C:\Program Files\IBM\WinCollect\WinCollect.log
INFO SRV.System.WinCollectSvc.Service : Config change (or patch) detected on
configuration server. Attempting to download and extract...
INFO SRV.Code.ConfigurationPatchStrategy : Retrieving Configuration Update
ERROR SRV.Code.ConfigurationPatchStrategy : RetrieveConfigurationUpdate succeeded,
but the configuration file fingerprints don't match, exp:[FINGERPRINT
INFORMATION] act:[FINGERPRINT INFORMATION]
WARN SRV.System.WinCollectSvc.Service : Config change (or patch) download
failed validation. Not applying.
Diagnosing The Problem
To verify the version of WinCollect is installed in QRadar, use one of the following
procedures based on your installation type:
For Managed WinCollect agents
1. From the Console command line as root user
type: /opt/qradar/support/WinCollectHealthCheck.sh -d
Figure 1: Output displays information on the WinCollect software installed on the
Console. AgentCore is the WinCollect application in QRadar.
2. Compare this to the version list for all managed WinCollect Agents from the
WinCollectHealthSummary utility or to the version list in the user interface:
Agent Name
of Config File
LAPTOP-N1002211
14:34:53.102
LAPTOP-A9354424
14:34:52.912
LAPTOP-LALM1223
14:34:54.932
LAPTOP-GAL22392
14:34:53.906
Version
7.2.9.72
192.168.0.80
7.2.9.72
192.168.0.80
7.2.9.72
192.168.0.80
7.2.9.72
192.168.0.80
Time of last heartbeat
Location
2019-05-29
2019-05-29
2019-05-29
2019-05-29
3. Optional. Administrators can use the agent list from the user interface to verify their
WinCollect agent versions (Admin tab > WinCollect).
Figure 2: Review the Version column to determine the software version for a
WinCollect agent to determine if it differs from the AgentCore version listed.
Results
Administrators should note the version difference between the Console install 7.2.8-
145 and the version on the Windows hosts 7.2.9-72. If there are version differences,
fingerprint error messages can be displayed in logs and status events. The
administrator will need to ensure that the software versions match is resolved to
prevent future errors.
Resolving The Problem
To resolve this issue, download the latest WinCollect Agent SFS package and install it on
the QRadar Console. A maintenance window should be scheduled before you begin a
WinCollect upgrade. Depending on your version, services might be required to restart to
complete the install, which will interrupt event collection from all event sources.
1. Download the latest WinCollect SFS file from IBM Fix Central.
2. Using SSH, log in to your Console as the root user. The SFS file is only installed on
the QRadar Console. There is no need to install the WinCollect SFS on non-Console
appliances.
3. Copy the WinCollect SFS file to the /tmp directory on the QRadar Console. If space
in the /tmp directory is limited, copy the SFS to another location that has sufficient
space, such as the /storetmp directory on QRadar 7.3.x Consoles.
4. To verify that the mount point /media/updates exists, type: mkdir -p /media/updates
5. To mount the SFS file, type the command for your QRadar version:
o QRadar 7.2.x: mount -o loop -t squashfs 720_QRadar_wincollectupdate-<version>.sfs
/media/updates
o
QRadar 7.3.x: mount -o loop -t squashfs 730_QRadar_wincollectupdate-<version>.sfs
/media/updates
6. Install the WinCollect SFS file: /media/updates/installer
NOTE: To proceed with the WinCollect Agent update services need to be restarted
on QRadar to apply protocol updates. The following message is displayed:
WARNING: Services need to be shutdown in order to apply patches. This will
cause an interruption to data collection and correlation.
Do you wish to continue (Y/N)?
7. To continue with the update, type Y to continue.
8. When the update completes, remove the mounted SFS file with the following
command: umount /media/updates
Results
Administrators should verify if any agents have automatic updates disabled.
