B Qradar Users Guide PDF
B Qradar Users Guide PDF
B Qradar Users Guide PDF
Version 7.3.3
User Guide
IBM
Note
Before you use this information and the product that it supports, read the information in “Notices” on
page 201.
Product information
This document applies to IBM® QRadar® Security Intelligence Platform V7.3.3 and subsequent releases unless
superseded by an updated version of this document.
© Copyright International Business Machines Corporation 2012, 2019.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
Introduction......................................................................................................... ix
iii
Chapter 4. Offense management.......................................................................... 33
Offense prioritization................................................................................................................................. 33
Offense chaining........................................................................................................................................ 33
Offense indexing........................................................................................................................................ 34
Offense indexing considerations......................................................................................................... 34
Example: Detecting malware outbreaks based on the MD5 signature.............................................. 35
Offense retention....................................................................................................................................... 35
Protecting offenses.............................................................................................................................. 36
Unprotecting offenses..........................................................................................................................36
Offense investigations............................................................................................................................... 36
Selecting an offense to investigate......................................................................................................37
Investigating an offense by using the summary information..............................................................39
Investigating events............................................................................................................................. 43
Investigating flows............................................................................................................................... 43
Offense actions.......................................................................................................................................... 44
Adding notes.........................................................................................................................................44
Hiding offenses.....................................................................................................................................45
Showing hidden offenses..................................................................................................................... 45
Closing offenses................................................................................................................................... 45
Exporting offenses................................................................................................................................46
Assigning offenses to users................................................................................................................. 47
Sending email notifications..................................................................................................................47
Marking an offense for follow-up.........................................................................................................48
Chapter 7. Using the False Positive Tuning function to prevent false positive
flows from creating offenses............................................................................ 75
iv
Chapter 9. Asset Management............................................................................. 79
Sources of asset data................................................................................................................................ 79
Incoming asset data workflow.................................................................................................................. 81
Updates to asset data................................................................................................................................83
Asset reconciliation exclusion rules.................................................................................................... 83
Example: Asset exclusion rules that are tuned to exclude IP addresses from the blacklist............. 84
Asset merging.......................................................................................................................................85
Identification of asset growth deviations..................................................................................................86
System notifications that indicate asset growth deviations............................................................... 86
Example: How configuration errors for log source extensions can cause asset growth
deviations........................................................................................................................................ 87
Troubleshooting asset profiles that exceed the normal size threshold............................................. 87
New asset data is added to the asset blacklists................................................................................. 88
Asset blacklists and whitelists.................................................................................................................. 88
Asset blacklists.....................................................................................................................................88
Asset whitelists.................................................................................................................................... 89
Asset profiles............................................................................................................................................. 90
Vulnerabilities.......................................................................................................................................90
Assets tab overview............................................................................................................................. 90
Viewing an asset profile....................................................................................................................... 91
Adding or editing an asset profile........................................................................................................ 93
Searching asset profiles from the Asset page on the Assets tab....................................................... 96
Saving asset search criteria................................................................................................................. 97
Asset search groups............................................................................................................................. 98
Asset profile management tasks....................................................................................................... 100
Research asset vulnerabilities...........................................................................................................101
v
Searching offenses on the By Networks page of the Offense tab...................................................142
Saving search criteria on the Offenses tab that you can reuse for future searches........................142
Searching for offenses that are indexed on a custom property........................................................143
Finding IOCs quickly with lazy search.....................................................................................................144
Deleting search criteria........................................................................................................................... 144
Using a subsearch to refine search results.............................................................................................145
Managing searches.................................................................................................................................. 146
Canceling a search............................................................................................................................. 146
Deleting a search................................................................................................................................146
Managing search groups..........................................................................................................................147
Viewing search groups....................................................................................................................... 147
Creating a new search group............................................................................................................. 148
Editing a search group....................................................................................................................... 148
Copying a saved search to another group......................................................................................... 148
Removing a group or a saved search from a group........................................................................... 149
Search example: Daily employee reports............................................................................................... 149
vi
Deleting generated content.....................................................................................................................194
Manually generating a report.................................................................................................................. 194
Duplicating a report................................................................................................................................. 195
Sharing a report....................................................................................................................................... 195
Branding reports...................................................................................................................................... 195
Report groups.......................................................................................................................................... 196
Creating a report group...................................................................................................................... 196
Editing a group................................................................................................................................... 197
Sharing report groups........................................................................................................................ 197
Assign a report to a group..................................................................................................................198
Copying a report to another group.....................................................................................................198
Removing a report..............................................................................................................................198
Notices..............................................................................................................201
Trademarks..............................................................................................................................................202
Terms and conditions for product documentation................................................................................. 202
IBM Online Privacy Statement................................................................................................................ 203
General Data Protection Regulation........................................................................................................203
Glossary............................................................................................................ 205
A............................................................................................................................................................... 205
B............................................................................................................................................................... 205
C............................................................................................................................................................... 206
D............................................................................................................................................................... 206
E............................................................................................................................................................... 207
F................................................................................................................................................................207
G............................................................................................................................................................... 207
H............................................................................................................................................................... 208
I................................................................................................................................................................ 208
K............................................................................................................................................................... 209
L................................................................................................................................................................209
M...............................................................................................................................................................209
N............................................................................................................................................................... 210
O............................................................................................................................................................... 210
P............................................................................................................................................................... 210
Q............................................................................................................................................................... 211
R............................................................................................................................................................... 211
S............................................................................................................................................................... 212
T................................................................................................................................................................212
V............................................................................................................................................................... 213
W.............................................................................................................................................................. 213
Index................................................................................................................ 215
vii
viii
About this guide
The IBM QRadar User Guide provides information on managing IBM QRadar SIEM including the
Dashboard, Offenses, Log Activity, Network Activity, Assets, and Reports tabs.
Intended audience
This guide is intended for all QRadar SIEM users responsible for investigating and managing network
security. This guide assumes that you have QRadar SIEM access and a knowledge of your corporate
network and networking technologies.
Technical documentation
For information about how to access more technical documentation, technical notes, and release notes,
see Accessing IBM Security QRadar Documentation (http://www.ibm.com/support/docview.wss?
rs=0&uid=swg21612861).
Learn more about visibility into MPLS flows received from IPFIX data
Learn more about identifying how application fields are set for a flow....
Some documentation, such as the Administration Guide and the User Guide, is common across multiple
products and might describe capabilities that are not available in your deployment. For example, IBM
QRadar on Cloud users do not have full administrative capabilities as described in the IBM QRadar
Administration Guide.
Procedure
1. In your Internet Explorer web browser, press F12 to open the Developer Tools window.
2. Click Browser Mode and select the version of your web browser.
3. Click Document Mode, and select the Internet Explorer standards for your Internet Explorer release.
RESTful API
The representational state transfer (REST) application programming interface (API) is useful when you
want to integrate IBM QRadar with other solutions. You can perform actions on the QRadar Console by
sending HTTPS requests to specific endpoints (URLs) on the QRadar Console.
Each endpoint contains the URL of the resource that you want to access and the action that you want to
complete on that resource. The action is indicated by the HTTP method of the request: GET, POST, PUT,
or DELETE. For more information about the parameters and responses for each endpoint, see the IBM
QRadar API Guide.
Related information
How to perform Network Analysis using QRadar SIEM Dashboard Items
Offenses tab
View offenses that occur on your network, which you can locate by using various navigation options or
through powerful searches.
From the Offenses tab, you can investigate an offense to determine the root cause of an issue, and then
work to resolve it.
Related concepts
Offense management
Related information
QRadar SIEM Investigation - Working with Offenses
Related concepts
Log Activity investigation
You can monitor and investigate events in real time or perform advanced searches.
Related information
QRadar SIEM Log Sources
QRadar SIEM Log Source Custom Properties
Related concepts
“Network activity monitoring” on page 73
Using the Network Activity tab, you can monitor and investigate network activity (flows) in real time or
conduct advanced searches.
Related information
IBM QRadar SIEM Foundations
QRadar SIEM Assets & Networks
Assets tab
QRadar automatically discovers assets, servers, and hosts that are operating on your network.
Automatic discovery is based on passive flow data and vulnerability data, allowing QRadar to build an
asset profile.
Asset profiles provide information about each known asset in your network, including identity
information, if available, and what services are running on each asset. This profile data is used for
correlation purposes to help reduce false positives.
For example, an attack tries to use a specific service that is running on a specific asset. In this situation,
QRadar can determine whether the asset is vulnerable to this attack by correlating the attack to the asset
profile. Using the Assets tab, you can view the learned assets or search for specific assets to view their
profiles.
Related information
QRadar SIEM Assets & Networks
Reports tab
Use the Reports tab to create, distribute, and manage reports for any data within QRadar.
Create customized reports for operational and executive use. Combine information (such as security or
network) into a single report. You can also use preinstalled report templates that are included with
QRadar.
You can also brand your reports with customized logos. This customization is beneficial for distributing
reports to different audiences.
Related concepts
Reports management
You can use the Reports tab to create, edit, distribute, and manage reports.
Viewing notifications
The Notifications menu provides access to a window in which you can read and manage your system
notifications.
Procedure
1. Log in to QRadar.
2. Click Notifications.
3. On the Messages window, view the system notification details.
4. To refine the list of system notifications, click one of the following options:
• Errors
• Warnings
• Info
5. To close system notifications, choose one of the following options:
Option Description
Dismiss All Info Click to close all system notifications.
Dismiss Click the Dismiss icon next to the system notification that you want to close.
6. To view the system notification details, hover over the system notification.
Related tasks
“Creating a custom rule” on page 159
Managing System Notifications
You can specify the number of notifications that you want to display on your System Notification
dashboard item and close system notifications after you read them.
Investigating IP addresses
You can use several methods to investigate information about IP addresses on the Dashboard, Log
Activity, and Network Activity tabs.
Procedure
1. Log in to QRadar.
2. Click the tab that you want to view.
3. Hover over an IP address to view the location of the IP address.
4. Right-click the IP address or asset name and select one of the following options:
Navigate > View by Network Displays the networks that are associated with
the selected IP address.
Navigate > View Source Summary Displays the offenses that are associated with the
selected source IP address.
Navigate > View Destination Summary Displays the offenses that are associated with the
selected destination IP address.
Information > DNS Lookup Searches for DNS entries that are based on the IP
address.
Information > WHOIS Lookup Searches for the registered owner of a remote IP
address. The default whois server is
whois.arin.net.
Information > Port Scan Performs a Network Mapper (NMAP) scan of the
selected IP address. This option is only available
if NMAP is installed on your system. For more
information about installing NMAP, see your
vendor documentation.
Information > Search Events Searches for events that are associated with this
IP address.
Information > Search Flows Searches for flows that are associated with this
IP address.
Information > Search Connections Searches for connections that are associated
with this IP address. This option is only displayed
if you purchased IBM QRadar Risk Manager and
connected QRadar and the IBM QRadar Risk
Manager appliance. For more information, see the
IBM QRadar Risk Manager User Guide.
Information > Switch Port Lookup Determines the switch port on a Cisco IOS device
for this IP address. This option applies only to
switches that are discovered by using the
Discover Devices option on the Risks tab.
Note: This menu option isn't available in QRadar
Log Manager.
Information > View Topology Displays the Risks tab, which depicts the layer 3
topology of your network. This option is available
if you purchased IBM QRadar Risk Manager and
connected QRadar and the IBM QRadar Risk
Manager appliance.
Run Vulnerability Scan Select the Run Vulnerability Scan option to scan
an IBM QRadar Vulnerability Manager scan on
this IP address. This option is only displayed
when IBM QRadar Vulnerability Manager has
been purchased and licensed. For more
information, see the IBM QRadar Vulnerability
Manager User Guide.
System time
The upper right of the QRadar console displays the system time, which is the local time on the console.
The console time synchronizes QRadar systems within the QRadar deployment. The console time is used
to determine what time events were received from other devices for correct time synchronization
correlation. In a distributed deployment, the console might be in a different time zone from your desktop
computer.
When you apply time-based filters and searches on the Log Activity and Network Activity tabs, you must
use the console system time to specify a time range.
Procedure
1. Click the user icon, and then click User Preferences to access your user information.
2. Update your preferences.
Option Description
Username Displays your user name. You cannot edit this field.
Email Address The email address must meet the following requirements:
• Minimum of 10 characters
• Maximum of 255 characters
Enable Popup If you want to enable pop-up system notifications to be displayed on your user
Notifications interface, select this check box.
3. Click Save.
Default dashboards
Use the default dashboard to customize your items into functional views. These functional views focus on
specific areas of your network.
The Dashboard tab provides five default dashboards that are focused on security, network activity,
application activity, system monitoring, and compliance.
Each dashboard displays a default that is set of dashboard items. The dashboard items act as starting
point to navigate to more detailed data. The following table defines the default dashboards.
Custom dashboards
You can customize your dashboards. The content that is displayed on the Dashboard tab is user-specific.
Changes that are made within a QRadar session affect only your system.
To customize your Dashboard tab, you can perform the following tasks:
• Create custom dashboards that are relevant to your responsibilities. 255 dashboards per user is the
maximum; however, performance issues might occur if you create more than 10 dashboards.
• Add and remove dashboard items from default or custom dashboards.
• Move and position items to meet your requirements. When you position items, each item automatically
resizes in proportion to the dashboard.
• Add custom dashboard items that are based on any data.
For example, you can add a dashboard item that provides a time series graph or a bar chart that
represents top 10 network activity.
To create custom items, you can create saved searches on the Network Activity or Log Activity tabs and
choose how you want the results that are represented in your dashboard. Each dashboard chart displays
real-time up-to-the-minute data. Time series graphs on the dashboard refresh every 5 minutes.
Flow search
You can display a custom dashboard item that is based on saved search criteria from the Network
Activity tab.
Flow search items are listed in the Add Item > Network Activity > Flow Searches menu. The name of
the flow search item matches the name of the saved search criteria the item is based on.
Default saved search criteria is available and is preconfigured to display flow search items on your
Dashboard tab menu. You can add more flow search dashboard items to your Dashboard tab menu. For
more information, see Adding search-based dashboard items to the Add Items list.
Offenses
You can add several offense-related items to your dashboard.
Note: Hidden or closed offenses are included in the values that are displayed in the Dashboard tab. For
more information about hidden or closed events, see Offense management.
The following table describes the Offense items:
Log activity
The Log Activity dashboard items will allow you to monitor and investigate events in real time.
Note: Hidden or closed events are not included in the values that are displayed in the Dashboard tab.
System summary
The System Summary dashboard item provides a high-level summary of activity within the past 24
hours.
Within the summary item, you can view the following information:
Procedure
1. Click the Dashboard tab.
2. On the toolbar, click New Dashboard.
3. Type a name and description for your policy compliance dashboard.
4. Click OK.
5. On the toolbar, select Add Item > Risk Manager > Risk.
Risk Manager dashboard items are displayed only when IBM QRadar Risk Manager is licensed.
6. On the header of the new dashboard item, click the yellow Settings icon.
7. Use the Chart Type, Display Top, and Sort lists to configure the chart.
8. From the Group list, select the group that you want to monitor. For more information, see the table in
step 9.
When you select the Asset option, a link to the Risks > Policy Management > By Asset page appears
at the bottom of the Risk dashboard item. The By Asset page displays more detailed information
about all results that are returned for the selected Policy Group. For more information on a specific
asset, select Table from Chart Type list and click the link in the Asset column to view details about
the asset in the By Asset page.
When you select the Policy option, a link to the Risks > Policy Management > By Policy page
appears at the bottom of the Risk dashboard item. The By Policy page displays more detailed
information about all results that are returned for the selected Policy Group. For more information on
Group Asset Passed Policy Checks Policy Group Policy Risk Score
Percentage Passed Passed
Percentage Percentage
All Returns the average Returns the Returns the Returns the
asset percentage pass average policy average policy average policy risk
rate across assets, check percentage group pass rate score across all
policies, and the policy pass rate across across all assets, assets, policies,
group. assets, policies, policies, and the and the policy
and the policy policy group. group.
group.
Policy Returns whether all the Returns Returns the Returns the
assets associated with percentage of percentage of importance factor
each policy in a Policy policy checks that
policy subgroups values for each
group pass compliance. pass per policy in
of which the policy question in
the policy group.policy is a part the Policy group.
Use this setting to
that pass
monitor whether all the Use this setting to Use this setting to
compliance.
assets associated with monitor how view the
each policy in a Policy many policy importance factor
Group pass or not. checks are failing for each policy in
per policy. a policy group.
Policy Group Returns the percentage Returns the Returns the Returns the sum
of assets that pass percentage of percentage of of all importance
compliance for the policy checks that policy subgroups factor values for
selected Policy Group pass per policy for within the Policy all policy
as a whole. the policy group Group that pass questions in the
as a whole. compliance. Policy group.
10. From the Policy Group list, select the policy groups that you want to monitor.
11. Click Save.
Procedure
1. Click the Dashboard tab.
2. On the toolbar, click New Dashboard.
3. Type a name and description for your historical policy compliance dashboard.
4. Click OK.
5. On the toolbar, select Add Item > Risk Manager > Risk Change.
Risk Manager Dashboard items are displayed only when IBM QRadar Risk Manager is licensed.
6. On the header of the new dashboard item, click the yellow Settings icon.
7. From the Policy Group list, select the policy groups that you want to monitor.
8. Select an option from the Value To Compare list:
• If you want to see the cumulative changes in importance factor for all policy questions within the
selected policy groups, select Policy Risk Score.
• If you want to see how many policy checks changed within the selected policy groups, select
Policies Checks.
• If you want to see how many policies changed within the selected policy groups, select Policies.
9. Select the risk change period that you want to monitor from the Delta Time list:
• If you want to compare risk changes from 12:00 a.m. today with yesterday's risk changes, select
Day.
