B Qradar Admin Guide
B Qradar Admin Guide
B Qradar Admin Guide
Version 7.2.6
Administration Guide
IBM
Note
Before using this information and the product that it supports, read the information in “Notices” on page 333.
Product information
This document applies to IBM QRadar Security Intelligence Platform V7.2.6 and subsequent releases unless
superseded by an updated version of this document.
© Copyright IBM Corporation 2012, 2015.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Introduction to QRadar product administration. . . . . . . . . . . . . . . . . . . xi
Chapter 8. Manage reference data collections with the reference data utility . . . . . 105
Creating a reference data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
ReferenceDataUtil.sh command reference . . . . . . . . . . . . . . . . . . . . . . . . . 106
create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
add. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
remove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
purge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
listall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Contents v
Backup archive restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Restoring a backup archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Restoring a backup archive created on a different QRadar system . . . . . . . . . . . . . . . . 117
Restoring data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Verifying restored data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Contents vii
Example: Asset exclusion rules that are tuned to exclude IP addresses from the blacklist . . . . . . . . 206
Clean up asset data after growth deviations . . . . . . . . . . . . . . . . . . . . . . . . 207
Deleting invalid assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Deleting blacklist entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Chapter 18. Configuring QRadar systems to forward data to other systems . . . . . 209
Adding forwarding destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Configuring forwarding profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Configuring routing rules for bulk forwarding . . . . . . . . . . . . . . . . . . . . . . . 211
Configuring selective forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Viewing forwarding destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Viewing and managing forwarding destinations . . . . . . . . . . . . . . . . . . . . . . . 214
Viewing and managing routing rules . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Privacy policy considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
I. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
N . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
W . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Contents ix
x QRadar SIEM Administration Guide
Introduction to QRadar product administration
Administrators use IBM® Security QRadar® SIEM to manage dashboards, offenses,
log activity, network activity, assets, and reports.
Intended audience
This guide is intended for all QRadar SIEM users responsible for investigating and
managing network security. This guide assumes that you have QRadar SIEM
access and a knowledge of your corporate network and networking technologies.
Technical documentation
To find IBM Security QRadar product documentation on the web, including all
translated documentation, access the IBM Knowledge Center (http://
www.ibm.com/support/knowledgecenter/SS42VS/welcome).
For information about how to access more technical documentation in the QRadar
products library, see Accessing IBM Security Documentation Technical Note
(www.ibm.com/support/docview.wss?rs=0&uid=swg21614644).
For information about contacting customer support, see the Support and
Download Technical Note (http://www.ibm.com/support/docview.wss?rs=0
&uid=swg21612861).
Please Note:
Use of this Program may implicate various laws or regulations, including those
related to privacy, data protection, employment, and electronic communications
and storage. IBM Security QRadar may be used only for lawful purposes and in a
lawful manner. Customer agrees to use this Program pursuant to, and assumes all
responsibility for complying with, applicable laws, regulations and policies.
Licensee represents that it will obtain or has obtained any consents, permissions, or
licenses required to enable its lawful use of IBM Security QRadar.
The IBM Security App Exchange is a new web portal for users and business
partners to leverage the power and knowledge of the QRadar global community.
Use the IBM Security App Exchange to collaborate with others and to share
security content in small, consumable extensions to enhance existing functionality
Use the new Data Obfuscation Management tool to hide sensitive data directly
from QRadar without using the command-line.
The new pre-defined, field-based expressions make it easier to mask common data
elements such as user names, group names, netBIOS names, and host names. You
can also create regular expressions to obfuscate other data in the event and flow
To extend the capabilities of QRadar, use the new Extensions Management tool to
import security extensions into your QRadar deployment. The new interface makes
it easy for you to add and install applications and security content directly from
the new IBM Security App Exchange into QRadar. Before you install an extension,
you can review the content and specify whether existing content is overwritten or
Deployment visualization
You can open a visualization of your deployment at the host level from the
Deployment Actions list. In the visualization, you can see the relationship between
your hosts and modify the relative location of hosts, without modifying the actual
deployment configuration. You can also export the graphic in either PNG or VDX
You can now select from a list of available response email templates when you are
configuring rules. You can now create different templates for different users,
different templates for different types of offenses, and so on. For more information
about configuring rules, see the IBM Security QRadar Users Guide. Learn more
...
Elements from Reference Data Maps, Map of Sets, Map of Maps, Reference Table,
and Reference Sets now trigger a Reference Data Expiry event when they expire.
The Reference Data Expiry event contains the name of the collection and the
element that expired.
You can use the feature, for example, to track such things as expired user accounts
You can attach scripts to custom rules that do custom actions in response to
network events. For example, you can write a script to create a firewall rule that
blocks a source IP address from your network in response to a rule that is
triggered by a defined number of failed login attempts. You can use the Custom
Action window on the Admin tab to manage custom action scripts. Learn
more ...
Configure system settings in a new and more secure interface. Access the new
View and Manage System window through HTTPS to configure firewalls, network
interfaces, and email servers.
Note: To improve security, you configure system time and password changes in
Inactivity timeout
The Inactivity Timeout property controls the maximum amount of time that an
inactive session remains alive. If more than the specified time interval passes with
no activity, the session is ended and you are logged out. By default, the maximum
This overview includes general information on how to access and use the user
interface and the Admin tab.
IBM Security QRadar SIEM includes the full range of security intelligence
capabilities for on-premises deployments. QRadar SIEM consolidates log source
event data from device endpoints and applications that are distributed throughout
your network, and performs immediate normalization and correlation activities on
raw data to distinguish real threats from false positives.
Use IBM Security Intelligence on Cloud to collect, analyze, archive, and store large
volumes of network and security event logs in a hosted environment. Analyze
your data to provide visibility into developing threats, and meet your compliance
monitoring and reporting requirements while lowering your total cost of
ownership.
Use IBM Security QRadar Log Manager to collect, analyze, archive, and store large
volumes of network and security event logs. QRadar Log Manager analyzes data
to provide visibility into developing threats, and it can help you to meet
compliance monitoring and reporting requirements.
When you are looking for help, use the following table, which lists the capabilities
of the products:
Table 1. Comparison of QRadar capabilities
IBM Security IBM Security
Intelligence on QRadar Log
Capability QRadar SIEM Cloud Manager
Supports hosted deployments No Yes No
Customizable dashboards Yes Yes Yes
Custom rules engine Yes Yes Yes
Manage network and security events Yes Yes Yes
Manage host and application logs Yes Yes Yes
Threshold-based alerts Yes Yes Yes
Compliance templates Yes Yes Yes
Data archiving Yes Yes Yes
When you access the QRadar system, you are prompted for a user name and a
password. The user name and password must be configured in advance by the
administrator.
Deploying changes
You can update your configuration settings from the Admin tab. Your changes are
saved to a staging area where they are stored until you manually deploy the
changes.
Each time that you access the Admin tab and each time you close a window on
the Admin tab, a banner at the top of the Admin tab displays the following
message: Checking for undeployed changes. If undeployed changes are found, the
banner updates to provide information about the undeployed changes.
If the list of undeployed changes is lengthy, a scroll bar is provided. Scroll through
the list.
The banner message also suggests which type of deployment change to make.
Choose one of the two options:
v Deploy Changes - Click the Deploy Changes icon on the Admin tab toolbar to
deploy any configuration changes from the current session to your deployment.
v Deploy Full Configuration - Select Advanced > Deploy Full Configuration
from the Admin tab menu to deploy all configuration settings to your
deployment. All deployed changes are then applied throughout your
deployment.
Important: When you click Deploy Full Configuration, QRadar restarts all
services, which results in a gap in data collection until deployment completes.
Procedure
1. Click View Details
2. Choose one of the following options:
a. To expand a group to display all items, click the plus sign (+) beside the
text. When done, you can click the minus sign (-).
b. To expand all groups, click Expand All. When done, you can click Collapse
All.
c. Click Hide Details to hide the details from view again.
3. Perform the suggested task:
a. From the Admin tab menu, click Deploy Changes.
b. From the Admin tab menu, click Advanced > Deploy Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Procedure
1. Click Preferences
2. Optional: Update the configurable user details.
Option Description
Parameter Description
Email Type a new email address
Password Type a new password
Password (Confirm) Type the new password again
Enable Popup Notifications
Pop-up system notification messages are
displayed at the lower right corner of the
user interface. To disable pop-up
notifications, clear this check box.
3. Click Save.
Resetting SIM
Use the Admin to reset the SIM module. You can now remove all offense, source
IP address, and destination IP address information from the database and the disk.
This option is useful after you tune your deployment to avoid receiving any
additional false positive information.
Procedure
1. Click the Admin tab.
2. From the Advanced menu, select Clean SIM Model.
3. Read the information on the Reset SIM Data Module window.
4. Select one of the following options.
Option Description
Soft Clean Closes all offenses in the database. If you
select the Soft Clean option, you can also
select the Deactivate all offenses check box.
Hard Clean Purges all current and historical SIM data,
which includes offenses, source IP addresses,
and destination IP addresses.
5. If you want to continue, select the Are you sure you want to reset the data
model? check box.
6. Click Proceed.
7. When the SIM reset process is complete, click Close.
8. When the SIM reset process is complete, reset your browser.
IBM Security QRadar uses the Net-SNMP agent, which supports various system
resource monitoring MIBs. They can be polled by Network Management solutions
for the monitoring and alerting of system resources. For more information about
Net-SNMP, see Net-SNMP documentation.
The items in the Display drop-down list resort the displayed data.
The Aggregate Data View is required to generate data for ADE rules, time series
graphs, and reports.
RESTful API
Use the representational state transfer (REST) application programming interface
(API) to make HTTPS queries and integrate IBM Security QRadar with other
solutions.
You must have administrative user role permissions in QRadar to access and use
RESTful APIs. .
The API user interface provides descriptions and capabilities for the following
REST API interfaces:
The REST API technical documentation interface provides a framework that you
can use to gather the required code that you need to implement QRadar functions
into other products.
1. Enter the following URL in your web browser to access the technical
documentation interface: https://ConsoleIPaddress/api_doc.
2. Click the header for the API that you want to access, for example, /ariel.
3. Click the subhead for the endpoint that you want to access, for example,
/databases.
4. Click the Experimental or Provisional sub header.
Note:
The API forum provides more information about the REST API, including the
answers to frequently asked questions and annotated code samples that you can
use in a test environment. For more information, see API forum
(https://www.ibm.com/developerworks/community/forums/html/
forum?id=b02461a3-9a70-4d73-94e8-c096abe263ca).
Custom actions give you the ability to select or define the value that is passed to
the script and the resulting action.
For example, you can write a script to create a firewall rule that blocks a source IP
address from your network in response to a rule that is triggered by a defined
number of failed login attempts.
The following examples are custom actions that are the outcomes of passing values
to a script:
v Block users and domains.
v Initiate work flows and updates in external systems.
v Update TAXI servers with a STIX representation of a threat.
Note: This feature works best with low volume custom rule events, and custom
rules with a low response limiter value.
Click Add on the Custom Action window toolbar to open the Define Custom
Action dialog where you can upload scripts that define custom actions.
Programming language versions that the product supports are listed in the
Interpreter list.
Note: In order to ensure the security of your deployment, QRadar does not
support the full range of scripting functionality that is provided by the Python,
Perl or Bash languages.
You can define two kinds of parameters to pass to the script that you upload:
Table 6. Custom action parameters
Parameter Description
Fixed property Fixed properties are values that are passed to the custom
action script.
You can test whether your script runs successfully before you associate it with a
rule. Select a custom action and click Test Execution > Execute to test your script.
The Test custom action execution dialog returns the result of the test and any
output that is produced by the script.
After you configure and test your custom action, use the Rule Wizard to create a
new event rule and associate the custom action with it.
For more information about event rules, see the IBM Security QRadar SIEM Users
Guide.
When you initially configure QRadar, you must create user accounts for all users
that require access to QRadar. After initial configuration, you can edit user
accounts to ensure that user information is current. You can also add and delete
user accounts as required.
Assign the following items for each new user account that you create:
v User role - Determines the privileges that the user is granted to access functions
and information in QRadar. Two default user roles are defined: Admin and All.
Before you add user accounts, you must create more user roles to meet the
specific permissions requirement of your users.
v Security profile - Determines the networks, log sources and domains the user is
granted access to. QRadar includes one default security profile for administrative
users. The Admin security profile includes access to all networks, log sources
and domains. Before you add user accounts, you must create more security
profiles to meet the specific access requirements of your users.
Role management
Using the User Roles window, you can create and manage user roles.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the User Roles icon.
4. On the toolbar, click New.
5. Configure the following parameters:
a. In the User Role Name field, type a unique name for this user role.
b. Select the permissions that you want to assign to this user role. See “User
role access and permissions” on page 30.
Note:
a. A dashboard displays no information if the user role does not have
permission to view dashboard data.
b. If a user modifies the displayed dashboards, the defined dashboards for the
user role appear at the next login.
7. Click Save.
8. Close the User Role Management window.
9. On the Admin tab menu, click Deploy Changes.
To quickly locate the user role you want to edit on the User Role Management
window, you can type a role name in the Type to filter text box. This box is
located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the User Roles icon.
4. In the left pane of the User Role Management window, select the user role that
you want to edit.
5. On the right pane, update the permissions, as necessary. See “User role access
and permissions” on page 30.
6. Modify the Dashboards options for the user role as required.
7. Click Save.
8. Close the User Role Management window.
9. On the Admin tab menu, click Deploy Changes.
You can quickly locate the user role that you want to delete on the User Role
Management window. Type a role name in the Type to filter text box, which is
located above the left pane.
Procedure
1. Click the Admin tab.
2. On the Navigation menu, click System Configuration > User Management.
Using the Security Profile Management window, you can view, create, update, and
delete security profiles.
Permission precedences
This topic defines each of the permission precedence options.
For example, if a security profile allows access to events from a log source but the
destination network is restricted, the event is displayed on the Log Activity tab if
QRadar SIEM includes one default security profile for administrative users. The
Admin security profile includes access to all networks, log sources and domains.
To select multiple items on the Security Profile Management window, hold the
Control key while you select each network or network group that you want to
add.
If after you add networks, log sources or domains you want to remove one or
more before you save the configuration, you can select the item and click the
Remove (<) icon. To remove all items, click Remove All.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Security Profiles icon.
4. On the Security Profile Management window toolbar, click New.
5. Configure the following parameters:
a. In the Security Profile Name field, type a unique name for the security
profile. The security profile name must meet the following requirements:
minimum of 3 characters and maximum of 30 characters.
b. OptionalType a description of the security profile. The maximum number
of characters is 255.
6. Click the Permission Precedence tab.
7. In the Permission Precedence Setting pane, select a permission precedence
option. See “Permission precedences” on page 15.
8. Configure the networks that you want to assign to the security profile:
a. Click the Networks tab.
b. From the navigation tree in the left pane of the Networks tab, select the
network that you want this security profile to have access to.
c. Click the Add (>) icon to add the network to the Assigned Networks pane.
d. Repeat for each network you want to add.
9. Configure the log sources that you want to assign to the security profile:
a. Click the Log Sources tab.
b. From the navigation tree in the left pane, select the log source group or log
source you want this security profile to have access to.
c. Click the Add (>) icon to add the log source to the Assigned Log Sources
pane.
To quickly locate the security profile you want to edit on the Security Profile
Management window, type the security profile name in the Type to filter text box.
It is located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Security Profiles icon.
4. In the left pane, select the security profile you want to edit.
5. On the toolbar, click Edit.
6. Update the parameters as required.
7. Click Save.
8. If the Security Profile Has Time Series Data window opens, select one of the
following options:
Option Description
Keep Old Data and Save Select this option to keep previously
accumulated time series data. If you choose
this option, issues might occur when users
associated with this security profile views
time series charts.
Hide Old Data and Save Select this option to hide the time-series
data. If you choose this option, time series
data accumulation restarts after you deploy
your configuration changes.
To quickly locate the security profile you want to duplicate on the Security Profile
Management window, you can type the security profile name in the Type to filter
text box, which is located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration User Management.
3. Click the Security Profiles icon.
4. In the left pane, select the security profile you want to duplicate.
5. On the toolbar, click Duplicate.
6. In the Confirmation window, type a unique name for the duplicated security
profile.
7. Click OK.
8. Update the parameters as required.
9. Close the Security Profile Management window.
10. On the Admin tab menu, click Deploy Changes.
If user accounts are assigned to the security profiles you want to delete, you must
reassign the user accounts to another security profile. QRadar SIEM automatically
detects this condition and prompts you to update the user accounts.
To quickly locate the security profile you want to delete on the Security Profile
Management window, you can type the security profile name in the Type to filter
text box. It is located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Security Profiles icon.
4. In the left pane, select the security profile that you want to delete.
5. On the toolbar, click Delete.
6. Click OK.
v If user accounts are assigned to this security profile, the Users are Assigned
to this Security Profile window opens. Go to “Deleting a user role” on page
14.
v If no user accounts are assigned to this security profile, the security profile is
successfully deleted. Go to “Deleting a user role” on page 14.
7. Reassign the listed user accounts to another security profile:
a. From the User Security Profile to assign list box, select a security profile.
b. Click Confirm.
8. Close the Security Profile Management window.
9. On the Admin tab menu, click Deploy Changes.
When you initially configure your system, you must create user accounts for each
of your users. After initial configuration, you might be required to create more user
accounts and manage existing user accounts.
Before you can create a user account, you must ensure that the required user role
and security profile are created.
When you create a new user account, you must assign access credentials, a user
role, and a security profile to the user. User Roles define what actions the user has
permission to perform. Security Profiles define what data the user has permission
to access.
You can create multiple user accounts that include administrative privileges;
however, any Administrator Manager user accounts can create other administrative
user accounts.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Users icon.
4. On the User Management toolbar, click New.
5. Enter values for the following parameters:
a. In the Username field, type a unique user name for the new user. The user
name must contain a maximum 30 characters.
b. In the Password field, type a password for the user to gain access.
The password must meet the following criteria:
v Minimum of 5 characters
v Maximum of 255 characters
6. Click Save.
7. Close the User Details window.
8. Close the User Management window.
9. On the Admin tab menu, click Deploy Changes.
After you delete a user, the user no longer has access to the user interface. If the
user attempts to log in, a message is displayed to inform the user that the user
To quickly locate the user account you want to delete on the User Management
window, you can type the user name in the Search User text box on the toolbar.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Users icon.
4. Select the user that you want to delete.
5. On the toolbar, click Delete.
6. Click OK.
7. Close the User Management window.
Authentication management
When authentication is configured and a user enters an invalid user name and
password combination, a message is displayed to indicate that the login was
invalid.
If the user attempts to access the system multiple times with invalid information,
the user must wait the configured amount of time before another attempt to access
the system again. You can configure console settings to determine the maximum
number of failed logins, and other related settings. For more information about
configuring console settings for authentication, see “QRadar system time
configuration” on page 50.
Before you can configure RADIUS, TACACS, Active Directory, or LDAP as the
authentication type, you must complete the following tasks:
__ v Configure the authentication server before you configure authentication in
QRadar. For more information, see your server documentation.
When external authentication is configured, you must set the local password for
administrative users. When the user logs in, the user name and password are first
validated against the remote authority. If the remote authority is not available, the
password is validated locally and the user can log in and perform administrative
functions.
The local password is not synchronized with the remote authority. To prevent
problems logging into QRadar when the remote authority is unavailable, remember
to update the local password at the same time that you update the password on
the remote authority.
You cannot change the local admin password while the remote authority is active.
To change the admin password, you must temporarily disable external
authentication, reset the password, and then reconfigure external authentication.
When you create non-administrative users, the local password is not set.
Non-administrative users authenticate against the remote authority only. If the
remote authority is unavailable or the user credentials are rejected, the user cannot
log in.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Authentication icon.
4. From the Authentication Module list box, select System Authentication.
5. Click Save.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration User Management.
3. Click the Authentication icon.
4. From the Authentication Module list box, select RADIUS Authentication.
Option Description
CHAP Challenge Handshake Authentication
Protocol (CHAP) establishes a Point-to-Point
Protocol (PPP) connection between the user
and the server.
MSCHAP Microsoft Challenge Handshake
Authentication Protocol (MSCHAP)
authenticates remote Windows workstations.
ARAP Apple Remote Access Protocol (ARAP)
establishes authentication for AppleTalk
network traffic.
PAP Password Authentication Protocol (PAP)
sends clear text between the user and the
server.
d. In the Shared Secret field, type the shared secret that QRadar SIEM uses to
encrypt RADIUS passwords for transmission to the RADIUS server.
6. Click Save.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Authentication icon.
4. From the Authentication Module list box, select TACACS Authentication.
5. Configure the parameters:
a. In the TACACS Server field, type the host name or IP address of the
TACACS server.
b. In the TACACS Port field, type the port of the TACACS server.
c. From the Authentication Type list box, select the type of authentication you
want to perform.
Choose from the following options:
Option Description
ASCII American Standard Code for Information
Interchange (ASCII) sends the user name
and password in clear text.
PAP Password Authentication Protocol (PAP)
sends clear text between the user and the
server. PAP is the default authentication
type.
d. In the Shared Secret field, type the shared secret that QRadar uses to
encrypt TACACS passwords for transmission to the TACACS server.
6. Click Save.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration and then click the
Authentication icon.
3. From the Authentication Module list box, select Active Directory.
Configure the following parameters:
Parameter Description
Server URL Type the URL used to connect to the LDAP
server, for example, ldaps://host:port.
LDAP Context Type the LDAP context you want to use, for
example, DC=QRADAR,DC=INC.
LDAP Domain Type the domain that you want to use, for
example qradar.inc.
4. Click Save.
LDAP authentication
You can configure QRadar to use supported Lightweight Directory Access Protocol
(LDAP) providers for user authentication and authorization.
QRadar reads the user and role information from the LDAP server, based on the
authorization criteria that you defined.
If you plan to use SSL encryption or use TLS authentication with your LDAP
server, you must import the SSL or TLS certificate from the LDAP server to the
/opt/qradar/conf/trusted_certificates directory on your QRadar console. For
more information about configuring the certificates, see “Configuring SSL or TLS
certificates” on page 27.
If you are using group authorization, you must configure a QRadar user role or
security profile on the QRadar console for each LDAP group that is used by
QRadar. Every QRadar user role or security profile must have at least one Accept
group. The mapping of group names to user roles and security profiles is
case-sensitive.
Authentication establishes proof of identity for any user who attempts to log in to
the QRadar server. When a user logs in, the user name and password are sent to
the LDAP directory to verify whether the credentials are correct. To send this
information securely, configure the LDAP server connection to use Secure Socket
Layer (SSL) or Transport Layer Security (TLS) encryption.
User attribute values are case-sensitive. The mapping of group names to user roles
and security profiles is also case-sensitive.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management
and click the Authentication icon.
3. From the Authentication Module list box, select LDAP.
4. Click Add and complete the basic configuration parameters.
Select False to search only the immediate contents of the Base DN.
The subdirectories are not searched.
LDAP user field The user field identifier that you want to search on.
For example, if all of your user accounts are on the directory server
in the Users folder, and your domain name is ibm.com, the User
Base DN value would be cn=Users,dc=ibm,dc=com.
Referral Select Ignore or Follow to specify how referrals are handled.
You must specify both a user role attribute and a security profile
attribute. The attributes that you can use are retrieved from the
LDAP server, based on your connection settings. User attribute
values are case-sensitive.
Group based Choose Group Based when you want users to inherit role-based
access permissions after they authenticate with the LDAP server.
The mapping of group names to user roles and security profiles is
case-sensitive.
Group base DN Specifies the start node in the LDAP directory for loading groups.
For example, to search for all groups that have at least one
memberUid attribute and that have a cn value that starts with the
letter 's', type memberUid in Group Member Field and type cn=s*
in Group Query Field.
8. If you specified Group Based authorization, click Load Groups and click the
plus (+) or minus (-) icon to add or remove privilege groups.
Note: Query limits can be set by selecting the Query Limit Enabled check
box or the limits can be set on the LDAP server. If query limits are set on the
LDAP server, you might receive a message that indicates that the query limit
is enabled even if you did not select the Query Limit Enabled check box.
9. Click Save.
10. Click Manage synchronization to exchange authentication and authorization
information between the LDAP server and the QRadar console.
a. If you are configuring the LDAP connection for the first time, click Run
Synchronization Now to synchronize the data.
b. Specify the frequency for automatic synchronization.
c. Click Close.
11. Repeat the steps to add more LDAP servers, and click Save when complete.
Each group that is configured on the LDAP server must have a matching user role
or security profile that is configured on the QRadar console. For each group that
matches, the users are imported and assigned permissions that are based on that
user role or security profile.
Procedure
1. On the Admin tab, click System Configuration and then click Authentication.
2. In the Authentication Module list, select LDAP.
3. Click Manage Synchronization and then click Run Synchronization Now.
Procedure
1. Using SSH, log in to your system as the root user.
a. User name: root
b. Password: <password>
The web server must be restarted after the LDAP properties is created. Consider
scheduling this task during a maintenance window when no active users are
logged in to the system.
The following example lists properties that you can add to an ldap.properties
configuration file.
ldap.url=ldap://LDAPserver.example.com:389
ldap.authentication=simple
ldap.userName=user.name
ldap.password=your.encrypted.password
ldap.basedn=O=IBM,C=US ldap.filterString=(&(objectclass=user)(samaccountname=%USER%))
ldap.attributes.displayName=Name
ldap.attributes.email=Email
ldap.attributes.employeeID=EmployeeID
ldap.attributes.department=Department
Procedure
1. Use SSH to log in to IBM Security QRadar as a root user.
2. To encrypt the LDAP user password, run the /opt/qradar/bin/runjava.sh
com.q1labs.core.util.PasswordEncrypt [password] script.
3. Use a text editor to create the /opt/qradar/conf/ldap.properties configuration
file.
4. Specify the location and authentication information to access the remote LDAP
server.
a. Specify the URL of the LDAP server and the port number.
Use ldaps:// or ldap:// to connect to the remote server, for example,
ldap.url=ldaps://LDAPserver.example.com:389.
b. Type the authentication method that is used to access the LDAP server.
Administrators can use the simple authentication method, for example,
ldap.authentication=simple.
c. Type the user name that has permissions to access the LDAP server. For
example, ldap.userName=user.name.
d. To authenticate to the remote LDAP server, type the encrypted LDAP user
password for the user. For example, ldap.password=password.
e. Type the base DN used to search the LDAP server for users. For example,
ldap.basedn=BaseDN.
f. Type a value to use for the search parameter filter in LDAP.
Results
Administrators can hover over the Username field on the Log Activity tab and
Offenses tab, or hover over the Last User field on the Assets tab (if available) to
display more information about the LDAP user.
If multiple repositories are configured, when a user logs in, they must specify
which repository to use for authentication. They must specify the full path to the
repository and the domain name in the user name field. For example, if
Repository_1 is configured to use domain ibm.com and Repository_2 is configured
to use domain ibm.ca.com, the login information might look like these examples:
v OU=User Accounts,OU=PHX,DC=qcorpaa,DC=aa,DC=ibm.com\username
v OU=Office,OU=User Accounts,DC=qcorpaa,DC=aa,DC=ibm.ca.com\username
User information is automatically imported from the LDAP server for repositories
that use user attributes or group authorization. For repositories that use local
authorization, you must create users directly on the QRadar system.
You can assign different privileges for QRadar data and QRadar capabilities. You
can do this assignment by specifying different accept and deny groups for security
profiles and user roles. Accept groups assign privileges and deny groups restrict
privileges.
Let's look at an example. Your company hired a group of student interns. John is
in his final year of a specialized cyber security program at the local university. He
was asked to monitor and review known network vulnerabilities and prepare a
remediation plan based on the findings. Information about the company's network
vulnerabilities is confidential.