WinCollect agents that have the Automatic Updates Enabled column as 'False' will
need to click the Enable/Disable Automatic Updates button in the WinCollect
user interface to set the Automatic Update Enabled status to 'True'. Software
updates for managed agents are only allowed to send software updates to remote
Windows hosts when Automatic Updates Enabled displays 'True'.
https://www.ibm.com/support/pages/node/6590417
QRadar: User interface inaccessible due to httpd
service failure. Error "Multiple RSA server
certificates not allowed"
Troubleshooting
Problem
QRadar user interface (UI) is inaccessible because of httpd service failure.
Cause
httpd service failure due to:
•
•
Multiple certificates present under /etc/httpd/conf/certs directory.
Multiple certificates present in /opt/qradar/conf/ssl.cert.conf file.
Diagnosing The Problem
Multiple certificates present under /etc/httpd/conf/certs directory
Multiple certificates present in /opt/qradar/conf/ssl.cert.conf file
If httpd service is in a failed state, search for log entries as:
less -i /var/log/httpd/error.log | grep -i "Multiple RSA server certificates not
allowed"
[Fri May 26 20:36:26.799179 2023] [ssl:emerg] [pid 25186] AH02242: Init: Multiple
RSA server certificates not allowed
less /var/log/httpd/error.log | grep -i "Fatal error initialising mod_ssl"
[Fri May 26 20:36:26.799211 2023] [ssl:emerg] [pid 25186] AH02312: Fatal error
initialising mod_ssl, exiting.
cat /opt/qradar/conf/ssl.cert.conf | grep -i "SSLCertificate"
SSLCertificateFile /etc/httpd/conf/certs/cert.cert
SSLCertificateFile /etc/httpd/conf/certs/cert.cert
SSLCertificateKeyFile /etc/httpd/conf/certs/cert.key
SSLCertificateKeyFile /etc/httpd/conf/certs/cert.key
Steps to resolve issue:
• Create backup of /opt/qradar/conf/ssl.cert.conf
mkdir -p /store/ibm_support/httpd_service_issue
cp -p /opt/qradar/conf/ssl.cert.conf /store/ibm_support/httpd_service_issue/
• Open a vim editor and removed the duplicate line for cert.cert and cert.key
Before:
SSLCertificateFile /etc/httpd/conf/certs/cert.cert
SSLCertificateFile /etc/httpd/conf/certs/cert.cert
SSLCertificateKeyFile /etc/httpd/conf/certs/cert.key
SSLCertificateKeyFile /etc/httpd/conf/certs/cert.key
After:
SSLCertificateFile /etc/httpd/conf/certs/cert.cert
SSLCertificateKeyFile /etc/httpd/conf/certs/cert.key
• Restart the tomcat service:
systemctl restart tomcat
Note: Restarting Tomcat on the QRadar Console logs out users, halts event exports in
progress. Also, scheduled reports wont run until the service is running. Administrators
with change control might need a maintenance window before you restart Tomcat.
• Validate tomcat and
systemctl status tomcat
systemctl status httpd
httpd service status:
● tomcat.service - Apache Tomcat
Loaded: loaded (/usr/lib/systemd/system/tomcat.service; disabled; vendor preset:
disabled)
Drop-In: /etc/systemd/system/tomcat.service.d
└─ulimit.conf
Active: active (running) since Fri 2023-05-26 20:57:48 IST; 4min 9s ago
● httpd.service - The Apache HTTP Server
Loaded: loaded (/usr/lib/systemd/system/httpd.service; disabled; vendor preset:
disabled)
Drop-In: /etc/systemd/system/httpd.service.d
└─qradar.conf
Active: active (running) since Fri 2023-05-26 20:57:49 IST; 4min 45s ago
• Test tomcat connection status:
/opt/qradar/bin/test_tomcat_connection.sh
Starting up...
Connected to tomcat
Note: Tomcat takes some time to start. After the command shows the status as connected,
you can connect to the QRadar GUI and verify whether other functions are working as,
expected. This procedure does not apply to QRadar on Cloud.