• If you want to compare risk changes from Monday 12:00 a.m. this week with last week's risk
changes, select Week.
• If you want to compare risk changes from the 12:00 a.m. on the first day of the current month
with last month's risk changes, select Month.
10. Click Save.
Procedure
1. Click the Dashboard tab.
2. Click the New Dashboard icon.
3. In the Name field, type a unique name for the dashboard. The maximum length is 65 characters.
4. In the Description field, type a description of the dashboard. The maximum length is 1024 characters.
This description is displayed in the tooltip for the dashboard name in the Show Dashboard list box.
5. Click OK.
2. If your time range is more than 1 hour, a time series chart is displayed and you are
prompted to click Update Details. This action starts the search that populates the event
or flow details and generates the bar chart. When the search completes, the bar chart
and table of event or flow details are displayed.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard that contains the item you want to
customize.
3. On the header of the dashboard item you want to configure, click the Settings icon.
4. Configure the chart parameters.
a) From the Value to Graph list box, select the object type that you want to graph on the chart.
Options include all normalized and custom event or flow parameters that are included in your
search parameters.
b) Select a chart type:
• Bar, pie, and table charts are only available for grouped events or flows.
• Data accumulates so that when you run a time series saved search, a cache of event or flows data
is available to display the data for the previous time period. Accumulated parameters are
indicated by an asterisk (*) in the Value to Graph list box. If you select a value to graph that is not
accumulated (no asterisk), time series data is not available.
Select the Capture Time Series Data checkbox to enable time series capture. When you select
this checkbox, the chart feature accumulates data for time series charts. By default, this option is
disabled.
Results
Your custom chart configurations are retained so that they are displayed as configured each time that you
access the Dashboard tab.
Procedure
1. Click the Dashboard tab.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard from which you want to detach an item.
3. On the dashboard item header, click the green icon to detach the dashboard item and open it in
separate window.
Renaming a dashboard
You can rename a dashboard and update the description.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard that you want to edit.
3. On the toolbar, click the Rename Dashboard icon.
4. In the Name field, type a new name for the dashboard. The maximum length is 65 characters.
5. In the Description field, type a new description of the dashboard. The maximum length is 255
characters
6. Click OK.
Deleting a dashboard
You can delete a dashboard.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard that you want to delete.
3. On the toolbar, click Delete Dashboard.
4. Click Yes.
Procedure
1. On the System Notification dashboard item header, click the Settings icon.
2. From the Display list box, select the number of system notifications you want to view.
• The options are 5, 10 (default), 20, 50, and All.
• To view all system notifications that are logged in the past 24 hours, click All.
3. To close a system notification, click the Delete icon.
Procedure
1. Choose:
• To add a flow search dashboard item, click the Network Activity tab.
• To add an event search dashboard item, click the Log Activity tab.
2. From the Search list box, choose one of the following options:
• To create a search, select New Search.
• To edit a saved search, select Edit Search.
3. Configure or edit your search parameters, as required.
• On the Edit Search pane, select the Include in my Dashboard option.
• On the Column Definition pane, select a column and click the Add Column icon to move the column
to the Group By list.
4. Click Filter.
The search results are displayed.
5. Click Save Criteria. See Saving search criteria on the Offense tab
6. Click OK.
7. Verify that your saved search criteria successfully added the event or flow search dashboard item to
the Add Items list
a) Click the Dashboard tab.
b) Choose one of the following options:
a) To verify an event search item, select Add Item > Log Activity > Event Searches > Add Item.
b) To verify a flow search item, select Add Item > Network Activity > Flow Searches.
Offense prioritization
The magnitude rating of an offense is a measure of the importance of the offense in your environment.
IBM QRadar uses the magnitude rating to prioritize offenses and help you to determine which offenses to
investigate first.
The magnitude rating of an offense is calculated based on relevance, severity, and credibility.
• Relevance determines the impact of the offense on your network. For example, if a port is open, the
relevance is high.
• Credibility indicates the integrity of the offense as determined by the credibility rating that is configured
in the log source. Credibility increases as multiple sources report the same event.
• Severity indicates the level of threat that a source poses in relation to how prepared the destination is
for the attack.
QRadar uses complex algorithms to calculate the offense magnitude rating, and the rating is re-evaluated
when new events are added to the offense and also at scheduled intervals. The following information is
considered when the offense magnitude is calculated:
• the number of events and flows that are associated with the offense
• the number of log sources
• the age of the offense
• the weight of the assets associated with the offense
• the categories, severity, relevance, and credibility of the events and flows that contribute to the offense
• the vulnerabilities and threat assessment of the hosts that are involved in the offense
The magnitude rating of an offense is different from the magnitude rating for an event. You can influence
the magnitude of an offense by setting the event magnitude in the rule actions, but you cannot bypass the
QRadar algorithms to set the offense magnitude yourself.
Offense chaining
IBM QRadar chains offenses together to reduce the number of offenses that you need to review, which
reduces the time to investigate and remediate the threat.
Offense chaining helps you find the root cause of a problem by connecting multiple symptoms together
and showing them in a single offense. By understanding how an offense changed over time, you can see
things that might be overlooked during your analysis. Some events that would not be worth investigating
on their own might suddenly be of interest when they are correlated with other events to show a pattern.
Offense indexing
Offense indexing provides the capability to group events or flows from different rules indexed on the
same property together in a single offense.
IBM QRadar uses the offense index parameter to determine which offenses to chain together. For
example, an offense that has only one source IP address and multiple destination IP addresses indicates
that the threat has a single attacker and multiple victims. If you index this type of offense by the source IP
address, all events and flows that originate from the same IP address are added to the same offense.
You can configure rules to index an offense based on any piece of information. QRadar includes a set of
predefined, normalized fields that you can use to index your offenses. If the field that you want to index
on is not included in the normalized fields, create a custom event or a custom flow property to extract the
data from the payload and use it as the offense indexing field in your rule. The custom property that you
index on can be based on a regular expression, a calculation, or an AQL-based expression.
System performance
Ensure that you optimize and enable all custom properties that are used for offense indexing. Using
properties that are not optimized can have a negative impact on performance.
When you create a rule, you cannot select non-optimized properties in the Index offense based on field.
However, if an existing rule is indexed on a custom property, and then the custom property is de-
optimized, the property is still available in the offense index list. Do not de-optimize custom properties
that are used in rules.
Offense retention
The state of an offense determines how long IBM QRadar keeps the offense in the system. The offense
retention period determines how long inactive and closed offenses are kept before they are removed from
the QRadar console.
Active offenses
When a rule triggers an offense, the offense is active. In this state, QRadar is waiting to evaluate new
events or flows against the offense rule test. When new events are evaluated, the offense clock is
reset to keep the offense active for another 30 minutes.
Dormant offenses
An offense becomes dormant if new events or flows are not added to the offense within 30 minutes,
or if QRadar did not process any events within 4 hours. An offense remains in a dormant state for 5
days. If an event is added while an offense is dormant, the five-day counter is reset.
Inactive offenses
An offense becomes inactive after 5 days in a dormant state. In the inactive state, new events that
trigger the offense rule test do not contribute to the inactive offense. They are added to a new
offense.
Inactive offenses are removed after the offense retention period elapses.
Closed offenses
Closed offenses are removed after the offense retention period elapses. If more events occur for an
offense that is closed, a new offense is created.
If you include closed offenses in a search, and the offense wasn't removed from the QRadar console,
the offense is displayed in the search results.
The default offense retention period is 30 days. After the offense retention period expires, closed and
inactive offenses are removed from the system. Offenses that are not inactive or closed are retained
indefinitely. You can protect an offense to prevent it from being removed when the retention period
expires.
Procedure
1. Click the Offenses tab, and click All Offenses.
2. Choose one of the following options:
• Select the offense that you want to protect, and then select Protect from the Actions list.
• From the Actions list box, select Protect Listed.
3. Click OK.
Results
The offense is protected and will not be removed from QRadar. In the Offense window, the protected
offense is indicated by a Protected icon in the Flag column.
Unprotecting offenses
You can unprotect offenses that were previously protected from removal after the offense retention
period has elapsed.
Procedure
1. Click the Offenses tab.
2. Click All Offenses.
3. Optional: Perform a search that displays only protected offenses.
4. Choose one of the following options:
• Select the offense that you no longer want to protect, and then select Unprotect from the Actions
list box.
• From the Actions list box, select Unprotect Listed.
5. Click OK.
Offense investigations
IBM QRadar uses rules to monitor the events and flows in your network to detect security threats. When
the events and flows meet the test criteria that is defined in the rules, an offense is created to show that a
security attack or policy breach is suspected. But knowing that an offense occurred is only the first step;
identifying how it happened, where it happened, and who did it requires some investigation.
The Offense Summary window helps you begin your offense investigation by providing context to help
you understand what happened and determine how to isolate and resolve the problem.
QRadar does not use device level user permissions to determine which offenses each user is able to view.
All users who have access to the network can view all offenses regardless of which log source or flow
source is associated with the offense. For more information about restricting network access, see the
security profiles documentation in the IBM QRadar Administration Guide.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, select the category of offenses that you want to view.
3. Depending on the category that you selected, you may be able to select the following filtering
options:
a) From the View Offenses list, select an option to filter the list of offenses for a specific time frame.
b) In the Current Search Parameters pane, click Clear Filter links to refine the list of offenses.
4. To view all global offenses that are occurring on the network, click All Offenses.
5. To view all offenses that are assigned to you, click My Offenses.
6. To view offenses grouped on the high-level category, click By Category.
a) To view low-level category groups for a particular high-level category, click the arrow icon next to
the high-level category name.
b) To view a list of offenses for a low-level category, double-click the low-level category.
Count fields, such as Event/Flow Count and Source Count do not consider the network
permissions of the user.
7. To view offenses grouped by source IP address, click By Source IP.
The list of offenses displays only source IP addresses with active offenses.
a) Double-click the Source IP group that you want to view.
b) To view a list of local destination IP addresses for the source IP address, click Destinations on the
Source page toolbar.
c) To view a list of offenses that are associated with this source IP address, click Offenses on the
Source page toolbar.
8. To view offenses grouped by destination IP address, click By Destination IP.
a) Double-click the Source IP address group that you want to view.
b) To view a list of offenses that are associated with the destination IP address, click Offenses on
the Destination page toolbar.
c) To view a list of source IP addresses associated with the destination IP address, click Sources on
the Destination page toolbar.
9. To view offenses grouped by network, click By Network.
a) Double-click the Network that you want to view.
b) To view a list of source IP addresses associated with this network, click Sources on the Network
page toolbar.
c) To view a list of destination IP addresses associated with this network, click Destinations on the
Network page toolbar.
d) To view a list of offenses that are associated with this network, click Offenses on the Network
page toolbar.
10. Double-click the offense to see additional information.
What to do next
Use the information in the offense summary and details to investigate the offense and take necessary
actions.
Procedure
1. Click the Offenses tab and double-click the offense that you want to investigate.
The Offense Summary window opens.
2. Review the first row of data to learn about the level of importance that QRadar assigned to the offense.
Learn more about the magnitude rating:
Parameter Description
Magnitude Indicates the relative importance of the offense. This value is calculated
based on the relevance, severity, and credibility ratings.
Status Hover your mouse over the status icon to see the status.
QRadar does not display a status icon when an offense is active.
Severity Indicates the threat that an attack poses in relation to how prepared the
destination is for the attack.
Credibility Indicates the integrity of the offense as determined by the credibility rating
that is configured in the log source. Credibility increases as multiple sources
report the same event. QRadar administrators configure the credibility rating
of log sources.
3. Review the information in the top portion of the Offense Summary window to learn more about the
type of attack and the timeframe when it occurred.
Learn more about the offense information:
Parameter Description
Description Shows the cause of the offense.
Chained offenses show Preceded by, indicating that the offense changed over
time as new events and flows were added to offense.
Offense Type The offense type is determined by the rule that created the offense. The
offense type determines what type of information is displayed in the Offense
Source Summary pane.
Event/Flow count To see the list of events and flows that contributed to the offense, click the
Event or Flow links.
If the flow count displays N/A, the offense might have a start date that
precedes the date when you upgraded to IBM QRadar version 7.1 (MR1). The
flows cannot be counted, but you can click the N/A link to investigate the
flows.
Source IP(s) Specifies the device that attempts to breach the security of a component on
your network. The device can have an IPv4 or IPv6 address.
Offenses of type Source IP always originate from only one source IP address.
Offenses of other types can have more than one source IP address. You can
see more information about the source IP address by hovering the mouse over
the address, or by using right-click and left-click mouse actions.
Destination IP(s) Specifies the network device that the source IP address attempted to access.
The network device can have an IPv4 or IPv6 address.
If the offense has only one target, the IP address is displayed. If the offense
has multiple targets, the number of local or remote IP addresses that were
targeted. You can see more information by hovering the mouse over the
address, or by using right-click and left-click mouse actions.
Start Specifies the date and time when the first event or flow occurred for the
offense.
Duration Specifies the amount of time that elapsed since the first event or flow that is
associated with the offense was created.
Network(s) Specifies the local networks of the local destination IP addresses that were
targeted. QRadar considers all networks that are specified in the network
hierarchy as local. The system does not associate remote networks to an
offense, even if they are specified as a remote network or a remote service on
the Admin tab.
4. In the Offense Source Summary window, review the information about the source of the offense.
The information that is shown in the Offense Source Summary window depends on the Offense Type
field.
Learn more about the source summary information:
Parameter Description
Destination IP(s) Specifies the network device that the source IP address attempted to access.
The network device can have an IPv4 or IPv6 address.
If the offense has only one target, the IP address is displayed. If the offense
has multiple targets, this field shows the number of local or remote IP
addresses that were targeted. You can see more information by hovering the
mouse over the address, or by using right-click and left-click mouse actions.
Location Specifies the network location of the source or destination IP address. If the
location is local, click the link to view the networks.
Magnitude Specifies the relative importance of the source or destination IP address.
The magnitude bar provides a visual representation of the CVSS risk value of
the asset that is associated with the IP address. Hover your mouse over the
magnitude bar to display the calculated magnitude.
Source IP(s) Specifies the device that attempted to breach the security of a component on
your network. The device can have an IPv4 or IPv6 address.
Offenses of type Source IP always originate from only one source IP address.
Offenses of other types can have more than one source IP address. You can
see more information about the source IP address by hovering the mouse over
the address, or by using right-click and left-click mouse actions.
Username Specifies the user name that is associated with the event or flow that created
the offense.
Hover your mouse over the user name to see the most recent information in
the asset model database for the user.
Events that do not include a user name in the payload, or system-generated
events that belong to a local computer or a system account, show Unknown.
To access more information that is associated with a selected user name,
right-click the user name for View Assets and View Events menu options.
Vulnerabilities Specifies the number of identified vulnerabilities that are associated with the
source or destination IP address. This value also includes the number of
active and passive vulnerabilities.
When you view the summary information for historical offenses, the Last Known data fields are not
populated.
5. In the bottom portion of the Offense Summary window, review additional information about the
offense top contributors, including notes and annotations that are collected about the offense.
To see all the information that QRadar collected in a category, click the links on the right side of the
category heading.
Learn more about the information presented in the offense details:
Top 5 Log Sources Shows the log sources that contribute the most events to the offense.
The Custom Rule Engine (CRE) creates an event and adds it to the offense
when the test criteria that is specified in the custom rule matches the
incoming event. A log source that displays Custom Rule Engine in the
Description field indicates that QRadar created the events from that log
source.
Total Events shows the sum of all the events that are received from this log
source while the offense was active.
Top 5 Users Events must include user information in order for QRadar to populate this
table.
Top 5 Categories Shows the low-level categories that have the most events that contributed to
the offense.
Local Destination Count shows the number of local destination IP addresses
affected by offenses with events in the category. When all destination IP
addresses are remote, this field shows 0.
Last 10 Events Shows information about the last 10 events that contributed to the offense.
Last 10 Flows Shows information about the last 10 flows that contributed to the offense.
The Total Bytes column shows the sum of the bytes transferred in both
directions.
Annotations Annotations provide insight into why QRadar considers the event or observed
traffic to be threatening.
QRadar can add annotations when it adds events or flows to an offense. The
oldest annotation shows information that QRadar added when the offense
was created. Users cannot add, edit, or delete annotations.
Last 5 Search Shows information about the results from the last five scheduled searches.
Results
6. If you installed IBM QRadar Risk Manager, click View Attack Path to see which assets in your network
are communicating to allow an offense to travel through the network.
Procedure
1. In the Offense Summary window, click Events.
The List of Events window shows all events that are associated with the offense.
2. Specify the Start Time, End Time, and View options to view events that occurred within a specific
time frame.
3. Click the event column header to sort the event list.
4. In the list of events, right-click the event name to apply quick filter options to reduce the number of
events to review.
You can apply quick filters to other columns in the event list as well.
5. Double-click an event to view the event details.
The Event Information and the Source and Destination Information window show only the
information that is known about the event. Depending on the type of event, some fields might be
empty.
Learn more about the time fields on the Event Information:
Field Description
Start Time The time that QRadar received the raw event from the log source.
Storage Time The time that QRadar stored the normalized event.
Log Source Time The time that is recorded in the raw event from the log source.
6. In the Payload Information box, review the raw event for information that QRadar did not normalize.
Information that is not normalized does not appear in the QRadar interface, but it may be valuable to
your investigation.
What to do next
For more information about how to use QRadar to review event data, see “Log activity monitoring” on
page 53 and Chapter 11, “Event and flow searches,” on page 109.