As the QRadar administrator, you must ensure that the student interns have
limited access to data and systems. Most student interns must be denied access to
QRadar Vulnerability Manager, but John's special assignment requires that he has
this access. Your organization's policy is that student interns never have access to
the QRadar API.
qvm.interns qradar.qrm
company.interns
QRM qradar.qrm company.firedemployees
company.interns
The following table shows that the security profile for qvm.interns restricts John
from accessing the QRadar API.
Table 11. Security profile privilege groups
Security profile Accept Deny
QVM qradar.secprofile.qvm company.firedemployees
API qradar.secprofile.qvm.api company.firedemployees
qradar.secprofile.qvm.interns
The following table describes the User Role Management window parameters. The
parameters that are visible on the User Role Management window are dependent
on which QRadar components are installed.
Table 12. Description of User Role Management window parameters
Parameter Description
User Role name A unique name for the role.
The following table provides descriptions of the User Management window toolbar
functions:
Table 15. User Management window toolbar functions
Function Description
New Click this icon to create a user account. For
more information about how to create a user
account, see “Creating a user account” on
page 19.
Edit Click this icon to edit the selected user
account.
Delete Click this icon to delete the selected user
account.
Search Users In this text box, you can type a keyword and
then press Enter to locate a specific user
account.
The following table provides descriptions of the User Details window parameters:
Table 16. User Details window parameters
Parameter Description
Username Type a unique user name for the new user.
The user name must contain a maximum of
30 characters.
E-mail Type the user's email address. The email
address must meet the following
requirements:
v Must be a valid email address
v Minimum of 10 characters
v Maximum of 255 characters
Password Type a password for the user to gain access.
The password must meet the following
criteria:
v Minimum of 5 characters
v Maximum of 255 characters
Confirm Password Type the password again for confirmation.
Description Optional. Type a description for the user
account. The maximum number of
characters is 2,048.
You must allocate a license for each system in your deployment, including
software appliances. QFlow and QRadar Event Collectors do not require a license.
When you install a QRadar system, a default license key provides you with access
to the user interface for five weeks. Before the default license expires, you must
allocate a license key to your system. You can also add licenses to enable QRadar
products, such as QRadar Vulnerability Manager.
There is a 14-day grace period to reallocate a license. You can unlock a license if
the key is uploaded, after a host is patched with a fix, or after an unlock key is
uploaded. After the grace period is passed, the license is locked to the system.
If your license status is Invalid, the license must be replaced. The status might
indicate that your license was altered without authorization.
The toolbar in the System and License Management window provides the
following functions:
Table 17. System and License Management toolbar functions
Function Description
Allocate License to Use this function to allocate a license to a system.
System
When you select Licenses from the Display menu, the label on this
function changes to Allocate System to License.
Upload License Use this function to upload a license to your Console. For more
information, see “Uploading a license key” on page 40.
Actions (License) Select Licenses from the Display menu, to view license menu
options.
Add HA Host - Select a system, and then select this option to add
an HA host to the system to form an HA cluster. For more
information about HA, see the High Availability Guide for your
product.
Restart Web Server - Select this option to restart the user interface,
when required. For example, you might be required to restart your
user interface after you install a new protocol that adds new user
interface components.
Collect Log Files - Collect log files for the selected host.
When you select Licenses from the Display menu, the System and License
Management window displays the following information:
Table 18. System and License Management window parameters - Licenses view
Parameter Description
Host Name System that is allocated to this license.
Host IP System that is allocated to this license.
License Appliance Type of appliance that is allocated to this license.
Type
License Identity Name of the IBM Security QRadar product this license provides.
Invalid - The license is not valid and must be replaced. This status
might indicate that your license was altered without authorization.
License Expiration Date of expiration.
Date
Event Rate Limit Maximum event rate that is allowed per the terms of your license.
Flow Rate Limit Maximum flow rate that is allowed per the terms of your license.
A default license key provides you with access to the user interface for five weeks.
You must allocate a license key to your system.
You must set up the QRadar system before users can use the tools. Begin by
obtaining a license key. After you have a license key, you must upload it to the
console and allocate it to a system.
During the initial set up of a system you must complete the following tasks:
Procedure
1. Obtain a license key by one of the following methods:
v For a new or updated license key, contact your local sales representative.
v For all other technical issues, contact Customer Support.
2. Upload your license key.
When you upload a license key, it is listed in the System and License
Management window, but remains unallocated. For more information, see
“Uploading a license key” on page 40
3. Allocate your license to a system or allocate a system to a license.
4. To deploy your changes, from the Admin tab menu, click Advanced > Deploy
Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Choose one of the following options if you need assistance with your license key:
v For a new or updated license key, contact your local sales representative.
v For all other technical issues, contact Customer Support.
If you log on to your QRadar Console and find that your license key is expired,
you are automatically directed to the System and License Management window.
You must upload a license key before you can continue. If one of your managed
host systems includes an expired license key, a message is displayed when you log
in indicating that a system requires a new license key. You must access the System
and License Management window to update that license key.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. On the toolbar, click Upload License.
5. In the dialog box, click Select File.
6. On the File Upload window, locate and select the license key.
7. Click Open.
8. Click Upload.
Results
The license is uploaded to your QRadar Console and is displayed in the System
and License Management window. By default, the license is not allocated.
What to do next
“Allocating a license to a system” on page 44
You can allocate multiple licenses to a system. For example, in addition to IBM
Security QRadar SIEM, you can allocate IBM Security QRadar Risk Manager, and
IBM Security QRadar Vulnerability Manager to your QRadar Console system.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Licenses.
5. Select an unallocated license.
6. Click Allocate System to License.
7. Optional: To filter the list of licenses, type a keyword in the Upload License
search box.
8. From the list of licenses, select a license.
9. Select a system.
10. Click Allocate License to System.
Reverting an allocation
You can revert an allocated license within the 14-day grace period.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Licenses.
5. Select the license that you want to revert.
6. Click Actions > Revert Allocation.
From the System and License Management window, you can view license details,
such as the number of allowable log sources and the expiration dates.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Licenses.
5. To view license information for a host, select the host, and then click Actions >
View License.
What to do next
From the Licenses window, you can complete the following tasks:
v Click Upload Licenses to upload a license. See Uploading a license key.
v Click Allocate License to System on the toolbar to assign a license. See
Allocating a license to a system.
Exporting a license
Export license key information to an external file on a desktop system.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Licenses.
5. From the Actions menu, select Export Licenses.
6. Select one of the following options:
Open with
Opens the license key data using the selected application.
Save File
Saves the file to your desktop.
7. Click OK.
System management
Use the System and License Management window to manage systems in your
deployment.
View system information, manage licenses, manage systems, restart and shut down
a system, add a HA host, collect log files, and complete other management
activities on your system.
Open the System Details window to view information about the system and
licenses that are allocated to the system.
The License pane displays the following details for each license that is allocated to
the selected system:
Table 19. License parameters
Parameter Description
License Identity Name of the IBM Security QRadar product
this license provides.
License Status Status of the license that is allocated to this
system include the following Statuses:
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Systems.
5. To display the system details, select a host and click Actions > View and
Manage System, or double-click the host.
6. Click the License tab.
From the License pane, you can complete the following tasks:
v Select a license and click View License. See “Viewing license details” on page
41.
v Click Upload License to upload a license. See “Uploading a license key” on
page 40.
v Click Allocate License to System on the toolbar to assign a license. See
Allocating a license to a system.
System health
The System health view shows system notifications and health information for the
IBM Security QRadar host.
Select Admin > System Configuration > System Health icon in the System
Configuration area on the Admin tab to view CPU usage, network reads and
writes, disk reads and writes, memory usage, flows per second (FPS), and events
per second (EPS).
Hover over a graph to view more information, and the metric being graphed.
You can allocate multiple licenses to a system. For example, in addition to IBM
Security QRadar SIEM, you can allocate IBM Security QRadar Risk Manager, and
IBM Security QRadar Vulnerability Manager to your QRadar Console system.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Systems.
5. Select an available system.
6. Click Allocate License to System.
7. Optional: To filter the list of licenses, type a keyword in the Upload License
search box.
8. From the list of licenses, select a license.
9. Select a system.
10. Click Allocate License to System.
Restarting a system
From the Actions menu in the System and License Management window, you can
restart a system in your deployment.
Data collection stops while the system is shutting down and restarting.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Systems.
5. Select the system that you want to shut down.
6. From the Actions menu, select Shutdown.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Systems.
5. From the Actions menu, select Export Systems.
6. Select one of the following options:
Open with
Opens the license key data by using the selected application.
Save File
Saves the file to your desktop.
7. Click OK.
You can collect the log files for one or more host systems at the same time. The
time that is required to collect the log files depends on the size of your
deployment and the number of hosts that you want to include in the log file
collection. The QRadar console log files are automatically included in each log file
collection.
You can continue to use the QRadar console while the log file collection is running.
If the system is actively collecting log files, you cannot initiate a new collection
request. You must cancel the active collection process and start another collection.
When the log file collection process completes, a system notification appears on the
System Monitoring dashboard.
Procedure
1. Click the Admin tab.
2. On the navigation window, click System Configuration and click the System
and License Management icon.
3. Press Ctrl on the keyboard and click each host that you want to include in the
log file collection.
4. Click Actions > Collect Log Files.
5. Click Advanced Options and choose the options for the log file collection.
Encrypted log file collections can be decrypted only by IBM Support. If you
want access to the log file collection, do not encrypt the file.
6. Click Collect Log Files.
7. Under System Support Activities Messages, a message indicates the status of
the collection process.
To cancel an active log file collection process, click the X in the notification
message.
8. To download the log file collection, click Click here to download files in the
Log file collection completed successfully notification.
The hash files are generated in memory before the files are written to disk, so the
event and flow logs cannot be tampered with before the hash files are generated.
Ensure that log hashing is enabled for your QRadar system. For information about
enabling the flow log hashing or event log hashing parameters, see Configuring
system settings.
You must log in to the system that has the data storage for events and flows, and
run a utility to check the logs. You cannot check the log integrity in the event and
flow viewer interface.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. To run the utility, type the following command:
/opt/qradar/bin/check_ariel_integrity.sh -d <duration> -n <database name>
[-t <endtime>] [-a <hash algorithm>] [-r <hash root directory>] [-k <hmac key>]
For example, to validate the last 10 minutes of event data, type the following
command:
/opt/qradar/bin/check_ariel_integrity.sh -n events -d 10
Results
If an ERROR or FAILED message is returned, the hash key that is generated from the
current data on the disk does not match the hash key that was created when the
data was written to the disk. Either the key or the data was modified.
To replicate state and configuration data, ensure that you have a minimum
bandwidth of 100 Mbps between the QRadar console and all managed hosts.
Higher bandwidth is necessary when you search log and network activity, and you
have over 10,000 events per second (EPS). System and network performance affect
your data search speed. QRadar Event Collectors, with the store and forward
configuration, forward all data based on your schedule. You must allocate
sufficient bandwidth for the data that you plan to collect, or your store and
forward appliance cannot maintain your scheduled pace.
Chapter 4. System and licenses management 47
You can mitigate bandwidth limitations between data centers, by using the
following methods:
Process and send data to hosts at the primary data center
Design your deployment to process and send data to hosts at the primary
data center, where the console resides, as the data is collected. In this
design, all user-based searches query the data from the local data center,
rather than waiting for remote sites to send back data. You can deploy a
store and forward event collector, such as a QRadar 15XX physical or
virtual appliance, in the remote locations to control bursts of data across
the network. Bandwidth is used in the remote locations, and searches for
data occur at the primary data center, rather than at a remote location.
Don't run long-term searches over limited bandwidth connections
Ensure that users don't run long-term searches over links that have limited
bandwidth. Searches that have precise filters limit the amount of data that
is retrieved from the remote locations and reduces the amount of
bandwidth that is required to send data back for the result.
If you configured IBM Security QRadar Risk Manager in your deployment, you
can add a managed host. For more information, see the IBM Security QRadar Risk
Manager Installation Guide.
Procedure
1. Click the Admin tab.
2. In the System Configuration pane, click System and License Management.
3. From the host table, select one of the following appliances that you want to
manage.
v QRadar Console
v QRadar managed host
4. Optional: Use the Deployment Actions menu to add and configure
components of your software install. You can see visualizations of your
deployment by selecting Deployment actions > View Deployment.
You can download a PNG image or a Microsoft Visio (2010) VDX file of your
deployment visualization from the Deployment View window.
5. From the Deployment actions menu, choose an action.
6. Enter the required information and select the appropriate options.
You can assign roles for network interfaces, manage licenses, configure the email
server that you want QRadar to use, and use the local firewall to manage access
from external devices to QRadar.
If you change the External Flow Source Monitoring Port parameter in the QFlow
configuration, you must also update your firewall access configuration.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display menu, select Systems.
5. Select the host for which you want to configure firewall access settings.
6. From the Actions menu, click View and Manage System.
Note: You can right-click the selected host to access this menu option, or you
can double-click the host to open the Systems Information window.
7. To configure your local firewall to allow access to this host from specified
devices outside of your QRadar deployment, click the Firewall tab.
a. Configure access for devices that are outside of your deployment and need
to connect to this host.
b. Add this access rule by clicking the arrow.
8. To configure network interfaces on your QRadar system, click the Network
Interfaces tab.
a. Select a network interface from the Device column.
b. Click Edit.
c. Configure the parameters.
You can't edit a network interface with a management, HA crossover, or slave
role.
9. To configure an email server to distribute alerts, reports, notifications, and
event messages, click the Email Server tab.
a. In the Email Server Address field, type the host name or IP address of the
email server that you want to use.
Note: It is recommended that you use port 25 for the email server
connection.
10. Click Save.
Procedure
1. Use SSH to log in to your QRadar Console as the root user.
2. Type the user name and password for the root user.
The user name and password are case-sensitive.
3. Use the passwd command to change your password.
Use one of the following methods to configure the IBM Security QRadar system
time:
v Configure a Network Time Protocol (NTP) server to maintain the system time.
The time is automatically synchronized between the QRadar Console and the
managed hosts.
v Configure the system time manually.
To ensure that searches and data-related functions work properly, all appliances
must synchronize time settings with the QRadar Console appliance. When the time
zone settings are mismatched, you may see inconsistent results between QRadar
searches and report data.
The Accumulator service runs on all appliances with local storage to create minute
by minute accumulations, and hourly and daily rollups. QRadar uses the
accumulated data in reports and time series graphs. When the time zones are
mismatched in a distributed deployment, report and time series graphs may show
inconsistent results when compared to AQL query results due to the way that the
accumulated data is aggregated.
Before you manually adjust the system time, stop QRadar services, then use the
date command to change the system time and date.
Procedure
1. Stop QRadar services.
service hostcontext stop
service tomcat stop
service hostservices stop
2. Type the date command with time parameters.
date <MMddhhmm><YYYY>
For example, if you want to set the time to December 13, 2018, 5:24 PM, type
the following command:
date 121317242018
3. Synchronize the system hardware clock to the current time.
/sbin/hwclock --systohc
4. Restart QRadar services.
service hostservices start
service tomcat start
service hostcontext start
5. Synchronize your QRadar Console time with your QRadar managed hosts by
typing the following command.
/opt/qradar/support/all_servers.sh /opt/qradar/bin/time_sync.sh
6. On the Admin tab, click Advanced > Deploy Full Configuration, to restart
services on all QRadar managed hosts.
Time is now synchronized between the QRadar Console and the managed
hosts.
To synchronize your QRadar Console time with a time server, you must enable
time sync services on your QRadar Console.
Procedure
1. Use SSH to log in to the QRadar Console as the root user.
2. Edit the ntp.conf file.
IBM Security QRadar SIEM uses the information that is collected from the
endpoints to enrich the user information that is associated with the traffic and
events that occur on your network.
Use the following utilities to configure and manage user information sources:
v Tivoli Directory Integrator- You must install and configure a Tivoli® Directory
Integrator on a non-QRadar host.
v UISConfigUtil.sh - Use this utility to create, retrieve, update, or delete user
information sources. You can use user information sources to integrate QRadar
SIEM using a Tivoli Directory Integrator server.
v GetUserInfo.sh - Use this utility to collect user information from a user
information source and store the information in a reference data collection. You
can use this utility to collect user information on demand or on a schedule.
The reference data collection type is a Map of Maps. In a Reference Map of Maps,
data is stored in records that map one key to another key, which is then mapped to
a single value.
For example:
v #
v # Domain Admins
v # key1,key2,data
v smith_j,Full Name,John Smith
v smith_j,account_is_disabled,0
v smith_j,account_is_locked
v smith_j,password_does_not_expire,1
For more information about reference data collections, see the Reference Data
Collections Technical Note.
To ensure activities that are performed by privileged ISIM users comply with your
security policies, you can complete the following tasks:
Create a log source to collect and parse audit data for each ISIM server from which
the logs are collected. For more information about how to create a log source, see
the Managing Log Sources Guide.
1. Create a user information source for the ISIM server and collect ISIM
Administrators user group information. This step creates a reference data
collection that is called ISIM Administrators. See “Creating a user information
source” on page 58.
2. Configure a building block to test for events in which the source IP address is
the ISIM server and the user name is listed in the ISIM administrator reference
data collection. For more information about building blocks, see the User Guide
for your product.
3. Create an event search that uses the custom building block as a filter. For more
information about event searches, see the User Guide for your product.
4. Create a custom report that uses the custom event search to generate daily
reports on the audit activity of the privileged ISIM users. These generated
reports indicate whether any ISIM administrator activity breaches your security
policy. For more information about reports, see the User Guide for your product.
Note: If you want to collect application security logs, you must create a Device
Support Module (DSM). For more information, see the IBM Security QRadar DSM
Configuration Guide.
When you install Tivoli Directory Integrator, you must configure a name for the
Solutions directory. This task requires you to access the Solutions directory.
Therefore, in the task steps, <solution_directory> refers to the name that you
gave to the directory.
Procedure
1. Install Tivoli Directory Integrator on a non-QRadarhost. For more information
on how to install and configure Tivoli Directory Integrator, see your Tivoli
Directory Integrator (TDI) documentation.
2. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
3. Copy the QRadarIAM_TDI.zip file to the Tivoli Directory Integrator server.
4. On the Tivoli Directory Integrator server, extract the QRadarIAM_TDI.zip file in
the Solutions directory.
5. Configure your Tivoli Directory Integrator server to integrate with QRadar.
a. Open the Tivoli Directory Integrator <solution_directory>/
solution.properties file.
b. Uncomment the com.ibm.di.server.autoload property. If this property is
already uncommented, note the value of the property.
c. Choose one of the following options:
v Change directories to the autoload.tdi directory, which contains the
com.ibm.di.server.autoload property by default.
v Create an autoload.tdi directory in the <solution_directory> to store the
com.ibm.di.server.autoload property.
Before you create a user information source, you must install and configure your
Tivoli Directory Integrator server. For more information, see “Configuring the
Tivoli Directory Integrator Server” on page 55.
When you create a user information source, you must identify the property values
required to configure the user information source. The following table describes the
supported property values:
Table 23. Supported user interface property values
Property Description
tdiserver Defines the host name of the Tivoli Directory
Integrator server.
tdiport Defines the listening port for the HTTP
connector on the Tivoli Directory Integrator
server.
hostname Defines the host name of the user
information source host.
port Defines the listening port for the Identity
and Access Management registry on the user
information host.
username Defines the user name that QRadar SIEM
uses to authenticate to the Identity and
Access Management registry.
password Defines the password that is required to
authenticate to the Identity and Access
Management registry.
searchbase Defines the base DN.
search filter Defines the search filter that is required to
filter the user information that is retrieved
from the Identity and Access Management
registry.
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
2. Choose one of the following options:
a. Type the following command to retrieve all user information sources:
UISConfigUtil.sh get <name>
b. Type the following command to retrieve a specific user information source:
UISConfigUtil.sh get <name>
Where <name> is the name of the user information source you want to
retrieve.
For example:
[root@vmibm7089 bin]# .UISConfigUtil.sh get "UIS_AD"
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
2. Type the following command to delete a user information source:
UISConfigUtil.sh delete <name>
Where <name> is the name of the user information source you want to delete.
What to do next
The collected user information is stored in a reference data collection in the IBM
Security QRadar database. If no reference data collection exists, a new reference
data collection is created. If a reference data collection was previously created for
this user information source, the reference map is purged of previous data and the
new user information is stored. For more information about reference data
collections, see Reference data collections.
Use this task to collect user information on demand. If you want to create
automatic user information collection on a schedule, create a cron job entry. For
more information about cron jobs, see your Linux documentation.
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
What to do next
You can configure your network hierarchy, automatic updates, system settings,
event and flow retention buckets, system notifications, console settings, offense
close reasons, and index management.
Network hierarchy
QRadar uses the network hierarchy to understand your network traffic and
provide you with the ability to view activity for your entire deployment.
When you develop your network hierarchy, consider the most effective method for
viewing network activity. The network hierarchy does not need to resemble the
physical deployment of your network. QRadar supports any network hierarchy
that can be defined by a range of IP addresses. You can base your network on
many different variables, including geographical or business units.
When you define your network hierarchy, you must consider the systems, users,
and servers that can be grouped.
You can group systems and user groups that have similar behavior. However, do
not group a server that has unique behavior with other servers on your network.
Placing a unique server alone provides the server greater visibility in QRadar, and
you can manage specific policies.
Within a group, you can place servers with high volumes of traffic, such as mail
servers, at the top of the group. This hierarchy provides you with a visual
representation when a discrepancy occurs.
If your deployment processes more than 600,000 flows, then you can create
multiple top-level groups.
You can organize your systems and networks by role or similar traffic patterns. For
example, mail servers, departmental users, labs, or development groups. Using this
organization, you can differentiate network behavior and enforce network
management security policies.
Large network groups can cause you difficulty when you view detailed
information for each object. Do not configure a network group with more than 15
objects.
10.10.1.4/32
10.10.1.5/32
Add key servers as individual objects and group other major but related servers
into multi-CIDR objects.
The following table provides a list of the CIDR values that QRadar accepts:
Table 26. Acceptable CIDR values
Number of
CIDR Length Mask Networks Hosts
/1 128.0.0.0 128 A 2,147,483,392
/2 192.0.0.0 64 A 1,073,741,696
/3 224.0.0.0 32 A 536,870,848
/4 240.0.0.0 16 A 268,435,424
/5 248.0.0.0 8A 134,217,712
/6 252.0.0.0 4A 67,108,856
/7 254.0.0.0 2A 33,554,428
/8 255.0.0.0 1A 16,777,214
/9 255.128.0.0 128 B 8,388,352
/10 255.192.0.0 64 B 4,194,176
For example, a network is called a supernet when the prefix boundary contains
fewer bits than the natural (or classful) mask of the network. A network is called a
subnet when the prefix boundary contains more bits than the natural mask of the
network:
v 209.60.128.0 is a class C network address with a mask of /24.
v 209.60.128.0 /22 is a supernet that yields:
– 209.60.128.0 /24
– 209.60.129.0 /24
– 209.60.130.0 /24
– 209.60.131.0 /24
v 192.0.0.0 /25
Subnet Host Range
0 192.0.0.1-192.0.0.126
1 192.0.0.129-192.0.0.254
v 192.0.0.0 /26
Subnet Host Range
0 192.0.0.1 - 192.0.0.62
1 192.0.0.65 - 192.0.0.126
Network objects are a container for CIDR addresses. Any IP address that is
covered by a CIDR range in the network hierarchy is considered a local address.
Any IP address that is not defined in a network objects CIDR range is considered a
remote IP address. A CIDR can belong only to one network object, however
subsets of a CIDR range can belong to another network object. Network traffic
matches the most exact CIDR. A network object can have multiple CIDR ranges
assigned to it.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Network Hierarchy.
4. From the menu tree on the Network Views window, select the area of the
network in which you want to work.
5. To add network objects, follow these steps:
a. Click Add and type a unique name and description for the object.
b. From the Group list, select the group in which you want to add the new
network object.
c. To add a group, click the icon beside the Group list and type a name for the
group.
d. Type a CIDR range for this object and click Add.
e. Click Create.
f. Repeat the steps for all network objects.
6. Click Edit or Delete to work with existing network objects.
Related concepts:
Automatic updates
You can automatically or manually update your configuration files to ensure that
your configuration files contain the latest network security information.
The Console must be connected to the Internet to receive the updates. If your
Console is not connected to the Internet, you must configure an internal update
server for your Console to download the files from.
Update files are available for manual download from the following website:
After you install updates on your Console and deploy your changes, the Console
updates its managed hosts if your deployment is defined in your deployment
editor. For more information about the deployment editor, see Chapter 11,
“Deployment editor,” on page 123.
Description of updates
Update files can include the following updates:
v Configuration updates, which include configuration file changes, vulnerability,
QID map, and security threat information updates.
v DSM updates, which include corrections to parsing issues, scanner changes, and
protocol updates.
v Major updates, which include items such as updated JAR files.
v Minor updates, which include items such as more Online Help content or
updated scripts.
Your system needs to be operational long enough to retrieve the weekly updates. If
no updates are displayed in the Updates window, either your system has not been
in operation long enough to retrieve the weekly updates or no updates have been
issued. If this occurs, you can manually check for new updates. For more
information about checking for new updates, see “Checking for new updates” on
page 71.
You can select Auto Restart Service to allow automatic updates that require the
user interface to restart. A user interface disruption occurs when the service
restarts. Alternatively, you can manually install the updated from the Check for
Updates window.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Change Settings.
5. On the Basic tab, select the schedule for updates.
6. In the Configuration Updates section, select the method that you want to use
for updating your configuration files.
7. In the DSM, Scanner, Protocol Updates section, select an option to install
updates.
8. In the Major Updates section, select an option for receiving major updates for
new releases.
9. In the Minor updates section, select an option for receiving patches for minor
system issues.
10. Select the Auto Deploy check box if you want to deploy update changes
automatically after updates are installed.
11. Select the Auto Restart Service check box if you want to restart the user
interface service automatically after updates are installed.
12. Click the Advanced tab.
13. In Web Server field, type the web server from which you want to obtain the
updates. The default web server is https://qmmunity.q1labs.com/.
14. In the Directory field, type the directory location on which the web server
stores the updates. The default directory is autoupdates/.
Scheduling an update
Automatic updates occur on a recurring schedule according to the settings on the
Update Configuration page. You can also schedule an update or a set of updates to
run at a specific time.
For detailed information on each update, you can select the update. A description
and any error messages are displayed in the right pane of the window.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. Optional: If you want to schedule specific updates, select the updates that you
want to schedule.
5. From the Schedule list box, select the type of update you want to schedule.
6. Using the calendar, select the start date and time of when you want to start
your scheduled updates.
Scheduled updates display a status of Scheduled in the Status field. After the
schedule is cleared, the status of the update displays as New.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Check for Updates.
5. Click Get new updates.
The system retrieves the new updates from Fix Central. This might take an
extended period. When complete, new updates are listed on the Updates window.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Check for Updates.
5. Optional: If you want to install specific updates, select the updates that you
want to schedule.
6. From the Install list box, select the type of update you want to install.
A description of the update and any installation error messages are displayed in
the right pane of the View Update History page. The View Update History page
provides the following information:
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Restore Hidden Updates.
5. Optional: To locate an update by name, type a keyword in the Search by Name
text box and press Enter.
6. Select the hidden update that you want to restore.
7. Click Restore.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click View Log.
The autoupdate package includes all files necessary to manually set up an update
server in addition to the necessary system configuration files for each update. After
the initial setup, you only need to download and uncompress the most current
autoupdate package to manually update your configuration.
Procedure
1. Access your Apache server. By default, the update directory is in the web root
directory of the Apache server. You can place the directory in another location
if you configure QRadar accordingly.
2. Create an update directory named autoupdates/.
3. Optional: Create an Apache user account and password to be used by the
update process.
4. Download the autoupdate package from Fix Central: http://www.ibm.com/
support/fixcentral You can find QRadar products in the Security Systems
Product Group list on Fix Central.
5. Save the autoupdate package file on your Apache server in the autoupdates/
directory that you created.