Results
After the connection test completes successfully, you can log back in to QRadar.
Administrators might need to manually run reports that were scheduled to start during
the tomcat outage. Users can export events, execute the searches and export the results
from the user interface.
QRadar: General Health checklist
Question & Answer
Question
How can I verify that my deployment is healthy?
Answer
To assess the general health of your deployment, it is helpful to have standard checks to
follow in order to verify core functionality on your QRadar Console and Managed Hosts.
Is the QRadar Console UI accessible?
•
•
If you cannot access the UI and cannot access the system via SSH:
o Use a IMM or Hypervisor session to log in to the console to confirm that the
QRadar Console host is running and responsive. If you can connect here and
the console is running, there might be a network infrastructure problem
blocking your access. Contact your network administrator.
If you cannot access the UI but can access the Console system via SSH:
o Check systemctl status tomcat. If status is active or activating, the service is
still initializing. In some cases, you may need to wait for 10 - 15 minutes after
starting tomcat for the GUI to become accessible.
Are all Managed Hosts showing the expected Status?
•
If any of the Managed Hosts are not in Active status, check the following
o
o
o
From the Console command-line interface (CLI), try establishing an SSH
connection to each non-Active Managed Host (MH). If the connection fails or
times out:
▪ Establish a local console connection to the MH via IMM Remote
Console or some other local Console connection such as hypervisor if
the system is a VM.
▪ Verify whether the system is responsive and accepts login as
'root'.
▪ If the system is unresponsive but you can access the system's
local console, this may indicate a network issue. For more
information, see Technote 1997106- Using Linux Networking
Tools to troubleshoot Interfaces.
▪ If the MH is responsive via the local console connection, more
troubleshooting will need to be done to check network
connectivity between the Console and MH. For more
information, see Technote 1981436 - QRadar: Troubleshooting
tunnels and SSH issues in QRadar 7.2.5 and later.
Does a Full Deploy task complete successfully for all Managed Hosts?
▪ After the Deploy task completes and returns status for all hosts, review
any Managed Hosts that report Timed Out or otherwise fail to deploy:
▪ Check for the file /opt/qradar/conf/hostcontext.NODOWNLOAD on
the MH. For more information on how to resolve this issue,
see Technote 10744001 - Deploy Changes Does Not complete or
Times out.
Check that all partitions have sufficient free disk space:
▪ From the Console CLI, run /opt/qradar/support/all_servers.sh -C 'df
-h' to view the current disk space usage on all Managed Hosts'
partitions
▪ Connect to the MH via SSH as 'root' and type: df -h. If the disk
space usage ('Use%') for any partitions (other than /recovery)
are above 85% free up space on the relevant partitions and
check again. For more information on how to resolve space disk
issues, please see our Support 101 page on Troubleshooting disk
space issues.
Do all Dashboards populate?
Dashboards largely rely on ariel queries against accumulated data (also referred to as
Global Views (GV) or Aggregated Data Views (ADV).
•
•
If some Dashboards are failing to populate, but others are working, we're likely
seeing a problem with the individual Global Views. To troubleshoot corrupted
Global Views, please note which Dashboards are affected.
If all Dashboards are failing to populate, check the statuses of these services:
o
On all hosts the accumulator service should be Active. From the Console CLI,
run
/opt/qradar/support/all_servers.sh -C 'systemctl is-active accumulator'
▪ For any hosts where accumulator is not Active, try manually
o
restarting
the service with the command systemctl restart accumulator
The Console and all EP, FP, EP/FP, and Data node hosts should also have a
running ariel service. On the Console ariel runs as ariel_proxy_server. All
other relevant hosts will have ariel as ariel_query_server.
▪ On the Console run:
systemctl is-active ariel_proxy_server
▪
To check ariel on the remaining Managed Hosts. Run this command
from the Console CLI:
/opt/qradar/support/all_servers.sh -a '16%,17%,18%,21%'
'systemctl is-active ariel_query_server'
▪
If the ariel* service is stopped, try starting the relevant service
manually with systemctl restart <service> on the affected systems.