Related information
QRadar: Event details and the difference between Start Time, Storage Time, and Log Source Time
Investigating flows
IBM QRadar correlates flows into an offense when it identifies suspicious activity in network
communications. The flow analysis provides visibility into layer 7, or the application layer, for applications
such as web browsers, NFS, SNMP, Telnet, and FTP. A flow can include information such as IP addresses,
ports, applications, traffic statistics, and packet payload from unencrypted traffic.
By default, QRadar tries to extract normalized fields and custom flow properties from the first 64 bytes of
flow data, but administrators can increase the content capture length to collect more data. For more
information, see the IBM QRadar Administration Guide.
Field Description
Event Description When the application is not identified in the payload, QRadar uses built-
in decoding to determine the application, and shows Application
detected with state-based decoding in Event Description.
Source Payload and Shows the size of the payload.
Destination Payload
When the size exceeds 64 bytes, the payload might contain additional
information that is not shown in the QRadar interface.
Custom Rules Partially Shows rules for which the threshold value was not met, but otherwise
Matched the rule matched.
Flow Direction Specifies the flow direction, where L indicates local network, and R
indicates remote network.
What to do next
For more information about how to use QRadar to review flow data, see Chapter 6, “Network activity
monitoring,” on page 73 and Chapter 11, “Event and flow searches,” on page 109.
Offense actions
IBM QRadar provides the capability to act on the offenses as you investigate them. To help you track
offenses that were acted upon, QRadar adds an icon to the Flag column when you assign an offense to a
user, protect or hide an offense, add notes, or mark the offense for follow-up.
To perform the same action on multiple offenses, hold the Control key while you select each offense you
want to act on. To view offense details on a new page, press the Ctrl key while you double-click an
offense.
Adding notes
Add notes to an offense to track information that is collected during an investigation. Notes can include
up to 2000 characters.
Procedure
1. Click the Offenses tab.
2. Select the offense to which you want to add the note.
To add the same note to multiple offenses, press the Ctrl key while you select each offense.
3. From the Actions list, select Add Note.
4. Type the note that you want to include for this offense.
Results
The note is displayed in the Last 5 Notes pane on the Offense Summary window. A Notes icon is
displayed in the flag column of the offense list.
Hover your mouse over the notes indicator in the Flag column of the Offenses list to view the note.
Hiding offenses
Hide an offense to prevent it from being displayed in the offense list. After you hide an offense, the
offense is no longer displayed in any list on the Offenses tab, including the All Offenses list. However, if
you perform a search that includes hidden offenses, the offense is displayed in the search results.
Procedure
1. Click the Offenses tab.
2. Select the offense that you want to hide.
To hide multiple offenses, hold the Control key while you select each offense.
3. From the Actions list box, select Hide.
4. Click OK.
Procedure
1. Click the Offenses tab.
2. To clear the filter on the offense list, click Clear Filter next to the Exclude Hidden Offenses search
parameter.
3. To create a new search that includes hidden offenses, follow these steps:
a) From the Search list box, select New Search.
b) In the Search Parameters window, clear the Hidden Offenses check box in the Exclude options
list.
c) Click Search.
4. To remove the hidden flag from an offense, follow these steps:
a) Select the offense for which you want to remove the hidden flag.
To select multiple offenses, hold the Control key while you click each offense.
b) From the Actions list box, select Show.
The hidden flag is removed and the offense appears in the offense list without having to clear the
Exclude Hidden Offenses filter.
Closing offenses
Close an offense to remove it completely from your system.
Procedure
1. Click the Offenses tab.
2. Select the offense that you want to close.
To close multiple offenses, hold the Control key while you select each offense.
3. From the Actions list, select Close.
4. In the Reason for Closing list, specify a closing reason.
To add a close reason, click the icon beside Reason for Closing to open the Custom Offense Close
Reasons dialog box.
5. In the Notes field, type a note to provide more information.
The Notes field displays the note that was entered for the previous offense closing. Notes must not
exceed 2,000 characters.
6. Click OK.
Results
After you close offenses, the counts that are displayed on the By Category window of the Offenses tab
can take several minutes to reflect the closed offenses.
Exporting offenses
Export offenses when you want to reuse the data or when you want to store the data externally. For
example, you can use the offense data to create reports in a third-party application. You can also export
offenses as a secondary long-term retention strategy. Customer Support might require you to export
offenses for troubleshooting purposes.
You can export offenses in Extensible Markup Language (XML) or comma-separated values (CSV) format.
The resulting XML or CSV file includes the parameters that are specified in the Column Definition pane of
the search parameters. The length of time that is required to export the data depends on the number of
parameters specified.
Procedure
1. Click the Offenses tab.
2. Select the offenses that you want to export.
To select multiple offenses, hold the Control key while you select each offense.
3. Choose one of the following options:
• To export the offenses in XML format, select Actions > Export to XML.
• To export the offenses in CSV format, select Actions > Export to CSV
Note: If you use Microsoft Excel to import the CSV file, you must select the correct locale to ensure
that the data displays correctly.
.
4. Choose one of the following options:
• To open the file for immediate viewing, select Open with and select an application from the list.
• To save the file, select Save File.
Procedure
1. Click the Offenses tab.
2. Select the offense that you want to assign.
To assign multiple offenses, hold the Control key while you select each offense.
3. From the Actions list, select Assign.
4. In the Assign To User list, select the user that you want to assign this offense to.
Note: The Assign To User list displays only those users who have privileges to view the Offenses tab.
The security profile settings for the user are followed as well.
5. Click Save.
Results
The offense is assigned to the selected user. The User icon is displayed in the Flag column of the
Offenses tab to indicate that the offense is assigned. The designated user can see this offense on the My
Offenses page.
Procedure
1. Click the Offenses tab.
2. Select the offense for which you want to send an email notification.
3. From the Actions list box, select Email.
4. Configure the following parameters:
Option Description
Parameter Description
To Type the email address of the user you want to notify when a change occurs to the
selected offense. Separate multiple email addresses with a comma.
From Type the originating email address. The default is [email protected].
Email Subject Type the subject for the email. The default is Offense ID.
Email Message Type the standard message that you want to accompany the notification email.
5. Click Send.
Procedure
1. Click the Offenses tab.
2. Find the offense that you want to mark for follow-up.
3. Double-click the offense.
4. From the Actions list, select Follow up.
Results
The offense now displays the follow-up icon in the Flag column. To sort the offense list to show flagged
offenses at the top, click the Flags column header.
Quick Searches From this list box, you can run previously saved
searches. Options are displayed in the Quick
Searches list box only when you have saved search
criteria that specifies the Include in my Quick
Searches option.
Add Filter Click Add Filter to add a filter to the current search
results.
Save Criteria Click Save Criteria to save the current search
criteria.
Save Results Click Save Results to save the current search
results. This option is only displayed after a search
is complete. This option is disabled in streaming
mode.
Cancel Click Cancel to cancel a search in progress. This
option is disabled in streaming mode.
Status bar
When streaming events, the status bar displays the average number of results that are received per
second.
This is the number of results the Console successfully received from the Event processors. If this number
is greater than 40 results per second, only 40 results are displayed. The remainder is accumulated in the
result buffer. To view more status information, move your mouse pointer over the status bar.
When events are not being streamed, the status bar displays the number of search results that are
currently displayed on the tab and the amount of time that is required to process the search results.
Procedure
1. Click the Log Activity tab.
2. From the View list box, select Real Time (streaming).
For information about the toolbar options, see Table 4-1. For more information about the parameters
that are displayed in streaming mode, see Table 4-7.
3. Optional. Pause or play the streaming events. Choose one of the following options:
• To select an event record, click the Pause icon to pause streaming.
• To restart streaming mode, click the Play icon.
View From this list box, you can select the time range
that you want to filter for.
Offenses icon Click this icon to view details of the offense that is
associated with this event. For more information,
see Chart management.
Note: Depending on your product, this icon is
might not be available. You must have IBM QRadar
SIEM.
If you select the Normalized (With IPv6 Columns) display, then the Log Activity tab displays the
following extra parameters:
Table 11. Log Activity tab - Normalized (With IPv6 Columns) parameters
Parameter Description
Source IPv6 Specifies the source IP address of the event.
Note: IPv4 events display 0.0.0.0.0.0.0.0 in
the Source IPv6 and Destination IPv6 columns.
Procedure
1. Click the Log Activity tab.
2. Optional: From the Display list box, select Normalized (With IPv6 Columns).
The Normalized (With IPv6 Columns) display shows source and destination IPv6 addresses for IPv6
events.
3. From the View list box, select the time frame that you want to display.
4. Click the Pause icon to pause streaming.
5. Double-click the event that you want to view in greater detail. For more information, see Event details.
View From this list box, you can select the time range
that you want to filter for.
Offenses icon Click this icon to view details of the offense that is
associated with this event.
Low Level Category (Unique Count) Specifies the low-level category of this event. If
there are multiple categories that are associated
with this event, this field specifies the term
Multiple and the number of categories.
Procedure
1. Click the Log Activity tab.
2. From the View list box, select the time frame that you want to display.
3. From the Display list box, choose which parameter you want to group events on. See Table 2.
The events groups are listed. For more information about the event group details, see Table 1.
4. To view the List of Events page for a group, double-click the event group that you want to investigate.
The List of Events page does not retain chart configurations that you might have defined on the Log
Activity tab. For more information about the List of Events page parameters, see Table 1.
5. To view the details of an event, double-click the event that you want to investigate. For more
information about event details, see Table 2.
Start Time Specifies the time of the event was received from
the log source.
Storage Time Specifies the time that the event was stored in the
QRadar database.
Log Source Time Specifies the system time as reported by the log
source in the event payload.
Anomaly Detection Information - This pane is only displayed if this event was generated by an anomaly
detection rule. Click the Anomaly icon to view the saved search results that caused the anomaly
detection rule to generate this event.
Additional information
Protocol Specifies the protocol that is associated with this
event.
QID Specifies the QID for this event. Each event has a
unique QID. For more information about mapping a
QID, see Modifying event mapping.
Log Source Specifies the log source that sent the event to
QRadar. If there are multiple log sources that are
associated with this event, this field specifies the
term Multiple and the number of log sources.
Event Count Specifies the total number of events that are
bundled in this normalized event. Events are
bundled when many of the same type of event for
the same source and destination IP address are
seen within a short time.
Custom Rules Specifies custom rules that match this event. .
Custom Rules Partially Matched Specifies custom rules that partially match this
event.
Annotations Specifies the annotation for this event. Annotations
are text descriptions that rules can automatically
add to events as part of the rule response.
Identity Host Name Specifies the host name of the asset that is
associated with this event.
Identity MAC Specifies the MAC address of the asset that is
associated with this event.
Identity Group Name Specifies the group name of the asset that is
associated with this event.
Map Event Click Map Event to edit the event mapping. For
more information, see Modifying event mapping.
False Positive Click False Positive to tune QRadar to prevent
false positive events from generating into offenses.
Extract Property Click Extract Property to create a custom event
property from the selected event.
Previous Click Previous to view the previous event in the
event list.
Next Click Next to view the next event in the event list.
PCAP Data Note: This option is only displayed if your QRadar
Console is configured to integrate with the Juniper
JunOS Platform DSM. For more information about
managing PCAP data, see Managing PCAP data.
• View PCAP Information - Select this option to
view the PCAP information. For more
information, see Viewing PCAP information.
• Download PCAP File - Select this option to
download the PCAP file to your desktop system.
For more information, see Downloading the PCAP
file to your desktop system.
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to pause streaming.
3. Click the Offense icon beside the event you want to investigate.
4. View the associated offense.
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to pause streaming.
3. Double-click the event that you want to map.
4. Click Map Event.
5. If you know the QID that you want to map to this event, type the QID in the Enter QID field.
6. If you do not know the QID you want to map to this event, you can search for a particular QID:
a) Choose one of the following options: To search for a QID by category, select the
high-level category from the High-Level Category list box. To search for a
QID by category, select the low-level category from the Low-Level Category
list box. To search for a QID by log source type, select a log source type
from the Log Source Type list box. To search for a QID by name, type a
name in the QID/Name field.
b) Click Search.
c) Select the QID you want to associate this event with.
7. Click OK.
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to pause streaming.
3. Select the event that you want to tune.
4. Click False Positive.
5. In the Event/Flow Property pane on the False Positive window, select one of the following options:
• Event/Flow(s) with a specific QID of <Event>
• Any Event/Flow(s) with a low-level category of <Event>
• Any Event/Flow(s) with a high-level category of <Event>
6. In the Traffic Direction pane, select one of the following options:
• <Source IP Address> to <Destination IP Address>
• <Source IP Address> to Any Destination
• Any Source to <Destination IP Address>
• Any Source to any Destination
7. Click Tune.
PCAP data
If your QRadar Console is configured to integrate with the Juniper JunOS Platform DSM, then Packet
Capture (PCAP) can be received, processed, data can be stored from a Juniper SRX-Series Services
Gateway log source.
For more information about the Juniper JunOS Platform DSM, see the IBM QRadar DSM Configuration
Guide.
Procedure
1. Click the Log Activity tab.
2. From the Search list box, select New Search.
3. Optional. To search for events that have PCAP data, configure the following search criteria:
a) From the first list box, select PCAP data.
b) From the second list box, select Equals.
What to do next
For more information about viewing and downloading PCAP data, see the following sections:
• Viewing PCAP information
• Downloading the PCAP file to your desktop system
Procedure
1. For the event you want to investigate, choose one of the following options:
• Select the event and click the PCAP icon.
• Right-click the PCAP icon for the event and select More Options > View PCAP Information.
• Double-click the event that you want to investigate, and then select PCAP Data > View PCAP
Information from the event details toolbar.
2. If you want to download the information to your desktop system, choose one of the following options:
• Click Download PCAP File to download the original PCAP file to be used in an external application.
• Click Download PCAP Text to download the PCAP information in .TXT format
3. Choose one of the following options:
• If you want to open the file for immediate viewing, select the Open with option and select an
application from the list box.
• If you want to save the list, select the Save File option.
4. Click OK.
Procedure
1. For the event you want to investigate, choose one of the following options:
• Select the event and click the PCAP icon.
• Right-click the PCAP icon for the event and select More Options > Download PCAP File .
• Double-click the event you want to investigate, and then select PCAP Data > Download PCAP File
from the event details toolbar.
2. Choose one of the following options:
• If you want to open the file for immediate viewing, select the Open with option and select an
application from the list box.
• If you want to save the list, select the Save File option.
3. Click OK.
Exporting events
You can export events in Extensible Markup Language (XML) or Comma-Separated Values (CSV) format.
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to pause streaming.
3. From the Actions list box, select one of the following options:
• Export to XML > Visible Columns - Select this option to export only the columns that are visible on
the Log Activity tab. This is the recommended option.
• Export to XML > Full Export (All Columns) - Select this option to export all event parameters. A
full export can take an extended period of time to complete.
• Export to CSV > Visible Columns - Select this option to export only the columns that are visible on
the Log Activity tab. This is the recommended option.
• Export to CSV > Full Export (All Columns) - Select this option to export all event parameters. A full
export can take an extended period of time to complete.
4. If you want to resume your activities while the export is in progress, click Notify When Done.
Results
When the export is complete, you receive notification that the export is complete. If you did not select the
Notify When Done icon, the status window is displayed.
OverFlow records
With administrative permissions, you can specify the maximum number of flows that you want to send
from the QRadar QFlow Collector to the Flow processors.
If you have administrative permissions, you can specify the maximum number of flows that you want to
send from the QRadar QFlow Collector to the Flow processors. After the configured flow reaches its limit,
all the data that is collected is grouped into one flow record. This flow record is then displayed on the
Network Activity tab with a source IP address of 127.0.0.4 and a destination IP address of 127.0.0.5.
This flow record specifies OverFlow on the Network Activity tab.
Procedure
1. Click the Network Activity tab.
2. From the View list box, select Real Time (streaming).
3. Optional. Pause or play the streaming flows. When streaming is paused, the last 1,000 flows are
displayed.
Note: When you are streaming flows, the status bar displays the average number of results that are
received per second. This display is the number of results that the Console successfully received from
the Flow processors. If this number is greater than 40 results per second, only 40 results are
displayed. The remainder is accumulated in the result buffer. To view more status information, hover
over the status bar.
Procedure
1. Click the Network Activity tab.
2. From the Display list box, select Normalized (With IPv6 Columns) or Default (Normalized).
The Normalized (With IPv6 Columns) display shows source and destination IPv6 addresses for IPv6
flows.
3. From the View list box, select the time frame that you want to display.
4. Click the Pause icon to pause streaming.
5. Optional: Click Hide Charts to remove the charts from your display.
The Charts parameter in the Network Activity tab displays configurable charts that represent the
records that are matched by the time interval and grouping option. The charts are only displayed after
you select a time frame of Last Interval (auto refresh) or above, and a grouping option to display. For
more information about configuring charts, see Configuring charts.
If you use Mozilla Firefox as your browser and an ad blocker browser extension is installed, charts do
not display. To display charts, you must remove the ad blocker browser extension. For more
information, see your browser documentation.
6. Double-click the flow that you want to view in greater detail.
Procedure
1. Click the Network Activity tab.
2. From the View list box, select the time frame that you want to display.
3. From the Display list box, choose which parameter you want to group flows on.
4. To view the List of Flows page for a group, double-click the flow group that you want to investigate.
The List of Flows page does not retain chart configurations that you might define on the Network
Activity tab.