6. On the Apache server, type the following command to uncompress the
autoupdate package.tar -zxf updatepackage-[timestamp].tgz
7. Click the Admin tab.
8. On the navigation menu, click System Configuration.
9. Click Auto Update.
10. Click Change Settings.
11. Select the Advanced tab.
12. To direct the update process to the Apache server, configure the following
parameters in the Server Configuration panel:
a. In Web Server field, type the address or directory path of your Apache
server. If the Apache server runs on non-standard ports, add
:<portnumber> to the end of the address. https://qmmunity.q1labs.com/
:8080
b. In the Directory field, type the directory location on which the web server
stores the updates. The default directory is autoupdates/.
c. Optional: In the Proxy Server field, type the URL for the proxy server. The
proxy server is required if the application server uses a proxy server to
connect to the Internet.
d. Optional: In the Proxy Username field, type the user name for the proxy
server. A user name is required if you are using an authenticated proxy.
e. Optional: In the Proxy Password field, type the password for the proxy
server. A password is required if you are using an authenticated proxy.
13. Select Deploy changes.
14. Click Save.
15. Using SSH, log in to QRadar as the root user.
16. Type the following command to configure the user name that you set for your
Apache server: /opt/qradar/bin/UpdateConfs.pl -change_username
<username>
To configure your QRadar console to be your update server, you complete three
tasks:
v Create an autoupdate directory.
v Download the autoupdate package from Fix Central.
v Configure QRadar to accept the autoupdates.
Procedure
1. Log in to QRadar as the root user.
2. Type the following command to create the autoupdate directory: mkdir
/opt/qradar/www/autoupdates/
3. Download the autoupdate package from Fix Central: http://www.ibm.com/
support/fixcentral You can find QRadar products in the Security Systems
Product Group list on Fix Central.
4. Save the autoupdate package file on your Apache server in the autoupdates/
directory that you created.
5. On your QRadar Console, type the following command to uncompress the
autoupdate package.tar -zxf updatepackage-[timestamp].tgz
6. Log in to QRadar user interface.
7. On the navigation menu, click System Configuration.
8. Click Auto Update.
9. Click Change Settings.
10. Select the Advanced tab.
11. In Web Server field, type https://localhost/.
12. Clear the Send feed check box.
You must configure your update server and set up QRadar to receive updates from
the update server.
Procedure
1. Download the autoupdate package from Fix Central: http://www.ibm.com/
support/fixcentral You can find QRadar products in the Security Systems
Product Group list on Fix Central.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System Settings icon.
4. Configure the system settings.
5. Click Save.
6. On the Admin tab menu, select Advanced > Deploy Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Procedure
1. Using SSH, log in to IBM Security QRadar as the root user.
2. On the QRadar server, copy the ip_context_menu.xml file from the
/opt/qradar/conf/templates directory to the /opt/qradar/conf directory.
3. Open the /opt/qradar/conf/ip_context_menu.xml file for editing.
4. Edit the attributes in the menuEntry element .
5. Save and close the file.
6. To restart services, type the following command:
service tomcat restart
Restriction: You can add options to the right-click menu on only the QRadar
Console appliance and to only some Ariel database fields.
Procedure
1. Using SSH, log in to the QRadar Console appliance as the root user.
2. Go to the /opt/qradar/conf directory and create a file that is named
arielRightClick.properties.
3. Edit the /opt/qradar/conf/arielRightClick.properties file. Use the following
table to specify the parameters that determine the options for the right-click
menu.
Table 28. Description of the arielRightClick.properties file parameters.
Parameter Requirement Description Example
pluginActions Required Indicates either a URL or
script action.
arielProperty Required Specifies the column, or Ariel sourceIP
field name, for which the
right-click menu is enabled. sourcePort
destinationIP
qid
text Required Specifies the text that is Google search
displayed on the right click
menu.
useFormattedValue Specifies whether formatted If the parameter is set to true
Optional values are passed to the for the event name (QID)
script. property, the event name of the
QID is passed to the script.
Set to true to ensure that the
formatted value for attributes, If the parameter is set to false,
such as username and the raw, unformatted QID
payload, are passed. value is passed to the script.
Formatted values are easier
for administrators to read
than unformatted values.
url Required to Specifies the URL, which sourceIPwebUrlAction.url=
access a URL opens in a new window, and http://www.mywebsite.com?
the parameters to pass to the q=$sourceIP$
URL.
For each of the key names that are specified in the pluginActions list, define the
action by using a key with the format key name, property.
4. Save and close the file.
5. Log in to the QRadar user interface.
6. Click the Admin tab.
Example
The following example shows how to add Test URL as a right-click option for
source IP addresses.
pluginActions=sourceIPwebUrlAction
sourceIPwebUrlAction.arielProperty=sourceIP
sourceIPwebUrlAction.text=Test URL
sourceIPwebUrlAction.url=http://www.mywebsite.com?q=$sourceIP$
The following example shows how to enable script action for destination ports.
pluginActions=destinationPortScriptAction
destinationPortScriptAction.arielProperty=destinationPort
destinationPortScriptAction.text=Test Unformatted Command
destinationPortScriptAction.useFormattedValue=false
destinationPortScriptAction.command=/bin/echo
destinationPortScriptAction.arguments=$qid$
qidwebUrlAction.arielProperty=qid,device,eventCount
qidwebUrlAction.text=Search on Google
qidwebUrlAction.url=http://www.google.com?q=$qid$-$device$-$eventCount$
sourcePortScriptAction.arielProperty=sourcePort
sourcePortScriptAction.text=Port Unformatted Command
sourcePortScriptAction.useFormattedValue=true
sourcePortScriptAction.command=/bin/echo
sourcePortScriptAction.arguments=$qid$-$sourcePort$-$device$-$CONTEXT$
You must have root access to the command-line interface to create a login message
file.
Procedure
1. Log in to QRadar as the root user.
2. In the /etc/ file, type the following command:
vim loginMSG
The Vim editor creates a loginMsg file. Do not specify the file name with
special characters.
3. Press i to type your message.
4. To save your message, press ESC.
5. To return to the command-line, type the following command:
:wq
6. Press Enter.
7. To enable your login banner, go to Admin > System Settings.
8. Click Authentication Settings.
9. In the Login Message File field, type the following file path:
/etc/loginMsg
10. Click Save.
Contact your IF-MAP server administrator to obtain a copy of the IF-MAP server
public certificate. The certificate must have the .cert file extension, for example,
ifmapserver.cert.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. Copy the certificate to the /opt/qradar/conf/trusted_certificates directory.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. Access the certificate to the /opt/qradar/conf/trusted_certificates directory
3. Copy the SSL intermediate certificate and SSL Verisign root certificate to your
IF-MAP server as CA certificates. For assistance, contact your IF-MAP server
administrator.
4. Type the following command to create the Public-Key Cryptography Standards
file with the .pkcs12 file extension using the following command:openssl
pkcs12 -export -inkey <private_key> -in <certificate> -out
<pkcs12_filename.pkcs12> -name "IFMAP Client"
5. Type the following command to copy the pkcs12 file to the
/opt/qradar/conf/key_certificates directory:cp <pkcs12_filename.pkcs12>
/opt/qradar/conf/key_certificates
6. Create a client on the IF-MAP server with the Certificate authentication and
upload the SSL certificate. For assistance, contact your IF-MAP server
administrator.
Trusted root
To establish all internal SSL connections between components, QRadar uses the
web server certificate that is preinstalled on the QRadar Console. If you replace the
certificate with a third-party certificate, the certificate must be the same on the
QRadar Console and all managed hosts.
SSL certificates that are issued from some vendors, such as VeriSign, require an
intermediate certificate. You must download the intermediate certificate from the
vendor and use it during the configuration.
All trusted certificates for QRadar must meet the following requirements:
v The certificate must be a X.509 certificate and have PEM base64 encoding.
v The certificate must have a .cert, .crt, or .der file extension.
v Keystore files that contain certificates must have the .truststore file extension.
v The certificate file must be stored in the /opt/qradar/conf/
trusted_certificates directory.
Important:
Procedure
1. Obtain a certificate from a trusted certificate authority.
2. Use SSH to log in to your QRadar Console as the root user.
3. To install the certificate, type the following command:
/opt/qradar/bin/install_ssl_cert.sh -i
4. Type the location of your private key file.
Do not encrypt the private key when you install or replace an SSL certificate.
5. If you are using an intermediate certificate, type the location of your public key
file and the location of your intermediate certificate.
6. To continue, type Y and press Enter.
Procedure
1. Type the following command:
ssh-keygen -t rsa
If you want to use DSA keys, you need to use the ssh-keygen -t dsa
command.
2. Type the file in which to save the key or accept the default location.
Results
https://[<IP Address>]
Both IPv4 and IPv6 environments can use a hosts file for address translation. In an
IPv6 or mixed environment, the client resolves the Console address by its host
name. You must add the IP address of the IPv6 console to the /etc/hosts file on
the client.
Flow sources, such as NetFlow and sFlow, are accepted from IPv4 and IPv6
addresses. Event sources, such as syslog and SNMP, are accepted from IPv4 and
IPv6 addresses. You can disable superflows and flow bundling in an IPv6
environment.
Restriction:
By default, you cannot add an IPv4-only managed host to an IPv6 and IPv4
mixed-mode console. You must run a script to enable an IPv4-only managed host.
Data retention
Configure custom retention periods for specific data.
Retention buckets define retention policies for events and flows that match custom
filter requirements. As QRadar receives events and flows, each event and flow is
compared against retention bucket filter criteria. When an event or flow matches a
retention bucket filter, it is stored in that retention bucket until the retention policy
time period is reached. This feature enables you to configure multiple retention
buckets.
Retention buckets are sequenced in priority order from the top row to the bottom
row on the Event Retention and Flow Retention windows. A record is stored in the
bucket that matches the filter criteria with highest priority. If the record does not
match any of your configured retention buckets, the record is stored in the default
retention bucket, which is always located below the list of configurable retention
buckets.
The Event Retention and Flow Retention windows provide the following
information for each retention bucket:
Table 30. Retention window parameters
Parameter Description
Order The priority order of the retention buckets.
Name The name of the retention bucket.
Retention The retention period of the retention bucket.
Compression The compression policy of the retention
bucket.
Deletion Policy The deletion policy of the retention bucket.
Filters The filters applied to the retention bucket.
Move your mouse pointer over the Filters
parameter for more information on the
applied filters.
Distribution The retention bucket usage as a percentage
of total data retention in all your retention
buckets.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources .
3. Click the Event Retention or Flow Retention icon.
4. Double-click the first available retention bucket.
5. Configure the following parameters:
Parameter Description
Name Type a unique name for the retention
bucket.
Keep data placed in this bucket for Select a retention period. When the retention
period is reached, data is deleted according
to the Delete data in this bucket parameter.
Allow data in this bucket to be compressed
Select the check box to enable data
compression, and then select a time frame
from the list box. When the time frame is
reached, all data in the retention bucket are
eligible to be compressed. This increases
system performance by guaranteeing that no
data is compressed within the specified time
period. Compression only occurs when used
disk space reaches 83% for payloads and
85% for records.
6. Click Save.
7. Click Save again.
Your retention bucket starts storing data that match the retention parameters
immediately.
Retention buckets are sequenced in priority order from the top row to the bottom
row on the Event Retention and Flow Retention windows. A record is stored in the
first retention bucket that matches the record parameters.
You cannot move the default retention bucket. It always resides at the bottom of
the list.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. Click the Event Retention or Flow Retention icon.
4. Click the icon.
5. Select and move the required retention bucket to the correct location.
On the Retention Parameters window, the Current Filters pane is not displayed
when editing a default retention bucket.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. Choose one of the following options:
4. Click the Event Retention icon.
5. Click the Flow Retention icon.
6. Select the retention bucket you want to edit, and then click Edit.
7. Edit the parameters. For more information see, “Configuring retention buckets”
on page 86.
8. Click Save.
When you disable a bucket, any new events or flows that match the requirements
for the disabled bucket are stored in the next bucket that matches the event or flow
properties.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. Choose one of the following options:
4. Click the Event Retention icon.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. Click the Event Retention icon or the Flow Retention icon.
4. Select the retention bucket you want to delete, and then click Delete.
The following table describes the Global System Notifications window parameters
Table 32. Global System Notifications window parameters
Parameter Description
System load over 1 minute Type the threshold system load average over
the last minute.
System load over 5 minutes Type the threshold system load average over
the last 5 minutes.
System load over 15 minutes Type the threshold system load average over
the last 15 minutes.
Percentage of swap used Type the threshold percentage of used swap
space.
Received packets per second Type the threshold number of packets
received per second.
Transmitted packets per second Type the threshold number of packets
transmitted per second.
Received bytes per second Type the threshold number of bytes received
per second.
Transmitted bytes per second Type the threshold number of bytes
transmitted per second.
Receive errors Type the threshold number of corrupted
packets received per second.
Transmit errors Type the threshold number of corrupted
packets transmitted per second.
Packet collisions Type the threshold number of collisions that
occur per second while transmitting packets.
Dropped receive packets Type the threshold number of received
packets that are dropped per second due to
a lack of space in the buffers.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Global System Notifications icon.
4. Enter values for each parameter that you want to configure.
5. For each parameter, select Enabled and Respond if value is and then select
one of the following options:
Option Description
Greater Than An alert occurs if the parameter value
exceeds the configured value.
Less Than An alert occurs if the parameter value is less
than the configured value.
You can customize the content that is included in the email notification for rule
response by editing the alert-config.xml file.
You must create a temporary directory where you can safely edit your copy of the
files, without the risk of overwriting the default files. After you edit and save the
alert-config.xml file, you must run a script that validates your changes. The
Procedure
1. Using SSH, log in to the QRadar Console as the root user.
2. Create a new temporary directory to use to safely edit copies of the default
files.
3. To copy the files that are stored in the custom_alerts directory to the
temporary directory, type the following command:
cp /store/configservices/staging/globalconfig/templates/
custom_alerts/*.* <directory_name>
The <directory_name> option is the name of the temporary directory that you
created.
4. Confirm that the files were copied successfully:
a. To list the files in the directory, type the following command:
ls -lah
b. Verify that the following file is listed:
alert-config.xml
5. Open the alert-config.xml file for editing.
6. To create multiple template elements, copy the <template></template>
element, including tags and the contents, and then paste it below the existing
<template></template> element.
Important: Set the Active property to True for each event and flow template
type that you want to appear as an option in QRadar.
7. Edit the contents of the <template></template> element:
a. Specify the template type by using the following XML property:
<templatetype></templatetype>
The possible values are event or flow. This value is mandatory.
b. Specify the template name by using the following XML element:
<templatename></templatename>
c. Set the active element to true:
<active>true</active>
d. Edit the subject element, if required.
e. Add or remove parameters from the body element. For valid parameters,
see the Accepted Parameters table.
f. Repeat these steps for each template that you add.
8. Save and close the file.
9. To validate your changes, type the following command:
/opt/qradar/bin/runCustAlertValidator.sh
<directory_name>
The <directory_name> option is the name of the temporary directory that you
created.
If the script validates the changes successfully, the following message is
displayed:
File alert-config.xml was deployed successfully to staging!
10. Log in to QRadar.
11. Click the Admin tab.
Example
Table 33. Accepted Notification Parameters
Common Parameters Event Parameters Flow Parameters
AppName EventCollectorID Type
RuleName DeviceId CompoundAppID
RuleDescription DeviceName FlowSourceIDs
EventName DeviceTime SourceASNList
EventDescription DstPostNATPort DestinationASNList
EventProcessorId SrcPostNATPort InputIFIndexList
Qid DstMACAddress OutputIFIndexList
Category DstPostNATIPAddress AppId
RemoteDestinationIP DstPreNATIPAddress Host
Payload SrcMACAddress Port
Credibility SrcPostNATIPAddress SourceBytes
Relevance SrcPreNATIPAddress SourcePackets
Source SrcPreNATPor Direction
SourcePort DstPreNATPort SourceTOS
SourceIP SourceDSCP
Destination SourcePrecedence
DestinationPort DestinationTOS
DestinationIP DestinationDSCP
DestinationUserName SourceASN
Protocol DestinationASN
StartTime InputIFIndex
Duration OutputIFIndex
StopTime FirstPacketTime
EventCount LastPacketTime
SourceV6 TotalSourceBytes
DestinationV6 TotalDestinationBytes
UserName TotalSourcePackets
DestinationNetwork TotalDestinationPackets
SourceNetwork SourceQOS
Severity DestinationQOS
CustomPropertiesList SourcePayload
Administrators can add, edit, and delete custom offense close reasons from the
Admin tab.
The Custom Offense Close Reasons window provides the following parameters.
Table 34. Custom Close Reasons window parameters
Parameter Description
Reason The reason that is displayed in the Reason
for Closing list box on the Close Offense
window of the Offenses tab.
Created by The user that created this custom offense
close reason.
Date Created The date and time of when the user created
this custom offense close reason.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Custom Offense Close Reasons icon.
4. Click Add.
5. Type a unique reason for closing offenses. Reasons must be between 5 and 60
characters in length.
6. Click OK. Your new custom offense close reason is now listed in the Custom
Close Reasons window. The Reason for Closing list box on the Close Offense
window of the Offenses tab also displays the custom reason you added.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Custom Offense Close Reasons icon.
4. Select the reason you want to edit.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Custom Offense Close Reasons icon.
4. Select the reason you want to delete.
5. Click Delete.
6. Click OK.
Procedure
1. Click the Admin tab.
2. Click Custom Asset Properties.
3. In the Name field, enter a descriptor for the custom asset property.
4. In the Type drop-down menu, select Numeric or Text to define the information
type for the custom asset property.
5. Click OK.
6. Click the Assets tab.
7. Click Edit Asset > Custom Asset Properties.
8. Enter the required information in the value field.
9. Click OK.
Index management
The Index Management feature allows you to control database indexing on event
and flow properties.
Indexing event and flow properties allows you to optimize your searches. You can
enable indexing on any property that is listed in the Index Management window
and you can enable indexing on more than one property.
Enabling indexes
The Index Management window lists all event and flow properties that can be
indexed and provides statistics for the properties. Toolbar options allow you to
enable and disable indexing on selected event and flow properties.
Modifying database indexing might decrease system performance. Ensure that you
monitor the statistics after you enable indexing on multiple properties.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration .
3. Click the Index Management icon.
4. Select one or more properties from the Index Management list.
5. Choose one of the following options:
v Click Enable Index.
v Click Disable Index.
6. Click Save.
7. Click OK.
Results
In lists that include event and flow properties, indexed property names are
appended with the following text: [Indexed]. Examples of such lists include the
search parameters on the Log Activity and Network Activity tab search criteria pages
and the Add Filter window.
Restriction:
Use the Quick Filter feature in the Log Activity and Network Activity tab to
search event and flow payloads by using a text string. Payload indexing increases
disk storage requirements and might affect system performance. Enable payload
indexing if your deployment meets the following conditions:
v The event and flow processors are at less than 70% disk usage.
v The event and flow processors are less than 70% of the maximum events per
second (EPS) or flows per interface (FPI) rating.
Procedure
1. From the navigation pane on the Admin tab in the QRadar product, click
System Configuration.
2. Click Index Management.
3. In the Quick Search field, type Quick Filter.
The Quick Filter property is displayed.
What to do next
To manage payload indexes, see “Configuring the retention period for payload
indexes.”
By default, payload indexes are retained for one week. The minimum retention
period one day and the maximum is two years.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click System Settings.
4. In the Database Settings section, select a retention time period from the
Payload Index Retention list.
5. Click Save.
6. Close the System Settings window.
7. On the Admin tab menu, click Deploy Changes.
A reference set is a set of elements that are derived from events and flows that
occur on your network. Examples of elements that are derived from events are IP
addresses or user names.
After you create a reference set, you can create rules to detect log activity or
network activity that is associated with the reference set. For example, you can
create a rule to detect when an unauthorized user attempts to access your network
resources. You can also configure a rule to add an element to a reference set when
log activity or network activity matches the rule conditions. For example, you can
create a rule to detect when an employee accesses a prohibited website and add
that employee's IP address to a reference set. For more information on configuring
rules, see the Users Guide for your product.
After you create a reference set, the reference set is listed on the Reference Set
Management window. In the Rule wizard, this reference set is listed as an option
on the Rule Response page. After you configure one or more rules to send
elements to this reference set, the Number of Elements, Associated Rules, and
Capacity parameters are automatically updated.
Procedure
1. On the Reference Set Management window, click Add.
2. Configure the parameters:
Table 35. Reference Set parameters
Parameter Description
Name A unique name for this reference set.
Type There are 5 reference set element types you
can choose:
v Alphanumeric - a collection of
alphanumeric values
v Numeric - a collection of numeric values
v IP - a collection of IP addresses
v Port - a collection of port numbers
v Alphanumeric (Ignore Case) - a collection
of alphanumeric values but tests ignore
case
3. Click Create.
You can use the events that are created when elements expire in a reference set to
track such things as expired user accounts on your network.
By default, all reference set elements live forever, which means that they exist in
the reference set until they are removed. However, you can set the time-to-live of
the element so that an event that contains the reference set name and element
value is created when the element expires.
You can use these events to detect, for example, when network accounts are not
being used:
1. Create a reference set to track expired users. Set the time-to-live for the
elements to reflect a reasonable period of account inactivity.
2. Create a custom event rule to add login data (such as username) as elements to
the reference set.
3. If no data is added for a particular user within the time-to-live period, the
reference set element expires and a Reference Data Expiry event is triggered.
4. You can then use the Log Activity tab to track the events.
Procedure
1. In the Reference Set Management window, select a reference set
2. Click Edit.
3. Edit the parameters.
4. Click Submit.
When you delete reference sets, a confirmation window indicates whether the
reference sets that you want to delete have rules that are associated with them.
After you delete a reference set, the Add to Reference Set configuration is cleared
from the associated rules.
Tip: Before you delete a reference set, you can view associated rules in the
Reference tab.
Procedure
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. To view contents, click the Content tab.
Tip: Use the Quick Search field to filter for specific elements. All elements that
match the keyword are listed in the Content list. Then, you can select the
action from the toolbar.
Tip: Use the Quick Search field to filter for specific elements. All elements that
match the keyword are listed in the Content list. Then, you can select the
action from the toolbar.
Table 38. Content tab parameters
Parameter Description
Rule Name The name of this rule.
Group The name of the group this rule belongs to.
Category The category of the rule. Options include
Custom Rule or Anomaly Detection Rule.
Type The type of this rule.
Enabled Indicates whether the rule is enabled or
disabled.
Response The responses that are configured for this
rule.
Origin System indicates a default rule.
5. To view or edit an associated rule, double-click the rule in the References list.
In the Rule wizard, you can edit the rule configuration settings.
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. Click the Content tab.
Parameter Description
Value(s) If you want to type multiple values, include
a separator character between each value,
and then specify the separator character in
the Separator Character field.
Separator Character Type the separator character that you used
in the Value(s) field.
6. Click Add.
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. Click the Content tab.
4. Choose one of the following options:
v Select an element, and then click Delete.
v Use the Quick Search text box to display only the elements that you want to
delete, and then click Delete Listed.
5. Click Delete.
Ensure that the CSV or text file that you want to import is stored on your local
desktop.
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. Click the Content tab.
4. On the toolbar, click Import.
5. Click Browse.
6. Select the CSV or text file that you want to import.
7. Click Import.
Use the reference data utility to manage reference data collections from the
command line. You can use ReferenceDataUtil.sh to create the following reference
data collection types:
v Reference map
v Reference map of sets
v Reference map of maps
v Reference table
Procedure
1. Using SSH, log in to QRadar as the root user.
2. Go to the /opt/qradar/bin directory.
3. To create the reference data collection, type the following command:
./ReferenceDataUtil.sh create name [MAP | MAPOFSETS | MAPOFMAPS |
REFTABLE] [ALN | NUM | IP | PORT | ALNIC | DATE]
[-timeoutType=[FIRST_SEEN | LAST_SEEN]] [-timeToLive=]
4. To populate the map with data from an external file, type the following
command:
./ReferenceDataUtil.sh load name filename [-encoding=...] [-sdf=" ... "]
Example
Create an Alphanumeric Map
./ReferenceDataUtil.sh create testALN MAP ALN
Create a Map of Sets of PORT values that will age out 3 hours after they
were last seen
./ReferenceDataUtil.sh create testPORT MAPOFSETS PORT -timeoutType=LAST_SEEN
-timeToLive=’3 hours’
Create a Map of Maps of Numeric values that will age out 3 hours 15 minutes
after they were first seen
./ReferenceDataUtil.sh create testNUM MAPOFMAPS NUM -timeoutType=FIRST_SEEN
-timeToLive=’3 hours 15 minutes’
What to do next
Log in to the user interface to create rules that add data to your reference data
collections. You can also create rule tests that detect activity from elements that are
in your reference data collection. For more information about creating rules and
rule tests, see the Users Guide for your product.
create
Creates a reference data collection.
name
The name of the reference data collection.
[MAP | MAPOFSETS | MAPOFMAPS | REFTABLE]
The type of reference data collection.
[ALN | ALNIC | NUM | IP | PORT | DATE]
The type of data in the reference set:
v ALN specifies a reference data collection of alphanumeric values. This data
type supports IPv4 and IPv6 addresses.
v ALNIC specifies a reference data collection of alphanumeric values but tests
ignore the case. This data type supports IPv4 and IPv6 addresses.
v NUM specifies a reference data collection of numeric values.
v IP specifies a reference data collection of IP addresses. This data type
supports only IPv4 address.
v PORT specifies a reference data collection of PORT addresses.
v DATE specifies a reference data collection of DATE values.
[-timeoutType=[FIRST_SEEN | LAST_SEEN]]
Specifies whether the amount of time the data elements remain in the reference
data collection is from the time the element was first seen or last seen.
[-TimeToLive='']
The amount of time the data elements remain in the reference data collection.
[-keyType=name:elementType,name:elementType,...]
A mandatory REFTABLE parameter of consisting of key name to ELEMENTTYPE
pairs.
[-key1Label='']
An optional label for key1, or the primary key. A key is a type of information,
such as an IP Address.
[-valueLabel='']
An optional label for the values of the collection.
update
Updates a reference data collection.
name
The name of the reference data collection.
[-timeoutType=[FIRST_SEEN | LAST_SEEN]]
Specifies whether the amount of time the data elements remain in the reference
data collection is from the time the element was first seen or last seen.
[-timeToLive='']
The amount of time the data elements remain in the reference data collection.
add
Adds a data element to a reference data collection
name
The name of the reference data collection.
<value> <key1> [key2]
The key value pair that you want to add. MAP and MAPOFSETS require Key
1. MAPOFMAPS and REFTABLE require Key 1 and Key 2. Keys are
alphanumeric strings. Key 2 is the second level key, and is required when you
add to, or delete from a MAPOFMAPS or a REFTABLE collection.
[-sdf=" ... "]
The Simple Date Format string that is used to parse the date data.
delete
Deletes an element from a reference data collection.
name
The name of the reference data collection.
<value> <key1> [key2]
The key value pair that you want to delete. MAP and MAPOFSETS require
Key 1. MAPOFMAPS and REFTABLE require Key 1 and Key 2. Keys are
alphanumeric strings.
[-sdf=" ... "]
The Simple Date Format string that is used to parse the date data.
remove
Removes a reference data collection.
name
The name of the reference data collection.
purge
Purges all elements from a reference data collection.
name
The name of the reference data collection.
list
Lists elements in a reference data collection.
name
The name of the reference data collection.
[displayContents]
Lists all elements in the specified reference data collection.
Chapter 8. Manage reference data collections with the reference data utility 107
listall
Lists all elements in all reference data collection.
[displayContents]
Lists all elements in all reference data collections.
load
Populates a reference data collections with data from an external CSV file.
name
The name of the reference data collection.
filename
The fully qualified file name to be loaded. Each line in the file represents a
record to be added to the reference data collection.