▪ If ariel fails on any system, you may not be able to retrieve event
or flow data from that Managed Host, accumulated or otherwise.
Are Offenses generating and updating?
•
In the 'Last Event/Flow Seen' for the most recently updated Offenses, is the
date/time fairly recent?
o Confirm whether ecs-ep is running on all 31xx, 18xx, 17xx, and 16xx hosts:
▪ On 7.3.0 and above: /opt/qradar/support/all_server.sh -C -a
'31%,18%,17%,16%,software' "systemctl is-active ecs-ep"
▪
If the service state is 'failed', try restarting the service:
▪ on 7.3.0 and above: /opt/qradar/support/all_servers.sh
"systemctl restart ecs-ep"
If ecs-ep fails to start on any of systems, collect the logs for the Console
system and any affected Managed Host.
▪ Getting Help: What information should be submitted with a
QRadar service request?
If ecs-ep is running on all Managed Hosts (where expected):
▪ Rule out the possibility that the system is working correctly and there
are simply no events or flows that are triggering Rules for Offense
creation or updates by creating a test rule to test Offense generation:
▪ In the QRadar UI, click the Offenses tab, then select Rules.
▪ Once the Rules display loads select Actions > New Event Rule.
▪ Identify a Source IP (or IP range) in your environment that is
consistently generating events
▪ Configure the new event rule with this criteria, using the address
or range identified above as the value for:
▪ Apply Dummy Test Rule on events which are detected by
the local system and when the source IP is one of the
following IP addresses: Click next.
▪
o
Set the Responses page with the following options:
1. Check: Ensure the detected event is part of an
offense.
2. Check: Respond no more than 1 per 1 minute per
source IP.
3. Click Finish.
4. Make sure the Rule is enabled.
5. In the Log Activity tab, add a filter for the Source IP
or range you configured in the Rule, and watch for
incoming events.
When events show up for this IP or range, you should see that a
new Offense is created and the events for the source IP or range
are associated with that Offense. Disable the Rule once testing is
complete.
▪
▪
Can you search and view events and flows?
•
•
•
Do you see new events and flows (if present in your environment) in Log Activity
and Network Activity tabs while the View is set to Real Time?
Are your Console, Event Processors, and Event and Flow Processors receiving
events?
o In Log Activity, select Quick Searches and choose Event Processor
Distribution.
▪ Make sure all of your Console, Event Processors, and Event and Flow
Processors are represented on the resulting search.
Can I run normal searches?
o Try running a simple 5 minute search filtering on 'Source IP is
127.0.0.1'. Does it complete without errors?
▪ If you receive IO errors, try using this information to troubleshoot:
▪ QRadar: Understanding IO Errors while searching
Is your Assets tab populated as expected?
•
•
Is the Assets page loading and populating as expected?
Is the Last Modified Time for the most recently modified asset relatively recent?
Can all users log in to the Console UI?
•
•
•
Can the local 'admin' account log in to the UI?
Can local non-admin Users log in to the UI?
o QRadar: Unable to log in with local user accounts
Can non-local users (LDAP, etc; where applicable) log in to the UI?
o QRadar: Cannot Log in to QRadar with a Valid Active Directory Account
Are my apps all loaded and running?
•
Basic App Troubleshooting Before Opening a QRadar Support Ticket
Additional checks
•
•
•
•
The checks described above should cover most core functionality. You can also
check to make sure all expected QRadar processes are running on any QRadar
system:
o Run /opt/qradar/upgrade/util/setup/upgrades/wait_for_start.sh . Wait for
at least 3 iterations (in case the system is still initializing) to see if all listed
processes show up as Running. If any show as ' stopped' after a few iterations,
break out of the utility (using ctrl-c) and note which processes were not
running.
