B DSM Guide PDF
B DSM Guide PDF
Product information
This document applies to IBM QRadar Security Intelligence Platform V7.2.4 and subsequent releases unless
superseded by an updated version of this document.
© Copyright IBM Corporation 2005, 2015.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
About this DSM Configuration Guide Chapter 12. Cisco IronPort . . . . . . 33
Addendum . . . . . . . . . . . . . vii Configuring the Cisco IronPort to send syslog
events . . . . . . . . . . . . . . . . 34
Chapter 1. Event collection from
third-party devices . . . . . . . . . . 1 Chapter 13. Correlog Agent for IBM
Adding a single DSM . . . . . . . . . . . 2 z/OS . . . . . . . . . . . . . . . . 35
Installing a DSM bundle . . . . . . . . . . 3 Configuring your CorreLog Agent system for
Adding a log source . . . . . . . . . . . . 3 communication with QRadar . . . . . . . . 36
Adding bulk log sources . . . . . . . . . . 5
Adding a log source parsing order . . . . . . . 5 Chapter 14. CloudPassage Halo . . . . 37
Configuring CloudPassage Halo for communication
Chapter 2. 3Com Switch 8800 . . . . . 7 with QRadar . . . . . . . . . . . . . . 37
Configuring your 3COM Switch 8800 . . . . . . 7 Configuring a CloudPassage Halo log source in
QRadar . . . . . . . . . . . . . . . . 39
Chapter 3. AccessData InSight . . . . . 9
Configuring your AccessData InSight device to Chapter 15. DG Technology MEAS . . . 41
communicate with QRadar . . . . . . . . . 10 Configuring your DG Technology MEAS system for
Adding an AccessData InSight log source on your communication with QRadar . . . . . . . . 41
QRadar Console . . . . . . . . . . . . . 10
Chapter 16. FireEye . . . . . . . . . 43
Chapter 4. AhnLab Policy Center . . . 13 Configuring your FireEye system for
communication with QRadar . . . . . . . . 43
Chapter 5. Amazon AWS CloudTrail . . 15 Configuring a FireEye log source in QRadar . . . 44
Chapter 25. IBM Security Privileged Chapter 35. Lastline Enterprise . . . . 111
Identity Manager . . . . . . . . . . 71 Configuring Lastline Enterprise to communicate
Configuring IBM Security Privileged Identity with QRadar . . . . . . . . . . . . . 112
Manager . . . . . . . . . . . . . . . 72
Chapter 36. McAfee ePolicy
Chapter 26. IBM RACF . . . . . . . . 75 Orchestrator . . . . . . . . . . . . 113
Integrating IBM RACF with QRadar Using IBM Configuring a McAfee ePO log source by using the
Security zSecure . . . . . . . . . . . . . 75 JDBC protocol . . . . . . . . . . . . . 113
Create an IBM RACF log source . . . . . . 76 Configuring ePO to forward SNMP events . . . 115
Integrate IBM RACF with QRadar using audit Adding a registered server to McAfee ePO . . 115
scripts . . . . . . . . . . . . . . . . 80 Configuring ePO to forward SNMP events . . 116
Configure IBM RACF to integrate with QRadar 81 Configuring a McAfee ePO log source by using
the SNMP protocol . . . . . . . . . . 116
Chapter 27. IBM Privileged Session Installing the Java Cryptography Extension on
Recorder . . . . . . . . . . . . . . 85 McAfee ePO . . . . . . . . . . . . . 117
Configuring IBM Privileged Session Recorder to Installing the Java Cryptography Extension on
communicate with QRadar . . . . . . . . . 86 QRadar . . . . . . . . . . . . . . 118
Supported parameters for event detection . . . 118
Chapter 28. IBM Security Network IPS 87
Configuring your IBM Security Network IPS Chapter 37. LOGbinder EX event
appliance for communication with QRadar . . . . 88 collection from Microsoft Exchange
Configuring an IBM Security Network IPS log Server . . . . . . . . . . . . . . 121
source in QRadar . . . . . . . . . . . . 88 Configuring your LOGbinder EX system to send
Microsoft Exchange event logs to QRadar . . . . 122
Chapter 29. IBM SmartCloud
Orchestrator . . . . . . . . . . . . 91 Chapter 38. LOGbinder SP event
Installing IBM SmartCloud Orchestrator . . . . . 92 collection from Microsoft SharePoint . 123
Configuring an IBM SmartCloud Orchestrator log Configuring your LOGbinder SP system to send
source in QRadar . . . . . . . . . . . . 92 Microsoft SharePoint event logs to QRadar . . . 124
Chapter 30. IBM Tivoli Endpoint Chapter 39. LOGbinder SQL event
Manager . . . . . . . . . . . . . . 93 collection from Microsoft SQL Server . 125
Configuring your LOGbinder SQL system to send
Chapter 31. IBM Security Trusteer Apex Microsoft SQL Server event logs to QRadar . . . 126
Advanced Malware Protection. . . . . 95
Configuring IBM Security Trusteer Apex Advanced Chapter 40. Microsoft Exchange
Malware Protection to send syslog events to QRadar 98 Server . . . . . . . . . . . . . . 127
Configuring a Flat File Feed service . . . . . . 98 Configuring Microsoft Exchange Server to
communicate with QRadar . . . . . . . . . 128
Chapter 32. IBM WebSphere Configuring OWA logs on your Microsoft
DataPower . . . . . . . . . . . . 101 Exchange Server . . . . . . . . . . . 128
Configuring IBM WebSphere DataPower to Enabling SMTP logs on your Microsoft
communicate with QRadar . . . . . . . . . 102 Exchange Server . . . . . . . . . . . 129
Configuring a log source for Microsoft Exchange 129
Contents v
Configuring your WatchGuard Fireware OS Chapter 62. QRadar supported DSMs 203
appliance in Fireware XTM for communication
with QRadar . . . . . . . . . . . . . 198 Notices . . . . . . . . . . . . . . 215
Configuring a WatchGuard Fireware OS log source
Trademarks . . . . . . . . . . . . . . 216
in QRadar . . . . . . . . . . . . . . 199
Privacy policy considerations . . . . . . . . 217
Intended audience
System administrators who are responsible for installing DSMs must be familiar
with network security concepts and device configurations.
Technical documentation
To find IBM Security QRadar product documentation on the web, including all
translated documentation, access the IBM Knowledge Center (http://
www.ibm.com/support/knowledgecenter/SS42VS/welcome).
For information about how to access more technical documentation in the QRadar
products library, see Accessing IBM Security Documentation Technical Note
(www.ibm.com/support/docview.wss?rs=0&uid=swg21614644).