5. To view the details of a flow, double-click the flow that you want to investigate.
Procedure
1. Click the Network Activity tab.
2. Optional. If you are viewing flows in streaming mode, click the Pause icon to pause streaming.
3. Select the flow that you want to tune.
4. Click False Positive.
5. In the Event/Flow Property pane on the False Positive page, select one of the following options:
• Event/Flow(s) with a specific QID of <Event>
• Any Event/Flow(s) with a low-level category of <Event>
• Any Event/Flow(s) with a high-level category of <Event>
6. In the Traffic Direction pane, select one of the following options:
• <Source IP Address> to <Destination IP Address>
• <Source IP Address> to any Destination
• Any Source to <Destination IP Address>
• Any Source to any Destination
7. Click Tune.
Procedure
1. Click the Network Activity tab.
2. Optional. If you are viewing flows in streaming mode, click the Pause icon to pause streaming.
3. From the Actions list box, select one of the following options:
• Export to XML > Visible Columns - Select this option to export only the columns that are visible on
the Log Activity tab. This is the recommended option.
• Export to XML > Full Export (All Columns) - Select this option to export all flow parameters. A full
export can take an extended period of time to complete.
• Export to CSV > Visible Columns - Select this option to export only the columns that are visible on
the Log Activity tab. This is the recommended option.
• Export to CSV > Full Export (All Columns) - Select this option to export all flow parameters. A full
export can take an extended period of time to complete.
4. If you want to resume your activities, click Notify When Done.
Results
When the export is complete, you receive notification that the export is complete. If you did not select the
Notify When Done icon, the Status window is displayed.
Asset data
An asset is any network endpoint that sends or receives data across your network infrastructure. For
example, notebooks, servers, virtual machines, and handheld devices are all assets. Every asset in the
asset database is assigned a unique identifier so that it can be distinguished from other asset records.
Detecting devices is also useful in building a data set of historical information about the asset. Tracking
asset information as it changes helps you monitor asset usage across your network.
Asset profiles
An asset profile is a collection of all information that IBM QRadar SIEM collected over time about a
specific asset. The profile includes information about the services that are running on the asset and any
identity information that is known.
QRadar SIEM automatically creates asset profiles from identity events and bidirectional flow data or, if
they are configured, vulnerability assessment scans. The data is correlated through a process that is
called asset reconciliation and the profile is updated as new information comes into QRadar. The asset
name is derived from the information in the asset update in the following order of precedence:
• Given name
• NETBios host name
• DNS host name
• IP address
Correlate
matches into Is potential
No
single target matches
asset list empty?
Yes
Output:
Create new asset target asset End
1. QRadar receives the event. The asset profiler examines the event payload for identity information.
Identity information
Every asset must contain at least one piece of identity data. Subsequent updates that contain one or more
pieces of that same identity data are reconciled with the asset that owns that data. Updates that are
based on IP addresses are handled carefully to avoid false-positive asset matches. False positive asset
matches occur when one physical asset is assigned ownership of an IP address that was previously
owned by another asset in the system.
When multiple pieces of identity data are provided, the asset profiler prioritizes the information from the
most deterministic to the least in the following order:
• MAC address
• NetBIOS host name
• DNS host name
• IP address
MAC addresses, NetBIOS host names, and DNS host names are unique and therefore are considered as
definitive identity data. Incoming updates that match an existing asset only by the IP address are handled
differently than updates that match more definitive identity data.
Related concepts
Asset reconciliation exclusion rules
You can view these rules on the Offenses tab by clicking Rules and then selecting the asset
reconciliation exclusion group in the drop-down list.
Related concepts
Example: Asset exclusion rules that are tuned to exclude IP addresses from the blacklist
You can exclude IP addresses from being blacklisted by tuning the asset exclusion rules.
Example: Asset exclusion rules that are tuned to exclude IP addresses from the blacklist
You can exclude IP addresses from being blacklisted by tuning the asset exclusion rules.
As the Network security administrator, you manage a corporate network that includes a public wifi
network segment where IP address leases are typically short and frequent. The assets on this segment of
the network tend to be transient, primarily notebooks and hand-held devices that log in and out of the
public wifi frequently. Commonly, a single IP address is used multiple times by different devices over a
short time.
In the rest of your deployment, you have a carefully managed network that consists only of inventoried,
well-named company devices. IP address leases are much longer in this part of the network, and IP
addresses are accessed by authentication only. On this network segment, you want to know immediately
Blacklisting IP addresses
In this environment, the default asset reconciliation exclusion rules inadvertently blacklist the entire
network in a short time.
Your security team finds the asset-related notifications that are generated by the wifi segment are a
nuisance. You want to prevent the wifi from triggering any more deviating asset growth notifications.
The updated rule tests only the events from the log sources that are not on your wifi DHCP server. To
prevent wifi DHCP events from undergoing more expensive reference set and behavior analysis tests, you
also moved this test to the top of the test stack.
Asset merging
Asset merging is the process where the information for one asset is combined with the information for
another asset under the premise that they are actually the same physical asset.
Asset merging occurs when an asset update contains identity data that matches two different asset
profiles. For example, a single update that contains a NetBIOS host name that matches one asset profile
and a MAC address that matches a different asset profile might trigger an asset merge.
Some systems can cause high volumes of asset merging because they have asset data sources that
inadvertently combine identity information from two different physical assets into a single asset update.
Some examples of these systems include the following environments:
• Central syslog servers that act as an event proxy
• Virtual machines
• Automated installation environments
• Non-unique host names, common with assets like iPads and iPhones.
• Virtual private networks that have shared MAC addresses
• Log source extensions where the identity field is OverrideAndAlwaysSend=true
Assets that have many IP addresses, MAC addresses, or host names show deviations in asset growth and
can trigger system notifications.
Related concepts
Identification of asset growth deviations
Threshold settings
When an asset in the database reaches a specific number of properties, such as multiple IP addresses or
MAC addresses, QRadar blocks that asset from receiving more updates.
The Asset Profiler threshold settings specify the conditions under which an asset is blocked from updates.
The asset is updated normally up to the threshold value. When the system collects enough data to exceed
the threshold, the asset shows an asset growth deviation. Future updates to the asset are blocked until
the growth deviation is rectified.
Example: How configuration errors for log source extensions can cause asset growth
deviations
Customized log source extensions that are improperly configured can cause asset growth deviations.
You configure a customized log source extension to provide asset updates to IBM QRadar by parsing user
names from the event payload that is on a central log server. You configure the log source extension to
override the event host name property so that the asset updates that are generated by the custom log
source always specify the DNS host name of the central log server.
Instead of QRadar receiving an update that has the host name of the asset that the user logged in to, the
log source generates many asset updates that all have the same host name.
In this situation, the asset growth deviation is caused by one asset profile that contains many IP
addresses and user names.
The system detected asset profiles that exceed the normal size threshold
Explanation
The payload of the notification shows a list of the top five most frequently deviating assets and why the
system marked each asset as a growth deviation. As shown in the following example, the payload also
shows the number of times that the asset attempted to grow beyond the asset size threshold.
When the asset data exceeds the configured threshold, QRadar blocks the asset from future updates. This
intervention prevents the system from receiving more corrupted data and mitigates the performance
impacts that might occur if the system attempts to reconcile incoming updates against an abnormally
large asset profile.
The asset blacklist rules have added new asset data to the asset blacklists
Explanation
Asset exclusion rules monitor asset data for consistency and integrity. The rules track specific pieces of
asset data over time to ensure that they are consistently being observed with the same subset of data
within a reasonable time.
For example, if an asset update includes both a MAC address and a DNS host name, the MAC address is
associated with that DNS host name for a sustained period. Subsequent asset updates that contain that
MAC address also contain that same DNS host name when one is included in the asset update. If the MAC
address suddenly is associated with a different DNS host name for a short period, the change is
monitored. If the MAC address changes again within a short period, the MAC address is flagged as
contributing to an instance of deviating or abnormal asset growth.
Asset blacklists
An asset blacklist is a collection of data that IBM QRadar considers untrustworthy based on the asset
reconciliation exclusion rules. Data in the asset blacklist is likely to contribute to asset growth deviations
and QRadar prevents the data from being added to the asset database.
Every asset update in QRadar is compared to the asset blacklists. Blacklisted asset data is applied
globally for all domains. If the asset update contains identity information (MAC address, NetBIOS host
Your QRadar administrator can modify the blacklist entries to ensure that new asset data is handled
correctly.
Asset whitelists
You can use asset whitelists to keep IBM QRadar asset data from inadvertently reappearing in the asset
blacklists.
An asset whitelist is a collection of asset data that overrides the asset reconciliation engine logic about
which data is added to an asset blacklist. When the system identifies a blacklist match, it checks the
whitelist to see whether the value exists. If the asset update matches data that is on the whitelist, the
change is reconciled and the asset is updated. Whitelisted asset data is applied globally for all domains.
Your QRadar administrator can modify the whitelist entries to ensure that new asset data is handled
correctly.
Asset profiles
Asset profiles provide information about each known asset in your network, including what services are
running on each asset.
Asset profile information is used for correlation purposes to help reduce false positives. For example, if a
source attempts to exploit a specific service running on an asset, then QRadar determines if the asset is
vulnerable to this attack by correlating the attack to the asset profile.
Asset profiles are automatically discovered if you have flow data or vulnerability assessment (VA) scans
configured. For flow data to populate asset profiles, bidirectional flows are required. Asset profiles can
also be automatically created from identity events. For more information about VA, see the IBM QRadar
Vulnerability Assessment Guide.
For more information about flow sources, see the IBM QRadar Administration Guide.
Vulnerabilities
You can use QRadar Vulnerability Manager and third-party scanners to identify vulnerabilities.
Third-party scanners identify and report discovered vulnerabilities using external references, such as the
Open Source Vulnerability Database (OSVDB), National Vulnerability Database (NVDB), and Critical Watch.
Examples of third-party scanners include QualysGuard and nCircle ip360. The OSVDB assigns a unique
reference identifier (OSVDB ID) to each vulnerability. External references assign a unique reference
identifier to each vulnerability. Examples of external data reference IDs include Common Vulnerability
and Exposures (CVE) ID or Bugtraq ID. For more information on scanners and vulnerability assessment,
see the IBM QRadar Vulnerability Manager User Guide.
QRadar Vulnerability Manager is a component that you can purchase separately and enable using a
license key. QRadar Vulnerability Manager is a network scanning platform that provides awareness of the
vulnerabilities that exist within the applications, systems, or devices on your network. After scans identify
vulnerabilities, you can search and review vulnerability data, remediate vulnerabilities, and rerun scans to
evaluate the new level of risk.
When QRadar Vulnerability Manager is enabled, you can perform vulnerability assessment tasks on the
Vulnerabilities tab. From the Assets tab, you can run scans on selected assets.
For more information, see the IBM QRadar Vulnerability Manager User Guide
View Topology Click View Topology to further investigate the asset. The
Current Topology window is displayed.
This option is only displayed when IBM QRadar Risk Manager is
been purchased and licensed. For more information, see the IBM
QRadar Risk Manager User Guide.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles
3. Double-click the asset that you want to view.
4. Use the options on the toolbar to display the various panes of asset profile information. See Editing an
asset profile.
5. To research the associated vulnerabilities, click each vulnerability in the Vulnerabilities pane. See
Table 10-10
6. If required, edit the asset profile. See Editing an asset profile.
7. Click Return to Assets List to select and view another asset, if required.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Choose one of the following options:
• To add an asset, click Add Asset and type the IP address or CIDR range of the asset in the New IP
Address field.
• To edit an asset, double-click the asset that you want to view and click Edit Asset .
4. Configure the parameters in the MAC & IP Address pane. Configure one or more of the following
options:
• Click the New MAC Address icon and type a MAC Address in the dialog box.
• Click the New IP Address icon and type an IP address in the dialog box.
• If Unknown NIC is listed, you can select this item, click the Edit icon, and type a new MAC address
in the dialog box.
• Select a MAC or IP address from the list, click the Edit icon, and type a new MAC address in the
dialog box.
• Select a MAC or IP address from the list and click the Remove icon.
5. Configure the parameters in the Names & Description pane. Configure one or more of the following
options:
Parameter Description
Parameter Description
Weight From the Weight list box, select a weight for this
asset profile. The range is 0 - 10.
When you configure the Weight parameter, the
Collateral Damage Potential parameter is
automatically updated.
8. Configure the parameters in the Owner pane. Choose one or more of the following options:
Technical User From the list box, select the username that you
want to associate with this asset profile.
You can also use this parameter to enable
automatic vulnerability remediation for IBM
Security QRadar Vulnerability Manager. For more
information about automatic remediation, see the
IBM QRadar Vulnerability Manager User Guide.
9. Click Save.
2010-000
To view a list of all hosts that are vulnerable to that specific CVE ID.
Note: For more information about OSVDB, see http://osvdb.org/ . For more information about NVDB, see
http://nvd.nist.gov/ .
Results
You can save your asset search criteria. See Saving asset search criteria.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Perform a search.
4. Click Save Criteria .
5. Enter values for the parameters:
Parameter Description
Enter the name of this search Type the unique name that you want to assign to
this search criteria.
Manage Groups Click Manage Groups to manage search groups.
This option is only displayed if you have
administrative permissions.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search.
4. Click on Manage Groups.
5. View the search groups.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search.
4. Click Manage Groups.
5. Select the folder for the group under which you want to create the new group.
6. Click New Group.
7. In the Name field, type a unique name for the new group.
8. Optional. In the Description field, type a description.
9. Click OK.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search.
4. Click Manage Groups.
5. Select the group that you want to edit.
6. Click Edit.
7. Type a new name in the Name field.
8. Type a new description in the Description field.
9. Click OK.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search.
4. Click Manage Groups.
5. Select the saved search that you want to copy.
6. Click Copy.
7. On the Item Groups window, select the check box for the group you want to copy the saved search to.
8. Click Assign Groups.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search .
4. Click Manage Groups.
5. Select the saved search that you want to remove from the group:
• Select the saved search that you want to remove from the group.
• Select the group that you want to remove.
Deleting assets
You can delete specific assets or all listed asset profiles.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select the asset that you want to delete, and then select Delete Asset from the Actions list box.
4. Click OK.
ip,name,weight,description
Where:
• IP - Specifies any valid IP address in the dotted decimal format. For example: 192.168.5.34.
• Name - Specifies the name of this asset up to 255 characters in length. Commas are not valid in this
field and invalidate the import process. For example: WebServer01 is correct.
• Weight - Specifies a number from 0 to 10, which indicates the importance of this asset on your
network. A value of 0 denotes low importance and 10 is very high.
• Description - Specifies a textual description for this asset up to 255 characters in length. This value is
optional.
For example, the following entries might be included in a CSV file:
• 192.168.5.35,MailServ01,0,
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. From the Actions list box, select Import Assets.
4. Click Browse to locate and select the CSV file that you want to import.
5. Click Import Assets to begin the import process.
Exporting assets
You can export listed asset profiles to an Extended Markup Language (XML) or Comma-Separated Value
(CSV) file.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. From the Actions list box, select one of the following options:
• Export to XML
• Export to CSV
4. View the status window for the status of the export process.
5. Optional: If you want to use other tabs and pages while the export is in progress, click the Notify
When Done link.
When the export is complete, the File Download window is displayed.
6. On the File Download window, choose one of the following options:
• Open - Select this option to open the export results in your choice of browser.
• Save - Select this option to save the results to your desktop.
7. Click OK.
Parameter Description
Vulnerability ID Specifies the ID of the vulnerability. The Vuln ID is
a unique identifier that is generated by
Vulnerability Information System (VIS).
Published Date Specifies the date on which the vulnerability
details were published on the OSVDB.
Name Specifies the name of the vulnerability.
Assets Specifies the number of assets in your network
that have this vulnerability. Click the link to view
the list of assets.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles .
3. Select an asset profile.
View a larger time span of data Using the zoom feature, you can investigate larger
time segments or return to the maximum time
range. You can expand a time range using one of
the following options:
• Click Zoom Reset at the upper left corner of the
chart.
• Move your mouse pointer over the chart, and
then use your mouse wheel to expand the view
(roll the mouse wheel down).
Scan the chart When you have magnified a time series chart, you
can click and drag the chart to the left or right to
scan the timeline.
Chart legends
Each chart provides a legend, which is a visual reference to help you associate the chart objects to the
parameters they represent.
Using the legend feature, you can perform the following actions:
• Move your mouse pointer over a legend item or the legend color block to view more information about
the parameters it represents.
• Right-click the legend item to further investigate the item.
• Click a pie or bar chart legend item to hide the item in the chart. Click the legend item again to show the
hidden item. You can also click the corresponding graph item to hide and show the item.
• Click Legend, or the arrow beside it, if you want to remove the legend from your chart display.
Procedure
1. Click the Log Activity or Network Activity tab.
2. To create a grouped search, follow these steps:
a) On the toolbar, click Search > New Search.
b) From the Available Saved Searches, select a search and click Load.
c) Go to the Column Definition pane and if the Group By list box is empty, from the Available
Columns list, select a column.
d) Click Search.
3. To use a grouped search, on the toolbar, click Quick Searches and select a grouped search.
4. In the Charts pane, click the Configure icon ( ).
5. Configure the following parameters:
Parameter Description
Value to Graph The object type that you want to graph on the Y
axis of the chart.
Options include all normalized and custom event
or flow parameters that are included in your
search parameters.
6. If you selected the Time Series chart option and enabled the Capture Time Series Data option, in the
Charts pane, click Save .
7. To view the list of events or flows if your time range is greater than 1 hour, click Update Details.
flow searches, the resource restriction icon ( ) appears next to the search criteria.
Related concepts
Quick filter search options
Search event and flow payloads by typing a text search string that uses simple words or phrases.
Type Saved Search or Select from List Type the name of a saved search or a keyword to
filter the Available Saved Searches list.
Available Saved Searches This list displays all available searches, unless you
use Group or Type Saved Search or Select from
List options to apply a filter to the list. You can
select a saved search on this list to display or edit.
Search The Search icon is available in multiple panes on
the search page. You can click Search when you
are finished configuring the search and want to
view the results.
Include in my Quick Searches Select this check box to include this search in your
Quick Search menu.
Set as Default Select this check box to set this search as your
default search.