[-encoding=...]
Encoding that is used to read the file.
[-sdf=" ... "]
The Simple Date Format string that is used to parse the date data.
The QRadar RESTful API uses authorized services to authenticate API calls to the
QRadar Console. For more information about the RESTful API, see the IBM
Security QRadar API Guide.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Authorized Services.
4. From the Manage Authorized Services window, select the appropriate
authorized service.
The token is displayed in the Selected Token field in the top bar. You can copy
the token into your vendor software to authenticate with QRadar.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Authorized Services.
4. From the Manage Authorized Services window, select the service that you want
to revoke.
5. Click Revoke Authorization.
You can use the backup and recovery feature to back up your event and flow data;
however, you must restore event and flow data manually. For assistance in
restoring your event and flow data, see the Restoring Your Data Technical Note.
You can use two types of backups; configuration backups and data backups.
From the Backup Management Archive window, you can view and manage all
successful backup archives.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Backup and Recovery.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery icon.
4. In the Upload Archive field, click Browse.
5. Locate and select the archive file that you want to upload. The archive file must
include a .tgz extension.
6. Click Open.
7. Click Upload.
If a backup file is deleted, it is removed from the disk and from the database. Also,
the entry is removed from this list and an audit event is generated to indicate the
removal.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Backup and Recovery.
4. In the Existing Backups section, select the archive that you want to delete.
5. Click Delete.
By default, the nightly backup process includes only your configuration files. You
can customize your nightly backup process to include data from your Console and
selected managed hosts. You can also customize your backup retention period,
backup archive location, the time limit for a backup to process before timing out,
and the backup priority in relation to other QRadar processes.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery.
4. On the toolbar, click Configure.
You initiate an on-demand backup archive during a period when QRadar has low
processing load, such as after normal office hours. During the backup process,
system performance is affected.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Backup and Recovery.
4. From the toolbar, click On Demand Backup.
5. Enter values for the following parameters:
Option Description
Name Type a unique name that you want to assign
to this backup archive. The name can be up
to 100 alphanumeric characters in length.
The name can contain following characters:
underscore (_), dash (-), or period (.).
Description Type a description for this configuration
backup archive. The description can be up to
255 characters in length.
During the restore process, the following steps are taken on the Console:
1. Existing files and database tables are backed up.
2. Tomcat is shut down.
3. All system processes are shut down.
4. Files are extracted from the backup archive and restored to disk.
5. Database tables are restored.
6. All system processes are restarted.
7. Tomcat restarts.
You can restart the Console only after the restore process is complete.
The restore process can take up to several hours; the process time depends on the
size of the backup archive that must be restored. When complete, a confirmation
message is displayed.
A window provides the status of the restore process. This window provides any
errors for each host and instructions for resolving the errors.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery.
4. Select the archive that you want to restore.
5. Click Restore.
6. On the Restore a Backup window, configure the parameters.
7. Click Restore.
8. Click OK.
9. Click OK.
10. Choose one of the following options:
v If the user interface was closed during the restore process, open a web
browser and log in to QRadar.
v If the user interface was not closed, the login window is displayed. Log in
to QRadar.
11. Follow the instructions on the status window.
What to do next
After you verify that your data is restored to your system, ensure that your DSMs,
vulnerability assessment (VA) scanners, and log source protocols are also restored.
If the backup archive originated on an HA cluster, you must click Deploy Changes
to restore the HA cluster configuration after the restore is complete. If disk
replication is enabled, the secondary host immediately synchronizes data after the
system is restored. If the secondary host was removed from the deployment after a
backup, the secondary host displays a failed status on the System and License
Management window.
You can restart the Console only after the restore process is complete.
The restore process can take up to several hours; the process time depends on the
size of the backup archive that must be restored. When complete, a confirmation
message is displayed.
Chapter 10. Manage backup and recovery 117
A window provides the status of the restore process. This window provides any
errors for each host and instructions for resolving the errors.
You must stop the iptables service on each managed host in your deployment. The
Iptables service is a Linux based firewall.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery.
4. Select the archive that you want to restore.
What to do next
After you verify that your data is restored to your system, you must reapply RPMs
for any DSMs, vulnerability assessment (VA) scanners, or log source protocols.
If the backup archive originated on an HA cluster, you must click Deploy Changes
to restore the HA cluster configuration after the restore is complete. If disk
replication is enabled, the secondary host immediately synchronizes data after the
system is restored. If the secondary host was removed from the deployment after a
backup, the secondary host displays a failed status on the System and License
Management window.
Restoring data
You can restore the data on your QRadar Console and managed hosts from backup
files. The data portion of the backup files includes information such as source and
destination IP address information, asset data, event category information,
vulnerability data, flow data, and event data.
Each managed host in your deployment, including the QRadar Console, creates all
backup files in the /store/backup/ directory. Your system might include a
Restriction: You must restore the configuration backup before you restore the data
backup.
Procedure
1. Using SSH, log in toQRadar as the root user.
2. Go to the /store/backup directory.
3. To list the backup files, type ls -l
4. If backup files are listed, go to the root directory by typing cd /
Important: The restored files must be in the /store directory. If you type cd
instead of cd /, the files are restored to the /root/store directory.
5. To extract the backup files to their original directory, type the following
command:
tar -zxpvPf /store/backup/backup.<name>.<hostname_hostID>
.<target date>.<backup type>.<timestamp>.tgz
Table 44. Description of file name variables
File name variable Description
hostname_hostID The name of the QRadar system that hosts the backup
file followed by the identifier for the QRadar system
target date The date that the backup file was created. The format
of the target date is <day>_<month>_<year>
backup type The options are data or config
timestamp The time that the backup file was created.
Results
Daily backup of data captures all data on each host. If you want to restore data on
a managed host that contains only event or flow data, only that data is restored to
that host.
What to do next
After you verified that your data is restored, you must reapply RPMs for any
DSMs, vulnerability assessment (VA) scanners, and log source protocols.
The deployment editor requires Java™ Runtime Environment (JRE). You can
download Java 1.6 or 1.7 from the Java website (www.java.com). If you are using
the Mozilla Firefox web browser, you must configure your browser to accept Java
Network Language Protocol (JNLP) files.
Many web browsers that use the Microsoft Internet Explorer engine, such as
Maxthon, install components that might be incompatible with the Admin tab. You
might be required to disable any web browsers that are installed on your system.
To access the deployment editor from behind a proxy server or firewall, you must
configure the appropriate proxy settings on your desktop. The s software can then
automatically detect the proxy settings from your browser.
To configure the proxy settings, open the Java configuration in your Control Pane
and configure the IP address of your proxy server. For more information, see the
Microsoft documentation.
You can access the deployment editor by using the Admin tab. You can use the
deployment editor to create your deployment, assign connections, and configure
each component.
After you update your configuration settings by using the deployment editor, you
must save those changes to the staging area. You must manually deploy all
changes by using the Admin tab menu option. All deployed changes are then
enforced throughout your deployment.
System View
Use the System View page to assign software component to managed hosts in your
deployment. The System View page includes all managed hosts in your
deployment. A managed host is a system in your deployment that has QRadar
software that is installed.
By default, the System View page also includes the following components:
On the System View page, the left pane provides a list of managed hosts, which
you can view and configure. The deployment editor polls your deployment for
updates to managed hosts. If the deployment editor detects a change to a managed
host in your deployment, a message is displayed notifying you of the change. For
example, if you remove a managed host, a message is displayed, indicating that
the assigned components to that host must be reassigned to another host.
Also, if you add a managed host to your deployment, the deployment editor
displays a message that indicates that the managed host was added.
Event View
On the Event View page, the left pane provides a list of components you can add
to the view. The right pane provides a view of your deployment.
Vulnerability View
Use the Vulnerability View page to create a view of your IBM Security QRadar
Vulnerability Manager components. You must install IBM Security QRadar
Vulnerability Manager to see this view. For more information, see the IBM Security
QRadar Vulnerability Manager User Guide
Procedure
1. Select File > Edit Preferences.
2. To configure the Presence Poll Frequency parameter, type how often, in
milliseconds, you that want the managed host to monitor your deployment for
updates.
3. To configure the Zoom Increment parameter, type the increment value when
the zoom option is selected.
For example, 0.1 indicates 10%.
Before you use the deployment editor, ensure that the following conditions are
met:
v Install the Java Runtime Environment (JRE). You can download Java 1.6 or 1.7
from the Java website (www.java.com).
v If you are using the Firefox browser, you must configure your browser to accept
Java Network Language Protocol (JNLP) files.
v Plan your QRadar deployment, including the IP addresses and login information
for all devices in your deployment.
Procedure
1. Click the Admin tab and click Deployment Editor.
2. Click the Event View tab and add event components to the deployment.
3. Click the System View tab, and build the system.
4. Configure the components.
5. To stage your deployment, in the Deployment Editor, click File > Save to
Staging.
6. Deploy the configuration by choosing one of the following options on the
Admin tab in the QRadar Console.
v Click Deploy Changes.
v Click Advanced > Deploy Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Related tasks:
“Deploying managed hosts and components after installation” on page 48
After installation, you can add managed hosts to your deployment. To help
distribute processing, you can add QRadar Event Collectors,QRadar Flow
Processors, or other appliances in your deployment.
If the off-site source and off-site target are on separate systems, the public key is
automatically generated. If the off-site source and target are both on an all-in-one
system, the public key is not automatically generated. You must manually generate
the public key.
QRadar VFlow Collector collects network flows from devices on your network.
Live and recorded feeds are included, such as network taps, span ports, NetFlow,
and QRadar flow logs.
QRadar QFlow Collector groups related individual packets into a flow. A flow
starts when QRadar QFlow Collector detects the first packet that has a unique
source IP address, destination IP address, source port, destination port, and other
specific protocol options.
Each new packet is evaluated. Counts of bytes and packets are added to the
statistical counters in the flow record. At the end of an interval, a status record of
the flow is sent to an Event Collector and statistical counters for the flow are reset.
A flow ends when no activity for the flow is detected within the configured time.
If the protocol does not support port-based connections, QRadar combines all
packets between the two hosts into a single flow record. However, QRadar QFlow
Collector does not record flows until a connection is made to another QRadar
component and data is retrieved.
Event Collector
Collects security events from security devices, which are known as log sources, in
your network.
The Event Processor on the QRadar Console is always connected to the Magistrate.
This connection cannot be deleted.
Data Node
The Data Node receives security events and flows from associated event and flow
processors.
Off-site Source
An off-site data source that forwards normalized data to an Event Collector. You
can configure an off-site source to receive data and encrypt the data before
forwarding.
Later versions of QRadar systems can receive data from earlier versions of QRadar
systems. However, earlier versions cannot receive data from later versions. To
avoid, upgrade all receivers before you upgrade senders.
Off-site Target
Indicates an off-site device that receives event or flow data. An off-site target can
receive data only from an Event Collector.
Later versions of QRadar systems can receive data from earlier versions of QRadar
systems. However, earlier versions cannot receive data from later versions. To
avoid, upgrade all receivers before you upgrade senders.
Magistrate
You can add one Magistrate component for each deployment. The Magistrate
provides views, reports, alerts, and analysis of network traffic and security events.
The Magistrate processes the events or flows by using the custom rules that are
configured to create a response. If no custom rules exist, the Magistrate uses the
default rule set to process the offending event or flow.
The Magistrate prioritizes the response and assigns a magnitude value that is
based on several factors, including the number of responses, severity, relevance,
and credibility.
After the Magistrate establishes the magnitude, it provides multiple options for
resolution.
You can add the following QRadar components to your Event View page:
v Event Collector
v Event Processor
v Off-site source
v Off-site target
v QRadar QFlow Collector
v Data Node
Procedure
1. On the Admin tab, click Deployment Editor.
2. In the Event Components pane, select a component that you want to add to
your deployment.
3. Type a unique name for the component you want to add and click Next.
Connecting components
After you add all the necessary components in your Event View page, you must
connect them.
The following table describes the components that you can connect.
Procedure
1. In the Event View page, select the component for which you want to establish a
connection.
2. Click Actions > Add Connection.
An arrow is displayed in your map. The arrow represents a connection between
two components.
3. Drag the end of the arrow to the component you want to establish a connection
to.
4. Optional: Configure flow filtering on a connection between a QRadar QFlow
Collector and an Event Collector.
a. Right-click the arrow between the QRadar QFlow Collector and the Event
Collector and click Configure
b. In the field for the Flow Filter parameter, type the IP addresses or CIDR
addresses for the QRadar Event Collectors you want the QRadar QFlow
Collector to send flows to.
5. Click Save.
6. Repeat these steps for all remaining components that require connections.
You can add the following components to your Event View page:
v An Off-site Source is an off-site Event Collector from which you want to
receive event and flow data.
Example:
To forward normalized events and flows between two deployments (A and B),
where deployment B wants to receive events and flows from deployment A:
1. Configure deployment A with an off-site target to provide the IP address of the
managed host that includes Event Collector B.
2. Connect Event Collector A to the off-site target.
3. In deployment B, configure an off-site source with the IP address of the
managed host that includes Event Collector A and the port that Event Collector
A is monitoring.
If you want to disconnect the off-site source, you must remove the connections
from both deployments. From deployment A, remove the off-site target and in
deployment B, remove the off-site source.
The following diagram shows forwarding event and flow between deployments.
Router
Event Collector
Event Processor
Magistrate (MPC)
If the off-site source or target is an all-in-one system, the public key is not
automatically generated, therefore, you must manually generate the public key. For
more information about generating public keys, see your Linux documentation.
If you update your Event Collector configuration or the monitoring ports, you
must manually update your source and target configurations to maintain the
connection between deployments.
Procedure
1. On the Admin tab, click Deployment Editor.
2. In the Event Components pane, select Off-site Source or Off-site Target.
3. Type a unique name for the off-site source or off-site target. The name can be
up to 20 characters in length and might include underscores or hyphens. Click
Next.
4. Enter values for the parameters and click Finish.
The host name for the Enter a name for the off-site host field can contain a
maximum of 20 characters and can include underscores or hyphens characters.
If you select the Encrypt traffic from off-site source the check box, you must
also select the encryption check box on the associated off-site source and target.
5. Repeat for all remaining off-site sources and targets.
6. From the deployment editor menu, click File > Save to staging.
7. On the Admin tab menu, select Advanced > Deploy Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Renaming components
You must rename a component in your view to uniquely identify components
through your deployment.
Procedure
1. On the QRadar Console, click the Admin tab to view the status of data nodes
in your deployment at the top of the window.
2. Click View in the Detail column to open the System and License Details
window.
3. View the progress of any data rebalancing, and the capacity of the Data Node
appliance in the Security Data Distribution pane.
Procedure
1. In the Deployment Editor, right-click the Data Node that you want to set to
archive mode and click Configure..
2. Click Archive.
3. From the Admin tab menu, click Deploy Changes.
4. If you want to resume balancing data to a Data Node that is in archive mode,
right-click Configure > Active.
Procedure
1. In the Deployment Editor, right-click the event processor that has data that you
want to transfer to a Data Node appliance, and click Configure.
2. Click Active and select Processing-Only from the list.
3. From the Admin tab menu, click Deploy Changes.
Encryption
Encryption provides greater security for all traffic between managed hosts. To
provide enhanced security, QRadar also provides integrated support for OpenSSH.
When integrated with QRadar, OpenSSH provides secure communication between
components.
When you enable encryption on a managed host, the encryption SSH tunnel is
created on the client host. For example, the connection between the Event
Processor and Event Collector and the connection between the Event Processor and
Magistrate are encrypted. When you enable encryption on the QRadar Console, an
encryption tunnel is used when your search events by using the Offenses tab.
If you want to enable Network Address Translation (NAT) for a managed host, the
network must use static NAT translation. For more information, see “NAT
management” on page 140.
Procedure
1. Click Actions > Add a Managed Host.
2. Click Next.
3. Enter values for the parameters.
Use the following table to help you configure the parameters.
Table 46. Parameters for the managed host
Header Header
Host is NATed Select the check box to use an existing
Network Address Translation (NAT) on this
managed host.
Enable Encryption Select the check box to create an SSH
encryption tunnel for the host.
Select the check box to enable data
compression between two managed hosts.
4. If you selected the Host is NATed check box, configure the parameters.
Table 47. Parameters for a NAT-enabled network
Parameter Description
Enter public IP of the server or appliance The managed host uses this IP address to
to add communicate with other managed hosts in
different networks by using NAT.
Select NATed network If the managed host is on the same subnet
as the Console, select the Console of the
NAT-enabled network .
5. Click Next.
6. Click Finish.
7. Deploy your changes.
Related concepts:
Procedure
1. Click the System View tab.
2. Right-click the managed host that you want to edit and select Edit Managed
Host.
This option is available only when the selected component has a managed host
that is running a compatible version of QRadar.
3. Click Next.
4. Edit the parameter values, as necessary.
Use the following table to help you configure the parameters.
Table 48. Parameters for the managed host
Header Header
Host is NATed Select the check box to use an existing
Network Address Translation (NAT) on this
managed host.
Enable Encryption Select the check box to create an SSH
encryption tunnel for the host.
Select the check box to enable data
compression between two managed hosts.
5. If you selected the Host is NATed check box, configure the parameters.
Table 49. Parameters for a NAT-enabled network
Parameter Description
Enter public IP of the server or appliance The managed host uses this IP address to
to add communicate with other managed hosts in
different networks by using NAT.
Select NATed network If the managed host is on the same subnet
as the Console, select the Console of the
NAT-enabled network .
6. Click Next.
7. Click Finish.
Tip: The Remove host option is available only when the selected component has a
managed host that is running a compatible version of QRadar.
Procedure
1. Click the System View tab.
2. Right-click the managed host that you want to delete and select Remove host.
3. Click OK.
4. On the Admin tab menu, click Advanced > Deploy Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Procedure
1. From the System View page, right-click the managed host that you want to
configure and click Configure.
2. Enter values for the parameters:
In the Ports to exclude field, use a comma to separate multiple ports
3. Click Save.
Tip: The list box displays only the managed hosts that are running a compatible
version of QRadar.
Procedure
1. Click the System View tab.
2. From the Managed Host list, select the managed host that you want to assign a
QRadar component to.
3. Select the component that you want to assign to a managed host.
4. From the menu, select Actions > Assign.
5. From the Select a host list box, select the host that you want to assign to this
component. Click Next.
6. Click Finish.
The Host Context component monitors all QRadar components to make sure that
each component is operating as expected.
6. Click Save .
Configuring an accumulator
Use the System View page of the deployment editor to configure the accumulator
component on a managed host.
The accumulator component assists with data collection and anomaly detection for
the Event Processor on a managed host. The accumulator component is responsible
for receiving streams of events and flows from the local Event Processor, writing
database data, and contains the anomaly detection engine (ADE).
Procedure
1. In the deployment editor, click the System View tab.
2. Select the managed host that you want to configure.
3. Select the accumulator component.
4. Click Actions > Configure.
5. Configure the parameters.
6. Click Save.
NAT management
Use the deployment editor to manage NAT-enabled deployments.
You can add a non-NAT-enabled managed host by using inbound NAT for a public
IP address. You can also use a dynamic IP address for outbound NAT. However,
both must be on the same switch as the Console or managed host. You must
configure the managed host to use the same IP address for the public and private
IP addresses.
When you add or edit a managed host, you can enable NAT for that managed
host. You can also use the deployment editor to manage your NAT-enabled
networks.
Ensure that you set up your NAT-enabled networks by using static NAT
translation. This setup ensures that communications between managed hosts that
exist within different NAT-enabled networks.
Procedure
1. In the deployment editor, click the NATed Networks icon.
2. Click Add.
3. Type a name for a network you want to use for NAT.
4. Click OK.
The Manage NATed Networks window is displayed, including the added
NAT-enabled network.
5. Click OK.
6. Click Yes.
Procedure
1. In the deployment editor, click the NATed Networks icon.
2. Select the NAT-enabled network that you want to edit, and click Edit.
3. Type a new name for of the NAT-enabled network and click OK.
The Manage NATed Networks window shows the updated NAT-enabled
networks.
4. Click OK.
5. Click Yes.
Procedure
1. In the deployment editor, click the NATed Networks icon.
2. Select the NAT-enabled network you want to delete.
3. Click Delete.
4. Click OK.
5. Click Yes.
If you want to enable NAT for a managed host, the NAT-enabled network must be
using static NAT translation.
To change your NAT status for a managed host, make sure you update the
managed host configuration within QRadar before you update the device.
Procedure
1. In the deployment editor, click the System View tab.
2. Right-click the managed host that you want to edit and select Edit Managed
Host.
3. Click Next.
4. Choose one of the following options:
v If you want to enable NAT for the managed host, select the Host is NATed
check box and click Next.
v If you want to disable NAT for the managed host, clear the Host is NATed
check box.
Important: When you change the NAT status for an existing managed host,
error messages might be displayed. Ignore these error messages.
5. If you enabled NAT, select a NAT-enabled network, and enter values for the
parameters:
Table 52. Parameters for a NAT-enabled network
Parameter Description
Change public IP of the server or The managed host uses this IP address to
appliance to add communicate with another managed host that
belongs to a different network by using NAT.
Select NATed network Update the NAT-enabled network configuration.
Manage NATs List - Network address translation (NAT) translates an IP
address in one network to a different IP address in
another network. NAT provides increased security
for your deployment since requests are managed
through the translation process and hides internal IP
addresses.
6. Click Next.
7. Click Finish.
8. Update the configuration for the device (firewall) to which the managed host is
communicating.
9. On the Admin tab menu, click Advanced > Deploy Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Component configuration
Use the deployment editor to configure each component in your deployment.
You can configure a flow filter on the connection from a QRadar QFlow Collector
and multiple QRadar Event Collectors. A flow filter controls which flow a
component receives. The Flow Filter parameter is available on the Flow
Connection Configuration window.
Right-click the arrow between the component you want to configure for flow
filtering and select Configure.
The following table describes the advanced QRadar QFlow Collector parameters:
Procedure
1. From either the Event View or System View page, select the QRadar QFlow
Collector you want to configure.
2. Click Actions > Configure.
3. Enter values for the following parameters:
Parameter Description
6. Click Save.
7. Repeat for all QRadar QFlow Collectors in your deployment you want to
configure.
Related concepts:
“Event views of QRadar components in your deployment” on page 126
Procedure
1. From either the Event View or System View page, select the Event Collector
that you want to configure.
2. Click Actions > Configure.
3. Enter values for the following parameters:
Parameter Description
Destination Event Processor
Specifies the Event Processor component
that is connected to this Event Collector. The
connection is displayed in the following
format: <Host IP Address>:<Port>.
Flow Listen Port The listen port for flows.
Event Forwarding Listen Port The Event Collector event forwarding port.
6. Click Save.
7. Repeat for all QRadar Event Collectors in your deployment you want to
configure.
Related concepts:
“Event views of QRadar components in your deployment” on page 126
Procedure
1. From either the Event View or System View page, select the Event Processor
that you want to configure.
2. Click Actions > Configure.
3. Enter values for the parameters:
6. Click Save.
7. Repeat for all Event Processors in your deployment you want to configure.
Related concepts:
“Event views of QRadar components in your deployment” on page 126
Procedure
1. From either the Event View or System View page, select the Magistrate that
you want to configure.
2. Click Actions > Configure.
3. On the toolbar, click Advanced to display the advanced parameters.
4. In the Overflow Routing Threshold field, type the events per second threshold
that the Magistrate can manage events.
Events over this threshold are placed in the cache.
The default is 20,000.
5. Click Save.
Related concepts:
“Event views of QRadar components in your deployment” on page 126
To prevent connection errors, when you configure off-site source and target
components, deploy the QRadar Console with the off-site source first. Then deploy
the QRadar Console with the off-site target.
Procedure
1. From either the Event View or System View page, select the Event Collector
that you want to configure.
2. Click Actions > Configure.
3. Enter the parameter values.
Parameter Description
Receive Events True enables the system to receive events
from the off-site source host.
4. Click Save.
5. Repeat for all off-site sources in your deployment you want to configure.
Related concepts:
“Event views of QRadar components in your deployment” on page 126
To prevent connection errors, when you configure off-site source and target
components, deploy the QRadar Console with the off-site source first. Then, deploy
the QRadar Console with the off-site target.
Procedure
1. From either the Event View or System View page, select the Event Collector
that you want to configure.
2. Click Actions > Configure.
3. Enter values for the parameters:
Parameter Description
Event Collector Listen Port The Event Collector listen port for receiving
event data.
4. Click Save.
Related concepts:
“Event views of QRadar components in your deployment” on page 126
Flow sources
For IBM Security QRadar appliances, IBM Security QRadar SIEM automatically
adds default flow sources for the physical ports on the appliance. QRadar SIEM
also includes a default NetFlow flow source.
QRadar SIEM can forward external flows source data by using the spoofing or
non-spoofing method:
Spoofing
Resends the inbound data that is received from flow sources to a
NetFlow
NetFlow is a proprietary accounting technology that is developed by Cisco
Systems. NetFlow monitors traffic flows through a switch or router, interprets the
client, server, protocol, and port that is used, counts the number of bytes and
packets, and sends that data to a NetFlow collector.
The process of sending data from NetFlow is often referred to as a NetFlow Data
Export (NDE). You can configure IBM Security QRadar SIEM to accept NDEs and
thus become a NetFlow collector. QRadar SIEM supports NetFlow versions 1, 5, 7,
and 9. For more information on NetFlow, see the Cisco web site (
http://www.cisco.com).
While NetFlow expands the amount of the network that is monitored, NetFlow
uses a connection-less protocol (UDP) to deliver NDEs. After an NDE is sent from
a switch or router, the NetFlow record is purged. As UDP is used to send this
information and does not guarantee the delivery of data, NetFlow records
inaccurate recording and reduced alerting capabilities. Inaccurate presentations of
both traffic volumes and bidirectional flows might result.
When you configure an external flow source for NetFlow, you must do the
following tasks:
v Make sure that the appropriate firewall rules are configured. If you change your
External Flow Source Monitoring Port parameter in the QRadar QFlow
Collector configuration, you must also update your firewall access configuration.
v Make sure that the appropriate ports are configured for your QRadar QFlow
Collector.
If you are using NetFlow version 9, make sure that the NetFlow template from the
NetFlow source includes the following fields:
v FIRST_SWITCHED
v LAST_SWITCHED
v PROTOCOL
v IPV4_SRC_ADDR
v IPV4_DST_ADDR
v L4_SRC_PORT
v L4_DST_PORT
IPFIX
Internet Protocol Flow Information Export (IPFIX) is an accounting technology.
IPFIX monitors traffic flows through a switch or router, interprets the client, server,
protocol, and port that is used, counts the number of bytes and packets, and sends
that data to a IPFIX collector.
IBM Security Network Protection XGS 5000, a next generation intrusion protection
system (IPS), is an example of a device that sends flow traffic in IPFIX flow format.
The process of sending IPFIX data is often referred to as a NetFlow Data Export
(NDE). IPFIX provides more flow information and deeper insight than NetFlow v9.
You can configure IBM Security QRadar SIEM to accept NDEs and thus become an
IPFIX collector. IPFIX uses User Datagram Protocol (UDP) to deliver NDEs. After
an NDE is sent from the IPFIX forwarding device, the IPFIX record might be
purged.
To configure QRadar SIEM to accept IPFIX flow traffic, you must add a NetFlow
flow source. The NetFlow flow source processes IPFIX flows by using the same
process.
Your QRadar SIEM system might include a default NetFlow flow source; therefore,
you might not be required to configure a NetFlow flow source. To confirm that
your system includes a default NetFlow flow source, select Admin > Flow
Sources. If default_Netflow is listed in the flow source list, IPFIX is already
configured.
When you configure an external flow source for IPFIX, you must do the following
tasks:
v Ensure that the appropriate firewall rules are configured. If you change your
External Flow Source Monitoring Port parameter in the QRadar QFlow
Collector configuration, you must also update your firewall access configuration.