For information about contacting customer support, see the Support and
Download Technical Note (http://www.ibm.com/support/docview.wss?rs=0
&uid=swg21612861).
Log sources
A log source is any external device, system, or cloud service that is configured to
either send events to your IBM Security QRadar system or be collected by your
QRadar system. QRadar shows events from log sources in the Log Activity tab.
To receive raw events from log sources, QRadar supports several protocols,
including syslog from OS, applications, firewalls, IPS/IDS, SNMP, SOAP, JDBC for
data from database tables and views. QRadar also supports proprietary
vendor-specific protocols such as OPSEC/LEA from Checkpoint.
For more information about supported protocols, see the Log Sources User Guide.
DSMs
A Device Support Module (DSM) is a configuration file that parses received events
from multiple log sources and coverts them to a standard taxonomy format that
can be displayed as output. Each type of log source has a corresponding DSM. For
example, the IBM Fiberlink MaaS360 DSM parses and normalizes events from an
IBM Fiberlink MaaS360 log source.
Automatic Updates
QRadar provides daily and weekly automatic updates on a recurring schedule. The
weekly automatic update includes new DSM releases, corrections to parsing issues,
and protocol updates. For more information about managing automatic updates,
see the IBM Security QRadar SIEM Administration Guide.
To collect events from third-party device, you must complete installation and
configuration steps on both the log source device and your QRadar system. For
some third-party devices, extra configuration steps are needed, such as configuring
a certificate to enable communication between that device and QRadar.
Tip: If your QRadar system is configured to accept automatic updates, this step
might not be required.
3. Configure the third-party device to send events to QRadar.
After the events are collected and before the correlation can begin, individual
events from your devices must be properly normalized. Normalization means to
map information to common field names, such as event name, IP addresses,
protocol, and ports. If an enterprise network has one or more network or security
devices that QRadar does not provide a corresponding DSM, you can use the
Universal DSM. QRadar can integrate with most devices and any common protocol
sources by using the Universal DSM.
To configure the Universal DSM, you must use device extensions to associate a
Universal DSM to devices. Before you define device extension information in the
Log Sources window in the Admin tab, you must create an extensions document
for the log source. For more information, see the Log Sources User Guide.
For more information about Universal DSMs, see the IBM support website
(http://www.ibm.com/support).
Procedure
1. Download the DSM RPM file from the IBM support website
(http://www.ibm.com/support).
2. Copy the RPM file to your QRadar Console.
3. Using SSH, log in to the QRadar host as the root user.
4. Navigate to the directory that includes the downloaded file.
5. Type the following command:
rpm -Uvh <rpm_filename>
6. Log in to the QRadar user interface.
7. On the Admin tab, click Deploy Changes.
8. On the Admin tab, selected Advanced > Restart Web Services.
Related concepts:
Chapter 2, “3Com Switch 8800,” on page 7
The IBM Security QRadar DSM for 3Com Switch 8800 receives events by using
syslog.
Procedure
1. Download the DSM bundle from the IBM support website
(http://www.ibm.com/support).
2. Copy the bundle to your QRadar Console.
3. Using SSH, log in to the QRadar host as the root user.
4. Navigate to the directory that includes the downloaded file.
5. Type the following command to extract the contents of the bundle:
tar -zxvf QRadar_bundled-DSM-your_qradar_version.tar.gz
6. Type the following command:
for FILE in *Common*.rpm DSM-*.rpm; do rpm -Uvh "$FILE"; done
7. Log in to the QRadar user interface.
8. On the Admin tab, click Deploy Changes.
9. On the Admin tab, selected Advanced > Restart Web Services.
The following table describes the common log source parameters for all log source
types:
Table 1. Log source parameters
Parameter Description
Log Source Identifier The IPv4 address or host name that
identifies the log source.
Procedure
1. Click the Admin tab.
2. Click the Log Sources icon.
3. Click Add.
4. Configure the common parameters for your log source.
5. Configure the protocol-specific parameters for your log source.
6. Click Save.
7. On the Admin tab, click Deploy Changes.
Related concepts:
Chapter 2, “3Com Switch 8800,” on page 7
The IBM Security QRadar DSM for 3Com Switch 8800 receives events by using
syslog.
Procedure
1. Click the Admin tab.
2. Click the Log Sources icon.
3. From the Bulk Actions list, select Bulk Add.
4. Configure the parameters for the bulk log source.
v File Upload - Upload a text file that has one host name or IP per line
v Manual - Enter the host name or IP of the host that you wish to add
5. Click Save.
6. Click Continue to add the log sources.
7. On the Admin tab, click Deploy Changes.
You can order the importance of the log sources by defining the parsing order for
log sources that share a common IP address or host name. Defining the parsing
order for log sources ensures that certain log sources are parsed in a specific order,
regardless of changes to the log source configuration. The parsing order ensures
that system performance is not affected by changes to log source configuration by
preventing unnecessary parsing. The parsing order ensures that low-level event
sources are not parsed for events before more important log source.
Procedure
1. Click the Admin tab.
2. Click the Log Source Parsing Ordering icon.
3. Select a log source.
4. Optional: From the Selected Event Collector list, select the Event Collector to
define the log source parsing order.
5. Optional: From the Log Source Host list, select a log source.
6. Prioritize the log source parsing order.
7. Click Save.
The following table identifies the specifications for the 3Com Switch 8800 DSM:
Specification Value
Manufacturer 3Com
DSM name Switch 8800 Series
RPM file name DSM-3ComSwitch_qradar-version_build-
number.noarch.rpm
Supported versions v3.01.30
Protocol Syslog
QRadar recorded events Status and network condition events
Automatically discovered? Yes
Includes identity? No
Includes custom event properties? No
More information 3Com website (http://www.3com.com)
To send 3COM Switch 8800 events to QRadar, complete the following steps:
1. If automatic updates are not enabled, download and install the most recent
3COM Switch 8800 RPM on your QRadar Console.