Share with Everyone Select this check box to share this search with all
other users.
Real Time (streaming) Displays results in streaming mode.
Note: When Real Time (streaming) is enabled, you
are unable to group your search results. If you
select any grouping option in the Column Definition
pane, an error message opens.
Last Interval (auto refresh) The Log Activity and Network Activity tabs are
refreshed at one-minute intervals to display the
most recent information.
Recent After you select this option, you must select a time
range option from the list.
Note: The results from the last minute might not
be available. Select the <Specific Interval> option if
you want to see all results.
Specific Interval After you select this option, you must select the
date and time range from the Start Time and End
Time calendars.
Data Accumulation Displayed when you load a saved search.
If no data is accumulating for this saved search,
the following information message is displayed:
Data is not being accumulated for this
search.
If data is accumulating for this saved search, the
following options are displayed:
When you click or hover your mouse over the
column link, a list of the columns that are
accumulating data opens.
Use the Enable Unique Counts/Disable Unique
Counts link to display unique event and flow
counts instead of average counts over time. After
you click the Enable Unique Counts link, a dialog
box opens and indicates which saved searches and
reports share the accumulated data.
Current Filters Displays the filters that are applied to this search.
Save results when the search is complete Saves the search results.
Available Columns Columns that are currently in use for this saved
search are highlighted and displayed in the
Columns list.
Add and remove column arrows (top set) Use the top set of arrows to customize the Group
By list.
• To add a column, select one or more columns
from the Available Columns list and click the
right arrow.
• To remove a column, select one or more columns
from the Group By list and click the left arrow.
Add and remove column arrows (bottom set) Use the bottom set of arrows to customize the
Columns list.
• To add a column, select one or more columns
from the Available Columns list and click the
right arrow.
• To remove a column, select one or more columns
from the Columns list and click the left arrow.
Move columns between the Group By list and the Move columns between the Group By list and the
Columns list Columns list by selecting a column in one list and
dragging it to the other.
Order By From the first list, select the column by which you
want to sort the search results. Then, from the
second list, select the order that you want to
display for the search results.
Results Limit Specifies the number of rows that a search returns
on the Edit Search window. The Results Limit field
also appears on the Results window.
• For a saved search, the limit is stored in the
saved search and re-applied when search is
loaded.
• When you are sorting a column in the search
result that has a row limit, sorting is done within
the limited rows, which are shown in the data
grid.
• For a grouped by search where time series chart
is turned on, the row limit applies only to the
data grid. The Top N list in the time series chart
controls how many time series are drawn in the
chart.
Procedure
1. Choose a search option:
• To search events, click the Log Activity tab.
• To search flows, click the Network Activity tab.
2. From the Search list, select New Search.
3. Select a previously saved search.
Procedure
1. On the Log Activity or the Network Activity tab, click Search > Edit Search.
2. In the Column Definition pane, select an existing column layout in the Display list.
When you modify the layout, the name in the Display list is automatically changed to Custom.
3. Modify your search grouping.
a) To add a column to your search group, select a column from the Available Columns list and click
the right arrow to move the column to the Group By list.
b) To move a column from the Columns list to your search group, select a column from the Columns
list and drag it to the Group By list.
c) To remove a column from your search group, select the column from the Group By list and click the
left arrow.
d) To change the order of your column groupings, use the up and down arrows or drag the columns
into place.
4. Modify your column layout.
a) To add a column to your custom layout, select a column from the Available Columns list and click
the right arrow to move the column to the Columns list.
b) To move a column from the Group By list to your custom layout, select a column from the Group
By list and drag it to the Columns list.
Procedure
1. On the Log Activity or the Network Activity tab, click Search > Edit Search.
2. In the Column Definition pane, select an existing user-created column layout in the Display list.
3. Click Delete Column Layout.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. Perform a search.
3. Click Save Criteria.
4. Enter values for the parameters:
Option Description
Parameter Description
Search Name Type the unique name that you want to assign to this search criteria.
Assign Search to Select the check box for the group you want to assign this saved search. If you
Group(s) do not select a group, this saved search is assigned to the Other group by
default. For more information, see Managing search groups.
Manage Groups Click Manage Groups to manage search groups. For more information, see
Managing search groups.
Timespan options: Choose one of the following options:
• Real Time (streaming) - Select this option to filter your search results while in
streaming mode.
• Last Interval (auto refresh) - Select this option to filter your search results
while in auto-refresh mode. The Log Activity and Network Activity tabs
refreshes at one-minute intervals to display the most recent information.
• Recent - Select this option and, from this list box, select the time range that
you want to filter for.
• Specific Interval- Select this option and, from the calendar, select the date
and time range you want to filter for.
Include in my Select this check box to include this search in your Quick Search list box on the
Quick Searches toolbar.
Include in my Select this check box to include the data from your saved search on the
Dashboard Dashboard tab. For more information about the Dashboard tab, see Dashboard
management.
Note: This parameter is only displayed if the search is grouped.
Set as Default Select this check box to set this search as your default search.
Share with Select this check box to share these search requirements with all users.
Everyone
5. Click OK.
Scheduled search
Use the Scheduled search option to schedule a search and view the results.
You can schedule a search that runs at a specific time of day or night. If you schedule a search to run in
the night, you can investigate in the morning. Unlike reports, you have the option of grouping the search
results and investigating further. You can search on number of failed logins in your network group. If the
result is typically 10 and the result of the search is 100, you can group the search results for easier
investigating. To see which user has the most failed logins, you can group by user name. You can continue
to investigate further.
You can schedule a search on events or flows from the Reports tab. You must select a previously saved
set of search criteria for scheduling.
1. Create a report
Specify the following information in the Report Wizard window:
• The chart type is Events/Logs or Flows.
• The report is based on a saved search.
Note: QRadar does not support reports based on AQL searches that contain subselect statements.
• Generate an offense.
You can choose the create an individual offense option or the add result to an existing offense
option.
You can also generate a manual search.
2. View search results
You can view the results of your scheduled search from the Offenses tab.
• Scheduled search offenses are identified by the Offense Type column.
If you create an individual offense, an offense is generated each time that the report is run. If you add
the saved search result to an existing offense, an offense is created the first time that the report runs.
The following table provides examples of AQL search strings for X-Force.
For more information about functions, search fields and operators, see the Ariel Query Language guide.
SELECT
REFERENCETABLE('user_data','FullName',username) as 'Full Name',
REFERENCETABLE('user_data','Location',username) as 'Location',
REFERENCETABLE('user_data','Manager',username) as 'Manager',
UNIQUECOUNT(username) as 'Userid Count',
UNIQUECOUNT(sourceip) as 'Source IP Count',
COUNT(*) as 'Event Count'
FROM events
WHERE qidname(qid) ILIKE '%logon%'
GROUP BY 'Full Name', 'Location', 'Manager'
LAST 1 days
SELECT
REFERENCEMAP('GlobalID Mapping',username) as 'Global ID',
REFERENCETABLE('user_data','FullName', 'Global ID') as 'Full Name',
UNIQUECOUNT(username),
COUNT(*) as 'Event count'
FROM events
WHERE RULENAME(creEventlist) ILIKE '%suspicious%'
GROUP BY 'Global ID'
LAST 1 days
The following query shows the activities that are completed by a global ID.
SELECT
QIDNAME(qid) as 'Event name',
starttime as 'Time',
sourceip as 'Source IP', destinationip as 'Destination IP',
username as 'Event Username',
REFERENCEMAP('GlobalID_Mapping', username)as 'Global User'
FROM events
WHERE 'Global User' = 'John Doe'
LAST 1 days
Tip: You can modify this query to work on proxy logs and other event types.
The following query detects potential instances of daily beaconing.
The following query detects daily beaconing between a source IP and a destination IP. The beaconing
times are not at the same time each day. The time lapse between beacons is short.
SELECT
sourceip,
LONG(DATEFORMAT(starttime,'hh')) as hourofday,
(AVG( hourofday*hourofday) - (AVG(hourofday)^2))as variance,
COUNT(*) as 'total flows'
FROM flows
GROUP BY sourceip, destinationip
HAVING variance < 01 and "total flows" < 10
LAST 7 days
The following query detects daily beaconing to a domain by using proxy log events. The beaconing times
are not at the same time each day. The time lapse between beacons is short.
SELECT sourceip,
LONG(DATEFORMAT(starttime,'hh')) as hourofday,
(AVG(hourofday*hourofday) - (AVG(hourofday)^2)) as variance,
COUNT(*) as 'total events'
FROM events
WHERE LOGSOURCEGROUPNAME(devicegrouplist) ILIKE '%proxy%'
GROUP BY url_domain
HAVING variance < 0.1 and "total events" < 10
LAST 7 days
Select
REFERENCETABLE('ip_threat_data','Category',destinationip) as 'Category',
REFERENCETABLE('ip_threat_data','Rating', destinationip) as 'Threat Rating',
UNIQUECOUNT(sourceip) as 'Source IP Count',
UNIQUECOUNT(destinationip) as 'Destination IP Count'
FROM events
GROUP BY 'Category', 'Threat Rating'
LAST 1 days
SELECT
ASSETPROPERTY('Location',sourceip) as location,
COUNT(*) as 'event count'
FROM events
GROUP BY location
LAST 1 days
The following query shows how you can use advanced searches and user identity tracking in the asset
model.
The AssetUser function retrieves the user name from the asset database.
SELECT
APPLICATIONNAME(applicationid) as App,
ASSETUSER(sourceip, now()) as srcAssetUser,
COUNT(*) as 'Total Flows'
FROM flows
WHERE srcAssetUser IS NOT NULL
GROUP BY App, srcAssetUser
ORDER BY "Total Flows" DESC
LAST 3 HOURS
The following query returns events that triggered a specific rule name.
Related tasks
Creating a custom property
Create a custom property to extract data that IBM QRadar does not typically show from the event or flow
payloads. Custom properties must be enabled, and extraction-based custom properties must be parsed,
before you can use them in rules, searches, reports, or for offense indexing.
Procedure
1. Click the Log Activity or Network Activity tab.
2. From the Search list, select New Search or Edit Search.
3. Select a previously saved search.
4. Click Show AQL.
5. From the AQL window, click Copy to Clipboard.
6. In the Search Mode section, click Advanced Search.
7. Paste the AQL string text into the Advanced Search text box.
8. Modify the string to include the data you want to find.
9. Click Search to display the results.
What to do next
Save the search criteria so that the search appears in your list of saved searches and can be reused.
Related concepts
“Advanced search options” on page 116
Use the Advanced Search field to enter an Ariel Query Language (AQL) that specifies the fields that you
want and how you want to group them to run a query.
“AQL search string examples” on page 117
Use the Ariel Query Language (AQL) to retrieve specific fields from the events, flows, and simarc tables in
the Ariel database.
Related tasks
“Creating a customized search” on page 109
You can search for data that match your criteria by using more specific search options. For example, you
can specify columns for your search, which you can group and reorder to more efficiently browse your
search results.
“Saving search criteria” on page 114
Procedure
1. Click the Network Activity tab.
2. From the Search list, select New Search.
3. In the Column Definition section, scroll down the list of available columns and add Flow Direction
Algorithm to the list of columns to display on the tab.
4. Click Filter. The Flow Direction Algorithm column appears on the Network Activity tab, displaying a
value that represents the algorithm that was used.
Results
The Flow Direction Algorithm now appears in the Flow Details window for all flows.
Procedure
1. Click the Network Activity tab.
2. From the Search list, select New Search.
3. In the Column Definition section, scroll down the list of available columns and add Application
Determination Algorithm to the list of columns to display on the tab.
4. Click Filter. The Application Determination Algorithm column appears on the Network Activity tab,
with one of the values to represent the algorithm that was used.
5. Pause the event streaming and click a flow to investigate in the Flow Details window.
Note: When you use the Application Determination Algorithm, the Event Description field no longer
appears because the application algorithm contains that information.
AWS Action The numerical values for the AWS Action field map to the following
descriptions:
• 0 = N/A
• 1 = Accept
• 2 = Reject
AWS Log Status The numerical values for the AWS Log Status field map to the following
descriptions:
• 0 = N/A
• 1 = OK
• 2 = No Data
• 3 = Skip Data
Procedure
To include the description for the enumerated property in your query results, you must include the
LOOKUP function in your AQL search string.
a) Click the Network Activity tab.
For example, the following query uses a LOOKUP in the WHERE clause and groups the accepted flows
by application:
In this example, the query uses a LOOKUP in the SELECT clause to show the number of accepted flows
vs rejected flows in the AWS environment:
For more information about using the Add Filter search option, see the “Quick filter search options” on
page 122 topic.
For more information about using the Advanced Search option, see the “Advanced search options” on
page 116 topic.
Field Element ID
mplsTopLabelType 46
mplsTopLabelIPv4Address 47
mplsTopLabelStackSection 70
mplsLabelStackSection2 71
mplsLabelStackSection3 72
mplsLabelStackSection4 73
mplsLabelStackSection5 74
mplsLabelStackSection6 75
For more information about each field, see the IANA information element assignment at IP Flow
Information Export (IPFIX) Entities (https://www.iana.org/assignments/ipfix/ipfix.xhtml).
Offense searches
You can search offenses by using specific criteria to display offenses that match the search criteria in a
results list.
You can create a new search or load a previously saved set of search criteria.
Source IP In this field, you can type the source IPv4 or IPv6
address or CIDR range you want to search for.
Destination IP In this field, you can type the destination IPv4 or
IPv6 address or CIDR range you want to search for.
Magnitude From this list box, you can specify a magnitude and
then select to display only offenses with a
magnitude that is equal to, less than, or greater
than the configured value. The range is 0 - 10.
Severity From this list box, you can specify a severity and
then select to display only offenses with a severity
that is equal to, less than, or greater than the
configured value. The range is 0 - 10.
Credibility From this list box, you can specify a credibility and
then select to display only offenses with a
credibility that is equal to, less than, or greater
than the configured value. The range is 0 - 10.
Relevance From this list box, you can specify a relevance and
then select to display only offenses with a
relevance that is equal to, less than, or greater
than the configured value. The range is 0 - 10.
Contains Username In this field, you can type a regular expression
(regex) statement to search for offenses containing
a specific user name. When you define custom
regex patterns, adhere to regex rules as defined by
the Java™ programming language. For more
information, you can refer to regex tutorials
available on the web.
Source Network From this list box, you can select the source
network that you want to search for.
Destination Network From this list box, you can select the destination
network that you want to search for.
High Level Category From this list box, you can select the high-level
category that you want to search for. .
Low Level Category From this list box, you can select the low-level
category that you want to search for.
Reason For Closing This parameter is only displayed when the Closed
Offenses check box is cleared in the Exclude pane.
From this list box, you can select a reason that you
want to search closed offenses for or select Any to
display all closed offenses.
Events From this list box, you can specify an event count
and then select to display only offenses with an
event count that is equal to, less than, or greater
than the configured value.
Flows From this list box, you can specify a flow count and
then select to display only offenses with a flow
count that is equal to, less than, or greater than the
configured value.
Total Events/Flows From this list box, you can specify a total event and
flow count and then select to display only offenses
with a total event and flow count that is equal to,
less than, or greater than the configured value.
Destinations From this list box, you can specify a destination IP
address count and then select to display only
offenses with a destination IP address count that is
equal to, less than, or greater than the configured
value.
Log Source Group From this list box, you can select a log source
group that contains the log source you want to
search for. The Log Source list box displays all log
sources that are assigned to the selected log
source group.
Log Source From this list box, you can select the log source
that you want to search for.
The following table describes the options available in the Offense Type list box:
Procedure
1. Click the Offenses tab.
2. From the Search list box, select New Search.
3. Choose one of the following options:
• To load a previously saved search, go to Step 4.
• To create a new search, go to Step 7.
4. Select a previously saved search using one of the following options:
• From the Available Saved Searches list, select the saved search that you want to load.
• In the Type Saved Search or Select from List field, type the name of the search you want to load.
5. Click Load.
6. Optional. Select the Set as Default check box in the Edit Search pane to set this search as your
default search. If you set this search as your default search, the search automatically performs and
displays results each time you access the Offenses tab.
7. On the Time Range pane, select an option for the time range you want to capture for this search. See
Table 1.
8. On the Search Parameters pane, define your specific search criteria. See Table 1.
9. On the Offense Source pane, specify the offense type and offense source you want to search:
a) From the list box, select the offense type that you want to search for.
b) Type your search parameters. See Table 2.
10. In the Column Definition pane, define the order in which you want to sort the results:
a) From the first list box, select the column by which you want to sort the search results.
b) From the second list box, select the order that you want to display for the search results. Options
include Descending and Ascending.
11. Click Search.
What to do next
Saving search criteria on the Offense tab
Procedure
1. Click the Offenses tab.
2. Click By Source IP.
3. From the Search list box, select New Search.
4. On the Time Range pane, select an option for the time range you want to capture for this search. See
Table 1.
5. On the Search Parameters pane, define your specific search criteria. See Table 1.
6. On the Column Definition pane, define the order in which you want to sort the results:
a) From the first list box, select the column by which you want to sort the search results.
b) From the second list box, select the order that you want to display for the search results. Options
include Descending and Ascending.
7. Click Search.
What to do next
Saving search criteria on the Offense tab
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click By Destination IP.
3. From the Search list box, select New Search.
4. On the Time Range pane, select an option for the time range you want to capture for this search. See
Table 1.
5. On the Search Parameters pane, define your specific search criteria. See Table 1.
6. On the Column Definition pane, define the order in which you want to sort the results:
a) From the first list box, select the column by which you want to sort the search results.
b) From the second list box, select the order in which you want to display the search results. Options
include Descending and Ascending.