If using HA, check the state of your HA pairs:
o Troubleshooting QRadar® HA deployments
Check Notifications in UI for any messages about Predictive Disk Failure
o QRadar: Troubleshooting Disk Failure or Predictive Disk Failure Notifications
If SSH or HTTPS connectivity is lost to your QRadar Console, local console access
might be needed to further troubleshoot system health. As a best practice, make
sure that this access is available in case of future problems:
o If running on IBM hardware, is IMM accessible?
▪ Can you connect with the IMM Remote Console?
o If running as a virtual machine, can you reach local console through your
hypervisor?
o If running on non-IBM hardware, do you have provision for local console
access.
You've experienced an issue with one of the troubleshooting steps, what should you do?
1. Record all troubleshooting steps from any procedure that failed.
2. If possible collect logs from the Console and the affected systems. Refer to the link
below on how to collect logs.
Getting logs from a QRadar deployment
3. Open a case with IBM QRadar Support. Include logs and all information from
troubleshooting step in the case.
4. If your appliances are unavailable or not functional, you can indicate that you have a 'System down'
issue.
5. A QRadar Support representative will contact you using your preferred method of communication
TASK: 8.5 Basic GUI REST-API usage
SUBTASKS:
8.5.1. Use the REST-API via the GUI on the console
• Pick an endpoint and show how to access it
API error messages
When an API request fails due to request errors or server errors, an error response message is
returned in JSON format.
An error response message is returned in JSON format even for endpoints that support other MIME
types. The error response message includes error message itself, a description of the error, a
unique error code for the endpoint, an HTTP response message, and an HTTP response code.
The error response includes following fields:
•
•
•
•
•
message: the error message
details: a field for additional information, which may or may not be populated
description: description of the specific error
code: Unique error response code
http_response:
o message: HTTP response message
o code: HTTP response status code
For example, the following API request attempts to get information about a non-existent reference
set that is called "test-set":
https://<host_ip>/api/reference_data/sets/test_set
An HTTP 404 response code and the following JSON error response message are returned:
{
"message": "test_set does not exist",
"details": {},
"description": "The reference set does not exist.",
"code": 1002,
"http_response": {
"message": "We could not find the resource you requested.",
"code": 404
}
}
The following table provides more information about the HTTP response error categories returned
by the IBM® QRadar® REST API:
HTTP
responseHTTP response message
Code
The requested resource corresponds to any one of a
MULTIPLE
300
set of representations, each with its own specific
CHOICES
location.
The resource has moved permanently. Please refer
MOVED
301
PERMANENTLY
to the documentation.
The resource has moved temporarily. Please refer
FOUND
302
to the documentation.
SEE OTHER
303
The resource can be found under a different URI.
NOT MODIFIED 304
The resource is available and not modified.
The requested resource must be accessed through
USE PROXY
305
the proxy given by the Location field.
The resource resides temporarily under a different
TEMPORARY
307
REDIRECT
URI.
BAD REQUEST
400
Invalid syntax for this request was provided.
You are unauthorized to access the requested
UNAUTHORIZED 401
resource. Please log in.
Your account is not authorized to access the
FORBIDDEN
403
requested resource.
We could not find the resource you requested.
NOT FOUND
404
Please refer to the documentation for the list of
resources.
METHOD NOT
405
This method type is not currently supported.
ALLOWED
Acceptance header is invalid for this endpoint
NOT ACCEPTABLE 406
resource.
PROXY
AUTHENTICATION407
Authentication with proxy is required.
REQUIRED
Client did not produce a request within the time
REQUEST
408
TIMEOUT
that the server was prepared to wait.
The request could not be completed due to a
CONFLICT
409
conflict with the current state of the resource.
The requested resource is no longer available and
GONE
410
has been permanently removed.
Length of the content is required, please include
LENGTH
411
REQUIRED
it with the request.
The request did not match the pre-conditions of
PRECONDITION
412
FAILED
the requested resource.
The request entity is larger than the server is
REQUEST ENTITY
413
TOO LARGE
willing or able to process.