For more information about QRadar QFlow Collector configuration, see the IBM
Security QRadar SIEM Administration Guide.
v Ensure that the appropriate ports are configured for your QRadar QFlow
Collector.
v Ensure the IPFIX template from the IPFIX source includes the following fields:
v FIRST_SWITCHED
v LAST_SWITCHED
v PROTOCOL
v IPV4_SRC_ADDR
v IPV4_DST_ADDR
v L4_SRC_PORT
v L4_DST_PORT
sFlow
sFlow is a multi-vendor and user standard for sampling technology that provides
continuous monitoring of application level traffic flows on all interfaces
simultaneously.
A sFlow combines interface counters and flow samples into sFlow datagrams that
are sent across the network to an sFlow collector. IBM Security QRadar SIEM
supports sFlow versions 2, 4, and 5. sFlow traffic is based on sampled data and,
therefore, might not represent all network traffic. For more information, see the
sflow website (www.sflow.org).
sFlow uses a connection-less protocol (UDP). When data is sent from a switch or
router, the sFlow record is purged. As UDP is used to send this information and
does not guarantee the delivery of data, sFlow records inaccurate recording and
reduced alerting capabilities. Inaccurate presentations of both traffic volumes and
bidirectional flows might result.
When you configure an external flow source for sFlow, you must do the following
tasks:
v Make sure that the appropriate firewall rules are configured.
v Make sure that the appropriate ports are configured for your QRadar VFlow
Collector.
J-Flow
A proprietary accounting technology used by Juniper Networks that allows you to
collect IP traffic flow statistics. J-Flow enables you to export data to a UDP port on
a J-Flow collector. Using J-Flow, you can also enable J-Flow on a router or interface
to collect network statistics for specific locations on your network. Note that J-Flow
traffic is based on sampled data and, therefore, might not represent all network
traffic. For more information on J-Flow, see the Juniper Networks website
(www.juniper.net).
J-Flow uses a connection-less protocol (UDP). When data is sent from a switch or
router, the J-Flow record is purged. As UDP is used to send this information and
does not guarantee the delivery of data, J-Flow records inaccurate recording and
reduced alerting capabilities. This can result in inaccurate presentations of both
traffic volumes and bi-directional flows.
When you configure an external flow source for J-Flow, you must:
v Make sure the appropriate firewall rules are configured.
v Make sure the appropriate ports are configured for your QFlow Collector.
Packeteer
Packeteer devices collect, aggregate, and store network performance data. After
you configure an external flow source for Packeteer, you can send flow information
from a Packeteer device to IBM Security QRadar SIEM.
Packeteer uses a connection-less protocol (UDP). When data is sent from a switch
or router, the Packeteer record is purged. As UDP is used to send this information
To configure Packeteer as an external flow source, you must do the following tasks:
v Make sure that the appropriate firewall rules are configured.
v Make sure that you configure Packeteer devices to export flow detail records
and configure the QRadar QFlow Collector as the destination for the data
export.
v Make sure that the appropriate ports are configured for your QRadar QFlow
Collector.
v Make sure the class IDs from the Packeteer devices can automatically be
detected by the QRadar QFlow Collector.
v For more information, see the Mapping Packeteer Applications into QRadar Technical
Note.
Flowlog file
A Flowlog file is generated from the IBM Security QRadar SIEM flow logs.
Napatech interface
If you installed a Napatech Network Adapter on your IBM Security QRadar SIEM
system, the Napatech Interface option is displayed as a configurable packet-based
flow source on the QRadar SIEM user interface. The Napatech Network Adapter
provides next-generation programmable and intelligent network adapter for your
network. For more information, see the Napatech documentation.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. On the navigation menu, click Flows.
4. Click Flow Sources.
5. Do one of the following actions:
v To add a flow source, click Add.
v To edit a flow source, select the flow source and click Edit.
6. To create this flow source from an existing flow source, select the Build from
existing flow source check box, and select a flow source from the Use as
Template list.
7. Enter the name for the Flow Source Name.
Tip: If the external flow source is also a physical device, use the device name
as the flow source name. If the flow source is not a physical device, use a
recognizable name.
For example, if you want to use IPFIX traffic, enter ipf1. If you want to use
NetFlow traffic, enter nf1.
8. Select a flow source from the Flow Source Type list and configure the
properties.
Restriction: You cannot send different flow types to the same port.
9. If traffic on your network is configured to take alternate paths for inbound
and outbound traffic, select the Enable Asymmetric Flows check box.
10. Click Save.
11. On the Admin tab menu, click Deploy Changes.
If you already have a QRadar QFlow Collector 1310 with a 10G Napatech network
card, you can mirror the traffic to QRadar Packet Capture.
As shown in the following diagram, if you already have a QRadar QFlow Collector
1310 with a 10G Napatech network card, you can mirror the traffic to QRadar
Packet Capture.
Figure 2. Packet data forwarding from a QRadar QFlow Collector to QRadar Packet Capture
by using the Napatech card
Procedure
1. Using SSH from your QRadar Console, log in to QRadar QFlow Collector as
the root user. On the QRadar QFlow Collector appliance, edit the following file.
/opt/qradar/init/apply_tunings
a. Locate the following line, which is around line 137.
apply_multithread_qflow_changes()
{
APPLIANCEID=`$NVABIN/myver -a`
if [ "$APPLIANCEID" == "1310" ]; then
MODELNUM=$(/opt/napatech/bin/AdapterInfo 2>&1 | grep "Active FPGA Image" | cut -d’-’ -f2)
if [ "$MODELNUM" == "9220" ]; then..
b. In the AppendToConf lines that follow the code in the preceding step, add
these lines:
AppendToConf SV_NAPATECH_FORWARD YES
AppendToConf SV_NAPATECH_FORWARD_INTERFACE_SRCDST "0:1"
These statements enable packet forwarding, and forward packets from port
0 to port 1.
c. Ensure that multithreading is enabled, by verifying that the following line is
in the /opt/qradar/conf/nva.conf file.
MULTI_THREAD_ON=YES
2. Run the apply_tunings script to update the configuration files on the QRadar
QFlow Collector, by typing the following command:
./apply_tunings restart
3. Restart QRadar services by typing the following command:
service hostcontext restart
4. Optional: Verify that your Napatech card is receiving and transmitting data.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. On the navigation menu, click Flows.
4. Click the Flow Sources icon.
5. Select the flow source that you want to enable or disable.
The Enabled column indicates whether the flow source is enabled or disabled.
The following statuses are displayed:
v True indicates that the flow source is enabled.
v False indicates that the flow source is now disabled.
6. Click Enable/Disable.
7. On the Admin tab menu, click Deploy Changes.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. On the navigation menu, click Flows.
4. Click Flow Sources.
5. Select the flow source that you want to delete.
6. Click Delete.
7. Click OK.
160 QRadar SIEM Administration Guide
8. On the Admin tab menu, click Deploy Changes.
You can identify multiple sources that are sent to the same QRadar QFlow
Collector by using the source IP address and virtual name. With an alias, a QRadar
QFlow Collector can uniquely identify and process data sources that are sent to the
same port.
When QRadar QFlow Collector receives traffic from a device that has an IP address
but does not have a current alias, the QRadar QFlow Collector attempts a reverse
DNS lookup. The lookup is used to determine the host name of the device. If the
lookup is successful, the QRadar QFlow Collector adds this information to the
database and reports the information to all QRadar QFlow Collector components in
your deployment.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. On the navigation menu, click Flows.
4. Click the Flow Source Aliases icon.
5. Do one of the following actions:
v To add a flow source alias, click Add and enter the values for the
parameters.
v To edit an existing flow source alias, select the flow source alias, click Edit,
and update the parameters.
6. Click Save.
7. On the Admin tab menu, click Deploy Changes.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. On the navigation menu, click Flows.
4. Click the Flow Source Aliases icon.
5. Select the flow source alias that you want to delete.
6. Click Delete.
7. Click OK.
8. On the Admin tab menu, click Deploy Changes.
All remote network and service groups have group levels and leaf object levels.
You can edit remote network and service groups by adding objects to existing
groups or changing pre-existing properties to suit your environment.
If you move an existing object to another group, the object name moves from the
existing group to the newly selected group. However, when the configuration
changes are deployed, the object data that is stored in the database is lost and the
object ceases to function. To resolve this issue, create a new view and re-create the
object that exists with another group.
On the Admin tab, you can group remote networks and services for use in the
custom rules engine, flow, and event searches. You can also group networks and
services in IBM Security QRadar Risk Manager, if it is available.
Groups and objects that include superflows are only for informational purposes
and cannot be edited. Groups and objects that include bogons are configured by
the Automatic Update function.
The following list describes some of the suggested practices that you can follow:
v Bundle objects and use the Network Activity and Log Activity tabs to analyze
your network data.
Fewer objects create less input and output to your disk.
v Typically, for standard system requirements, do not exceed more than 200 objects
per group.
More objects might impact your processing power when you investigate your
traffic.
Use the Remote Networks window, you can add or edit a remote networks object.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Remote Networks and Services Configuration.
3. Click the Remote Networks icon.
4. To add a remote networks object, click Add and enter values for the
parameters.
5. To edit remote networks object, click the group that you want displayed, click
Edit, and then change the values.
6. Click Save.
7. Click Return.
8. Close the Remote Networks window.
9. On the Admin tab menu, click Deploy Changes.
Use the Remote Services window to add or edit a remote services object.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Remote Networks and Services Configuration.
3. Click the Remote Services icon.
4. To add a remote services object, click Add and enter the parameter values.
The following table describes the command-line options for the QID map utility.
Table 59. QID map utility options
Options Description
-l Lists the low-level category.
-c Creates a QID map entry
-m Modifies an existing user-defined QID map entry.
-i Imports QID map entries.
-e Exports existing user-defined QID map entries.
-f <filename> If you include the -i or -e option, specifies a file name to import
or export QID map entries.
-d If you include the -i or -e option, specifies a delimiter for the
import or export file. The default is a comma.
-h Displays the help options.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. To locate the low-level category for the QID map entry that you want to create,
type the following command:
/opt/qradar/bin/qidmap_cli.sh -l
Options Description
-c Creates a QID map entry.
--qname <name> The name that you want to associate with this QID
map entry. The name can be up to 255 characters in
length, with no spaces.
--qdescription <description> The description for this QID map entry. The
description can be up to 2048 characters in length with
no spaces.
--severity <severity> The severity level that you want to assign to this QID
map entry. The valid range is 1 - 10.
--lowlevelcategoryid <ID> The low-level category ID you want to assign to this
QID map entry. For more information, see the QRadar
Administration Guide.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. Type the following command:
qidmap_cli.sh -m --qid<QID> --qname <name> --qdescription <description>
--severity <severity>
The following table describes the command-line options for the QID map
utility:
Options Description
-m Modifies an existing user-defined QID map
entry.
--qid<QID> The QID that you want to modify.
--qname <name> The name that you want to associate with
this QID map entry. The name can be up to
255 characters in length with no spaces.
--qdescription <description> The description for this QID map entry. The
description can be up to 2048 characters in
length with no spaces.
--severity <severity> The severity level that you want to assign to
this QID map entry. The valid range is 0 -
10.
Procedure
1. Create a .txt file that includes the user-defined QID map entries that you want
to import. Ensure that each entry in the file is separated with a comma. Choose
one of the following options:
v If you want to import a new list of user-defined QID map entries, create the
file with the following format for each entry:
,<name>,<description>,<severity>,<category>
Example:
,buffer,buffer_QID,7,18401 ,malware,malware_misc,8,18403
v If you want to import an existing list of user-defined QID map entries, create
the file with the following format for each entry:
<qid>,<name>,<description>,<severity>
Options Description
<qid> The existing QID for the entry. This option is
required if you want to import an existing
exported list of QID entries.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. To export the QID map file, type the following command:
/opt/qradar/bin/qidmap_cli.sh -e -f
<filename.txt>
The <filename.txt> option is the directory path and name of the file that you
want to contain your QID map entries.
The Server Discovery function is based on server-type building blocks. Ports are
used to define the server type. Thus, the server-type building block works as a
port-based filter when you search the Asset Profile database.
For more information about building blocks, see the IBM Security QRadar SIEM
Users Guide.
Discovering servers
Use the Assets tab to discover servers on your network.
Procedure
1. Click the Assets tab
2. On the navigation menu, click Server Discovery.
3. From the Server Type list, select the server type that you want to discover.
4. Select one of the following options to determine the servers you want to
discover:
v To use the currently selected Server Type to search all servers in your
deployment, select All.
v To search servers in your deployment that were assigned to the currently
selected Server Type, select Assigned.
v To search servers in your deployment that are not assigned, select
Unassigned.
5. From the Network list, select the network that you want to search.
6. Click Discover Servers.
7. In the Matching Servers table, select the check boxes of all servers you want to
assign to the server role.
8. Click Approve Selected Servers.
You can create security profiles to limit the information that is available to a group
of users within that domain. Security profiles provide authorized users access to
only the information that is required to complete their daily tasks. You modify
only the security profile of the affected users, and not each user individually.
You can also use domains to manage overlapping IP address ranges. This method
is helpful when you are using a shared IBM Security QRadar infrastructure to
collect data from multiple networks. By creating domains that represent a
particular address space on the network, multiple devices that are in separate
domains can have the same IP address and still be treated as separate devices.
Overlapping IP addresses
An overlapping IP address is an IP address that is assigned to more than one
device or logical unit, such as an event source type, on a network. Overlapping IP
address ranges can cause significant problems for companies that merge networks
after corporate acquisitions, or for Managed Security Service Providers (MSSPs)
who are bringing on new clients.
IBM Security QRadar must be able to differentiate events and flows that come
from different devices and that have the same IP address. If the same IP address is
assigned to more than one event source, you can create domains to distinguish
them.
For example, let's look at a situation where Company A acquires Company B and
wants to use a shared instance of QRadar to monitor the new company's assets.
The acquisition has a similar network structure that results in the same IP address
being used for different log sources in each company. Log sources that have the
same IP address cause problems with correlation, reporting, searching, and asset
profiling.
To distinguish the origin of the events and flows that come in to QRadar from the
log source, you can create two domains and assign each log source to a different
domain. If required, you can also assign each event collector and flow collector to
the same domain as the log source that sends events to them.
To view the incoming events by domain, create a search and include the domain
information in the search results.
You can also assign vulnerability scanners to a specific domain so that scan results
are properly flagged as belonging to that domain. A domain definition can consist
of all QRadar input sources.
When events and flows come into the QRadar system, the domain criteria is
evaluated based on the granularity of the domain definition.
If the domain definition is based on an event, the incoming event is first checked
for any custom properties that are mapped to the domain definition. If the result of
a regular expression that is defined in a custom property does not match a domain
mapping, the event is automatically assigned to the default domain.
If the event does not match the domain definition for custom properties, the
following order of precedence is applied:
1. log source
2. log source group
3. event collector
If a scanner has an associated domain, all assets that are discovered by the scanner
are automatically assigned to the same domain as the scanner.
Creating domains
Use the Domain Management window to create domains based on IBM Security
QRadar input sources.
Tip: You can check for unique names by typing the name in the Input domain
name search box.
5. Depending on the domain criteria to be defined, click the appropriate tab.
v To define the domain based on a custom property, log source group, log
source, or event collector, click the Events tab.
v To define the domain based on a flow source or flow collector, click the
Flows tab.
v To define the domain based on a scanner, including IBM Security QRadar
Vulnerability Manager scanners, click the Scanners tab.
6. To assign a custom property to a domain, in the Capture Result box, type the
text that matches the result of the regular expression (regex) filter.
Important: You must select the Optimize parsing for rules, reports, and
searches check box in the Custom Event Properties window to parse and store
the custom event property. Domain segmentation will not occur if this option is
not checked.
7. From the list, select the domain criteria and click Add.
8. After you add the source items to the domain, click Create.
What to do next
Create security profiles to define which users have access to the domains. After
you create the first domain in your environment, you must update the security
profiles for all non-administrative users to specify the domain assignment. In
domain-aware environments, non-administrative users whose security profile does
not specify a domain assignment will not see any log activity or network activity.
You can also use the Network Hierarchy tool to assign your network to
pre-configured domains. For more information, see “Network hierarchy” on page
63.
Users can see only data within the domain boundaries that are set up for the
security profiles that are assigned to them. Security profiles include domains as
one of the first criteria that is evaluated to restrict access to the system. When a
domain is assigned to a security profile, it takes priority over other security
permissions. After domain restrictions are evaluated, individual security profiles
are assessed to determine network and log permissions for that particular profile.
As a QRadar administrator, you can see all domains and you can assign domains
to non-administrative users. Do not assign administrative privileges to users whom
you want to limit to a particular domain.
When you assign domains to a security profile, you can grant access to the
following types of domains:
User-defined domains
You can create domains that are based on input sources by using the
Domain Management tool. For more information, see Creating domains.
Default domain
Everything that is not assigned to a user-defined domain is automatically
assigned to the default domain. The default domain contains system-wide
events.
Note: Users who have access to the default domain can see system-wide
events without restriction. Ensure that this access is acceptable before you
assign default domain access to users. All administrators have access to the
default domain.
Any log source that gets auto-discovered on a shared event collector (one
that is not explicitly assigned to a domain), is auto-discovered on the
default domain. These log sources require manual intervention. To identify
these log sources, you must periodically run a search in the default domain
that is grouped by log source.
All domains
Users who are assigned to a security profile that has access to All
Domains can see all active domains within the system, the default domain,
and any domains that were previously deleted across the entire system.
They can also see all domains that are created in the future.
If you delete a domain, it cannot be assigned to a security profile. If the user has
the All domains assignment, or if the domain was assigned to the user before it
was deleted, the deleted domain is returned in historical search results for events,
flows, assets, and offenses. You can't filter by deleted domains when you run a
search.
Administrative users can see which domains are assigned to the security profiles
on the Summary tab in the Domain Management window.
Rules can be viewed, modified, or disabled by any user who has both the
Maintain Custom Rules and View Custom Rules permissions, regardless of which
domain that user belongs to.
Important: When you add the Log Activity capability to a user role, the Maintain
Custom Rules and View Custom Rules permissions are automatically granted.
Domain-aware searches
You can use domains as search criteria in custom searches. Your security profile
controls which domains you can search against.
System-wide events and events that are not assigned to a user-defined domain are
automatically assigned to the default domain. Administrators, or users who have a
security profile that provides access to the default domain, can create a custom
search to see all events that are not assigned to a user-defined domain.
The default domain administrator can share a saved search with other domain
users. When the domain user runs that saved search, the results are limited to their
domain.
You can restrict a rule so that it is applied only to events that are happening within
a specified domain. An event that has a domain tag that is different from the
domain that is set on the rule does not trigger an event response.
In an IBM Security QRadar system that does not have user-defined domains, a rule
creates an offense and keeps contributing to it each time the rule fires. In a
domain-aware environment, a rule creates a new offense each time the rule is
triggered in the context of a different domain.
Rules that work in the context of all domains are referred to as system-wide rules.
To create a system-wide rule that tests conditions across the entire system, select
Any Domain in the domain list for the And Domain Is test. An Any Domain rule
creates an Any Domain offense.
Single-domain rule
If the rule is a stateful rule, the states are maintained separately for each
domain. The rule is triggered separately for each domain. When the rule is
triggered, offenses are created separately for each domain that is involved
and the offenses are tagged with those domains.
Single-domain offense
The offense is tagged with the corresponding domain name. It can contain
only events that are tagged with that domain.
System-wide rule
If the rule is a stateful rule, a single state is maintained for the whole
system and domain tags are ignored. When the rule runs, it creates or
contributes to a single system-wide offense.
System-wide offense
The offense is tagged with Any Domain. It contains only events that are
tagged with all domains.
When you view the offense table, you can sort the offenses by clicking the Domain
column. The Default Domain is not included in the sort function so it does not
appear in alphabetical order. However, it appears at the top or bottom of the
Domain list, depending on whether the column is sorted in ascending or
descending order. Any Domain does not appear in the list of offenses.
You assign a custom property to a domain based on the capture result. You can
assign the same custom property to multiple domains, but the capture results must
be different.
For example, a custom event property, such as userID, might evaluate to a single
user or a list of users. Each user can belong to only one domain.
In the following diagram, the log sources contain user identification information
that is exposed as a custom property, userID. The capture results return a list of
four users, and each user is assigned to only one domain. In this case, two users
are assigned to Domain A and two users are assigned to Domain B.
Domain A
User_1
Capture results User_3
Event Collector
User_ID User_1
User_2
User_3
User_4
Console Domain B
User_2
User_4
If the capture results return a user that is not assigned to a specific user-defined
domain, that user is automatically assigned to the default domain. Default domain
assignments require manual intervention. Perform periodic searches to ensure that
all entities in the default domain are correctly assigned.
Important: Before you use a custom property in a domain definition, ensure that
Optimize parsing for rules, reports, and searches is checked on the Custom Event
Properties window. This option ensures that the custom event property is parsed
and stored when QRadar receives the event for the first time. Domain
segmentation will not occur if this option is not checked.
In a multitenant deployment, you ensure that customers see only their data by
creating domains that are based on their QRadar input sources. Then, use security
profiles and user roles to manage privileges for large groups of users within the
domain. Security profiles and user roles ensure that users have access to only the
information that they are authorized to see.
Service provider
The service provider owns the system and manages its use by multiple tenants.
The service provider can see data across all tenants. The Managed Security Service
Provider (MSSP) administrator is responsible for the following activities:
v Administers and monitors the system health of the QRadar deployment.
v Provisions new tenants.
v Creates roles and security profiles for tenant administrators and users.
v Secures the system against unauthorized access.
v Creates domains to isolate tenant data.
v Deploys changes that the tenant administrator made in the tenant environment.
v Monitors QRadar licenses.
v Collaborates with the tenant administrator.
Tenants
Each tenancy includes a tenant administrator and tenant users. The tenant
administrator can be an employee of the tenant organization, or the service
provider can administer the tenant on behalf of the customer.
The tenant administrator can configure tenant-specific deployments, but they can't
access or change the configuration for another tenant. They must contact the MSSP
administrator to deploy changes in the QRadar environment, including network
hierarchy changes within their own tenant.
When events or flows come into QRadar, QRadar evaluates the domain definitions
that are configured, and the events and flows are assigned to a domain. A tenant
can have more than one domain. If no domains are configured, the events and
flows are assigned to the default domain.
Domain segmentation
Domains are virtual buckets that you use to segregate data based on the source of
the data. They are the building blocks for multitenant environments. You configure
domains from the following input sources:
v Event and flow collectors
v Flow sources
v Log sources and log source groups
v Custom properties
v Scanners
To consolidate the hardware configuration even further, you can use one collector
for multiple customers. If log or flow sources are aggregated by the same collector
but belong to different tenants, you can assign the sources to different domains.
When you use domain definitions at the log source level, each log source name
must be unique across the entire QRadar deployment.
If you need to separate data from a single log source and assign it to different
domains, you can configure domains from custom properties. QRadar looks for the
custom property in the payload, and assigns it to the correct domain. For example,
if you configured QRadar to integrate with a Check Point Provider-1 device, you
can use custom properties to assign the data from that log source to different
domains.
When domains are defined at the collector level and the dedicated event collector
is assigned to a single domain, new log sources that are automatically detected are
assigned to that domain. For example, all log sources that are detected on
Event_Collector_1 are assigned to Domain_A. All log sources that are automatically
collected on Event_Collector_2 are assigned to Domain_B.
When domains are defined at the log source or custom property level, log sources
that are automatically detected and are not already assigned to a domain are
automatically assigned to the default domain. The MSSP administrator must
In this scenario, you are onboarding a new client. You provision a new tenant and
create a tenant administrator account that does limited administrative duties
within their own tenant. You limit the access of the tenant administrator so that
they can't see or edit information in other tenants.
Before you provision a new tenant, you must create the data sources, such as log
sources or flow collectors, for the customer and assign them to a domain.
Complete the following tasks by using the tools on the Admin tab to provision the
new tenant in QRadar:
1. To create the tenant, click Tenant Management.
For information about setting events per second (EPS) and flows per minute
(FPM) limits for each tenant, see “Monitoring license usage in multitenant
deployments.”
2. To assign domains to the tenant, click Domain Management.
3. To create the tenant administrator role and grant the Delegated Administration
permissions, click User Roles.
In a multitenant environment, tenant users with Delegated administration
permissions can see only data for their own tenant environment. If you assign
other administrative permissions that are not part of Delegated
Administration, access is no longer restricted to that domain.
4. To create the tenant security profiles and restrict data access by specifying the
tenant domains, click Security Profiles.
5. To create the tenant users and assign the user role, security profile, and tenant,
click Users.
When you create a tenant, you can set limits for both events per second (EPS) and
flows per minute (FPM). By setting EPS and FPM limits for each tenant, you can
better manage license capacities across multiple clients. If you have a processor
that is collecting events or flows for a single customer, you do not need to assign
tenant EPS and FPM limits. If you have a single processor that collects events or
flows for multiple customers, you can set EPS and FPM limits for each tenant.
If you set the EPS and FPM limits to values that exceed the limits of either your
software licenses or the appliance hardware, the system automatically throttles the
events and flows for that tenant to ensure that the limits are not exceeded. If you
do not set EPS and FPM limits for tenants, each tenant receives events and flows
until either the license limits or the appliance limits are reached. The licensing
The EPS and FPM rates that you set for each tenant are not automatically validated
against your license entitlements. To see the cumulative limits for the software
licenses that are applied to the system as compared to the appliance hardware
limits, do these steps:
1. On the Admin tab, click System Configuration > System and License
Management.
2. Expand Deployment Details and hover your mouse over Event Limit or Flow
Limit.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. View the /var/log/qradar.error log file and look for these messages:
These messages indicate that events or flows were dropped:
[Tenant:[tenantID]:[tenantName]
Event dropped while attempting to add to Tenant Event Throttle queue.
The Tenant Event Throttle queue is full.
[Tenant:[tenantID]:[tenantName]
Flow dropped while attempting to add to Tenant Flow Throttle queue.
The Tenant Flow Throttle queue is full.
These messages indicate that the processing pipeline was near capacity:
Throttle processor cannot keep up with events.
TENANT_QUEUE_THREAD_INTERVAL_IN_MILLISEC is probably too short.
Throttle processor cannot keep up with flows.
TENANT_QUEUE_THREAD_INTERVAL_IN_MILLISEC is probably too short.
What to do next
If your system is dropping events and flows, you can expand your license to
handle more data or you can set more restrictive EPS and FPM limits for each
tenant.
The following table shows how you can use the domain modifier to change the
scope of rules in a multitenant deployment.
Table 61. Scope of rules in a multitenant environment
Rule scope Description Rule test example
Single domain These rules include only 1 and when the domain is one of the
rules domain modifier. following: manufacturing
Single tenant rules These rules include all the and when the domain is one of the
domains that are assigned to following: manufacturing, finance, legal
the tenant. Use single tenant
rules to correlate events
across multiple domains
within a single tenant.
Global rules These rules use the Any and when the domain is one of the
domain modifier and run following:Any domain
across all tenants.
When you add the Log Activity capability to a user role, the Maintain Custom
Rules and View Custom Rules permissions are automatically granted. Users who
have these permissions have access to all log data for all domains. They can edit
rules in all domains, even if their security profile settings have domain-level
restrictions.
To prevent users from being able to access log data and modify rules in other
domains or tenants, edit the user role and remove the Maintain Custom Rules and
View Custom Rules permissions. Without these permissions, the tenant
administrator and users cannot change rules, including those rules in their own
domain.
IBM Security QRadar uses the network hierarchy to understand and analyze the
network traffic in your environment.
In a multitenant environment, the network object name must be unique across the
entire deployment. You cannot use network objects that have the same name, even
if they are assigned to different domains.
Related concepts:
“Network hierarchy” on page 63
QRadar uses the network hierarchy to understand your network traffic and
provide you with the ability to view activity for your entire deployment.