7. Click Search.
What to do next
Saving search criteria on the Offense tab
Table 32. Search options for search offense data on the By Networks page
Option Description
Network From this list box, you can select the network that
you want to search for.
Magnitude From this list box, you can specify a magnitude,
and then select display only offenses with a
magnitude that is equal to, less than, or greater
than the configured value.
VA Risk From this list box, you can specify a VA risk, and
then select display only offenses with a VA risk that
is equal to, less than, or greater than the
configured value.
Event/Flows From this list box, you can specify an event or flow
count, and then select display only offenses with
an event or flow count that is equal to, less than, or
greater than the configured value.
Procedure
1. Click the Offenses tab.
2. Click By Networks.
3. From the Search list box, select New Search.
4. On the Search Parameters pane, define your specific search criteria. See Table 1.
5. On the Column Definition pane, define the order in which you want to sort the results:
a) From the first list box, select the column by which you want to sort the search results.
b) From the second list box, select the order in which you want to display the search results. Options
include Descending and Ascending.
6. Click Search.
What to do next
Saving search criteria on the Offense tab
Procedure
1. Procedure
2. Perform a search. See Offense searches.
3. Click Save Criteria.
4. Enter values for the following parameters:
Set as Default Select this check box to set this search as your default search.
5. Click OK.
Procedure
1. Click the Offenses tab.
2. From the Search list, select New Search.
3. On the Offense Source pane, select the custom property in the Offense Type list.
The Offense Type list shows only normalized fields and custom properties that are used as rule
indexes. You cannot use Offense Source to search DateTime properties.
4. Optional: To search for offenses that have a specific value in the custom property capture result, type
the value that you want to search for in the filter box.
5. Configure other search parameters to satisfy your search requirements.
6. Click Search.
Results
All offenses that meet the search criteria are shown in the offense list. When you view the offense
summary, the custom property that you searched on is shown in the Offense Type field. The custom
Procedure
1. To do a lazy search for quick filters, do these steps:
a) On the Log Activity tab, in the Quick Filter field, enter a value.
b) From the View list, select a time range.
2. To do a lazy search for basic searches, do these steps:
a) On the Log Activity tab, click Search > New Search.
b) Select a Recent time range or set a Specific Interval.
c) Ensure that Order by field value is set to Start Time and the Results Limit field value is 1000 or
less. Aggregated columns must not be included in the search.
d) Enter a value for the Quick Filter parameter and click Add Filter.
3. To disable lazy search completely, do these steps:
a) Click the System Settings on the Admin tab.
b) In the System Settings window, remove any values from the Default Search Limit field.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. From the Search list box, select New Search or Edit Search.
What to do next
If the saved search criteria was associated with other QRadar objects, access the associated objects that
you noted and edit the objects to remove or replace the association with the deleted saved search.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. Perform a search.
3. When your search is complete, add another filter:
a) Click Add Filter.
b) From the first list box, select a parameter that you want to search for.
c) From the second list box, select the modifier that you want to use for the search. The list of
modifiers that are available depends on the attribute that is selected in the first list.
d) In the entry field, type specific information that is related to your search.
e) Click Add Filter.
Results
The Original Filter pane specifies the original filters that are applied to the base search. The Current Filter
pane specifies the filters that are applied to the subsearch. You can clear subsearch filters without
restarting the base search. Click the Clear Filter link next to the filter you want to clear. If you clear a
filter from the Original Filter pane, the base search is relaunched.
What to do next
Save search criteria
Canceling a search
While a search is queued or in progress, you can cancel the search on the Manage Search Results page.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. From the Search menu, select Manage Search Results.
3. Select the queued or in progress search result you want to cancel.
4. Click Cancel.
5. Click Yes.
Deleting a search
If a search result is no longer required, you can delete the search result from the Manage Search Results
page.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. From the Search menu, select Manage Search Results.
3. Select the search result that you want to delete.
4. Click Delete.
5. Click Yes.
The Event Search Group, Flow Search Group, and Offense Search Group window toolbars provide the
following functions.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. Select Search >Edit Search.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. Select Search Edit Search.
3. Click Manage Groups.
4. Select the folder for the group under which you want to create the new group.
5. Click New Group.
6. In the Name field, type a unique name for the new group.
7. Optional. In the Description field, type a description.
8. Click OK.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. Select Search > Edit Search.
3. Click Manage Groups.
4. Select the group that you want edit.
5. Click Edit.
6. Edit the parameters:
• Type a new name in the Name field.
• Type a new description in the Description field.
7. Click OK.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. Select Search > Edit Search.
3. Click Manage Groups.
4. Select the saved search that you want to copy.
5. Click Copy.
6. On the Item Groups window, select the check box for the group you want to copy the saved search to.
Procedure
1. Choose one of the following options:
• Click the Log Activity tab.
• Click the Network Activity tab.
2. Select Search > Edit Search.
3. Click Manage Groups.
4. Choose one of the following options:
• Select the saved search that you want to remove from the group.
• Select the group that you want to remove.
5. Click Remove.
6. Click OK.
IBM QRadar normalizes standard information that is parsed by the DSM, such as user names, IP
addresses, and ports.
Some event sources send unique information that is not normalized. You can use custom properties to
extract that data from the event or flow payload, and then use the non-normalized data in custom rules,
searches, and reports.
The type of custom property that you create depends on the method that you want to use to define the
non-normalized data in the payload.
Extraction-based properties
Create an extraction-based property when you want to use a regex or JSON expression to parse the
property values from the event or flow payloads.
For example, you have a report that shows all the users who changed other user's permissions on an
Oracle server. The report uses normalized data to show the list of users who made the permission
changes and the number of changes they made. The user account that was changed is not normalized and
cannot be shown in the report. You can create a regex-based custom property to extract this information
from the logs, and then use the property in searches and reports.
When the event or flow is parsed, the expression pattern is tested against each payload until the pattern
matches. The first pattern to match the event or flow payload determines the data to be extracted.
When you define custom regex patterns, follow the regex rules as defined by the Java programming
language. To learn more about regex rules, you can view regex tutorials on the web.
Calculation-based properties
Create a calculation-based property when you want to do calculations on existing numeric event and flow
properties. For example, you can create a calculation-based property that divides one numeric property
by another numeric property to display a percentage value.
AQL-based properties
Create an AQL-based property when you want to combine multiple extraction and calculation-based
properties into a single property. For example, you can use AQL-based custom properties to combine
extraction-based URLs, virus names, or secondary user names into a single property.
CONCAT( 'Src=', sourceip, ' | ', 'User=', username, ' | ', 'Domain=',
DOMAINNAME(domainid) )
Note: The AQL expression can include AQL functions.
It does not support expressions that use SELECT, FROM, or database names.
You cannot use aggregate functions, such as SUM or GROUP, or other AQL-based custom properties.
Procedure
1. Click the Log Activity tab or the Network Activity tab.
2. If you are viewing the events or flows in streaming mode, click the Pause icon to pause streaming.
3. Double-click the event or flow that contains the data that you want to extract, and then click Extract
Property.
4. In the Property Type Selection pane, select the type of custom property that you want to create.
5. Configure the custom property parameters.
Click the help icon ( ) to see information about the custom property parameters.
6. If you are creating an extraction-based custom property that is to be used in rules, search indexes, or
forwarding profiles, ensure that the Parse in advance for rules, reports, and searches check box is
selected.
7. Click Test to test the expression against the payload.
8. Click Save.
What to do next
“Modifying or deleting a custom property” on page 153
Related concepts
AQL search string examples
Procedure
1. Choose one of the following options:
• To edit or delete a custom event property, click the Log Activity tab.
• To edit or delete a custom flow property, click the Network Activity tab.
2. From the Search list box, select Edit Search.
3. Click Manage Custom Properties.
4. Select the property from the list, and click Edit, Copy, or Delete.
5. Make the required changes to the property, and then click Save.
Procedure
1. Log in to QRadar and click the Admin tab.
2. From the Data Sources section, click Custom Event Properties, and then click Add.
3. In the Property Type Selection section, select Extraction Based.
4. In the Test Field, enter the event payload that you want to use to test your custom property.
5. In the Property Definition section, complete the following steps:
a) If you're adding an expression to an existing property, select Existing Property and select a
property from the list.
b) If you're defining a new property, select New Property and enter the name of the property.
For an event in a nested JSON format, a valid JSON expression is in the form:
The following two examples show how to extract data from a JSON record.
• Simple case of an event for a flat JSON record:
To extract just the 'last_name' value from the 'user' subobject, type this expression:
/"user"/"last_name"
LEEF:1.0|ABC Company|SystemDefender|1.13|console_login|devTimeFormat=yyyy-MM-
dd'T'HH:mm:ss.SSSZ
devTime=2017-10-18T11:26:03.060+0200 usrName=flastname name=Firstname Lastname
authType=interactivePassword src=192.168.0.1
• Simple case of an event formatted in LEEF V2.0 with the caret (^) separator character:
LEEF:2.0|ABC Company|SystemDefender|1.13|console_login|^|devTimeFormat=yyyy-
MMdd'T'HH:mm:ss.SSSZ^
devTime=2017-10-18T11:26:03.060+0200^usrName=flastname^name=Firstname Lastname
^authType=interactivePassword^src=192.168.0.1
To extract the 'usrName' property, type usrName in the LEEF Key field.
The possible keys that can be extracted in these examples are:
– devTimeFormat
– devTime
– usrName
– name
– authType
– src
To extract a header key property, type the key in the following format in the LEEF Key field:
$eventid$
The LEEF header values can be extracted by using the following expressions:
– $leefversion$
– $vendor$
– $product$
– $version$
– $eventid$
j) If the extraction method is CEF Key, enter the CEF expression.
Note: Valid CEF expressions are in the form of either a single key reference, or a special CEF header
field reference.
The following example shows how to extract data from a CEF record.
• Simple case of an event formatted in CEF:
To extract the 'cs1' property, type cs1 in the CEF Key field.
The possible keys that can be extracted in the example are:
– start
– duser
– cs1
– cs1Label
– cs2
– cs2Label
$id$
The CEF header values can be extracted by using the following expressions:
– $cefversion$
– $vendor$
– $product$
– $version$
– $id$
– $name$
– $severity$
k) If you chose the Numeric Field Type in the Property Definition section, select a number format in
the Extracted Number Format field in the Format section to define any digit group separators for
the locale of the custom property.
l) If you chose the Date/Time Field Type in the Property Definition section, enter a format in the
Extracted Date/Time Format and Locale fields in the Format section to define the date and time
for the locale of the custom property.
m) Click Test to test the property expression definition.
7. Click Save.
Use case: Create a report that uses event data that is not normalized
You can use a custom property to extract data that is not normalized from a payload, and use that data to
build a report. For example, you can build a report that is based on the interface information that is in
Cisco ASA firewall deny messages.
In this example, we'll use the following sample Cisco ASA firewall events to demonstrate how to extract
the interface value from the event payload, and then build a report that uses that data.
Rule types
Each of the event, flow, common, and offense rule types test against incoming data from different sources
in real time. There are multiple types of rule tests. Some check for simple properties from the data set.
Other rule tests are more complicated. They track multiple, event, flow, and offense sequences over a
period of time and use "counter" that is on one or more parameters before a rule response is triggered.
Event rules
Test against incoming log source data that is processed in real time by the QRadar Event Processor.
You create an event rule to detect a single event or event sequences. For example, to monitor your
network for unsuccessful login attempts, access multiple hosts, or a reconnaissance event followed
by an exploit, you create an event rule. It is common for event rules to create offenses as a response.
Flow rules
Test against incoming flow data that is processed by the QRadar Flow Processor. You can create a
flow rule to detect a single flow or flow sequences. It is common for flow rules to create offenses as a
response.
Common rules
Test against event and flow data. For example, you can create a common rule to detect events and
flows that have a specific source IP address. It is common for common rules to create offenses as a
response.
Offense rules
Test the parameters of an offense to trigger more responses. For example, a response generates
when an offense occurs during a specific date and time. An offense rule processes offenses only when
changes are made to the offense. For example, when new events are added, or the system scheduled
the offense for reassessment. It is common for offense rules to email a notification as a response.
Managing rules
You can create, edit, assign rules to groups, and delete groups of rules. By categorizing your rules or
building blocks into groups, you can efficiently view and track your rules. For example, you can view all
rules that are related to compliance.
Domain-specific rules
If a rule has a domain test, you can restrict that rule so that it is applied only to events that are happening
within a specified domain. An event that has a domain tag that is different from the domain that is set on,
the rule does not trigger a response.
To create a rule that tests conditions across the entire system, set the domain condition to Any Domain.
Rule conditions
Most rule tests evaluate a single condition, like the existence of an element in a reference data collection
or testing a value against a property of an event. For complex comparisons, you can test event rules by
building an Ariel Query Language (AQL) query with WHERE clause conditions. You can use all of the
WHERE clause functions to write complex criteria that can eliminate the need to run numerous individual
tests. For example, use an AQL WHERE clause to check whether inbound SSL or web traffic is being
tracked on a reference set.
Procedure
1. From the Offenses, Log Activity, or Network Activity tabs, click Rules.
2. From the Display list, select Rules to create a new rule.
3. Optional: From the Display list, select Building Blocks to create a new rule by using building blocks.
4. From the Actions list, select a rule type.
Each rule type tests against incoming data from different sources in real time. For example, event
rules test incoming log source data and offense rules test the parameters of an offense to trigger
more responses.
5. On the Rule Test Stack Editor page, in the Rule pane, type a unique name that you want to assign to
this rule in the Apply text box.
6. From the list box, select Local or Global.
• If you select Local, all rules are processed on the Event Processor on which they were received and
offenses are created only for the events that are processed locally.
• If you select Global, all matching events are sent to the QRadar Console for processing and
therefore, the QRadar Console uses more bandwidth and processing resources.
Learn more about Local and Global rules:
Global rule tests
Use global rules to detect things like "multiple user login failures" where the events from that
user might appear on multiple Event Processors. For example, if you configured this rule for 5
login failures in 10 minutes from the same user name, and set as a Local rule, all 5 of those login
failures must appear on the same Event Processor. Therefore, if 3 login failures were on one
Table 35. Event , Flow and Common Rule, and Offense Rule Response page parameters
Parameter Description
Drop the detected event Forces the matched event or flow to bypass all other rules in the
rule engine and prevents it from creating an offense. The event is
written to storage for searching and reporting.
Dispatch New Event Select this check box to dispatch a new event in addition to the
original event or flow, which is processed like all other events in
the system.
Dispatches a new event with the original event, and is processed
like all other events in the system.
The Dispatch New Event parameters are displayed when you
select this check box. By default, the check box is clear.
Severity The severity level that you want to assign to the event, where 0 is
the lowest and 10 is the highest. The severity is displayed in the
Annotation pane of the event details.
Credibility The credibility that you want to assign to the log source. For
example, is the log source noisy or expensive? The range is 0
(lowest) to 10 (highest) and the default is 10. Credibility is
displayed in the Annotation pane of the event details.
Send to Local SysLog If you want to log the event or flow locally, select this check box.
By default, this check box is clear.
Note: Only normalized events can be logged locally on an
appliance. If you want to send raw event data, you must use the
Send to Forwarding Destinations option to send the data to a
remote syslog host.
Send to Forwarding Destinations If you want to log the event or flow on a forwarding destination,
select this check box.
A forwarding destination is a vendor system, such as SIEM,
ticketing, or alerting systems. When you select this check box, a
list of forwarding destinations is displayed.
To add, edit, or delete a forwarding destination, click the Manage
Destinations link.
Add to Reference Set Adds events that are generated as a result of this rule to a
reference set. You must be an administrator to add data to a
reference set.
To add data to a reference set, follow these steps:
a. From the first list, select the property of the event or flow that
you want to add.
b. From the second list, select the reference set to which you
want to add the specified data.
Add to Reference Data To use this rule response, you must create the reference data
collection.
Remove from Reference Set If you want this rule to remove data from a reference set, select
this check box.
To remove data from a reference set:
a. From the first list box, select the property of the event or flow
that you want to remove. Options include all normalized or
custom data.
b. From the second list box, select the reference set from which
you want to remove the specified data.
The Remove from Reference Set rule response provides the
following function:
Refresh
Click Refresh to refresh the first list box to ensure that the list
is current.
Remove from Reference Data To use this rule response, you must have a reference data
collection.
Execute Custom Action You can write scripts that do specific actions in response to
network events. For example, you might write a script to create a
firewall rule that blocks a particular source IP address from your
network in response to repeated login failures.
You add and configure custom actions by using the Define
Actions icon on the Admin tab.
Publish on the IF-MAP Server If the IF-MAP parameters are configured and deployed in the
system settings, select this option to publish the event
information about the IF-MAP server.
Response Limiter Configures the frequency in which you want this rule to respond.
Offense Name If you want the Event Name information to contribute to the
name of the offense, select the This information should
contribute to the name of the offense option.
If you want the configured Event Name to be the name of the
offense, select the This information should set or replace the
name of the offense option.
Note: This option does not rename existing offenses. To rename
an existing offense, you must use the Offense Rule option This
information should set or replace the name of the offense.
10. To verify that the event triggers the rule test based on your building block, you can create an email
response. See “Sending email notifications” on page 47.
Related information
Managing Custom Rules in QRadar SIEM
Procedure
1. From the, Log Activity, or Network Activity tabs, click the pause on the upper right to stop real-time
streaming of events or flows.
2. Select the event that you want to tune.
3. Click False Positive.
4. Select an event or flow property option.
5. Select a traffic direction option.
6. Click Tune.
Results
The event or flow that matches the specified criteria will no longer correlates into offenses. To edit false
positive tuning, use the User-BB_FalsePositive: User Defined Positive Tunings building block in the
Rules section on the Offenses tab.