HTTP error
category
HTTP error
category
REQUEST-URI
TOO LONG
UNSUPPORTED
MEDIA TYPE
REQUESTED
RANGE NOT
SATISFIABLE
EXPECTATION
FAILED
MISSING
ARGUMENTS
INVALID
ARGUMENTS
UNPROCESSABLE
ENTITY
INTERNAL
SERVER ERROR
NOT
IMPLEMENTED
BAD GATEWAY
SERVICE
UNAVAILABLE
GATEWAY
TIMEOUT
HTTP VERSION
NOT SUPPORTED
INITIALIZATION
FAILURE
HTTP
responseHTTP response message
Code
The request URI is longer than the server is
414
willing to interpret.
The requested resource does not support the media
415
type provided.
416
417
419
420
422
500
501
502
503
504
505
550
The requested range for the resource is not
available.
Unable to meet the expectation given in the Expect
request header.
The requested resource is missing required
arguments.
The requested resource does not support one or
more of the given parameters.
The request was well-formed but was unable to be
followed due to semantic errors.
Unexpected internal server error.
The requested resource is recognized but not
implemented.
Invalid response received when acting as a proxy
or gateway.
The server is currently unavailable.
Did not receive a timely response from upstream
server while acting as a gateway or proxy.
The HTTP protocol version used in the request
message is not supported.
A failure occurred during initialization of
services. API will be unavailable.
Accessing the interactive API documentation
page
Last Updated: 2023-03-02
Use the interactive API documentation page to access technical details for the RESTful APIs and
experiment with making API requests to your server.
The API documentation user interface provides descriptions and the ability to use the following
REST API interfaces:
REST API
Description
/api/analytics
Create, update, and remove custom actions for rules.
View event and flow properties, create event and flow searches, and
/api/ariel
manage searches.
Returns a list of all assets in the model. You can also list all available
/api/asset_model
asset property types and saved searches, and update an asset.
/api/auth
Log out and invalidate the current session.
/api/config
View and manage tenants, domains, and QRadar® extensions.
View all high and low-level categories, QRadar Identifier (QID) records,
/api/data_classificationand event mappings. You can also create or edit QID records and
mappings.
/api/forensics
Manage capture recoveries and cases.
Install and manage applications that are created by using the GUI
/api/gui_app_framework
Application Framework Software Development Kit.
/api/help
Returns a list of API capabilities.
Manage QRM saved search groups, question groups, simulation groups,
/api/qrm
topology saved search groups, and model groups.
Retrieves assets, vulnerabilities, networks, open services, networks,
/api/qvm
and filters. You can also create or update remediation tickets.
/api/reference_data
View and manage reference data collections.
/api/scanner
View, create, or start a remote scan that is related to a scan profile.
Perform tasks such as WHOIS lookups, port scan lookups, DNS lookups,
/api/services
and DIG lookups. You can also retrieve geolocation data for an IP or set
of IP addresses.
View, update, and close offenses. You can also add notes and manage
/api/siem
offense closing reasons.
Retrieve staged configuration for users, hosts, notifications, remote
/api/staged_config
networks, and remote services. You can also initiate or see the state of
a deploy action, and update and delete Yara rules.
/api/system
Manage server hosts, network interfaces, and firewall rules.
Table 1. REST API interfaces
1. To access the interactive API documentation interface, enter the following URL in your web
browser: https://ConsoleIPaddress/api_doc/.
2. Select the API version that you want to use from the list.
3. Go to the endpoint that you want to access.
4. Read the endpoint documentation and complete the request parameters.
5. Click Try it out to send the API request to your console and receive a properly formatted
HTTPS response.
Note: When you click Try it out, the action is performed on the QRadar system. Not all
actions can be reversed, for example, you cannot reopen an offense after you close it.
6. Review and gather the information that you need to integrate with QRadar.
https://www.youtube.com/watch?v=swGI5QWB29g
Descargar