To create a tenant-specific retention policy, you add a domain-based filter for each
of the domains within the tenant. Adding the domains specifies that the policy
applies only to the data for that tenant.
For more information about creating retention policies, see “Data retention” on
page 86.
The Assets tab in QRadar provides a unified view of the known information about
the assets in your network. As QRadar discovers more information, the system
updates the asset profile and incrementally builds a complete picture about the
asset.
Asset profiles are built dynamically from identity information that is passively
absorbed from event or flow data, or from data that QRadar actively looks for
during a vulnerability scan. You can also import asset data or edit the asset profile
manually. For more information, see the topics Importing Asset Profiles and Adding
or editing an asset profile in the IBM Security QRadar User Guide.
Restriction: QRadar Log Manager only tracks asset data if QRadar Vulnerability
Manager is installed. For more information about the differences between IBM
Security QRadar SIEM and IBM Security QRadar Log Manager, see “Capabilities in
your security intelligence product” on page 3.
Asset data is written to the asset database incrementally, usually two or three
pieces of data at a time. With exception of updates from network vulnerability
scanners, each asset update contains information about only one asset at a time.
Asset data usually comes from one of the following asset data sources:
Events
Event payloads, such as those created by DHCP or authentication servers,
often contain user logins, IP addresses, host names, MAC addresses, and
other asset information. This data is immediately provided to the asset
database to help determine which asset the asset update applies to.
Events are the primary cause for asset growth deviations.
Flows Flow payloads contain communication information such as IP address,
port, and protocol that is collected over regular, configurable intervals. At
the end of each interval, the data is provided to the asset database, one IP
address at a time.
Because asset data from flows is paired with an asset based on a single
identifier, the IP address, flow data is never the cause of asset growth
deviations.
Vulnerability scanners
QRadar integrates with both IBM and third-party vulnerability scanners
that can provide asset data such as operating system, installed software,
and patch information. The type of data varies from scanner to scanner,
When an asset data source is configured with domain information, all asset data
that comes from that data source is automatically tagged with the same domain.
Because the data in the asset model is domain-aware, the domain information is
applied to all QRadar components, including identities, offenses, asset profiles, and
server discovery.
When you view the asset profile, some fields might be blank. Blank fields exist
when the system did not receive this information in an asset update, or the
information exceeded the asset retention period. The default retention period is 120
days. An IP address that appears as 0.0.0.0 indicates that the asset does not contain
IP address information.
Each asset update must contain trusted information about a single asset. When
QRadar receives an asset update, the system determines which asset the update
applies to.
Identity information
Every asset must contain at least one piece of identity data. Subsequent updates
that contain one or more pieces of that same identity data are reconciled with the
asset that owns that data. Updates that are based on IP addresses are handled
carefully to avoid false-positive asset matches. False-positive asset matches occur
when one physical asset is assigned ownership of an IP address that was
previously owned by another asset in the system.
When multiple pieces of identity data are provided, the asset profiler prioritizes
the information in the following order:
v MAC address (most deterministic)
v NetBIOS host name
v DNS host name
v IP address (least deterministic)
MAC addresses, NetBIOS host names, and DNS host names must be unique and
therefore are considered as definitive identity data. Incoming updates that match
an existing asset only by the IP address are handled differently than updates that
match more definitive identity data.
By default, each piece of asset data is tracked over a two-hour period. If any one
piece of identity data in the asset update exhibits suspicious behavior two or more
times within 2 hours, that piece of data is added to the asset blacklists. There is a
separate blacklist for each type of identity asset data that is tested.
You can view these rules on the Offenses tab by clicking Rules and then selecting
the asset reconciliation exclusion group in the drop-down list.
Asset merging
Asset merging is the process where the information for one asset is combined with
the information for another asset under the premise that they are actually the same
physical asset.
Asset merging occurs when an asset update contains identity data that matches
two different asset profiles. For example, a single update that contains a NetBIOS
host name that matches one asset profile and a MAC address that matches a
different asset profile might trigger an asset merge.
Some systems can cause high volumes of asset merging because they have asset
data sources that inadvertently combine identity information from two different
physical assets into a single asset update. Some examples of these systems include
the following environments:
v Central syslog servers that act as an event proxy
v Virtual machines
v Automated installation environments
v Non-unique host names, common with assets like iPads and iPhones.
Assets that have many IP addresses, MAC addresses, or host names show
deviations in asset growth and can trigger system notifications.
Asset growth deviations occur when the number of asset updates for a single device
grows beyond the limit that is set by the retention threshold for a specific type of
the identity information. Proper handling of asset growth deviations is critical to
maintaining an accurate asset model.
At the root of every asset growth deviation is an asset data source whose data is
untrustworthy for updating the asset model. When a potential asset growth
deviation is identified, you must look at the source of the information to determine
whether there is a reasonable explanation for the asset to accumulate large
amounts of identity data. The cause of an asset growth deviation is specific to an
environment.
From the perspective of the DHCP server, the same MAC address repeatedly
requests many IP address assignments. In the context of network operations, the
VPN server is delegating the IP addresses to the clients, but the DHCP server can't
distinguish when a request is made by one asset on behalf of another.
The DHCP server log, which is configured as a QRadar log source, generates a
DHCP acknowledgment (DHCP ACK) event that associates the MAC address of
the VPN server with the IP address that it assigned to the VPN client. When asset
reconciliation occurs, the system reconciles this event by MAC address, which
results in a single existing asset that grows by one IP address for every DHCP
ACK event that is parsed.
Eventually, one asset profile contains every IP address that was allocated to the
VPN server. This asset growth deviation is caused by asset updates that contain
information about more than one asset.
Threshold settings
When an asset in the database reaches a specific number of properties, such as
multiple IP addresses or MAC addresses, QRadar blocks that asset from receiving
more updates.
The following system messages indicate that QRadar identified potential asset
growth deviations:
v The system detected asset profiles that exceed the normal size threshold
v The asset blacklist rules have added new asset data to the asset
blacklists
The system notification messages include links to reports to help you identify the
assets that have growth deviations.
Asset growth can be caused by large volumes of asset data that changes
legitimately, such as in these situations:
v A mobile device that travels from office-to-office frequently and is assigned a
new IP address whenever it logs in.
v A device that connects to a public wifi with short IP addresses leases, such as at
a university campus, might collect large volumes of asset data over a semester.
Instead of QRadar receiving an update that has the host name of the asset that the
user logged in to, the log source generates many asset updates that all have the
same host name.
In this situation, the asset growth deviation is caused by one asset profile that
contains many IP addresses and user names.
The payload of the notification shows a list of the top five most frequently
deviating assets and why the system marked each asset as a growth deviation. As
shown in the following example, the payload also shows the number of times that
the asset attempted to grow beyond the asset size threshold.
Feb 13 20:13:23 127.0.0.1 [AssetProfilerLogTimer]
com.q1labs.assetprofile.updateresolution.UpdateResolutionManager:
[INFO] [NOT:0010006101][9.21.118.83/- -] [-/- -]
The top five most frequently deviating asset profiles between
Feb 13, 2015 8:10:23 PM AST and Feb 13, 2015 8:13:23 PM AST:
[ASSET ID:1003, REASON:Too Many IPs, COUNT:508],
[ASSET ID:1002, REASON:Too many DNS Names, COUNT:93],
[ASSET ID:1001, REASON:Too many MAC Addresses, COUNT:62]
When the asset data exceeds the configured threshold, QRadar blocks the asset
from future updates. This intervention prevents the system from receiving more
corrupted data and mitigates the performance impacts that might occur if the
system attempts to reconcile incoming updates against an abnormally large asset
profile.
Use the information in the notification payload to identify the assets that are
contributing to the asset growth deviation and determine what is causing the
abnormal growth. The notification provides a link to a report of all assets that
experienced deviating asset growth over the past 24 hours.
After you resolve the asset growth deviation in your environment, you can run the
report again.
1. Click the Log Activity tab and click Search > New Search.
2. Select the Deviating Asset Growth: Asset Report saved search.
3. Use the report to identify and repair inaccurate asset data that was created
during the deviation.
If the asset data is valid, QRadar administrators can increase the threshold limits
for IP addresses, MAC addresses, NetBIOS host names, and DNS host names in
the Asset Profiler Configuration on the QRadar Admin tab.
Related concepts:
“Stale asset data” on page 196
Stale asset data can be problematic when the rate at which new asset records are
created exceeds the rate at which stale asset data is removed. Controlling and
managing asset retention thresholds is the key to addressing asset growth
deviations that are caused by stale asset data.
Explanation
Asset exclusion rules monitor asset data for consistency and integrity. The rules
track specific pieces of asset data over time to ensure that they are consistently
being observed with the same subset of data within a reasonable time.
Use the information in the notification payload to identify the rules that are used
to monitor asset data. Click the Asset deviations by log source link in the
notification to see the asset deviations that occurred in the last 24 hours.
If the asset data is valid, QRadar administrators can configure QRadar to resolve
the problem.
v If your blacklists are populating too aggressively, you can tune the asset
reconciliation exclusion rules that populate them.
v If you want to add the data to the asset database, you can remove the asset data
from the blacklist and add it to the corresponding asset whitelist. Adding asset
data to the whitelist prevents it from inadvertently reappearing on the blacklist.
Related concepts:
“Advanced tuning of asset reconciliation exclusion rules” on page 205
You can tune the Asset Reconciliation Exclusion rules to refine the definition of
deviating asset growth in one or more of the rules.
Use the following list to help you decide how to prevent asset growth deviations:
v Understand how QRadar handles stale asset data.
v Tune the asset profiler retention settings to limit the length of time that asset
data is retained.
v Tune the number of IP addresses allowed for a single asset.
v Create identity exclusion searches to exclude certain events from providing asset
updates.
v Tune the Asset Reconciliation Exclusion rules to refine the definition of deviating
asset growth.
v Create asset whitelists to prevent data from reappearing on the asset blacklists.
v Modify the entries on the asset blacklists and asset whitelists.
v Ensure that your DSMs are up to date. QRadar provides a weekly automatic
update that might contain DSM updates and corrections to parsing issues.
The historical records become active again if they are observed by QRadar
passively, through events and flows, or actively, through port and vulnerability
scanners.
Preventing asset growth deviations requires finding the right balance between the
number of IP addresses allowed for a single asset and the length of time that
QRadar retains the asset data. You must consider the performance and
manageability trade-offs before you configure QRadar to accommodate high levels
of asset data retention. While longer retention periods and higher per-asset
thresholds might appear desirable all the time, a better approach is to determine a
baseline configuration that is acceptable for your environment and test that
configuration. Then, you can increase the retention thresholds in small increments
until the right balance is achieved.
Related tasks:
“Tuning the Asset Profiler retention settings” on page 202
IBM Security QRadar uses the asset retention settings to manage the size of the
asset profiles.
“Tuning the number of IP addresses allowed for a single asset” on page 202
IBM Security QRadar monitors the number of IP addresses that a single asset
accumulates over time.
An asset whitelist is a collection of asset data that overrides the asset reconciliation
engine logic about which data is added to an asset blacklist. When the system
identifies a blacklist match, it checks the whitelist to see whether the value exists.
If the asset update matches data that is on the whitelist, the change is reconciled
and the asset is updated. Whitelisted asset data is applied globally for all domains.
The asset blacklists and whitelists are reference sets. You can view and modify the
asset blacklist and whitelist data using the Reference Set Management tool in the
QRadar Console. For more information about working with reference sets, see
Chapter 7, “Reference sets management,” on page 99.
Alternatively, you can use the command line interface (CLI) or the RestFUL API
endpoint to update the content of the asset blacklists and whitelists.
Asset blacklists
An asset blacklist is a collection of data that IBM Security QRadar considers
untrustworthy based on the asset reconciliation exclusion rules. Data in the asset
blacklist is likely to contribute to asset growth deviations and QRadar prevents the
data from being added to the asset database.
The following table shows the reference collection name and type for each type of
identity asset data.
Table 63. Reference collection names for asset blacklist data
Type of identity
data Reference collection name Reference collection type
IP addresses (v4) Asset Reconciliation IPv4 Blacklist Reference Set [Set Type: IP]
DNS host names Asset Reconciliation DNS Blacklist Reference Set [Set Type: ALNIC*]
NetBIOS host Asset Reconciliation NetBIOS Reference Set [Set Type: ALNIC*]
names Blacklist
MAC Addresses Asset Reconciliation MAC Blacklist Reference Set [Set Type: ALNIC*]
* ALNIC is an alphanumeric type that can accommodate both host name and MAC
address values.
You can use the Reference Set Management tool to edit the blacklist entries. For
information about working with reference sets, see Chapter 7, “Reference sets
management,” on page 99.
Related concepts:
“Asset whitelists”
You can use asset whitelists to keep IBM Security QRadar asset data from
inadvertently reappearing in the asset blacklists.
Asset whitelists
You can use asset whitelists to keep IBM Security QRadar asset data from
inadvertently reappearing in the asset blacklists.
An asset whitelist is a collection of asset data that overrides the asset reconciliation
engine logic about which data is added to an asset blacklist. When the system
identifies a blacklist match, it checks the whitelist to see whether the value exists.
If the asset update matches data that is on the whitelist, the change is reconciled
and the asset is updated. Whitelisted asset data is applied globally for all domains.
You can use the Reference Set Management tool to edit the whitelist entries. For
information about working with reference sets, see Chapter 7, “Reference sets
management,” on page 99.
The whitelist is helpful if you have asset data that continues to show up in the
blacklists when it is a valid asset update. For example, you might have a round
robin DNS load balancer that is configured to rotate across a set of five IP
addresses. The Asset Reconciliation Exclusion rules might determine that the
multiple IP addresses associated with the same DNS host name are indicative of an
asset growth deviation, and the system might add the DNS load balancer to the
blacklist. To resolve this problem, you can add the DNS host name to the Asset
Reconciliation DNS Whitelist.
An accurate asset database makes it easier to connect offenses that are triggered in
your system to physical or virtual assets in your network. Ignoring asset deviations
by adding mass entries to the asset whitelist is not helpful in building an accurate
asset database. Instead of adding mass whitelist entries, review the asset blacklist
to determine what is contributing to the deviating asset growth and then
determine how to fix it.
Each type of identity data is kept in a separate whitelist. The following table shows
the reference collection name and type for each type of identity asset data.
Table 64. Reference collection name for asset whitelist data
Type of data Reference collection name Reference collection type
IP addresses Asset Reconciliation IPv4 Whitelist Reference Set [Set Type: IP]
DNS host names Asset Reconciliation DNS Whitelist Reference Set [Set Type: ALNIC*]
NetBIOS host Asset Reconciliation NetBIOS Reference Set [Set Type: ALNIC*]
names Whitelist
MAC addresses Asset Reconciliation MAC Reference Set [Set Type: ALNIC*]
Whitelist
* ALNIC is an alphanumeric type that can accommodate host name and MAC address
values.
Related concepts:
“Asset blacklists” on page 197
An asset blacklist is a collection of data that IBM Security QRadar considers
untrustworthy based on the asset reconciliation exclusion rules. Data in the asset
blacklist is likely to contribute to asset growth deviations and QRadar prevents the
data from being added to the asset database.
The commands to add new values to each list are described in the following table.
The parameter values must exactly match the asset update values that are
provided by the originating asset data source.
Table 65. Command syntax to modify asset blacklist and whitelist data
Name Command syntax
Asset ReferenceSetUtil.sh add "Asset Reconciliation IPv4 Blacklist" IP
Reconciliation
IPv4 Blacklist For example, this command adds IP address 192.168.3.56 to the blacklist:
ReferenceSetUtil.sh add "Asset Reconciliation IPv4 Blacklist"
192.168.3.56
Related tasks:
“Updating the blacklists and whitelists using the RESTful API” on page 201
You can use the IBM Security QRadar RESTful API to customize the content of the
asset blacklists and whitelists.
You must specify the exact name of the reference set that you want to view or
update.
v Asset Reconciliation IPv4 Blacklist
v Asset Reconciliation DNS Blacklist
v Asset Reconciliation NetBIOS Blacklist
v Asset Reconciliation MAC Blacklist
v Asset Reconciliation IPv4 Whitelist
v Asset Reconciliation DNS Whitelist
v Asset Reconciliation NetBIOS Whitelist
v Asset Reconciliation MAC Whitelist
Procedure
1. Type the following URL in your web browser to access the RESTful API
interface:
https://ConsoleIPaddress/api_doc
2. In the navigation pane on the left, find 4.0>/reference_data >/sets > /{name}.
3. To view the contents of an asset blacklist or whitelist, follow these steps:
a. Click the GET tab and scroll down to the Parameters section.
b. In the Value field for the Name parameter, type the name of the asset
blacklist or whitelist that you want to view.
c. Click Try It Out and view the results at the bottom of the screen.
4. To add a value to an asset blacklist or whitelist, follow these steps:
a. Click the POST tab and scroll down to the Parameters section.
b. Type in the values for the following parameters:
Table 66. Parameters that are required to add new asset data
Parameter name Parameter description
name Represents the name of the reference collection that you want to
update.
value Represents the data item that you want to add to the asset blacklist
or whitelist. Must exactly match the asset update values that are
provided by the originating asset data source.
c. Click Try It Out to add the new value to the asset whitelist or asset
blacklist.
What to do next
For more information about using the RESTful API to change the reference sets, see
the IBM Security QRadar API Guide.
Related concepts:
“Updating the asset blacklists and whitelists by using reference set utility” on page
199
You can use the IBM Security QRadar reference set utility to add or modify the
The default retention period for most asset data is 120 days after the last time it
was either passively or actively observed in QRadar. User names are retained for
30 days.
Asset data that is added manually by QRadar users does not usually contribute to
asset growth deviations. By default, this data is retained forever. For all other types
of asset data, the Retain Forever flag is suggested only for static environments.
You can adjust the retention time based on the type of asset identity data that is in
the event. For example, if multiple IP addresses are merging under one asset, you
can change the Asset IP Retention period from 120 days to a lower value.
When you change the asset retention period for a specific type of asset data, the
new retention period is applied to all asset data in QRadar. Existing asset data that
already exceeds the new threshold is removed when the deployment is complete.
To ensure that you can always identify named hosts even when the asset data is
beyond the retention period, the asset retention cleanup process does not remove
the last known host name value for an asset.
Before you determine how many days that you want to retain the asset data,
understand the following characteristics about longer retention periods:
v provides a better historical view of your assets.
v creates larger data volumes per asset in the asset database.
v increases the probability that stale data will contribute to asset growth deviation
messages.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Asset Profiler Configuration.
4. Click Asset Profiler Retention Configuration.
5. Adjust the retention values and click Save.
6. Deploy the changes into your environment for the updates to take effect.
Related tasks:
“Tuning the number of IP addresses allowed for a single asset”
IBM Security QRadar monitors the number of IP addresses that a single asset
accumulates over time.
Setting the limit for the number of IP addresses too high prevents QRadar from
detecting asset growth deviations before they have a negative impact on the rest of
the deployment. Setting the limit too low increases the number of asset growth
deviations that are reported.
You can use the following guideline when you tune the Number of IPs Allowed
for a Single Asset setting for the first time.
Number of IP addresses that are allowed for a single asset = (<retention time (days)>
x <estimated IP addresses per day>) + <buffer number of IP addresses>
Where
v <estimated IP addresses per day> is the number of IP addresses that a single asset
might accumulate in one day under normal conditions
v <retention time (days)> is the preferred amount of time to retain the asset IP
addresses
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Asset Profiler Configuration.
4. Click Asset Profiler Retention Configuration.
5. Adjust the configuration values and click Save.
6. Deploy the changes into your environment for the updates to take effect.
Related tasks:
“Tuning the Asset Profiler retention settings” on page 202
IBM Security QRadar uses the asset retention settings to manage the size of the
asset profiles.
For example, log sources can provide large volumes of asset identity information
to the asset database. They provide IBM Security QRadar with near real-time
changes to asset information and they can keep your asset database current. But
log sources are most often the source of asset growth deviations and other
asset-related anomalies.
When a log source sends incorrect asset data to QRadar, try to fix the log source so
that the data it sends is usable by the asset database. If the log source cannot be
fixed, you can build an identity exclusion search that blocks the asset information
from entering the asset database.
Blacklists can specify only raw asset data, such as MAC addresses and host names,
that is to be excluded. Identity exclusion searches filter out asset data based on
search fields like log source, category, and event name.
Blacklists do not account for the type of data source that is providing the data,
whereas identity exclusion searches can be applied to events only. Identity
exclusion searches can block asset updates based on common event search fields,
such as event type, event name, category, and log source.
The filters that you create for the search must match events that you want to
exclude, not the events that you want to keep.
You might find it helpful to run the search against events that are already in the
system. However, when you save the search, you must select Real Time
(streaming) in the Timespan options. If you do not choose this setting, the search
will not match any results when it runs against the live stream of events that are
coming into QRadar.
When you update the saved identity exclusion search without changing the name,
the identity exclusion list that is used by the Asset Profiler is updated. For
example, you might edit the search to add more filtering of the asset data that you
want to exclude. The new values are included and the asset exclusion starts
immediately after the search is saved.
Procedure
1. On the Log Activity tab, click Search > New Search.
2. Create the search by adding search criteria and filters to match the events that
you want to exclude from asset updates.
3. In the Time Range box, select Real Time (streaming) and then click Filter to
run the search.
4. On the search results screen, click Save Criteria and provide the information
for the saved search. You can assign the saved search to a search group. An
Identity Exclusion search group exists in the Authentication, Identity and
User Activity folder.
Ensure that Real Time (streaming) is selected in the Timespan options.
5. Click OK to save the search.
6. Click the Admin tab, and click Asset Profiler Configuration.
7. Click Manage Identity Exclusion at the bottom of the screen.
This table lists the variables in the rule template that can be tuned and the result of
the change. Avoid changing other variables in the template.
Table 67. Options for tuning the asset reconciliation rules
Default
Variable value Tuning result
N1 3 Tuning this variable to a lower value results in more data
being added to the blacklist because fewer events with
conflicting data are needed for the rule to fire.
The Asset Reconciliation Exclusion rules are system-wide rules. Changes to the
rules affect the way that the rule behaves throughout the entire system.
Always be cautious when you are adding new rules to the system because as some
tasks and CRE rules might impact system performance. It might be beneficial to
add the new rules to the top of each test stack to allow the system to bypass the
remainder of the test logic whenever an asset update matches the criteria for the
new rule.
Procedure
1. Duplicate the rule.
a. On the Offenses tab, click Rules and select the rule that you want to copy.
b. Click Actions > Duplicate. It can be helpful if the name of the new rule is
indicative of the reason for duplicating it.
2. Add a test to the rule.
Determine a filter that you want to use to apply the rule only to a subset of
system data. For example, you can add a test that matches only events from a
specific log source.
3. Tune the variables of the rule to achieve the wanted behavior.
4. Update the original rule.
a. Add the same test that you added to the duplicate rule to the original rule,
but this time invert the rules AND and AND NOT operators.
Inverting the operators prevents events from being triggered in both rules.
In the rest of your deployment, you have a carefully managed network that
consists only of inventoried, well-named company devices. IP address leases are
much longer in this part of the network, and IP addresses are accessed by
authentication only. On this network segment, you want to know immediately
when there are any asset growth deviations and you want to keep the default
settings for the asset reconciliation exclusion rules.
Blacklisting IP addresses
Your security team finds the asset-related notifications that are generated by the
wifi segment are a nuisance. You want to prevent the wifi from triggering any
more deviating asset growth notifications.
You review the Asset deviation by log source report in the last system notification.
You determine that the blacklisted data is coming from the DHCP server on your
wifi.
The values in the Event Count column, Flow Count column and the Offenses
column for the row corresponding to the AssetExclusion: Exclude IP By MAC
Address rule indicate that your wifi DHCP server is triggering this rule.
You add a test to the existing asset reconciliation exclusion rules to stop rules from
adding wifi data to the blacklist.
Apply AssetExclusion:Exclude IP by MAC address on events which are detected by
the Local system and NOT when the event(s) were detected by one or more of
MicrosoftDHCP @ microsoft.dhcp.test.com
and NOT when any of Domain is the key and any of Identity IP is the value in
any of Asset Reconciliation Domain IPv4 Whitelist
- IP Asset Reconciliation Domain IPv4 Blacklist - IP
and when at least 3 events are seen with the same Identity IP and
different Identity MAC in 2 hours.
The updated rule tests only the events from the log sources that are not on your
wifi DHCP server. To prevent wifi DHCP events from undergoing more expensive
reference set and behavior analysis tests, you also moved this test to the top of the
test stack
Whether you fix the source of the problem or block the asset updates, you must
clean up the asset database by removing the invalid asset data and removing the
asset blacklist entries.
Results
Purging a blacklist removes all blacklist entries, including those entries that were
added manually. Blacklist entries that were manually added must be added again.
Procedure
1. To purge a blacklist by using the QRadar Console:
a. Click Admin > System Configuration > Reference Set Management.
b. Select a reference set and then click Delete.
c. Use the quick search text box to search for the reference sets that you want
to delete, and then click Delete Listed.
2. To purge a blacklist by using the QRadar Console command-line interface:
a. Change directory to /opt/qradar/bin.
b. Run the following command.
./ReferenceDataUtil.sh purge "Reference Collection Name"
where Reference Collection Name is one of the following lists:
v Asset Reconciliation NetBIOS Blacklist
v Asset Reconciliation DNS Blacklist
v Asset Reconciliation IPv4 Blacklist
v Asset Reconciliation MAC Blacklist
Results
Purging a blacklist removes all blacklist entries, including those entries that were
added manually. Blacklist entries that were manually added must be added again.
With exception of domain tagging, QRadar systems ensure that all forwarded data
is unaltered. Domain information is removed from forwarded data. Events and
flows that contain domain information are automatically assigned to the default
domain on the receiving system.
To avoid compatibility problems when sending event and flow data, ensure that
the deployment receiving the data is the same version or higher than the
deployment that is sending the data.
1. Configure one or more forwarding destinations.
2. To determine what data you want to forward, configure routing rules, custom
rules, or both.
3. Configure the routing options to apply to the data.
For example, you can configure all data from a specific event collector to forward
to a specific ticketing system. You can also bypass correlation by removing the data
that matches a routing rule.
Procedure
1. Click the Admin tab.
2. In the navigation pane, click System Configuration.
3. Click the Forwarding Destinations icon.
4. On the toolbar, click Add.
5. In the Forwarding Destinations window, enter values for the parameters.
The following table describes some of the Forwarding Destinations parameters.
Table 68. Forwarding Destinations parameters
Parameter Description
Event Format v Payload is the data in the format that the log source or flow source
sent.
v Normalized is raw data that is parsed and prepared as readable
information for the user interface.
Destination The IP address or host name of the vendor system that you want to
Address forward data to.
6. Click Save.
You must re-create JSON forwarding profiles that you created in IBM Security
QRadar V7.2.3 or earlier.
You can use forwarding profiles only when the event data is sent in JSON format.
You can select specific event or flow properties, including custom properties, to
forward to an external destination. You can enhance the readability of the event
data by specifying an alias name and default value for the attribute. Alias names
and default values are specific to the profile they are defined in. If the attributes
are used in other profiles, the alias names and default values must be redefined.
You can use a single profile that has multiple forwarding destinations. When you
edit a profile, ensure that the changes are appropriate for all forwarding
destinations that the profile is associated with.
When you delete a profile, all forwarding destinations that used the profile
automatically revert to using the default profile.
Procedure
1. Click the Admin tab, and in the navigation pane, click System Configuration.
2. Click the Forwarding Destinations icon.
3. On the toolbar, click Profile Manager.
4. To create a new profile, click New.
5. Type a name for the profile and select the check box beside the attributes that
you want to include in the event data set.
6. To change an existing profile, select the profile and click Edit or Delete.
7. Click Save.
You can configure routing rules to forward data in either online or offline mode:
v In Online mode, your data remains current because forwarding is performed in
real time. If the forwarding destination becomes unreachable, data can
potentially be lost.
v In Offline mode, all data is stored in the database and then sent to the
forwarding destination. This assures that no data is lost, however, there might be
delays in data forwarding.