Anomaly rules
Test event and flow traffic for changes in short-term events when you are comparing against a longer time
frame. For example, new services or applications that appear in a network, a web server crashes, firewalls
that all start to deny traffic.
Example: You want to be notified when one of your firewall devices is reporting more often than it usually
does because your network might be under attack. You want to be notified when you receive twice as
many events in 1 hour. You follow these steps:
1. Create and save a search that groups by log source, and displays only the count column.
2. Apply the saved search to an anomaly rule, and add the rule test, and when the average value (per
interval) of count over the last 1 hour is at least 100% different from the average value (per
interval) of the same property over the last 24 hours.
Behavioral rules
Test events or flows for volume changes that occur in regular patterns to detect outliers. For example, a
mail server that has an open relay and suddenly communicates with many hosts or an IPS (intrusion
protection systems) that start to generate numerous alert activity.
A behavior rule that learns the rate or volume of a property over a pre-defined season. The season defines
the baseline comparison timeline for what you are evaluating. When you set a season of 1 week, the
behavior for the property over that 1 week is learned and than you use rule tests to alert you to the
changes.
After a behavioral rule is set, the seasons adjust automatically. As the data in the season is learned and is
continually evaluated so that business growth is profiled within the season, you do not have to make
changes to your rules. The longer that a behavioral rule runs, the more accurate it is over time. You can
then adjust the rule responses to capture more subtle changes.
You want to detect changes in traffic or properties that are always present such as mail traffic, firewall
traffic, bytes transferred by common protocols such as 443 traffic, or applications that are common
within your network. Define a pattern, traffic type, or data type that you can track to generate an overall
trend or historical analysis. Assign rule tests against that pattern to alert you to special conditions.
Example: You add and when the importance of the current traffic level (on a scale of 0 to 100) is 70
compared to learned traffic trends and behavior to the rule test, the system sends an alert when the
traffic that is set in your season time frame is +70 or -70 of the learned behavior.
The following table describes the Behavioral rule test parameter options.
Current traffic trend Weight of changes in the data for each time
interval. This rule test asks the question, "How
much does the data change when it compares this
minute to the minute before?"
Current traffic behavior Weight of the seasonal effect for each period. This
rule test asks the question, "Did the data increase
the same amount from week 2 to week 3, as it did
from week 1 to week 2?"
Predicted value Use predicted values to scale baselines to make
alerting more or less sensitive.
Procedure
1. Click the Log Activity or Network Activity tab.
The following table provides the Rule Response page parameters if the rule type is Anomaly.
Offense Naming If you want the Event Name information to contribute to the name
of the offense, select the This information should contribute to
the name of the associated offense(s) option.
If you want the configured Event Name to contribute to the
offense, select the This information should set or replace the
name of the associated offense(s).
Note: After you replace the name of the offense, the name won't
change until the offense is closed. For example, if an offense is
associated with more than one rule, and the last event doesn't
trigger the rule that is configured to override the name of the
offense, the offense's name won't be updated by the last event.
Instead, the offense name remains the name that is set by the
override rule.
Severity The severity level that you want to assign to the event. The range
is 0 (lowest) to 10 (highest) and the default is 5. The Severity is
displayed in the Annotations pane of the event details.
Credibility The credibility that you want to assign to the log source. For
example, is the log source noisy or expensive? Using the list
boxes, select the credibility of the event. The range is 0 (lowest)
to 10 (highest) and the default is 5. Credibility is displayed in the
Annotations pane of the event details.
Relevance The relevance that you want to assign to the weight of the asset.
For example, how much do you care about the asset? Using the
list boxes, select the relevance of the event. The range is 0
(lowest) to 10 (highest) and the default is 5. Relevance is
displayed in the Annotations pane of the event details.
Ensure that the dispatched As a result of this rule, the event is forwarded to the magistrate. If
event is part of an offense an offense exists, this event is added. If no offense was created
on the Offenses tab, a new offense is created.
Notify Events that generate as a result of this rule are displayed in the
System Notifications item in the Dashboard tab. If you enable
notifications, configure the Response Limiter parameter.
Send to Local SysLog Select this check box if you want to log the event or flow locally.
By default, the check box is clear.
Note: Only normalized events can be logged locally on a QRadar
appliance. If you want to send raw event data, you must use the
Send to Forwarding Destinations option to send the data to a
remote syslog host.
Add to Reference Set Adds events that are generated as a result of this rule to a
reference set. You must be an administrator to add data to a
reference set.
To add data to a reference set, follow these steps:
a. From the first list, select the property of the event or flow that
you want to add.
b. From the second list, select the reference set to which you
want to add the specified data.
Add to Reference Data To use this rule response, you must create the reference data
collection.
Remove from Reference Set If you want this rule to remove data from a reference set, select
this check box.
To remove data from a reference set, follow these steps:
a. From the first list, select the property of the event or flow that
you want to remove.
b. From the second list, select the reference set from which you
want to remove the specified data.
Remove from Reference Data To use this rule response, you must have a reference data
collection.
Execute Custom Action You can write scripts that do specific actions in response to
network events. For example, you might write a script to create a
firewall rule that blocks a particular source IP address from your
network in response to repeated login failures.
Select this check box and select a custom action from the Custom
action to execute list.
You add and configure custom actions by using the Define
Actions icon on the Admin tab.
Publish on the IF-MAP Server If the IF-MAP parameters are configured and deployed in the
system settings, select this option to publish the offense
information about the IF-MAP server.
Response Limiter Select this check box and use the list boxes to configure the
frequency with which you want this rule to respond
Enable Rule Select this check box to enable this rule. By default, the check
box is selected.
Procedure
1. Create the reference data collection by using the Reference Set Management widget on the Admin
tab.
You can also create a reference data collection by using the ReferenceDataUtil.sh script.
2. Create a rule by using the Rules wizard.
Procedure
1. Click the Offenses or Network Activity tab.
2. Click Rules.
3. From the Display list, select Building Blocks.
4. Double-click the building block that you want to edit.
5. Update the building block, as necessary.
6. Click Next.
7. Continue through the wizard.
8. Click Finish.
Related information
Overview of Building Blocks in QRadar SIEM
When events or flows are routed to storage, QRadar begins collecting metrics on enabled rules for
efficiency measures. Metrics are collected on all event, common, and flow rules. When you save rule
updates, the metrics are cleared for the rules that you updated to avoid any confusion around
performance and updated rules. This option is configurable by an Administrator.
You can sort rules by their performance metrics and identify the more expensive rules. When you review
the rules, you can adjust the tests to optimize each rule, and reduce the load on the system.
With rule performance visualization, you see how expensive the rules are. QRadar operations teams can
monitor any expensive rules and ensure that they do not cause future performance issues.
By having rules run efficiently, the workload on the system can decrease. Over time, this efficiency can
help QRadar avoid any performance degradations around rules, which cause rules to bypass rule
correlation. As a result, potential suspect activity might not trigger a notification, potentially missing
future security-related issues.
For more information about tuning rules, see the IBM QRadar Tuning Guide.
For more information about tuning rules, see the Custom" rule testing order" topic in the IBM QRadar
Tuning Guide.
Related concepts
“Rules” on page 157
Rules, sometimes called correlation rules are applied to events, flows, or offenses to search for or detect
anomalies. If all the conditions of a test are met, the rule generates response.
Data selection
The profile uses a saved search to collect the historical event and flow data to use in the run. Ensure that
your security profile grants permission to view the events and flows that you want to include in the
historical correlation run.
Offense creation
Historical correlation runs create offenses only when a rule is triggered and the rule action specifies that
an offense must be created. A historical correlation run does not contribute to a real-time offense, nor
does it contribute to an offense that was created from an earlier historical correlation run, even when the
same profile is used.
The maximum number of offenses that can be created by a historical correlation run is 100. The historical
correlation run stops when the limit is reached.
You can view historical offenses on the Threat and Security Monitoring dashboard and on the Offenses
tab at the same time that you review real-time offenses.
Procedure
1. Open the Historical Correlation dialog box.
• On the Log Activity tab, click Actions > Historical Correlation.
• On the Network Activity tab, click Actions > Historical Correlation.
• On the Offenses tab, click Rules > Actions > Historical Correlation.
2. Select a profile and click View History.
a) If the historical correlation run status is Completed and the Offense Count is 0, the profile rules
did not trigger any offenses.
b) If the historical correlation run created offenses, in the Offense Count column, click the link to see
a list of the offenses that were created.
If only one offense was created, the offense summary is shown.
3. In the Catalogs column, click the links to see the list of events that either fully or partially match the
profile rules.
The StartTime column in the event list represents the time that QRadar received the event.
For more information about the current threat level, click the Learn More link to open the Current Threat
Activity page on the IBM X-Force Exchange website.
To view a summary of the current advisories, click the arrow icon next to the advisory. To investigate the
full advisory, click the advisory link.
Procedure
1. Click the Log Activity tab.
2. On the toolbar, click Rules > Rules.
3. From the Group menu, click Threats.
The Group column might show both legacy and enhanced rules. By default, X-Force legacy rules are
disabled. However, you might see legacy rules that are enabled. Use the newer enhanced rules in the
Threat group, and not the legacy rules that use the remote nets.
4. Select the X-Force rules in the Threat group and click Actions > Enable/Disable.
Procedure
1. To look up an IP address in X-Force Exchange from QRadar, follow these steps:
a) Select the Log Activity or the Network Activity tab.
b) Right-click the IP address that you want to view in X-Force Exchange and select More Options >
Plugin Options > X-Force Exchange Lookup to open the X-Force Exchange interface.
2. To look up a URL in X-Force Exchange from QRadar, follow these steps:
a) Select either the Offenses tab, or the event details windows available on the Offenses.
b) Right-click the URL you want to look up in X-Force Exchange and select Plugin Options > X-Force
Exchange Lookup to open the X-Force Exchange interface.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Actions list, select New Event Rule.
4. Read the introductory text on the Rule wizard and click Next.
5. Click Events and click Next.
6. From the Test Group list box, select X-Force Tests.
7. Click the plus (+) sign beside the when URL (custom) is categorized by X-Force as one of the
following categories test.
8. In the enter rule name here field in the Rule pane, type a unique name that you want to assign to this
rule.
9. From the list box, select Local or Global.
Determining a threshold
As an example, spam messages with an IP address reputation entry of 0 indicates that the source IP
traffic is not spam, whereas an entry of 100 indicates definite spam traffic. Thus, values less than 50
indicate less probability that the message is spam, and values greater than 50 indicate more probability
that the message is spam. A value of 50 or higher is the threshold where you might consider action on a
triggered rule.
These probabilities are based on ongoing web-based data that IBM Security X-Force Threat Intelligence
continuously collects and analyzes from around the world in X-Force data centers. As data is collected,
the system evaluates how much spam is received from a particular IP address, or how frequently the
flagged IP address is in the IP address reputation category. The more times, the higher the system scores
the confidence factor.
Procedure
1. Click the Log Activity tab.
2. On the toolbar, click Rules > Rules.
3. Double-click a rule to start the Rule wizard.
4. In the filter box, type the following text:
when this host property is categorized by X-Force as this category with
confidence value equal to this amount
5. Click the Add test to rule (+) icon.
6. In the Rule section, click the this amount link.
7. Enter a confidence value.
8. Click Submit.
9. Click Finish to exit the Rules wizard.
Searching data from IBM X-Force Exchange with advanced search criteria
For complex queries, you can search and filter data from X-Force Exchange by using Advanced Search
expressions.
Procedure
1. Click the Log Activity tab.
2. On the Search toolbar, select the Advanced Search.
3. Type an AQL query expression.
Note:
The following table describes some common search expressions.
Searches for source IP addresses that have a select * from events where
confidence factor above 50. XFORCE_IP_CONFIDENCE('Spam',sourceip)>50
4. Click Search.
Timezone considerations
To ensure that the Reports feature uses the correct date and time for reporting data, your session must
be synchronized with your timezone.
During the installation and setup of QRadar products, the time zone is configured. Check with your
administrator to ensure your QRadar session is synchronized with your timezone.
Report layout
A report can consist of several data elements and can represent network and security data in various
styles, such as tables, line charts, pie charts, and bar charts.
When you select the layout of a report, consider the type of report you want to create. For example, do
not choose a small chart container for graph content that displays many objects. Each graph includes a
legend and a list of networks from which the content is derived; choose a large enough container to hold
the data. To preview how each chart displays a data, see Graph types.
Chart types
When you create a report, you must choose a chart type for each chart you include in your report.
The chart type determines how the data and network objects appear in your report.
You can use any of the following types of charts:
Hide Interactive Reports Select this check box to hide inactive report
templates. The Reports tab automatically
refreshes and displays only active reports. Clear
the check box to show the hidden inactive reports.
Graph types
Each chart type supports various graph types that you can use to display data.
The network configuration files determine the colors that the charts use to depict network traffic. Each IP
address is depicted by using a unique color. The following table provides examples of how network and
security data is used in charts. The table describes the chart types that are available for each type of
graph.
Bar • Events/Logs
• Flows
• Asset Vulnerabilities Connections
• Connections
• Vulnerabilities
Pie • Events/Logs
• Flows
• Asset Vulnerabilities
• Connections
• Vulnerabilities
Table • Events/Logs
• Flows
• Top Source IPs
• Top Offenses
• Offenses Over Time
• Top Destination IPs
• Connections
• Vulnerabilities
To display content in a table, you must design the report with a full page
width container.
The following graph types are available for QRadar Log Manager reports:
• Line
• Stacked Line
• Bar
• Stacked Bar
• Pie
• Table
Note: When you create bar and stacked bar graph reports, the legend is presented in a fixed format and
the bars or bar sections are represented by color coded labels in most cases. If you select time as the
value for the x axis, you can create time intervals on the x axis.
Procedure
1. Click the Reports tab.
2. From the Actions list box, select Create.
3. On the Welcome to the Report wizard! window, click Next.
4. Select one of the following options:
Option Description
Manually By default, the report generates 1 time. You can generate the report as often as you
want.
Hourly Schedules the report to generate at the end of each hour. The data from the previous
hour is used.
From the list boxes, select a time frame to begin and end the reporting cycle. A report is
generated for each hour within this time frame. Time is available in half-hour
increments. The default is 1:00 a.m for both the From and To fields.
Daily Schedules the report to generate at the end of each day. The data from the previous day
is used.
From the list boxes, select the time and the days of the week that you want the report to
run.
Weekly Schedules the report to generate weekly using the data from the previous week.
Select the day that you want to generate the report. The default is Monday. From the list
box, select a time to begin the reporting cycle. Time is available in half-hour increments.
The default is 1:00 a.m.
Monthly Schedules the report to generate monthly using the data from the previous month.
From the list box, select the date that you want to generate the report. The default is the
first day of the month. Select a time to begin the reporting cycle. Time is available in
half-hour increments. The default is 1:00 a.m.
Select the users This option displays after you select the Report Console check box.
that should be able
From the list of users, select the users that you want to grant permission to
to view the
view the generated reports.
generated report.
Select all users This option is only displayed after you select the Report Console check box.
Select this check box if you want to grant permission to all users to view the
generated reports.
You must have appropriate network permissions to share the generated
report with other users.
Email Select this check box if you want to distribute the generated report by email.
Enter the report This option is only displayed after you select the Email check box.
distribution email
Type the email address for each generated report recipient; separate a list of
address(es)
email addresses with commas. The maximum characters for this parameter
are 255.
Email recipients receive this email from no_reply_reports@qradar.
Include link to This option is only displayed after you select the Email check box. Select
Report Console this check box to include a link to the Report Console in the email.
12. On the Finishing Up page, enter values for the following parameters.
Option Description
Report Description Type a description for this report. The description is displayed on
the Report Summary page and in the generated report
distribution email.
Please select any groups you Select the groups to which you want to assign this report. For
would like this report to be a more information about groups, see Report groups.
member of
Would you like to run the Select this check box if you want to generate the report when the
report now? wizard is complete. By default, the check box is selected.
13. Click Next to view the report summary.
14. On the Report Summary page, select the tabs available on the summary report to preview your
report configuration.
Results
The report immediately generates. If you cleared the Would you like to run the report now check box on
the final page of the wizard, the report is saved and generates at the scheduled time. The report title is
the default title for the generated report. If you reconfigure a report to enter a new report title, the report
is saved as a new report with the new name; however, the original report remains the same.
Related information
Creating reports in QRadar SIEM
Editing a report
Using the Report wizard, you can edit any default or custom report to change.
Procedure
1. Click the Reports tab.
2. Double-click the report that you want to customize.
3. On the Report wizard, change the parameters to customize the report to generate the content you
require.
Results
If you reconfigure a report to enter a new report title, the report is saved as a new report with the new
name; however, the original report remains the same.
Procedure
1. Click the Reports tab.
2. From the list box in the Generated Reports column, select the time-stamp of report you want to view.
3. Click the icon for the format you want to view.
Procedure
1. Click the Reports tab.
2. Select the reports for which you want to delete the generated content.
3. From the Actions list box, click Delete Generated Content.
What to do next
After the report generates, you can view the generated report from the Generated Reports column.
Duplicating a report
To create a report that closely resembles an existing report, you can duplicate the report that you want to
model, and then customize it.
Procedure
1. Click the Reports tab.
2. Select the report that you want to duplicate.
3. From the Actions list box, click Duplicate.
4. Type a new name, without spaces, for the report.
What to do next
You can customize the duplicated report.
Sharing a report
You can share reports with other users. When you share a report, you provide a copy of the selected
report to another user to edit or schedule.
Procedure
1. Click the Reports tab.
2. Select the reports that you want to share.
3. From the Actions list box, click Share.
4. From the list of users, select the users with whom you want to share this report.
Branding reports
To brand reports, you can import logos and specific images. To brand reports with custom logos, you
must upload and configure the logos before you begin using the Report wizard.