2. Configure each 3COM Switch 8800 instance to communicate with QRadar.
3. If QRadar does not automatically discover the DSM, create a log source on the
QRadar Console for each 3COM Switch 8800 instance. Configure all the
required parameters, and use the following table for specific values:
Parameter Description
Log Source Type 3COM Switch 8800
Protocol Configuration Syslog
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring your 3COM Switch 8800”
Configure your 3COM Switch 8800 to forward syslog events to IBM Security
QRadar.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
The following table identifies the specifications for the AccessData InSight DSM:
Table 2. AccessData InSight DSM specifications
Specification Value
Manufacturer AccessData
DSM name AccessData InSight
RPM file name DSM-AccessDataInSight-
build_number.noarch.rpm
Supported versions V2
Event format Log file
QRadar recorded event types
Volatile Data
Collection Data
Software Inventory
To send events from AccessData InSight to QRadar, use the following steps:
1. If automatic updates are not enabled, download the most recent versions of the
following RPMs.
v LogFileProtocol
v DSMCommon
v AccessData InSight DSM
2. Configure your AccessData InSight device to communicate with QRadar.
3. Create an AccessData InSight log source on the QRadar Console.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
Procedure
1. Log in to your AccessData InSight device.
2. Open the ADGIntegrationServiceHost.exe.config file, which is in the
C:\Program Files\AccessData\eDiscovery\Integration Services directory.
3. Change the text in the file to match the following lines:
<Option Name="Version" Value="2.0" />
<Option Name="Version" Value="2.0" />
<Option Name="OutputFormat" Value="LEEF" />
<Option Name="LogOnly" Value="1" />
<Option Name="OutputPath" Value="C:\CIRT\logs" />
4. Restart the AccessData Third-Party Integration service.
5. Create an FTP site for the C:\CIRT\logs output folder:
a. Open Internet Information Services Manager (IIS).
b. Right-click the Sites tab and click Add FTP Site.
c. Name the FTP site, and enter C:\CIRT\logs as the location for the generated
LEEF files.
d. Restart the web service.
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. In the Log Source Identifier field, type the IP address or host name of the
AccessData InSight device.
7. From the Log Source Type list, select AccessData InSight.
8. From the Protocol Configuration list, select Log File.
The following table identifies the specifications for the AhnLab Policy Center DSM:
Table 3. AhnLab Policy Center DSM specifications
Specification Value
Manufacturer AhnLab
DSM AhnLab Policy Center
RPM file names DSM-AhnLabPolicyCenter-QRadar-
Release_Build-Number.noarch.rpm
Supported versions 4.0
Protocol AhnLabPolicyCenterJdbc
QRadar recorded events Spyware detection, Virus detection, Audit
Automatically discovered? No
Includes identity Yes
More information Ahnlab website (https://
global.ahnlab.com/)
To integrate AhnLab Policy Center DSM with QRadar, complete the following
steps:
1. Download and install the most recent versions of the following RPMs on your
QRadar Console:
v JDBC protocol RPM
v AhnLabPolicyCenterJdbc protocol RPM
v AhnLab Policy Center RPM
Parameter Value
Log Source Type AhnLab Policy Center APC
Protocol Configuration AhnLabPolicyCenterJdbc
Access credentials Use the access credentials of the DB2 server.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
The following table lists the specifications for the Amazon AWS CloudTrail DSM:
Table 4. Amazon AWS CloudTrail DSM specifications
Specification Value
Manufacturer Amazon
DSM Amazon AWS CloudTrail
RPM name DSM-AmazonAWSCloudTrail-QRadar_version-
Build_number.noarch.rpm
Supported versions 1.0
Protocol Amazon AWS S3
QRadar recorded events All events
Automatically discovered? No
Includes identity? No
Includes custom properties? No
More information Amazon Cloud Trail documentation
(http://docs.aws.amazon.com/
awscloudtrail/latest/userguide/
whatisawscloudtrail.html)
To integrate Amazon AWS CloudTrail with QRadar, complete the following steps:
1. Obtain and install a certificate to enable QRadar to communicate with the
Amazon AWS CloudTrail S3 bucket.
2. Install the most recent version of the following RPMs on your QRadar Console
or Event Collector.
v Amazon REST API Protocol RPM
v Amazon AWS CloudTrail DSM RPM
3. Configure the Amazon AWS CloudTrail log source in QRadar. Configure all
required parameters and use the following table to help you determine values
for Amazon AWS CloudTrail parameters:
Table 5. Amazon AWS CloudTrail log source parameters
Parameter Description
Log Source Type Amazon AWS CloudTrail
Protocol Configuration Amazon AWS S3
Bucket Name The name of the AWS CloudTrail S3 bucket
where the log files are stored.
Public Key The public access key that is required to
access the AWS CloudTrail S3 bucket.
Access Key The private access key that is required to
access the AWS CloudTrail S3 bucket.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
The following table identifies the specifications for the Ambiron TrustWave
ipAngel DSM:
Table 6. Ambiron TrustWave ipAngel DSM specifications
Specification Value
Manufacturer Ambiron
DSM name Ambiron TrustWave ipAngel
RPM file name DSM-AmbironTrustwaveIpAngel-
Qradar_version-build_number.noarch.rpm
Supported versions V4.0
Protocol Syslog
Recorded event types Snort-based events
Automatically discovered? No
Includes identity? No
Includes custom properties? No
More information Ambiron website (http://www.apache.org)
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
The following table identifies the specifications for the Arbor Networks Pravail
DSM:
Table 8. Arbor Networks Pravail DSM specifications
Specification Value
Manufacturer Arbor Networks
DSM Arbor Networks Pravail
RPM file name DSM-ArborNetworksPravail-Qradar_version-
build_number.noarch.rpm
Supported versions v3.1 and later
Protocol Syslog
Recorded events All relevant events
Automatically discovered? Yes
Includes identity? No
Includes custom properties? No
More information Arbor Networks website
(www.arbornetworks.com)
To send Arbor Networks Pravail DSM events to QRadar, complete the following
steps:
1. If automatic updates are not enabled, download and install the most recent
Arbor Networks Pravail DSM RPM on your QRadar Console.
2. Configure each Arbor Networks Pravail system to send events to QRadar.
3. If QRadar does not automatically discover the Arbor Networks Pravail system,
create a log source on the QRadar Console. Configure the required parameters,
and use the following table for the Arbor Networks Pravail specific parameters:
Parameter Value
Log Source Type Arbor Networks Pravail
Protocol Configuration Syslog
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring your Arbor Networks Pravail system to send events to QRadar” on
page 20
To collect all audit logs and system events from Arbor Networks Pravail, you must
add a destination that specifies IBM Security QRadar as the syslog server.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Log in to your Arbor Networks Pravail server.
2. Click Settings & Reports.
3. Click Administration > Notifications.
4. On the Configure Notifications page, click Add Destinations.
5. Select Syslog.
6. Configure the following parameters:
Parameter Description
Host The IP address of the QRadar Console.
Port 514
Severity Info
Alert Types The alert types that you want to send to the
QRadar Console.