Chapter 18. Configuring QRadar systems to forward data to other systems 211
Table 69. Routing Rules window parameters (continued)
Parameter Description
Routing Options v The Forward option specifies that data is
forwarded to the specified forwarding
destination. Data is also stored in the
database and processed by the Custom
Rules Engine (CRE).
v The Drop option specifies that data is not
stored in the database, bypasses CRE, and
drops events. The data is not forwarded
to a forwarding destination, but it is
processed by the CRE. This option is not
available if you select the Offline option.
v The Bypass Correlation option specifies
that data bypasses CRE, but it is stored in
the database. This option is not available
if you select the Offline option.
Procedure
1. Click the Admin tab.
2. In the navigation pane, click System Configuration.
3. Click the Routing Rules icon.
4. On the toolbar, click Add.
5. In the Routing Rules window, enter values for the parameters.
a. Type a name and description for your routing rule.
b. From the Mode field, select one of the following options: Online or Offline.
c. From the Forwarding Event Collector or Forwarding Event Processor list,
select the event collector from which you want to forward data.
d. From the Data Source field in the Event Filters section, select which data
source you want to route: Events or Flows.
Restriction: If you select this check box, you cannot add a filter.
f. To add a filter, in the Event Filters or Flow Filters section, select a filter
from the first list and an operand from the second list.
g. In the text box, type the value that you want to filter for, and then click
Add Filter.
h. Repeat the previous two steps for each filter that you want to add.
i. To forward log data that matches the current filters, select the Forward check
box, and then select the check box for each preferred forwarding destination.
Restriction: If you select the Forward check box, you can also select either
the Drop or Bypass Correlation check boxes, but not both of them.
If you want to edit, add, or delete a forwarding destination, click the
Manage Destinations link.
6. Click Save.
The criteria that determines the event data that is sent to a forwarding destination
is based on the tests and building blocks that are included in the rule. When the
rule is configured and enabled, all event data that matches the rule tests are
automatically sent to the specified forwarding destinations. For more information
about how to edit or add a rule, see the see the User Guide for your product.
Procedure
1. Click the Offenses Log Activity tab.
2. On the navigation menu, select Rules.
3. Edit or add a rule. On the Rule Response page in the Rule wizard, ensure that
you select the Send to Forwarding Destinations option.
Procedure
1. Click the Admin tab.
2. In the navigation pane, click System Configuration.
3. Click the Forwarding Destinations icon.
Statistics for the data sent to each forwarding destination is displayed. For
example, you can see the following information:
v The total number events and flows that were seen for this forwarding
destination.
v The number of events or flows that were sent to this forwarding destination.
v The number of events or flows that were dropped before the forwarding
destination was reached.
4. On the toolbar, click an action, as described in the following table.
Table 70. Description of the Forwarding Destination toolbar actions
Action Description
Reset Counters Resets the counters for the Seen, Sent, and
Dropped parameters to zero, and the
counters start accumulating again.
Tip: You can reset the counters to provide a
more targeted view of the performance of
your forwarding destinations.
Edit Changes the configured name, format, IP
address, port, or protocol.
Delete Deletes a forwarding destination
Use the Event Routing Rules window to edit, enable, disable, or delete a rule. You
can edit a routing rule to change the configured name, Event Collector, filters, or
routing options.
Chapter 18. Configuring QRadar systems to forward data to other systems 215
216 QRadar SIEM Administration Guide
Chapter 19. Event store and forward
Use the Store and Forward feature to manage schedules for forwarding events
from your dedicated Event Collector appliances to Event Processor components in
your deployment.
The Store and Forward feature is supported on the Event Collector 1501 and Event
Collector 1590. For more information about these appliances, see the QRadar
Hardware Guide.
A dedicated Event Collector does not process events and it does not include an
on-board Event Processor. By default, a dedicated Event Collector continuously
forwards events to an Event Processor that you must connect by using the
Deployment Editor. Use the Store and Forward feature to schedule a time range
for when you want the Event Collector to forward events. During the time when
events are not forwarding, the events are stored locally on the appliance. The
events are not accessible in the QRadar Console user interface.
Use the scheduling feature to store events during your business hours. Forward
the events to an Event Processor when the transmission does not negatively affect
your network bandwidth. For example, you can configure an Event Collector to
forward events to an Event Processor during non-business hours.
A dedicated Event Collector does not process events and it does not include an
on-board Event Processor. By default, a dedicated Event Collector continuously
forwards events to an Event Processor that you must connect using the
Deployment Editor. The Store and Forward feature allows you to schedule a time
range for when you want the Event Collector to forward events. During the period
of time when events are not forwarding, the events are stored locally on the
appliance and are not accessible using the Console user interface.
This scheduling feature allows you to store events during your business hours and
then forward the events to an Event Processor during periods of time when the
transmission does not negatively affect your network bandwidth. For example, you
can configure an Event Collector to only forward events to an Event Processor
during non-business hours, such as midnight until 6 AM.
You can use options on the toolbar and the Display list box to change your view
of the schedule list. Change your view of the list to focus on the statistics from
various points of view. For example, if you want to view the statistics for a
particular Event Collector, you can select Event Collectors from the Display list.
The list then groups by the Event Collector column and makes it easier for you to
locate the Event Collector that you want to investigate.
By default, the Store and Forward list is configured to display the list that is
organized by the schedule (Display > Schedules).
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Store and Forward icon.
4. In the Store and Forward window, view the parameters for each schedule.
The following table describes some of the parameters for the schedule.
Table 71. Store and Forward window parameters
Parameter Description
Display The Schedules option shows a hierarchy of
the parent-child relationship between the
schedules, Event Processors and the
associated QRadar Event Collectors.
You can create and manage multiple schedules to control event forwarding from
multiple QRadar Event Collectors in a geographically distributed deployment.
Ensure that your dedicated Event Collector is added to your deployment and
connected to an Event Processor. The connection between an Event Collector and
an Event Processor is configured in the Deployment Editor.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Store and Forward icon.
4. Click Actions > Create.
a. Click Next to move to the Select Collectors page.
b. On the Select Collectors page, configure the parameters.
If the Event Collector that you want to configure is not listed, it might not
be added to your deployment. If so, use the Deployment Editor to add the
Event Collector and then proceed.
c. On the Schedule Options page, configure the parameters.
To configure the forward transfer rate, the minimum transfer rate is 0. The
maximum transfer rate is 9,999,999. A value of 0 means that the transfer rate
is unlimited.
d. Finish the configuration.
You can now view the schedule in the Store and Forward window. After
you create a new schedule, it might take up to 10 minutes for statistics to
start displaying in the Store and Forward window.
Procedure
1. On the navigation menu, click System Configuration .
2. Click the Store and Forward icon.
3. Select the schedule that you want to delete.
4. Click Actions > Delete.
After the schedule is deleted, the associated QRadar Event Collectors resume
continuous forwarding of events to their assigned Event Processor.
You must use the content management script to export content from the QRadar
source deployment. You can use either the content management script or the
Extensions Management tool to import the content to the target deployment.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to /opt/qradar/bin directory, and type the command to export all of the
custom content:
./contentManagement.pl -a export -c all
Examples:
v To include accumulated data in the export, type the following command:
./contentManagement.pl --action export --content-type all -g
v To specify the directory for the exported file and change the compression
format, type the following command:
./contentManagement.pl -a export -c all -o [filepath] -t [compression_type]
Results
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/bin directory and type the command to export all
content of the specified type:
./contentManagement.pl -a export --content-type [content_type] --id all
Parameters:
Table 73. contentManagement.pl script parameters for exporting custom content of a specific
type
Parameter Description
-c [content_type] Specifies the type of content.
or
--global-view
-i [content_identifier] Specifies the identifier of a specific instance of
custom content such as a single report or a single
or reference set.
--id [content_identifier] You can specify all to export all content of the
specified type.
-o [filepath] Specifies the full path to the directory where the
export file is written.
or
If no output directory is specified, the content is
--output-directory [filepath] exported to the current directory. If the specified
output directory does not exist, it is created.
-t [compression_type] Specifies the compression type of the export file.
Examples:
v To export all custom searches, type the following command:
./contentManagement.pl --action export --content-type search --id all
v To export all reports and include accumulated data, type the following
command:
./contentManagement.pl -a export -c 10 --id all --global-view
Results
The following table lists the identifiers to use when you want to search for specific
types of content.
Table 74. Content type identifiers for searching custom content
Custom content type Text identifier Numeric identifier
Dashboards dashboard 4
Reports report 10
Saved searches search 1
1
FGroups fgroup 12
FGroup types fgrouptype 13
Custom rules customrule 3
Custom properties customproperty 6
Log sources sensordevice 17
Log source types sensordevicetype 24
Log source categories sensordevicecategory 18
Log source extensions deviceextension 16
Reference data collections referencedata 28
Custom QID map entries qidmap 27
Historical correlation profiles historicalsearch 25
Custom functions custom_function 77
Custom actions custom_action 78
Applications installed_application 100
1
An FGroup represents a group of content, such as a log source group, reporting group, or
search group.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/bin directory and type the following command to search
for custom content that matches a regular expression:
./contentManagement.pl -a search -c [content_type] -r [regex]
Parameters:
Table 75. contentManagement.pl script parameters for searching content items
Parameter Description
-c [content_type] Specifies the type of content to search for.
What to do next
Use the unique identifier to export specific content items from QRadar. For more
information, see “Exporting custom content items of different types” on page 229
and “Exporting a single custom content item.”
You must know the unique identifier for the custom content item that you want to
export. For information about finding the unique identifiers for content items, see
“Searching for specific content items to export” on page 226.
Procedure
1. Us SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/bin directory and type the command to export the
content:
./contentManagement.pl -a export -c [content_type] -i [content_identifier]
Parameters:
Table 76. contentManagement.pl script parameters for exporting a single content item
Parameter Description
-c [content_type] Specifies the type of content to export.
or
--global-view
-i [content_identifier] Specifies the identifier of a specific instance of
custom content such as a single report or a single
or reference set.
--id [content_identifier]
-o [filepath] Specifies the full path to the directory where the
export file is written.
or
If no output directory is specified, the content is
--output-directory [filepath] exported to the current directory. If the specified
output directory does not exist, it is created.
-t [compression_type] Used with the export action.
Examples:
v To export the dashboard that has ID 7 into the current directory, type the
following command:
./contentManagement.pl -a export -c dashboard -i 7
v To export the log source that has ID 70, including accumulated data, into the
/store/cmt/exports directory, type the following command:
./contentManagement.pl -a export -c sensordevice -i 70 -o /store/cmt/exports -g
Results
The content is exported to a compressed .zip file. The exported file might contain
more content items than expected because all dependencies are exported with the
specified content items. For example, if you export a report, the saved search that
the report uses is also exported. You can manually change the file name to a name
that is more descriptive.
You must know the unique identifiers for each custom content item that you want
to export. For information about finding the unique identifiers for content items,
see “Searching for specific content items to export” on page 226.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Create a text file that lists the content that you want to export.
Each line must include the custom content type followed by a
comma-separated list of unique IDs for that type.
Example: To export two dashboards that have ID 5 and ID 7, all custom rules,
and a group, create a text file that has the following entries:
dashboard, 5,7
customrule, all
fgroup, 77
3. Go to /opt/qradar/bin and type the command to export the content:
./contentManagement.pl -a export -c package -f [source_file]
Parameters:
Table 77. contentManagement.pl script parameters for exporting different types of content
item
Parameter Description
-c [content_type] Specifies the type of content.
or
--global-view
Examples:
v To export all items in the exportlist.txt file in the qradar directory, and
save the exported file in the current directory, type the following command:
./contentManagement.pl -a export -c package -f /qradar/exportlist.txt
v To export all items in the exportlist.txt file in the qradar directory,
including accumulated data, and save the output in the /store/cmt/exports
directory, type the following command:
./contentManagement.pl -a export -c package
--file /qradar/exportlist.txt -o /store/cmt/exports -g
When you use the --file parameter, a package template file is automatically
generated in /store/cmt/packages. To use the package template file, specify the
filename as the value for the --name parameter.
Results
The content is exported to a compressed .zip file. The exported file might contain
more content items than expected because all dependencies are exported with the
specified content items. For example, if you export a report, the saved search that
the report uses is also exported. You can manually change the file name to a name
that is more descriptive.
Extensions must be on your local computer before you install them in QRadar.
You can download QRadar extensions from the IBM Security App Exchange
(https://apps.xforce.ibmcloud.com/) and from IBM Fix Central
(www.ibm.com/support/fixcentral/).
Procedure
1. On the Admin tab, click Extensions Management.
2. To upload a new extension to the QRadar console, follow these steps:
a. Click Add.
b. Click Browse and navigate to find the extension.
c. Optional: Click Install immediately to install the extension without viewing
the contents.
d. Click Add.
3. To view the contents of the extension, select it from the extensions list and click
More Details.
4. To install the extension, follow these steps:
a. Select the extension from the list and click Install.
b. If the extension does not include a digital signature, or it is signed but the
signature is not associated with the IBM Security Certificate Authority (CA),
you must confirm that you still want to install it. Click Install to proceed
with the installation.
c. Review the changes that the installation makes to the system.
d. Select Overwrite or Keep existing data to specify how to handle existing
content items.
e. Click Install.
f. Review the installation summary and click OK.
If you want to import content from another QRadar system, you must first export
the content and copy it to the target system. For more information about exporting
content, see “Content type identifiers for exporting custom content” on page 234.
When you import content that has log sources, confirm that DSM and protocol
RPMs are installed and current on the target system.
Do not start multiple imports on the same system at the same time. The imports
will fail due to conflicts with shared resources.
Parameters:
Table 78. contentManagement.pl script parameters for importing custom content
Parameter Description
-f [source_file] Specifies the file that contains the content items to
import.
or
Valid file types are zip, targz, and xml.
--file [source_file]
The filename and path are case-sensitive.
-u [user] Specifies the user that replaces the current owner
when you import user-specific data. The user must
or exist on the target system before you import the
content.
--user [user]
Examples:
v To import content from the fgroup-ContentExport-20120418163707.tar.gz
file in the current directory, type the following command:
/opt/qradar/bin/contentManagement.pl --action import
-f fgroup-ContentExport-20120418163707.tar.gz
v To import content from the fgroup-ContentExport-20120418163707.tar.gz
file in the current directory and make the admin user the owner of all
sensitive data in the import, type the following command:
/opt/qradar/bin/contentManagement.pl --action import
--file fgroup-ContentExport-20120418163707.tar.gz --user admin
The import script displays the following message when reference data is
actively collected while it is being exported: Foreign key constraint
violation. To avoid this issue, run the export process when no reference data is
being collected.
If you want to update content with content that was exported from another
QRadar system, ensure that the exported file is on the target system. For more
information about exporting content, see “Content type identifiers for exporting
custom content” on page 234.
When you import content that has log sources, confirm that DSM and protocol
RPMs are installed and current on the target system.
Do not start multiple imports on the same system at the same time. The imports
will fail due to conflicts with shared resources.
Parameters:
Table 79. contentManagement.pl script parameters for updating custom content
Parameter Description
-f [source_file] Specifies the file that contains the content items to
update.
or
Valid file types are zip, targz, and xml.
--file [source_file]
The filename and path are case-sensitive.
-u [user] Specifies the user that replaces the current owner
when you import user-specific data.
or
The user must exist on the target system before
--user [user] you import the content.
Example:
v To update based on the content in the fgroup-ContentExport-
20120418163707.zip file, type the following command:
/opt/qradar/bin/contentManagement.pl --action update
-f fgroup-ContentExport-20120418163707.zip
When you export content from a QRadar appliance, the content management script
checks content dependencies, and then includes associated content in the export.
For example, when the content management script detects that a saved search is
associated with a report that you want to export, the saved search is also exported.
You can't export offense, asset, or vulnerability saved searches.
You use the content type identifier when you want to export all custom content of
a specific type. If you want to export a specific content item from your QRadar
deployment, you must know the unique identifier for that specific content item.
For more information, see “Searching for specific content items to export” on page
226.
The following table describes the content type identifiers that are passed into the
contentManagement.pl script for the -c parameter.
Table 80. Content type identifiers for exporting custom content
Custom content type Text identifier Numeric identifier
All custom content all Not applicable
Custom list of content package Not applicable
The following table describes the parameters for the contentManagement.pl script
and the actions to which each parameter applies.
/opt/qradar/bin/contentManagement.pl --action [action_type] [script_parameters]
--global-view
-h [action_type] Used with all actions.
--quiet
-r [regex] Used with the search action.
Customize the SNMP configuration parameters in the custom rules wizard and
modify the SNMP traps that the custom rule engine sends to other software for
management. QRadar provides two default traps. However, you can add custom
traps or modify the existing traps to use new parameters.
For more information on SNMP, go to the The Internet Engineering Task Force
(http://www.ietf.org/) website and type RFC 1157 in the search field.
Restriction: The SNMP trap parameters are displayed in the custom rules wizard
only if SNMP is enabled in the QRadar system settings.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/conf directory and make backup copies of the following
files:
v eventCRE.snmp.xml
v offenseCRE.snmp.xml
3. Open the configuration file for editing.
v To edit the SNMP parameters for event rules, open the eventCRE.snmp.xml
file.
v To edit the SNMP parameters for offense rules, open the
offenseCRE.snmp.xml file.
4. Inside the <snmp> element and before the <creSNMPTrap> element, insert the
following section, updating the labels as needed:
<creSNMPResponse name=”snmp_response_1”>
<custom name=”MyColor”>
<string label=”What is your favorite color?”/>
</custom>
<custom name=”MyCategory”>
<list label=”Select a category”>
<option label=”Label1” value=”Category1”/>
<option label=”Label2” value=”Category2”/>
</list>
</custom>
</creSNMPResponse>
5. Save and close the file.
What to do next
Customize the SNMP trap output..
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/conf directory and make backup copies of the
following files:
v eventCRE.snmp.xml
v offenseCRE.snmp.xml
3. Open the configuration file for editing.
v To edit the SNMP parameters for event rules, open the eventCRE.snmp.xml
file.
v To edit the SNMP parameters for offense rules, open the
offenseCRE.snmp.xml file.
4. To change the trap that is used for SNMP trap notification, update the
following text with the appropriate trap object identifier (OID):
-<creSNMPTrap version="3" OID="1.3.6.1.4.1.20212.1.1"
name="eventCRENotification">
5. Use the following table to help you update the variable binding information:
Each variable binding associates a particular MIB object instance with its
current value.
Table 82. Value types for variable binding
Value
type Description Example
string Alphanumeric
characters
6. For each of the value types, include any of the following fields:
Table 83. Fields for the variable bindings
Field Description Example
Native For more information Example: 1If the value type is ipAddress, you must use
about these fields, see a variable that is an IP address. The string value type
the accepts any format.
/opt/qradar/conf/
snmp.help file.
Custom Custom SNMP trap Example: 1If you used the default file information and
information that you want to include this information in the SNMP trap,
configured for the include the following code:
custom rules wizard <variableBinding name="My Color Variable Binding"
OID="1.3.6.1.4.1.20212.3.1" type="string">
My favorite color
is %MyColor%</variableBinding>
1
Surround the field name with percentage (%) signs. Within the percentage signs, fields
must match the value type.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/conf directory.
3. Create an SNMP settings file for the new trap.
Example:
<include name="Custom_Event_Name" uri="customSNMPdef01.xml"/>
The traps are displayed in the menu in the same order in which they are
listed in the snmp-master.xml file.
7. Save and close the file.
8. Copy the file from the /opt/qradar/conf directory to the /store/
configservices/staging/globalconfig directory.
9. Log in to the QRadar interface.
10. On the Admin tab, select Advanced > Deploy Full Configuration.
When you deploy the full configuration, QRadar restarts all services. Data
collection for events and flows stops until the deployment completes.
Procedure
1. Use SSH to log in to QRadar as the root user.
2. Go to the /opt/qradar/conf directory and make backup copies of the following
files:
v eventCRE.snmp.xml
v offenseCRE.snmp.xml
3. Open the configuration file for editing.
v To edit the SNMP parameters for event rules, open the eventCRE.snmp.xml
file.
v To edit the SNMP parameters for offense rules, open the
offenseCRE.snmp.xml file.
4. Add no more than one <trapConfig> element inside the <snmp>
element inside the <creSNMPTrap> element and before any other child
elements.
<trapConfig>
<!-- All attribute values are default -->
<snmpHost snmpVersion="3" port="162" retries="2" timeout="500">HOST
</snmpHost>
<!-- Community String for Version 2 -->
<communityString>COMMUNITY_STRING</communityString>
<!-- authenticationProtocol (MD5 or SHA)securityLevel (AUTH_PRIV, AUTH_NOPRIV
or NOAUTH_PRIV) -->
Data obfuscation is the process of strategically hiding data from QRadar users. You
can hide custom properties, normalized properties, such as user names, or you can
hide the content of a payload, such as credit card or social security numbers.
The expressions in the data obfuscation profile are evaluated against the payload
and normalized properties. If the data matches the obfuscation expression, the data
is hidden in QRadar. Users who try to query the database directly cannot see the
sensitive data. The data must be reverted back to its original form, or deobfuscated,
by uploading the private key that was generated when the data obfuscation profile
was created.
To ensure that QRadar can still correlate on the hidden data values, the obfuscation
process is deterministic. It displays the same set of characters each time the data
value is found.
When a data obfuscation profile is enabled, the system masks the data for each
event as it is received by QRadar. Events that are received by the appliance before
data obfuscation is configured remain in the original unobfuscated state. The older
event data is not masked and users can see the information.
Assets
When data obfuscation is configured, the asset model accumulates data that is
masked while the pre-existing asset model data remains unmasked.
Offenses
To ensure that offenses do not display data that was previously unmasked, close
all existing offenses by resetting the SIM model. For more information, see
“Resetting SIM” on page 6.
Rules
You must update rules that depend on data that was previously unmasked. For
example, rules that are based on a specific user name do not fire when the user
name is obfuscated.
Log source extensions that change the format of the event payload can cause issues
with data obfuscation.
Use a field-based property to hide user names, group names, host names, and
NetBIOS names. Expressions that use field-based properties obfuscate all instances
of the data string. The data is hidden regardless of its log source, log source type,
event name, or event category.
If the same data value exists in more than one of the fields, the data is obfuscated
in all fields that contain the data even if you configured the profile to obfuscate
only one of the four fields. For example, if you have a host name that is called
IBMHost and a group name that is called IBMHost, the value IBMHost is obfuscated
in both the host name field and the group name field even if the data obfuscation
profile is configured to obfuscate only host names.
Regular expressions
Use a regular expression to obfuscate one data string in the payload. The data is
hidden only if it matches the log source, log source type, event name, or category
that is defined in the expression.
You can use high-level and low-level categories to create a regular expression that
is more specific than a field-based property. For example, you can use the
following regex patterns to parse user names:
Table 87. Regex user name parsing
Example regex patterns Matches
usrName=([0-9a-zA-Z]([-.\w]*[0-9a-zA-Z])*@([0-9 [email protected],
a-zA-Z][-\w]*[0-9a-zA-Z]\.)+[a-zA-Z]{2,20})$ [email protected], [email protected]
usrName=(^([\w]+[^\W])([^\W]\.?)([\w]+[^\W]$)) john.smith, John.Smith,
john, jon_smith
usrName=^([a-zA-Z])[a-zA-Z_-]*[\w_-]*[\S]$|^([a johnsmith, Johnsmith123,
-zA-Z])[0-9_-]*[\S]$|^[a-zA-Z]*[\S]$ john_smith123,
john123_smith, john-smith
usrName=(/S+) Matches any non-white space
after the equal, =, sign. This
regular expression is
non-specific and can lead to
system performance issues.
msg=([0-9a-zA-Z]([-.\w]*[0-9a-zA-Z]))*@\b(([01] Matches users with IP
?\d?\d|2[0-4]\d|25[0-5])\.){3}([01]?\d?\d|2[0-4 address. For example,
]\d|25[0-5])\b [email protected]
src=\b(([01]?\d?\d|2[0-4]\d|25[0-5])\.){3}([01] Matches IP address formats.
?\d?\d|2[0-4]\d|25[0-5])\b
host=^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]*[a hostname.ibm.com,
-zA-Z0-9])\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0- hostname.co.uk,
9\-]*[A-Za-z0-9])$
You can create a profile that creates a new keystore or you can use an existing
keystore. If you create a keystore, it must be downloaded and stored in a secure
location. Remove the keystore from the local system and store it in a location that
can be accessed only by users who are authorized to view the unmasked data.
Configuring profiles that use different keystores is useful when you want to limit
data access to different groups of users. For example, create two profiles that use
different keystores when you want one group of users to see user names and
another group of users to see host names.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources > Data Obfuscation Management.
3. To create a new profile, click Add and type a unique name and description for
the profile.
4. To create a new keystore for the profile, complete these steps:
a. Click System generate keystore.
b. In the Provider list box, select IBMJCE.
c. In the Algorithm list box, select JCE and select whether to generate 512-bit
or 1024-bit encryption keys. In the Keystore Certificate CN box, the fully
qualified domain name for the QRadar server is auto-populated.
d. In the Keystore password box, enter the keystore password. The keystore
password is required to protect the integrity of the keystore. The password
must be at least 8 characters in length.
e. In the Verify keystore password, retype the password.
5. To use an existing keystore with the profile, complete these steps:
a. Click Upload keystore.
b. Click Browse and select the keystore file.
c. In the Keystore password box, type the password for the keystore.
6. Click Submit.
7. Download the keystore. Remove the keystore from your system and store it in
a secure location.
What to do next
Create the data obfuscation expressions that target the data that you want to hide.
After an expression is created, you cannot change the type. For example, you
cannot create a property-based expression and then later change it to a regular
expression.
Multiple expressions that obfuscate the same data cause data to be obfuscated
twice. To decrypt data that is obfuscated multiple times, each keystore that is used
in the obfuscation process must be applied in the order that the obfuscation
occurred.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources > Data Obfuscation Management.
3. Click the profile that you want to configure, and click View Contents. You
cannot configure profiles that are locked.
4. To create a new data obfuscation expression, click Add and type a unique name
and description for the profile.
5. Select the Enabled check box to enable the profile.
6. To create a field-based expression, click Field Based and select the field type to
obfuscate.
7. To create a regular expression, click RegEx and configure the regex properties.
8. Click Save.
You must have the private key and the password for the key before you can
deobfuscate data. The private key must be on your local computer.
Before you can see the obfuscated data, you must upload the private key. After the
key is uploaded, it remains available on the system for the duration of the current
session. The session ends when you log out of QRadar, when the cache is cleared
on the QRadar console, or when there is an extended period of inactivity. When
the session ends, the private keys that were uploaded in the previous session are
no longer visible.
QRadar can use the keys available in the current session to automatically
deobfuscate data. With auto-deobfuscation enabled, you do not have to repeatedly
Procedure
1. On the Event Details page, find the data that you want to deobfuscate.
2. To deobfuscate identity-based data:
a. Click the lock icon next to the data that you want to deobfuscate.
b. In the Upload Key section, click Select File and select the keystore to
upload.
c. In the Password box, type the password that matches the keystore.
d. Click Upload.
The Deobfuscation window shows the event payload, the profile names that
are associated with the keystore, the obfuscated text, and the deobfuscated
text.
e. Optional: Click Toggle Auto Deobfuscate to enable auto-deobfuscation.
After you toggle the auto-deobfuscation setting, you must refresh the
browser window and reload the event details page for the changes to
appear.
3. To deobfuscate payload data that is not identity-based:
a. On the toolbar on the Event Details page, click Obfuscation >
Deobfuscation keys.
b. In the Upload Key section, click Select File and select the private key to
upload.
c. In the Password box, type the password that matches the private key and
click Upload.
d. In the Payload information box, select and copy the obfuscated text to the
clipboard.
e. On the toolbar on the Event Details page, click Obfuscation >
Deobfuscation.
f. Paste the obfuscated text in to dialog box.
g. Select the obfuscation profile from the drop-down list and click
Deobfuscate.