Procedure
1. Click the Reports tab.
2. On the navigation menu, click Branding.
3. Click Browse to browse the files that are located on your system.
4. Select the file that contains the logo you want to upload. Click Open.
5. Click Upload Image.
6. Select the logo that you want to use as the default and click Set Default Image.
Report groups
You can sort reports into functional groups. If you categorize reports into groups, you can efficiently
organize and find reports.
For example, you can view all reports that are related to Payment Card Industry Data Security Standard
(PCIDSS) compliance.
By default, the Reports tab displays the list of all reports, however, you can categorize reports into groups
such as:
• Compliance
• Executive
• Log Sources
• Network Management
• Security
• VoIP
• Other
When you create a new report, you can assign the report to an existing group or create a new group. You
must have administrative access to create, edit, or delete groups.
For more information about user roles, see the IBM QRadar Administration Guide.
Procedure
1. Click the Reports tab.
2. Click Manage Groups.
3. Using the navigation tree, select the group under which you want to create a new group.
4. Click New Group.
5. Enter values for the following parameters:
• Name - Type the name for the new group. The name can be up to 255 characters in length.
Editing a group
You can edit a report group to change the name or description.
Procedure
1. Click the Reports tab.
2. Click Manage Groups.
3. From the navigation tree, select the group that you want to edit.
4. Click Edit.
5. Update values for the parameters, as necessary:
• Name - Type the name for the new group. The name can be up to 255 characters in length.
• Description - Optional. Type a description for this group. The description can be up to 255
characters in length. This field is optional.
6. Click OK.
7. Close the Report Groups window.
Procedure
1. Click the Reports tab.
2. On the Reports window, click Manage Groups.
3. On the Report Groups window, select the report group that you want to share and click Share.
4. On the Sharing Options window, select one of the following options.
Option Description
Share with Everyone The report group is shared with all users.
Share with users The report group is shared with specific users.
matching the User Roles
following criteria... Select from the list of user roles and press the add icon (+).
Security Profiles
Select from the list of security profiles and press the add icon (+).
5. Click Save.
Results
On the Report Groups window, shared users see the report group in the report list. Generated reports
display content based on security profile setting.
Related tasks
“Creating custom reports” on page 190
Use the Report wizard to create and customize a new report.
Procedure
1. Click the Reports tab.
2. Select the report that you want to assign to a group.
3. From the Actions list box, select Assign Groups.
4. From the Item Groups list, select the check box of the group you want to assign to this report.
5. Click Assign Groups.
Procedure
1. Click the Reports tab.
2. Click Manage Groups.
3. From the navigation tree, select the report that you want to copy.
4. Click Copy.
5. Select the group or groups to which you want to copy the report.
6. Click Assign Groups.
7. Close the Report Groups window.
Removing a report
Use the Remove icon to remove a report from a group.
Procedure
1. Click the Reports tab.
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:
Such information may be available, subject to appropriate terms and conditions, including in some cases,
payment of a fee.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Applicability
These terms and conditions are in addition to any terms of use for the IBM website.
Personal use
You may reproduce these publications for your personal, noncommercial use provided that all proprietary
notices are preserved. You may not distribute, display or make derivative work of these publications, or
any portion thereof, without the express consent of IBM.
202 Notices
Commercial use
You may reproduce, distribute and display these publications solely within your enterprise provided that
all proprietary notices are preserved. You may not make derivative works of these publications, or
reproduce, distribute or display these publications or any portion thereof outside your enterprise, without
the express consent of IBM.
Rights
Except as expressly granted in this permission, no other permissions, licenses or rights are granted, either
express or implied, to the publications or any information, data, software or other intellectual property
contained therein.
IBM reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use of
the publications is detrimental to its interest or, as determined by IBM, the above instructions are not
being properly followed.
You may not download, export or re-export this information except in full compliance with all applicable
laws and regulations, including all United States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS ARE
PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-
INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE.
Notices 203
Learn more about the IBM GDPR readiness journey and our GDPR capabilities and Offerings here: https://
ibm.com/gdpr
A
accumulator
A register in which one operand of an operation can be stored and subsequently replaced by the
result of that operation.
active system
In a high-availability (HA) cluster, the system that has all of its services running.
Address Resolution Protocol (ARP)
A protocol that dynamically maps an IP address to a network adapter address in a local area network.
administrative share
A network resource that is hidden from users without administrative privileges. Administrative shares
provide administrators with access to all resources on a network system.
anomaly
A deviation from the expected behavior of the network.
application signature
A unique set of characteristics that are derived by the examination of packet payload and then used to
identify a specific application.
ARP
See Address Resolution Protocol.
ARP Redirect
An ARP method for notifying the host if a problem exists on a network.
ASN
See autonomous system number.
asset
A manageable object that is either deployed or intended to be deployed in an operational
environment.
autonomous system number (ASN)
In TCP/IP, a number that is assigned to an autonomous system by the same central authority that
assigns IP addresses. The autonomous system number makes it possible for automated routing
algorithms to distinguish autonomous systems.
B
behavior
The observable effects of an operation or event, including its results.
bonded interface
See link aggregation.
C
CIDR
See Classless Inter-Domain Routing.
Classless Inter-Domain Routing (CIDR)
A method for adding class C Internet Protocol (IP) addresses. The addresses are given to Internet
Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables
and make more IP addresses available within organizations.
client
A software program or computer that requests services from a server.
cluster virtual IP address
An IP address that is shared between the primary or secondary host and the HA cluster.
coalescing interval
The interval at which events are bundled. Event bundling occurs in 10 second intervals and begins
with the first event that does not match any currently coalescing events. Within the coalescing
interval, the first three matching events are bundled and sent to the event processor.
Common Vulnerability Scoring System (CVSS)
A scoring system by which the severity of a vulnerability is measured.
console
A display station from which an operator can control and observe the system operation.
content capture
A process that captures a configurable amount of payload and then stores the data in a flow log.
credential
A set of information that grants a user or process certain access rights.
credibility
A numeric rating between 0-10 that is used to determine the integrity of an event or an offense.
Credibility increases as multiple sources report the same event or offense.
CVSS
See Common Vulnerability Scoring System.
D
database leaf object
A terminal object or node in a database hierarchy.
datapoint
A calculated value of a metric at a point in time.
Device Support Module (DSM)
A configuration file that parses received events from multiple log sources and coverts them to a
standard taxonomy format that can be displayed as output.
DHCP
See Dynamic Host Configuration Protocol.
DNS
See Domain Name System.
Domain Name System (DNS)
The distributed database system that maps domain names to IP addresses.
E
encryption
In computer security, the process of transforming data into an unintelligible form in such a way that
the original data either cannot be obtained or can be obtained only by using a decryption process.
endpoint
The address of an API or service in an environment. An API exposes an endpoint and at the same time
invokes the endpoints of other services.
external scanning appliance
A machine that is connected to the network to gather vulnerability information about assets in the
network.
F
false positive
An event or flow that the user can decide should not create an offense, or an offense that the user
decides is not a security incident.
flow
A single transmission of data passing over a link during a conversation.
flow log
A collection of flow records.
flow sources
The origin from which flow is captured. A flow source is classified as internal when flow comes from
hardware installed on a managed host or it is classified as external when the flow is sent to a flow
collector.
forwarding destination
One or more vendor systems that receive raw and normalized data from log sources and flow sources.
FQDN
See fully qualified domain name.
FQNN
See fully qualified network name.
fully qualified domain name (FQDN)
In Internet communications, the name of a host system that includes all of the subnames of the
domain name. An example of a fully qualified domain name is rchland.vnet.ibm.com.
fully qualified network name (FQNN)
In a network hierarchy, the name of an object that includes all of the departments. An example of a
fully qualified network name is CompanyA.Department.Marketing.
G
gateway
A device or program used to connect networks or systems with different network architectures.
Glossary 207
H
HA
See high availability.
HA cluster
A high-availability configuration consisting of a primary server and one secondary server.
Hash-Based Message Authentication Code (HMAC)
A cryptographic code that uses a cryptic hash function and a secret key.
high availability (HA)
Pertaining to a clustered system that is reconfigured when node or daemon failures occur so that
workloads can be redistributed to the remaining nodes in the cluster.
HMAC
See Hash-Based Message Authentication Code.
host context
A service that monitors components to ensure that each component is operating as expected.
I
ICMP
See Internet Control Message Protocol.
identity
A collection of attributes from a data source that represent a person, organization, place, or item.
IDS
See intrusion detection system.
Internet Control Message Protocol (ICMP)
An Internet protocol that is used by a gateway to communicate with a source host, for example, to
report an error in a datagram.
Internet Protocol (IP)
A protocol that routes data through a network or interconnected networks. This protocol acts as an
intermediary between the higher protocol layers and the physical network. See also Transmission
Control Protocol.
Internet service provider (ISP)
An organization that provides access to the Internet.
intrusion detection system (IDS)
Software that detects attempts or successful attacks on monitored resources that are part of a
network or host system.
intrusion prevention system (IPS)
A system that attempts to deny potentially malicious activity. The denial mechanisms could involve
filtering, tracking, or setting rate limits.
IP
See Internet Protocol.
IP multicast
Transmission of an Internet Protocol (IP) datagram to a set of systems that form a single multicast
group.
IPS
See intrusion prevention system.
ISP
See Internet service provider.
L
L2L
See Local To Local.
L2R
See Local To Remote.
LAN
See local area network.
LDAP
See Lightweight Directory Access Protocol.
leaf
In a tree, an entry or node that has no children.
Lightweight Directory Access Protocol (LDAP)
An open protocol that uses TCP/IP to provide access to directories that support an X.500 model and
that does not incur the resource requirements of the more complex X.500 Directory Access Protocol
(DAP). For example, LDAP can be used to locate people, organizations, and other resources in an
Internet or intranet directory.
link aggregation
The grouping of physical network interface cards, such as cables or ports, into a single logical network
interface. Link aggregation is used to increase bandwidth and network availability.
live scan
A vulnerability scan that generates report data from the scan results based on the session name.
local area network (LAN)
A network that connects several devices in a limited area (such as a single building or campus) and
that can be connected to a larger network.
Local To Local (L2L)
Pertaining to the internal traffic from one local network to another local network.
Local To Remote (L2R)
Pertaining to the internal traffic from one local network to another remote network.
log source
Either the security equipment or the network equipment from which an event log originates.
log source extension
An XML file that includes all of the regular expression patterns required to identify and categorize
events from the event payload.
M
Magistrate
An internal component that analyzes network traffic and security events against defined custom rules.
magnitude
A measure of the relative importance of a particular offense. Magnitude is a weighted value calculated
from relevance, severity, and credibility.
Glossary 209
N
NAT
See network address translation.
NetFlow
A Cisco network protocol that monitors network traffic flow data. NetFlow data includes the client and
server information, which ports are used, and the number of bytes and packets that flow through the
switches and routers connected to a network. The data is sent to NetFlow collectors where data
analysis takes place.
network address translation (NAT)
In a firewall, the conversion of secure Internet Protocol (IP) addresses to external registered
addresses. This enables communications with external networks but masks the IP addresses that are
used inside the firewall.
network hierarchy
A type of container that is a hierarchical collection of network objects.
network layer
In OSI architecture, the layer that provides services to establish a path between open systems with a
predictable quality of service.
network object
A component of a network hierarchy.
O
offense
A message sent or an event generated in response to a monitored condition. For example, an offense
will provide information on whether a policy has been breached or the network is under attack.
offsite source
A device that is away from the primary site that forwards normalized data to an event collector.
offsite target
A device that is away from the primary site that receives event or data flow from an event collector.
Open Source Vulnerability Database (OSVDB)
Created by the network security community for the network security community, an open source
database that provides technical information on network security vulnerabilities.
open systems interconnection (OSI)
The interconnection of open systems in accordance with standards of the International Organization
for Standardization (ISO) for the exchange of information.
OSI
See open systems interconnection.
OSVDB
See Open Source Vulnerability Database.
P
parsing order
A log source definition in which the user can define the order of importance for log sources that share
a common IP address or host name.
payload data
Application data contained in an IP flow, excluding header and administrative information.
primary HA host
The main computer that is connected to the HA cluster.
Q
QID Map
A taxonomy that identifies each unique event and maps the events to low-level and high-level
categories to determine how an event should be correlated and organized.
R
R2L
See Remote To Local.
R2R
See Remote To Remote.
recon
See reconnaissance.
reconnaissance (recon)
A method by which information pertaining to the identity of network resources is gathered. Network
scanning and other techniques are used to compile a list of network resource events which are then
assigned a severity level.
reference map
A data record of direct mapping of a key to a value, for example, a user name to a global ID.
reference map of maps
A data record of two keys mapped to many values. For example, the mapping of the total bytes of an
application to a source IP.
reference map of sets
A data record of a key mapped to many values. For example, the mapping of a list of privileged users
to a host.
reference set
A list of single elements that are derived from events or flows on a network. For example, a list of IP
addresses or a list of user names.
reference table
A table where the data record maps keys that have an assigned type to other keys, which are then
mapped to a single value.
refresh timer
An internal device that is triggered manually or automatically at timed intervals that updates the
current network activity data.
relevance
A measure of relative impact of an event, category, or offense on the network.
Remote To Local (R2L)
The external traffic from a remote network to a local network.
Remote To Remote (R2R)
The external traffic from a remote network to another remote network.
report
In query management, the formatted data that results from running a query and applying a form to it.
report interval
A configurable time interval at the end of which the event processor must send all captured event and
flow data to the console.
Glossary 211
routing rule
A condition that when its criteria are satisfied by event data, a collection of conditions and consequent
routing are performed.
rule
A set of conditional statements that enable computer systems to identify relationships and run
automated responses accordingly.
S
scanner
An automated security program that searches for software vulnerabilities within web applications.
secondary HA host
The standby computer that is connected to the HA cluster. The secondary HA host assumes
responsibility of the primary HA host if the primary HA host fails.
severity
A measure of the relative threat that a source poses on a destination.
Simple Network Management Protocol (SNMP)
A set of protocols for monitoring systems and devices in complex networks. Information about
managed devices is defined and stored in a Management Information Base (MIB).
SNMP
See Simple Network Management Protocol.
SOAP
A lightweight, XML-based protocol for exchanging information in a decentralized, distributed
environment. SOAP can be used to query and return information and invoke services across the
Internet.
standby system
A system that automatically becomes active when the active system fails. If disk replication is
enabled, replicates data from the active system.
subnet
See subnetwork.
subnet mask
For internet subnetworking, a 32-bit mask used to identify the subnetwork address bits in the host
portion of an IP address.
subnetwork (subnet)
A network that is divided into smaller independent subgroups, which still are interconnected.
sub-search
A function that allows a search query to be performed within a set of completed search results.
superflow
A single flow that is comprised of multiple flows with similar properties in order to increase
processing capacity by reducing storage constraints.
system view
A visual representation of both primary and managed hosts that compose a system.
T
TCP
See Transmission Control Protocol.
Transmission Control Protocol (TCP)
A communication protocol used in the Internet and in any network that follows the Internet
Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-
V
violation
An act that bypasses or contravenes corporate policy.
vulnerability
A security exposure in an operating system, system software, or application software component.
W
whois server
A server that is used to retrieve information about a registered Internet resources, such as domain
names and IP address allocations.
Glossary 213
214 IBM QRadar : QRadar User Guide
Index
Index 215
export to XML 77 Log Activity dashboard items 22
exporting assets 101 log activity tab 53, 54, 57, 59, 67, 69, 71, 109
exporting events 71 Log Activity tab 9, 49
Exporting flows 77 log source 57
F M
false positive 68, 75 magnitude 36
false positives 90 Manage Groups 99
Flag 27 manage reports 12, 187
flow details 74 manage search groups 142
Flow processor 73 manage search results 146
flow search group 147, 148 managing search groups 147
flow searches 21 map event 68
flows 23, 109, 115 messages menu 13
modify event mapping 68
monitoring events 22
G monitoring offenses 44
generate a report manually 194 multiple dashboards 19
glossary 205
graph types 189 N
group
removing 149 network 19
grouped event parameters 59 network activity 14, 21, 28, 31, 73, 74, 105, 114, 144–146,
grouped events options 59 148
network activity monitoring 73
network activity tab 109
H Network activity tab 73, 75, 77
hide offense 45 Network Activity tab 10, 74
historical correlation new dashboard 28
creating a profile 176 new features
device time 175 Version 7.3.1 2
information about past runs 177 Version 7.3.2 1
offenses 177 new search 99
rule handling 175 normalized events 54
start time 175 normalized flows 73, 74
hosts 11 notification message 27
I O
IBM Security QRadar Risk Manager 13 offense
image investigations 36
reports magnitude 36
branding 195 Offense dashboard items 22
upload 195 Offense items 22
import asset profile 100 offense management 33
import assets 100 offense retention 36
internet threat information center 27 offense search group 148
internet threat level 27 offense searches 132
investigate event logs 9 Offense tab 139, 140, 142
investigate flows 10 offenses
investigate log activity 49 assigning to users 47
investigate offense 8 historical correlation 177
investigating events 22 offenses tab 36, 45, 46
investigating offenses 36 Offenses tab 8, 142
organize your dashboard items 19
OverFlow records 73
L
last minute (auto refresh) 14 P
list of events 63
log activity Packet Capture (PCAP) data 69
overview 49 pause data 14
search criteria 114 PCAP data 69, 70
Index 217
V
view asset profile 91
view grouped events 59
view messages 13
view PCAP data 70
view system notifications 31
viewing grouped flows 74
viewing offenses associated with events 67
viewing search groups 98, 147
viewing streaming events 53
viewing streaming flows 73
vulnerabilities 90
vulnerability details 101
Vulnerability Management dashboard 26
W
what's new 1, 2
X
X-Force Threat Intelligence feed
example 181