7. Click Save.
The following table identifies the specifications for the APC UPS DSM:
Table 9. APC UPS DSM specifications
Specification Value
Manufacturer APC
DSM name APC UPS
RPM file name DSM-APCUPS-Qradar_version-
build_number.noarch.rpm
Protocol Syslog
Recorded event types UPS events
Battery events
Bypass events
Communication events
SmartBoost events
SmartTrim events
Automatically discovered? No
Includes identity? No
Includes custom properties? No
More information APC website (http://www.apc.com)
Procedure
1. Log in to the APC Smart-UPS web interface.
2. In the navigation menu, click Network > Syslog.
3. From the Syslog list, select Enable.
4. From the Facility list, select a facility level for your syslog messages.
5. In the Syslog Server field, type the IP address of your QRadar Console or
Event Collector.
6. From the Severity list, select Informational.
7. Click Apply.
The following table identifies the specifications for the Barracuda Web Application
Firewall DSM:
Table 11. Barracuda Web Application Firewall DSM specifications
Specification Value
Manufacturer Barracuda
DSM name Web Application Firewall
RPM file name DSM-BarracudaWebApplicationFirewall-
QRadar_version-build_number.noarch.rpm
Supported versions V7.0.x and later
Protocol type
Syslog
QRadar recorded event types
System
Web
Access
Audit
Automatically discovered?
If LEEF-formatted payloads, the log source
is automatically discovered.
To collect syslog events from Barracuda Web Application Firewall, use the
following steps:
1. If automatic updates are not enabled, download the most recent version of the
following RPMs on your QRadar Console:
v Barracuda Web Application Firewall DSM RPM
v DSMCommon RPM
2. Configure your Barracuda Web Application Firewall device to send syslog
events to QRadar.
3. Add a Barracuda Web Application Firewall log source on the QRadar Console.
The following table describes the parameters that require specific values that
are required for Barracuda Web Application Firewall event collection:
Table 12. Barracuda Web Application Firewall log source parameters
Parameter Value
Log Source type Barracuda Web Application Firewall
Verify that firewalls between the Barracuda appliance and QRadar allow UDP
traffic on port 514.
Procedure
1. Log in to the Barracuda Web Application Firewall web interface.
2. Click the Advanced tab.
3. From the Advanced menu, select Export Logs.
4. Click Add Syslog Server.
5. Configure the parameters:
Option Description
Name The name of the QRadar Console or Event
Collector
Syslog Server The IP address of your QRadar Console or
Event Collector.
Port
The port that is associated with the IP
address of your QRadar Console or Event
Collector.
6. In the Log Formats pane, select a format from the list box for each log type.
v If you are using newer versions of Barracuda Web Application Firewall,
select LEEF 1.0 (QRadar).
v If you are using older versions of Barracuda Web Application Firewall, select
Custom Format.
7. Click Save Changes.
The following table identifies the specifications for the Bit9 Security Platform DSM:
Table 13. DSM specifications for Bit9 Security Platform
Specification Value
Manufacturer Bit9
DSM name Bit9 Security Platform
RPM file name DSM-Bit9Parity-build_number.noarch.rpm
Supported versions V6.0.2 and up
Event format
Syslog
Supported event types All events
Automatically discovered? Yes
Included identity? Yes
More information Bit9 website (http://www.bit9.com)
To integrate Bit9 Security Platform with QRadar, complete the following steps:
1. If automatic updates are not enabled, download the most recent version of the
Bit9 Security Platform DSM RPM.
2. Configure your Bit9 Security Platform device to enable communication with
QRadar. You must create a syslog destination and forwarding policy on the Bit9
Security Platform device.
3. If QRadar does not automatically detect Bit9 Security Platform as a log source,
create a Bit9 Security Platform log source on the QRadar Console. Use the
following Bit9 Security Platform values to configure the log source parameters:
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
The following table lists the specifications for the Blue Coat SG DSM:
Table 14. Blue Coat SG DSM specifications
Specification Value
Manufacturer Blue Coat
DSM name Blue Coat SG
RPM file name DSM-BlueCoatProxySG-Qradar_version-
build_number.noarch.rpm
Supported versions SG v4.x and later
Protocol Syslog
To send events from Blue Coat SG to QRadar, complete the following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the Blue Coat SG DSM RPM on your QRadar Console.
2. Configure your Blue Coat SG device to communicate with QRadar. Complete
the following steps:
v Create a custom event format.
v Create a log facility.
v Enable access logging.
v Configure Blue Coat SG for Log File protocol or syslog uploads.
3. Add an Blue Coat SG log source on the QRadar Console. Configure all the
required parameters, but use the following table to configure the parameters
that are required to collect Blue Coat SG events:
Table 15. Blue Coat SG log source parameters
Parameter Value
Log Source type Bluecoat SG Appliance
Protocol Configuration Log File
Syslog
The instructions provided describe how to configure Blue Coat SG using a custom
name-value pair format, however, QRadar also supports the following formats:
Procedure
1. Log in to the Blue Coat Management Console.
2. Select Configuration > Access Logging > Formats.
3. Select New.
4. Type a format name for the custom format.
5. Select Custom format string.
6. Type the following custom format:
Attention: The line breaks that in these examples will cause this configuration
to fail. Copy the code blocks into a text editor, remove the line breaks, and
paste as a single line in the Custom Format column.
Bluecoat|src=$(c-ip)|srcport=$(c-port)|dst=$(cs-uri-address)
|dstport=$(cs-uri-port)|username=$(cs-username)|devicetime=$(gmttime)
|s-action=$(s-action)|sc-status=$(sc-status)|cs-method=$(cs-method)
|time-taken=$(time-taken)|sc-bytes=$(sc-bytes)|cs-bytes=$(cs-bytes)
Note: The custom format for QRadar supports more key-value pairs by using
the Blue Coat ELFF format. For more information, see “Creating extra custom
format key-value pairs” on page 31.
What to do next
You are ready to create a log facility on your Blue Coat device.
Related tasks:
“Creating a log facility”
To use the custom log format that you created for IBM Security QRadar, you must
associate the custom log format to a facility.
Procedure
1. Select Configuration > Access Logging > Logs.
2. Click New.
3. Configure the following parameters:
Parameter Description
Log Name A name for the log facility.
Log Format The custom format you that created.
Description A description for the log facility.
4. Click OK.
5. Click Apply.
Related tasks:
“Enabling access logging”
You must enable access logging on your Blue Coat SG device.