Although you can see the expressions, you cannot edit or disable data obfuscation
expressions that were created in earlier versions. You must manually disable them
and create a data obfuscation profile that contains the revised expressions.
Procedure
1. Use SSH to log in to your QRadar console as the root user.
2. Edit the obfuscation expressions .xml configuration file that you created when
you configured the expressions.
3. For each expression that you want to disable, change the Enabled attribute to
false.
4. To disable the expressions, run the obfuscation_updater.sh script by typing the
following command:
obfuscation_updater.sh [-p <path_to_private_key>] [-e
<path_to_obfuscation_xml_config_file>]
The obfuscation_updater.sh script is in the /opt/qradar/bin directory, but you
can run the script from any directory on your QRadar console.
What to do next
The following log files can help you identify and resolve problems when they
occur:
v /var/log/qradar.log
v /var/log/qradar.error
v /var/log/qradar-sql.log
v /opt/tomcat6/logs/catalina.out
v /var/log/qflow.debug
If you want to collect the QRadar log files and review them later, see “Collecting
log files” on page 45.
Audit logs
Changes that are made by QRadar users are recorded in the audit logs.
You can view the audit logs to monitor changes to QRadar and the users who
change settings.
All audit logs are stored in plain text and are archived and compressed when the
audit log file reaches 200 MB. The current log file is named audit.log. When the
file reaches 200 MB, the file is compressed and renamed to audit.1.gz. The file
number increments each time that a log file is archived. QRadar stores up to 50
archived log files.
You can use Log Activity tab to view normalized audit log events.
The maximum size of any audit message, excluding date, time, and host name, is
1024 characters.
Each entry in the log file displays by using the following format:
Procedure
1. Using SSH, log in to QRadar as the root user:
2. User Name: root
3. Password: password
4. Go to the following directory:
/var/log/audit
5. Open and view the audit log file.
Logged actions
Understand the content of QRadar audit log file int the /var/log/audit directory.
The audit log file contains logged actions.
The following list describes the categories of actions that are in the audit log file:
Administrator Authentication
v Log in to the Administration Console.
v Log out of the Administration Console.
Assets
v Delete an asset.
v Delete all assets.
Audit Log Access
A search that includes events that have a high-level event category of
Audit.
Backup and Recovery
v Edit the configuration.
v Initiate the backup.
v Complete the backup.
v Fail the backup.
v Delete the backup.
Events that occur on your network are aggregated into high-level and low-level
categories. Each high-level category contains low-level categories and an associated
severity level. You can review the severity levels that are assigned to events and
adjust them to suit your corporate policy needs.
Categorizing the incoming events ensures that you can easily search the data..
Recon
The Recon category contains events that are related to scanning and other
techniques that are used to identify network resources.
The following table describes the low-level event categories and associated severity
levels for the Recon category.
Table 90. Low-level categories and severity levels for the Recon events category
Low-level event category Description Severity level (0 - 10)
Unknown Form of Recon An unknown form of 2
reconnaissance.
Application Query Reconnaissance to 3
applications on your system.
Host Query Reconnaissance to a host in 3
your network.
Network Sweep Reconnaissance on your 4
network.
Mail Reconnaissance Reconnaissance on your mail 3
system.
DoS
The DoS category contains events that are related to denial-of-service (DoS) attacks
against services or hosts.
The following table describes the low-level event categories and associated severity
levels for the DoS category.
Table 91. Low-level categories and severity levels for the DoS events category
Low-level event category Description Severity level (0 - 10)
Unknown DoS Attack Indicates an unknown DoS 8
attack.
Authentication
The authentication category contains events that are related to authentication,
sessions, and access controls that monitor users on the network.
The following table describes the low-level event categories and associated severity
levels for the authentication category.
Table 92. Low-level categories and severity levels for the authentication events category
Low-level event category Description Severity level (0 - 10)
Unknown Authentication Indicates unknown 1
authentication.
Host Login Succeeded Indicates a successful host 1
login.
Host Login Failed Indicates that the host login 3
failed.
Misc Login Succeeded Indicates that the login 1
sequence succeeded.
Misc Login Failed Indicates that login sequence 3
failed.
Privilege Escalation Failed Indicates that the privileged 3
escalation failed.
Access
The access category contains authentication and access controls that are used for
monitoring network events.
Exploit
The exploit category contains events where a communication or an access exploit
occurred.
The following table describes the low-level event categories and associated severity
levels for the exploit category.
Malware
The malicious software (malware) category contains events that are related to
application exploits and buffer overflow attempts.
The following table describes the low-level event categories and associated severity
levels for the malware category.
Table 95. Low-level categories and severity levels for the malware events category
Low-level event category Description Severity level (0 - 10)
Unknown Malware Indicates an unknown virus. 4
Backdoor Detected Indicates that a back door to 9
the system was detected.
Hostile Mail Attachment Indicates a hostile mail 6
attachment.
Malicious Software Indicates a virus. 6
Hostile Software Download Indicates a hostile software 6
download to your network.
Virus Detected Indicates that a virus was 8
detected.
Misc Malware Indicates miscellaneous 4
malicious software
Trojan Detected Indicates that a trojan was 7
detected.
Spyware Detected Indicates that spyware was 6
detected on your system.
Content Scan Indicates that an attempted 3
scan of your content was
detected.
Content Scan Failed Indicates that a scan of your 8
content failed.
Suspicious Activity
The suspicious category contains events that are related to viruses, trojans, back
door attacks, and other forms of hostile software.
The following table describes the low-level event categories and associated severity
levels for the suspicious activity category.
Table 96. Low-level categories and severity levels for the suspicious activity events category
Low-level event category Description Severity level (0 - 10)
Unknown Suspicious Event Indicates an unknown 3
suspicious event.
Suspicious Pattern Detected Indicates that a suspicious 3
pattern was detected.
Content Modified By Indicates that content was 3
Firewall modified by the firewall.
Invalid Command or Data Indicates an invalid 3
command or data.
Suspicious Packet Indicates a suspicious packet. 3
Suspicious Activity Indicates suspicious activity. 3
Suspicious File Name Indicates a suspicious file 3
name.
Suspicious Port Activity Indicates suspicious port 3
activity.
Suspicious Routing Indicates suspicious routing. 3
Potential Web Vulnerability Indicates potential web 3
vulnerability.
Unknown Evasion Event Indicates an unknown 5
evasion event.
IP Spoof Indicates an IP spoof. 5
IP Fragmentation Indicates IP fragmentation. 3
System
The system category contains events that are related to system changes, software
installation, or status messages.
The following table describes the low-level event categories and associated severity
levels for the system category.
Policy
The policy category contains events that are related to administration of network
policy and the monitoring network resources for policy violations.
The following table describes the low-level event categories and associated severity
levels for the policy category.
Table 98. Low-level categories and severity levels for the policy category
Low-level event category Description Severity level (0 - 10)
Unknown Policy Violation Indicates an unknown policy 2
violation.
Unknown
The Unknown category contains events that are not parsed and therefore cannot be
categorized.
The following table describes the low-level event categories and associated severity
levels for the Unknown category.
CRE
The custom rule event (CRE) category contains events that are generated from a
custom offense, flow, or event rule.
The following table describes the low-level event categories and associated severity
levels for the CRE category.
Table 100. Low-level categories and severity levels for the CRE category
Low-level event category Description Severity level (0 - 10)
Unknown CRE Event Indicates an unknown 5
custom rules engine event.
Single Event Rule Match Indicates a single event rule 5
match.
Event Sequence Rule Match Indicates an event sequence 5
rule match.
Cross-Offense Event Indicates a cross-offense 5
Sequence Rule Match event sequence rule match.
Offense Rule Match Indicates an offense rule 5
match.
Potential Exploit
The potential exploit category contains events that are related to potential
application exploits and buffer overflow attempts.
User Defined
The User Defined category contains events that are related to user-defined objects
SIM Audit
The SIM Audit category contains events that are related to user interaction with
the QRadar Console and administrative features.
The following table describes the low-level event categories and associated severity
levels for the SIM Audit category.
Table 103. Low-level categories and severity levels for the SIM Audit category
Low-level event category Description Severity level (0 - 10)
SIM User Authentication Indicates a user login or 5
logout on the Console.
SIM Configuration Change Indicates that a user changed 3
the SIM configuration or
deployment.
SIM User Action Indicates that a user initiated 3
a process, such as starting a
backup or generating a
report, in the SIM module.
Session Created Indicates that a user session 3
was created.
Session Destroyed Indicates that a user session 3
was destroyed.
Admin Session Created Indicates that an admin
session was created.
Admin Session Destroyed Indicates that an admin 3
session was destroyed.
Session Authentication Indicates an invalid session 5
Invalid authentication.
Session Authentication Indicates that a session 3
Expired authentication expired.
Risk Manager Configuration Indicates that a user changed 3
the IBM Security QRadar
Risk Manager configuration.
The following table describes the low-level event categories and associated severity
levels for the VIS host discovery category.
Table 104. Low-level categories and severity levels for the VIS host discovery category
Low-level event category Description Severity level (0 - 10)
New Host Discovered Indicates that the VIS 3
component detected a new
host.
New Port Discovered Indicates that the VIS 3
component detected a new
open port.
New Vuln Discovered Indicates that the VIS 3
component detected a new
vulnerability.
New OS Discovered Indicates that the VIS 3
component detected a new
operating system on a host.
Bulk Host Discovered Indicates that the VIS 3
component detected many
new hosts in a short period.
Application
The application category contains events that are related to application activity,
such as email or FTP activity.
The following table describes the low-level event categories and associated severity
levels for the application category.
Table 105. Low-level categories and severity levels for the application category
Low-level event category Description Severity level (0 - 10)
Mail Opened Indicates that an email 1
connection was established.
Mail Closed Indicates that an email 1
connection was closed.
Mail Reset Indicates that an email 3
connection was reset.
Mail Terminated Indicates that an email 4
connection was terminated.
Mail Denied Indicates that an email 4
connection was denied.
Mail in Progress Indicates that an email 1
connection is being
attempted.
Mail Delayed Indicates that an email 4
connection was delayed.
Audit
The audit category contains events that are related to audit activity, such as email
or FTP activity.
The following table describes the low-level event categories and associated severity
levels for the audit category.
Table 106. Low-level categories and severity levels for the audit category
Low-level event category Description Severity level (0 - 10)
General Audit Event Indicates that a general audit 1
event was started.
Built-in Execution Indicates that a built-in audit 1
task was run.
Bulk Copy Indicates that a bulk copy of 1
data was detected.
Data Dump Indicates that a data dump 1
was detected.
Risk
The risk category contains events that are related to IBM Security QRadar Risk
Manager.
The following table describes the low-level event categories and associated severity
levels for the risk category.
Table 107. Low-level categories and severity levels for the risk category
Low-level event category Description Severity level (0 - 10)
Policy Exposure Indicates that a policy 5
exposure was detected.
Compliance Violation Indicates that a compliance 5
violation was detected.
Exposed Vulnerability Indicates that the network or 9
device has an exposed
vulnerability.
Remote Access Vulnerability Indicates that the network or 9
device has a remote access
vulnerability.
Local Access Vulnerability Indicates that the network or 7
device has local access
vulnerability.
Open Wireless Access Indicates that the network or 5
device has open wireless
access.
Weak Encryption Indicates that the host or 5
device has weak encryption.
Un-Encrypted Data Transfer Indicates that a host or 3
device is transmitting data
that is not encrypted.
Un-Encrypted Data Store Indicates that the data store 3
is not encrypted.
The following table describes the low-level event categories and associated severity
levels for the Risk Manager audit category.
Table 108. Low-level categories and severity levels for the Risk Manager audit category
Low-level event category Description Severity level (0 - 10)
Policy Monitor Indicates that a policy 3
monitor was modified.
Topology Indicates that a topology was 3
modified.
Simulations Indicates that a simulation 3
was modified.
Administration Indicates that administrative 3
changes were made.
The following table describes the low-level event categories and associated severity
levels for the control category.
Table 109. Low-level categories and severity levels for the control category
Low-level event category Description Severity level (0 - 10)
Device Read Indicates that a device was 1
read.
Device Communication Indicates communication 1
with a device.
Device Audit Indicates that a device audit 1
occurred.
Device Event Indicates that a device event 1
occurred.
Device Ping Indicates that a ping action 1
to a device occurred.
Device Configuration Indicates that a device was 1
configured.
Device Route Indicates that a device route 1
action occurred.
Device Import Indicates that a device 1
import occurred.
Device Information Indicates that a device 1
information action occurred.
Device Warning Indicates that a warning was 1
generated on a device.
Device Error Indicates that an error was 1
generated on a device.
Relay Event Indicates a relay event. 1
NIC Event Indicates a Network Interface 1
Card (NIC) event.
UIQ Event Indicates an event on a 1
mobile device.
IMU Event Indicates an event on an 1
Integrated Management Unit
(IMU).
Billing Event Indicates a billing event. 1
DBMS Event Indicates an event on the 1
Database Management
System (DBMS).
Import Event Indicates that an import 1
occurred.
Location Import Indicates that a location 1
import occurred.
Route Import Indicates that a route import 1
occurred.
Asset Profiler
The asset profiler category contains events that are related to asset profiles.
The following table describes the low-level event categories and associated severity
levels for the asset profiler category.
Table 110. Low-level categories and severity levels for the asset profiler category
Low-level event category Description Severity level (0 - 10)
Asset Created Indicates that an asset was 1
created.
Asset Updated Indicates that an asset was 1
updated.
Asset Observed Indicates that an asset was 1
observed.
Asset Moved Indicates that an asset was 1
moved.
Asset Deleted Indicates that an asset was 1
deleted.
Asset Hostname Cleaned Indicates that a host name 1
was cleaned.
Asset Hostname Created Indicates that a host name 1
was created.
Asset Hostname Updated Indicates that a host name 1
was updated.
All the ports that are used by the QRadar console to communicate with managed
hosts can be tunneled, by encryption, through port 22 over SSH.
The console connects to the managed hosts using an encrypted SSH session to
communicate securely. These SSH sessions are initiated from the console to provide
data to the managed host. For example, the QRadar Console can initiate multiple
SSH sessions to the Event Processor appliances for secure communication. This
communication can include tunneled ports over SSH, such as HTTPS data for port
443 and Ariel query data for port 32006. QRadar QFlow Collectors that use
encryption can initiate SSH sessions to Flow Processor appliances that require data.
Installing additional software on your system may open ports that are not required
by QRadar. For example, you might find additional ports open in the following
situations:
v When you install QRadar on your own hardware, you may see open ports that
are used by services, daemons, and programs included in Red Hat Enterprise
Linux.
v When you mount or export a network file share, you might see dynamically
assigned ports that are required for RPC services, such as rpc.mountd and
rpc.rquotad.
v When you install third-party backup and recovery software, such as Veritas
NetBackup, you might see open ports that are required for processes such as
bpcd and pbx_exchange.
If you see open ports on your system that are not listed in QRadar documentation,
refer to the vendor documentation for the other software that is installed on your
system.
WinCollect agents that remotely poll other Microsoft Windows operating systems
might require additional port assignments.
The following table shows the QRadar ports that are open in a LISTEN state. The
LISTEN ports are valid only when iptables is enabled on your system. Unless
otherwise noted, information about the assigned port number applies to all
QRadar products.
Table 111. Listening ports that are used by QRadar services and components
Port Description Protocol Direction Requirement
22 SSH TCP Bidirectional from the Remote management
QRadar Console to all other access.
components.
Adding a remote
system as a managed
host.
High-availability
(HA).
25 SMTP TCP From all managed hosts to Emails from QRadar
the SMTP gateway. to an SMTP gateway.
QRadar managed
hosts that connect to
the QRadar Console.
Random port associations are not static port numbers. If a service is restarted, the
ports generated for the service are reallocated and the service is provided with a
new set of port numbers.
Procedure
1. Using SSH, log in to the QRadar Console as the root user.
2. To display a list of associated ports for the IMQ messaging connection, type the
following command:
telnet localhost 7676
telnet localhost 7677
3. If no information is displayed, press the Enter key to close the connection.
Procedure
1. Using SSH, log in to your QRadar Console, as the root user.
2. To display all active connections and the TCP and UDP ports on which the
computer is listening, type the following command:
netstat -nap
3. To search for specific information from the netstat port list, type the following
command:
netstat -nap | grep port
Examples:
v To display all ports that match 199, type the following command:
netstat -nap | grep 199
v To display information on all listening ports, type the following command:
netstat -nap | grep LISTEN
feeder.create_feed&feeder.feedtype=RSS
&feeder.uid=270006EH0R
&feeder.subscrid=
S14b5f284d32
&feeder.subdefkey=swgother
&feeder.maxfeed=25
Security News http://IP_address_of_QVM_processor IBM Security QRadar
Vulnerability Manager
:8844/rss/research/news.rss processor is deployed
Security http://IP_address_of_QVM_processor QRadar Vulnerability Manager
Advisories processor is deployed
:8844/rss/research/advisories.rss
Latest http://IP_address_of_QVM_processor QRadar Vulnerability Manager
Published processor deployed
Vulnerabilities :8844/rss/research/vulnerabilities.rss
Scans http://IP_address_of_QVM_processor QRadar Vulnerability Manager
Completed processor is deployed
:8844/rss/scanresults/completedScans.rss
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
170 Tracer Lane,
Waltham MA 02451, USA
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Depending upon the configurations deployed, this Software Offering may use
session cookies that collect each user’s session id for purposes of session
management and authentication. These cookies can be disabled, but disabling them
will also eliminate the functionality they enable.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, See IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details the
section entitled “Cookies, Web Beacons and Other Technologies” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
Notices 335
336 QRadar SIEM Administration Guide
Glossary
This glossary provides terms and definitions for derived by the examination of packet
the [product name] software and products. payload and then used to identify a
specific application.
The following cross-references are used in this
ARP See Address Resolution Protocol.
glossary:
v See refers you from a nonpreferred term to the ARP Redirect
preferred term or from an abbreviation to the An ARP method for notifying the host if a
spelled-out form. problem exists on a network.
v See also refers you to a related or contrasting ASN See autonomous system number.
term.
asset A manageable object that is either
deployed or intended to be deployed in
For other terms and definitions, see the IBM
an operational environment.
Terminology website (opens in new window).
autonomous system number (ASN)
“A” “B” “C” “D” on page 338 “E” on page 338 In TCP/IP, a number that is assigned to
“F” on page 338 “G” on page 339 “H” on page an autonomous system by the same
339 “I” on page 339 “K” on page 340 “L” on page central authority that assigns IP
340 “M” on page 340 “N” on page 340 “O” on addresses. The autonomous system
page 341 “P” on page 341 “Q” on page 341 “R” number makes it possible for automated
on page 341 “S” on page 342 “T” on page 342 routing algorithms to distinguish
“V” on page 343 “W” on page 343 autonomous systems.
A B
accumulator behavior
A register in which one operand of an The observable effects of an operation or
operation can be stored and subsequently event, including its results.
replaced by the result of that operation.
bonded interface
active system See link aggregation.
In a high-availability (HA) cluster, the
burst A sudden sharp increase in the rate of
system that has all of its services running.
incoming events or flows such that the
Address Resolution Protocol (ARP) licensed flow or event rate limit is
A protocol that dynamically maps an IP exceeded.
address to a network adapter address in a
local area network.
C
administrative share
A network resource that is hidden from CIDR See Classless Inter-Domain Routing.
users without administrative privileges. Classless Inter-Domain Routing (CIDR)
Administrative shares provide A method for adding class C Internet
administrators with access to all resources Protocol (IP) addresses. The addresses are
on a network system. given to Internet Service Providers (ISPs)
anomaly for use by their customers. CIDR
A deviation from the expected behavior of addresses reduce the size of routing tables
the network. and make more IP addresses available
within organizations.
application signature
A unique set of characteristics that are client A software program or computer that
requests services from a server.
Glossary 339
log source
K Either the security equipment or the
key file network equipment from which an event
In computer security, a file that contains log originates.
public keys, private keys, trusted roots, log source extension
and certificates. An XML file that includes all of the
regular expression patterns required to
L identify and categorize events from the
event payload.
L2L See Local To Local.
L2R See Local To Remote. M
LAN See local area network. magistrate
LDAP See Lightweight Directory Access An internal component that analyzes
Protocol. network traffic and security events
against defined custom rules.
leaf In a tree, an entry or node that has no
children. magnitude
A measure of the relative importance of a
Lightweight Directory Access Protocol (LDAP) particular offense. Magnitude is a
An open protocol that uses TCP/IP to weighted value calculated from relevance,
provide access to directories that support severity, and credibility.
an X.500 model and that does not incur
the resource requirements of the more
complex X.500 Directory Access Protocol N
(DAP). For example, LDAP can be used to
NAT See network address translation.
locate people, organizations, and other
resources in an Internet or intranet NetFlow
directory. A Cisco network protocol that monitors
network traffic flow data. NetFlow data
link aggregation
includes the client and server information,
The grouping of physical network
which ports are used, and the number of
interface cards, such as cables or ports,
bytes and packets that flow through the
into a single logical network interface.
switches and routers connected to a
Link aggregation is used to increase
network. The data is sent to NetFlow
bandwidth and network availability.
collectors where data analysis takes place.
live scan
network address translation (NAT)
A vulnerability scan that generates report
In a firewall, the conversion of secure
data from the scan results based on the
Internet Protocol (IP) addresses to
session name.
external registered addresses. This enables
local area network (LAN) communications with external networks
A network that connects several devices but masks the IP addresses that are used
in a limited area (such as a single inside the firewall.
building or campus) and that can be
network hierarchy
connected to a larger network.
A type of container that is a hierarchical
Local To Local (L2L) collection of network objects.
Pertaining to the internal traffic from one
network layer
local network to another local network.
In OSI architecture, the layer that
Local To Remote (L2R) provides services to establish a path
Pertaining to the internal traffic from one between open systems with a predictable
local network to another remote network. quality of service.
network object
A component of a network hierarchy.
Glossary 341
Remote To Local (R2L) SOAP can be used to query and return
The external traffic from a remote information and invoke services across
network to a local network. the Internet.
Remote To Remote (R2R) standby system
The external traffic from a remote A system that automatically becomes
network to another remote network. active when the active system fails. If disk
replication is enabled, replicates data from
report In query management, the formatted data
the active system.
that results from running a query and
applying a form to it. subnet
See subnetwork.
report interval
A configurable time interval at the end of subnet mask
which the event processor must send all For internet subnetworking, a 32-bit mask
captured event and flow data to the used to identify the subnetwork address
console. bits in the host portion of an IP address.
routing rule subnetwork (subnet)
A condition that when its criteria are A network that is divided into smaller
satisfied by event data, a collection of independent subgroups, which still are
conditions and consequent routing are interconnected.
performed.
sub-search
rule A set of conditional statements that A function that allows a search query to
enable computer systems to identify be performed within a set of completed
relationships and run automated search results.
responses accordingly.
superflow
A single flow that is comprised of
S multiple flows with similar properties in
order to increase processing capacity by
scanner reducing storage constraints.
An automated security program that
searches for software vulnerabilities system view
within web applications. A visual representation of both primary
and managed hosts that compose a
secondary HA host system.
The standby computer that is connected
to the HA cluster. The secondary HA host
assumes responsibility of the primary HA T
host if the primary HA host fails.
TCP See Transmission Control Protocol.
severity
Transmission Control Protocol (TCP)
A measure of the relative threat that a
A communication protocol used in the
source poses on a destination.
Internet and in any network that follows
Simple Network Management Protocol (SNMP) the Internet Engineering Task Force (IETF)
A set of protocols for monitoring systems standards for internetwork protocol. TCP
and devices in complex networks. provides a reliable host-to-host protocol in
Information about managed devices is packet-switched communication networks
defined and stored in a Management and in interconnected systems of such
Information Base (MIB). networks. See also Internet Protocol.
SNMP truststore file
See Simple Network Management A key database file that contains the
Protocol. public keys for a trusted entity.
SOAP A lightweight, XML-based protocol for
exchanging information in a
decentralized, distributed environment.
W
whois server
A server that is used to retrieve
information about a registered Internet
resources, such as domain names and IP
address allocations.
Glossary 343
344 QRadar SIEM Administration Guide
Index
A backup and recovery
about 111
D
about 13 deleting backup archives 112 data
access category importing backup archives 112 obfuscation
description 273 initiating backup 115 decrypting 249
accumulator restoring configuration restoring 120
configuring 139 information 115 data node
description 123 scheduling backups 113 archiving data 133
admin tab viewing backup archive 112 save event processor data 133
using 5 Data Node
Admin tab 3 rebalance progress, viewing 133
aggregated data views data obfuscation
deleting 7 C creating a profile 248
disabling 7 changes creating expressions 249
enabling 7 deploying 5 overview 245
managing 7 collecting log files 46 deleting 14, 60
application category commands deleting a security profile 18
description 291 description 106 deleting a store and forward
Ariel database components 142 schedule 222
right-click actions 77 configuration 49, 53 deleting backup archives 112
asset properties, custom configuring 21, 22, 24, 55 deploying changes 5
configuring 95 forwarding profiles 210 deployment editor
Asset retention values, overview 78 system configuration 21 configuring editor preferences 124
audit category configuring Microsoft Active creating your deployment 125
description 311 Directory 23 description 123
audit log content event view 126
viewing 253 importing 232 QRadar components 142
audit log file content capture 143 requirements 123, 125
logged actions 254 content management tool system view 134
audit logs custom content item, exporting 228 disabling account 19
description 253 custom content items, exporting discovering servers 171
authentication 21, 22, 23, 24 multiple 230 domains
Active Directory 21 custom content, exporting all of a creating 175
LDAP 21, 23 specific type 225 custom properties 180
overview 20 custom content, importing 232 default domain 176
RADIUS 21 existing content, updating 233 domain-aware searches 176
supported authentication exporting a single custom content overlapping IP addresses 173
providers 20 item 228 rules and offenses 178
system 21 exporting all custom content of a segmenting your network 173
TACACS 21 specific type 225 tagging events and flows 173
authentication category exporting multiple custom content user-defined domains 176
description 266 items 230 using security profiles 176
authorization importing custom content 232 DoS category
synchronizing data with LDAP searching for custom content 227 description 263
server 27 update 233 duplicating a security profile 18
authorized services CRE category
about 109 custom rule event
adding 110
revoking 110
See CRE
description 286
E
create 16 edit 17
token 109
create user information source 58 editing 14, 59
viewing 109
creating 13, 58 editing a store and forward
auto detection 143
creating a new store and forward schedule 222
automatic update 69
schedule 221 email, custom notifications 91
about 67
creating account 19 encryption 134
scheduling 70
custom rules event categories
autoupdate log 72
event forwarding 213 description 261
custom rules wizard event category correlation
access category 273
B adding SNMP traps 241
configuring SNMP traps 239 application category 291
backing up your information 112 audit category 311
authentication category 266
F
flow configuration 157 J O
flow retention obfuscation
J-Flow 156
configuring 86 data
deleting 90 decrypting 249
editing 89 off-site source 130
enabling and disabling 89 L off-site target 130
managing 89 LDAP offense close reason 94
sequencing 89 authentication 23 offenses
flow source displaying user information 28 domain-aware 178
about 153 synchronizing data 27 overlapping IP addresses
adding aliases 161 license domain segmentation 173
adding flow source 157 license status 40 overview 53
deleting aliases 161 license allocation 41 RESTful API 8
Index 347
user management (continued)
authentication 20
user management window
parameters 34
user management window toolbar 35
user role 13
user role management 30
user roles 13
users 13, 19
V
variable binding
SNMP traps 240
view backup archives 111
viewing backup archives 112
viewing the schedule list 217
VIS host discovery category
description 291
W
what's new 1
Printed in USA