Procedure
1. Select Configuration > Access Logging > General.
2. Select the Enable Access Logging check box.
3. Optional: If you use Blue Coat SGOS 6.2.11.2 Proxy Edition, complete the
following steps:
Procedure
1. Select Configuration > Access Logging > Logs > Upload Client.
2. From the Log list, select the log that contains your custom format.
3. From the Client type list, select FTP Client.
4. Select the text file option.
5. Click Settings.
6. From the Settings For list, select Primary FTP Server.
7. Configure the following values:
Parameter Description
Host The IP address of the FTP server that you
want to forward the Blue Coat events.
Port The FTP port number.
Path The directory path for the log files.
Username The user name to access the FTP server.
8. Click OK.
9. Select the Upload Schedule tab.
10. From the Upload the access log option, select Periodically.
11. Configure the Wait time between connect attempts option.
12. Select to upload the log file to the FTP daily or on an interval.
13. Click Apply.
Procedure
1. Select Configuration > Access Logging > Logs > Upload Client.
2. From the Log list, select the log that contains your custom format.
3. From the Client type list, select Custom Client.
The custom format is a series of pipe-delimited fields that start with the Bluecoat|
field and contains the $(Blue Coat ELFF) parameter.
For example:
Bluecoat|src=$(c-ip)|srcport=$(c-port)|dst=$(cs-uri-address)|dstport=$(cs-
uri-port)|username=$(cs-username)|devicetime=$(gmttime)|s-action=$(s-
action)|sc-status=$(sc-status)|cs-method=$(cs-method)
Table 16. Custom Format examples
Blue Coat ELFF Parameter QRadar Custom Format Example
sc-bytes $(sc-bytes)
rs(Content-type) $(rs(Content-Type))
For more information about available Blue Coat ELFF parameters, see your Blue
Coat appliance documentation.
The following table identifies the specifications for the Cisco IronPort DSM:
Table 17. Cisco IronPort DSM specifications
Specification Value
Manufacturer Cisco
DSM name Cisco IronPort
RPM file name DSM-CiscoIronport-Qradar_version-
build_number.noarch.rpm
Supported versions V5.5
V6.5
V7.1
System (syslog)
Access (syslog)
Procedure
1. Log in to Cisco IronPort.
2. Select System Administration > Log Subscriptions.
3. Define a log subscription for each log type that you want to forward to
QRadar:
a. Click Add Log Subscription.
b. From the Log Type list, select the type of log that you want to configure.
c. In the Log Name field, type a name.
The appliance uses this name for the directory that will contain the log file.
d. If you are creating a subscription for access logs, select Squid from the Log
style list and type dst %k dstPort %p in the Custom Fields (optional) field.
e. From the Retrieval Method list, select Syslog Push.
f. In the Hostname field, type the IP address or server name of your QRadar
system.
g. From the Protocol list, select UDP or TCP.
h. From the Facility list, select the facility you want to use.
The following table identifies the specifications for the CorreLog Agent for IBM
z/OS DSM:
Specification Value
Manufacturer CorreLog
DSM name CorreLog Agent for IBM z/OS
RPM file name DSM-CorreLogzOSAgent_qradar-
version_build-number.noarch.rpm
Supported versions
7.1
7.2
Protocol Syslog LEEF
QRadar recorded events All events
Automatically discovered Yes
Includes identity No
Includes custom event properties No
More information Correlog website (https://correlog.com/
solutions-and-services/sas-correlog-
mainframe.html)
To integrate CorreLog Agent for IBM z/OS DSM with QRadar, complete the
following steps:
1. If automatic updates are not enabled, download and install the most recent
CorreLog Agent for IBM z/OS RPM on your QRadar Console.
2. For each CorreLog Agent instance, configure your CorreLog Agent system to
enable communication with QRadar.
3. If QRadar does not automatically discover the DSM,, create a log source on the
QRadar Console for each CorreLog Agent system you want to integrate.
Configure all the required parameters, but use the following table for specific
Correlog values:
Parameter Description
Log Source Type CorreLog Agent for IBM zOS
Protocol Configuration Syslog
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Use the following sections of the CZA - CorreLog Agent for z/OS manual:
v General considerations in Section 1: Introduction.
v Procedure in Section 2: Installation.
v Procedure in the Section 3: Configuration.
Ensure that you complete the Tailoring the Installation for a Proprietary Syslog
Extension/IBM Security QRadar instructions.
When you start the CorreLog agent, if QRadar does not collect z/OS events, see
the Troubleshooting topic in Section 3.
v If you want to customize the optional CorreLog Agent parameter file, review
QRadar normalized event attributes in Appendix G: Fields.
The following table identifies the specifications for the CloudPassage Halo DSM:
Table 19. CloudPassage Halo DSM Specifications
Specification Value
Manufacturer CloudPassage
DSM name CloudPassage Halo
RPM file name DSM-CloudPassageHalo-
build_number.noarch.rpm
Supported versions All
Event format Syslog, Log file
QRadar recorded event types All events
Automatically discovered? Yes
Included identity? No
More information CloudPassage website
(www.cloudpassage.com)
Before you can configure the Event Connector, you must create a read-only
CloudPassage API key. To create a read-only key, log in to your CloudPassage
Portal and click Add New Key on the Site Administration window.
The Event Connector script requires Python 2.6 or later to be installed on the host
on which the Event Connector script runs. The Event Connector makes calls to the
CloudPassage Events API, which is available to all Halo subscribers.
Procedure
1. Log in to the CloudPassage Portal.
2. Go to to Settings > Site Administration.
3. Click the API Keys tab.
4. Click Show for the key you want to use.
5. Copy the key ID and secret key into a text file.
Ensure that the file contains only one line, with the key ID and the secret key
separated by a vertical bar/pipe (|), for example,
your_key_id|your_secret_key. If you want to retrieve events from multiple
Halo accounts, add an extra line for each account.
6. Save the file as haloEvents.auth.
7. Download the Event Connector script and associated files from
https://github.com/cloudpassage/halo-event-connector-python.
8. Copy the following files to a Linux or Windows system that has Python 2.6
(or later) installed:
v haloEvents.py
v cpapi.py
v cputils.py
v remote_syslog.py (use this script only if you deploy the Event Connector on
Windows and you want to send events through syslog)
v haloEvents.auth
9. Set the environment variables on the Linux or Windows system:
v On Linux, include the full path to the Python interpreter in the PATH
environment variable.
v On Windows, set the following variables:
– Set the PATH variable to include the location of haloEvents.py and the
Python interpreter.
– Set the PYTHONPATH variable to include the location of the Python
libraries and the Python interpreter.
10. To send events through syslog with the Event Connector is deployed on a
Windows system, run the haloEvents.py script with the --leefsyslog=<QRadar
IP> switch:
haloEvents.py --leefsyslog=1.2.3.4
By default, the Event Connector retrieves existing events on initial connection
and then retrieves onlynew events thereafter. To start event retrieval from a
specific date, rather than retrieving all historical events on startup, use the
--starting=<date> switch, where date is in the YYYY-MM-DD format:
haloEvents.py --leefsyslog=1.2.3.4 --starting=2014-04-02
11. To send events through syslog and deploy the Event Connector on a Linux
system, configure the local logger daemon.
a. To check which logger the system uses, type the following command:
ls -d /etc/*syslog*
Depending on what Linus distribution you have, the following files might
be listed:
v
Note: As an alternative to using syslog, you can write events to a file for
QRadar to retrieve by using the Log File protocol. For Windows or Linux
to write the events to a file instead, use the --leeffile=<filename> switch
to specify the file to write to.
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select CloudPassage Halo.
7. From the Protocol Configuration list, select Syslog or Log File.
8. Configure the remaining parameters:
9. Click Save.
10. On the Admin tab, click Deploy Changes.
The following table identifies the specifications for the DG Technology MEAS
DSM:
Table 20. DSM Specifications for DG Technology MEAS
Specification Value
Manufacturer DG Technology
Log source type DG Technology MEAS
RPM file name DSM-DGTechnologyMEAS-
build_number.noarch.rpm
Supported versions 8.x
Protocol configuration LEEF Syslog
Supported event types Mainframe events
Automatically discovered? Yes
Includes identity? No
Includes custom event properties No
More information DG Technology website
(http://www.dgtechllc.com)
Procedure
1. Log in to your DG Technology MEAS server.
2. Type the following command:
Results
When QRadar receives events from your DG Technology MEAS, a log source is
automatically created and listed on the Log Sources window.
This DSM applies to FireEye CMS, MPS, EX, AX, NX, FX, and HX appliances.
QRadar records all relevant notification alerts that are sent by FireEye appliances.
The following table identifies the specifications for the FireEye DSM.
Table 21. FireEye DSM specifications
Specification Value
Manufacturer FireEye
DSM name FireEye MPS
Supported versions CMS, MPS, EX, AX, NX, FX, and HX
RPM file name DSM-FireEyeMPS-QRadar_version-
Build_number.noarch.rpm
Protocol Syslog
QRadar recorded event types
All relevant events
Auto discovered? Yes
Includes identity? No
More information FireEye website (www.fireeye.com)
Procedure
1. Log in to the FireEye appliance by using the CLI.
2. To activate configuration mode, type the following commands:
enable
configure terminal
3. To enable rsyslog notifications, type the following command:
fenotify rsyslog enable
4. To add QRadar as an rsyslog notification consumer, type the following
command:
fenotify rsyslog trap-sink QRadar
5. To specify the IP address for the QRadar system that you want to receive
rsyslog trap-sink notifications, type the following command:
fenotify rsyslog trap-sink QRadar address QRadar_IP_address
6. To define the rsyslog event format, type the following command:
fenotify rsyslog trap-sink QRadar prefer message format leef
7. To save the configuration changes to the FireEye appliance, type the following
command:
write memory
Procedure
1. Log in to QRadar
2. Click the Admin tab.
3. On the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select FireEye.
7. Using the Protocol Configuration list, select Syslog.
8. In the Log Source Identifier field, type the IP address or host name of the
FireEye appliance.
9. Configure the remaining parameters.
10. Click Save.
11. On the Admin tab, click Deploy Changes.
The following table lists the specifications for the FreeRADIUS DSM:
Table 22. FreeRADIUS DSM specifications
Specification Value
Manufacturer FreeRADIUS
DSM name FreeRADIUS
RPM file name DSM-FreeRADIUS-Qradar_version-
build_number.noarch.rpm
Supported versions V2.x
Event format Syslog
Recorded event types All events
Automatically discovered? Yes
Includes identity? Yes
Includes custom properties? No
More information FreeRADIUS website (http://freeradius.org)
FreeRADIUS has multiple distributions. Some files might not be in the same
locations that are described in this procedure. For example, the location of the
FreeRADIUS startup script is based on distribution. Conceptually, the configuration
steps are the same for all distributions.
Procedure
1. Log in to the system that hosts FreeRADIUS.
2. Edit the /etc/freeradius/radius.conf file.
3. Change the text in the file to match the following lines:
logdir = syslog
Log_destination = syslog
log{
destination = syslog
syslog_facility = daemon
stripped_names = no
auth = yes
auth_badpass = no
auth_goodpass = no
}
4. Edit the /etc/syslog.conf file.
5. To configure log options, add the following text.
# .=notice logs authentication messages (L_AUTH).
# <facility_name>.=notice
@<IP_address_of_QRadar_Event_Collector_or_QRadar_Console>
# .=err logs module errors for FreeRADIUS.
#<facility_name>.=err
@<IP_address_of_QRadar_Event_Collector_or_QRadar_Console>
# .* logs messages to the same target.
# <facility_name>.*
@<IP_address_of_QRadar_Event_Collector_or_QRadar_Console>
An example syslog facility name is local1. You can rename it.
To configure a log option, remove the comment tag (#) from one of the active
lines that contains an @ symbol.
6. If the configuration change does not load automatically, restart the syslog
daemon. The method to restart the syslog daemon depends on the distribution
that is used. The following table lists possible methods.
genua genugate produces logs from third-party software such as openBSD and
sendMail. The genua genugate DSM provides basic parsing for the logs from these
third-party devices. To achieve more specify parsing for these logs, install the
specific DSM for that device.
The following table lists the specifications for the genua genugate DSM:
Table 24. genua genugate DSM specifications
Specification Value
Manufacturer genua
DSM name genua genugate
RPM file name DSM-GenuaGenugate-Qradar_version-
build_number.noarch.rpm
Supported versions 8.2 and later
Protocol Syslog
Recorded event types General error messages
High availability
Relay-specific messages
genua programs/daemons
EPSI
Configfw
FWConfig
ROFWConfig
User-Interface
Webserver
Automatically discovered? Yes
Includes identity? Yes
Includes custom properties? No
More information genua website (https://www.genua.de/en/
solutions/high-resistance-firewall-
genugate.html)
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring genua genugate to send events to QRadar”
Configure genua genugate to send events to IBM Security QRadar.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Log in to genua genugate.
2. Click System > Sysadmin > Logging page.
3. In the IBM QRadar IP Address field, type the IP address of your QRadar
Console or Event Collector.
4. Select the Accounting to External check box.
5. Click OK.
The following table lists the specifications for the HyTrust CloudControl DSM:
Table 26. HyTrust CloudControl DSM specifications
Specification Value
Manufacturer Hytrust
DSM name HyTrust CloudControl
RPM file name DSM-HyTrustCloudControl-Qradar_version-
build_number.noarch.rpm
Supported versions V3.0.2 through V3.6.0
Protocol Syslog
Recorded event types All events
Automatically discovered? Yes
Includes identity? Yes
Includes custom properties? No
More information Hytrust web site (http://www.hytrust.com)
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring HyTrust CloudControl to communicate with QRadar” on page 50
To collect HyTrust CloudControl events, you must configure your third-party
device to send events to IBM Security QRadar
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
Procedure
1. Log in to HyTrust CloudControl.
2. From the HTA Management Console, select Configuration > Logging.
3. From the HTA Logging Aggregation options, select External.
4. From the Logging Aggregation Template Type options, select either
Proprietary or CEF.
5. In the HTA Syslog Servers field, type the IP address for QRadar.
The following table identifies the specifications for both IBM AIX DSM Server:
Table 28. IBM AIX Server DSM specifications
Specification Value
Manufacturer IBM
DSM names IBM AIX Server
RPM file names DSM-IBMAIXServer-QRadar_version-
build_number.noarch.rpm
Supported versions V5.X, V6.X, and V7.X
Protocol type Syslog
QRadar recorded event types
Login or logoff events
To integrate IBM AIX Server events with QRadar, complete the following steps:
1. If automatic updates are not enabled, download the latest version of the IBM
AIX Server DSM.
2. Configure your IBM AIX Server device to send syslog events to QRadar.
3. Configure a syslog-based log source for your IBM AIX Server device. Use the
following protocol-specific parameters:
Parameter Description
Log Source Type IBM AIX Server
Protocol Configuration Syslog
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
The following table identifies the specifications for the IBM AIX Audit DSM:
Table 29. IBM AIX Audit DSM specifications
Specification Value
Manufacturer IBM
DSM names IBM AIX Audit
RPM file names DSM-IBMAIXAudit-QRadar_version-
build_number.noarch.rpm
Supported versions V6.1 and V7.1
Protocol type
Syslog
To integrate IBM AIX Audit events with QRadar, complete the following steps:
1. Download the latest version of the IBM AIX Audit DSM.
2. For syslog events, complete the following steps:
a. Configure your IBM AIX Audit device to send syslog events to QRadar. See
“Configuring IBM AIX Audit DSM to send syslog events to QRadar” on
page 54.
b. If QRadar does not automatically discover the log source, add an IBM AIX
Audit log source. Use the following IBM AIX Audit-specific values in the
log source configuration:
Parameter Value
Log Source Type IBM AIX Audit
Protocol Configuration Syslog
Parameter Value
Log Source Type IBM AIX Audit
Protocol Configuration Log File
Service Type The protocol to retrieve log files from a
remote server.
Important: If you select the SCP and SFTP
service type, ensure that the server that is
specified in the Remote IP or Hostname
parameter has the SFTP subsystem enabled.
Remote Port If the host for your event files uses a
non-standard port number for FTP, SFTP, or
SCP, adjust the port value.
SSH Key File If you select SCP or SFTP as the Service
Type, use this parameter to define an SSH
private key file. When you provide an SSH
Key File, the Remote Password parameter is
ignored.
Remote Directory The directory location on the remote host
where the files are retrieved. Specify the
location relative to the user account you are
using to log in.
Restriction: For FTP only. If your log files
are in a remote user home directory, leave
the remote directory blank to support
operating systems where a change in the
working directory (CWD) command is
restricted.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring IBM AIX Audit DSM to send syslog events to QRadar”
To collect syslog audit events from your IBM AIX Audit device, redirect your audit
log output from your IBM AIX device to the IBM Security QRadar Console or
Event Collector.
“Configuring IBM AIX Audit DSM to send log file protocol events to QRadar” on
page 55
Configure the audit.pl script to run each time that you want to convert your IBM
AIX audit logs to a readable event log format for QRadar.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
On an IBM AIX appliance, you can enable or disable classes in the audit
configuration. The IBM AIX default classes capture a large volume of audit events.
To prevent performance issues, you can tune your IBM AIX appliance to reduce
the number of classes that are collected. For more information about audit classes,
see your IBM AIX appliance documentation.
Procedure
1. Log in to your IBM AIX appliance.
2. Open the audit configuration file:
What to do next
The IBM AIX Audit DSM automatically discovers syslog audit events that are
forwarded from IBM AIX to QRadar and creates a log source. If the events are not
automatically discovered, you can manually configure a log source.
To use the audit script, you are required to install a version of Perl 5.8 or above on
your IBM AIX appliance
Procedure
1. Log in to your IBM AIX appliance.
2. Configure the audit configuration file:
a. Open the audit configuration file:
etc/security/audit/config
b. Edit the Start section to enable the binmode element.
binmode = on
c. In the Start section, edit the configuration to determine which directories
contain the binary audit logs. The default configuration for IBM AIX
auditing writes binary logs to the following directories:
trail = /audit/trail
bin1 = /audit/bin1
bin2 = /audit/bin2
binsize = 10240
cmds = /etc/security/audit/bincmds
In most cases, you do not have to edit the binary file in the bin1 and bin2
directories.
d. In the Classes section, edit the configuration to determine which classes are
audited. For information on configuring classes, see your IBM AIX
documentation.
e. Save the configuration changes.
3. Start auditing on your IBM AIX system:
audit start
4. Install the audit script:
a. Access the IBM Support website (http://www.ibm.com/support).
b. Download the audit.pl.gz file.
c. Copy the audit script to a folder on your IBM AIX appliance.
d. Extract the file:
tar -zxvf audit.pl.gz
e. Start the audit script:
./audit.pl
You can add the following parameters to modify the command:
What to do next
The IBM AIX Audit DSM automatically discovers log file protocol audit events that
are forwarded from IBM AIX to QRadar and creates a log source. If the events are
not automatically discovered, you can manually configure a log source.
You can use one of the following software products to configure QRadar to retrieve
events from an IBM AS/400 (or IBM OS/400) iSeries device:
IBM AS/400 iSeries DSM
The IBM AS/400 iSeries DSM uses the DSPJRN command to write audit
journal records to a database file. The database file is uploaded to an FTP
server for QRadar to retrieve. QRadar uses the Log File protocol to retrieve
the database file.
LogAgent for System i
The LogAgent for System i accepts all Common Event Format (CEF)
formatted syslog messages. You can integrate an IBM OS/400 device and
then use the LogAgent for System i software. After you configure your
LogAgent for System i software, use the Log File protocol source to
retrieve the syslog CEF messages.
For more information, see your Patrick Townsend Security Solutions LogAgent
for System i documentation.
PowerTech Interact
PowerTech Interact accepts all Common Event Format (CEF) formatted
syslog messages. After you configure your PowerTech Interact software,
use the Log File protocol source to pull the syslog CEF messages.
Raz-Lee iSecurity DSM
You can also use the Raz-Lee iSecurity DSM to retrieve events from an IBM
AS/400 (or IBM OS/400) iSeries device.
For more information, see the Frequently Asked Questions webpage on the IBM
Support webpage.
Related concepts:
Chapter 22, “IBM AS/400 iSeries DSM,” on page 61
The IBM Security QRadar DSM for IBM AS/400 iSeries collects audit records and
event information from IBM AS/400 iSeries devices.
The following table identifies the specifications for the IBM AS/400 iSeries DSM:
Table 30. IBM AS/400 iSeries DSM specifications
Specification Value
Manufacturer IBM
DSM name IBM AS/400 iSeries
Supported versions V5R4 and later
RPM file name DSM-IBMiSeries-Qradar_version-
build_number.noarch.rpm
Protocol Log File Protocol
syslog
Recorded event types Audit records and events
Automatically discovered? No
Includes identity? Yes
Includes custom properties? No
More information IBM website (http://www.ibm.com/)
To collect events from IBM AS/400 iSeries devices, complete the following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the IBM AS/400 iSeries DSM RPM on your QRadar Console.
2. Configure your IBM AS/400 iSeries device to communicate with QRadar.
3. Add an IBM AS/400 iSeries log source on the QRadar Console. Configure all
the required parameters, but use the following table to configure the
parameters that are required to collect IBM AS/400 iSeries events:
Table 31. IBM AS/400 iSeries log source parameters
Parameter Value
Log Source Type IBM AS/400 iSeries
Protocol Configuration Log File
Note: If you are using the PowerTech
Interact or LogAgent for System i software
to collect CEF formatted syslog messages,
you must select the Syslog option
Service Type Secure File Transfer Protocol (SFTP)
Related tasks:
“Configuring an IBM iSeries device to communicate with QRadar” on page 62
For IBM Security QRadar to be able to collect IBM iSeries events, you need to
configure your IBM iSeries device to communicate with your QRadar device.
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
The IBM AS/400 iSeries DSM uses an agent that manages, gathers, and transfers
event information. The agent uses the DSPJRN command to write audit journal
records to a database file. These records are reformatted and forwarded to an FTP
server where QRadar can retrieve the records.
The IBM iSeries system records and writes security events in the Audit Journal and
the QHST logs. QHST logs are stored in the Audit Journal as TYPE5 messages.
Procedure
1. From the IBM support website (http://www.ibm.com/support), download the
AJLIB.SAVF file.
2. Copy the AJLIB.SAVF file to a computer or terminal that has FTP access to the
IBM AS/400 iSeries device.
3. Using FTP on the computer or terminal, replace the iSeries generic SAVF file
with the AJLIB.SAVF file. Type the following commands:
cd qgpl
quote site namefmt 1
bin
lcd c:\
put ajlib.savf
quit
If you transfer your SAVF file from another iSeries device, send the file with the
BINARY FTP subcommand mode before the GET or PUT statement.
4. To restore the AJLIB library on the IBM iSeries device, type the following
command:
RSTLIB SAVLIB(AJLIB) DEV(*SAVF) SAVF(AJLIB)
5. To restore the IFS directory, type the following command:
RST DEV(’/qsys.lib/ajlib.lib/ajifs.file’) OBJ((’/ajlib’))
6. To configure the data collection start date and time for the Audit Journal
Library (AJLIB), type the following command:
ADDLIBLE AJLIB
AJLIB/SETUP
You are prompted for a user name and password. If you start the Audit Journal
Collector, a failure message is sent to QSYSOPR. The setup function sets a
default start date and time for data collection from the Audit Journal to 08:00:00
of the current day.
Tip: To preserve your previous start date and time information for a previous
installation, you must run AJLIB/DATETIME. Record the previous start date and
time, and then type those values when you run AJLIB/SETUP command. The
Results
If the FTP transfer is successful, the current date and time information is written
into the start time for AJLIB/DATETIME to update the gather time and the end time
is set to blank. If the FTP transfer fails, the export file is erased and no updates are
made to the gather date or time and a message is sent to QSYSOPR.
The following table identifies the specifications for the IBM Federated Directory
Server DSM:
Table 32. IBM Federated Directory Server DSM specifications
Specification Value
Manufacturer IBM
DSM name IBM Federated Directory Server
RPM file name DSM-IBMFederated DirectoryServer-
Qradar_version-build_number.noarch.rpm
Supported versions V7.2.0.2 and later
Event format LEEF
Recorded event types FDS Audit
Automatically discovered? Yes
Includes identity? No
Includes custom properties? No
More information Security Directory Server information in the
IBM Knowledge Center
((http://www-01.ibm.com/support/
knowledgecenter/SSVJJU/welcome)
To send events from IBM Federated Directory Server to QRadar, complete the
following steps:
1. If automatic updates are not enabled, download the most recent version of the
following RPMs on your QRadar Console:
v DSMCommon RPM
v IBM Federated Directory Server DSM RPM
2. Configure QRadar monitoring on your IBM Federated Directory Server device.
3. If QRadar does not automatically detect the log source, add an IBM Federated
Directory Server log source on the QRadar Console. The following table
describes the parameters that require specific values for IBM Federated
Directory Server event collection:
Table 33. IBM Federated Directory Serve log source parameters
Parameter Value
Log Source type IBM Federated Directory Server
Protocol Configuration Syslog
Log Source Identifier The source IP or host name of the IBM
Federated Directory Server.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
© Copyright IBM Corp. 2005, 2015 65
RPM manually.
“Configuring IBM Federated Directory Server to monitor security events”
Configure IBM Federated Directory Server to monitor security events, which are
generated when an entry is added, modified, or deleted in the target
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Log in to your IBM Federated Directory Server.
2. In the navigation pane, under Common Settings, click Monitoring.
3. On the Monitoring page, click the QRadar tab.
4. To indicate that you want to monitor security events, on the QRadar page,
select Enabled .
5. Configure the parameters
6. In the Map file field, specify the path and file name of the map file that
configures the various QRadar LEEF attributes for the event.
7. Click Select to browse for the map file. The default value points to the
LDAPSync/QRadar.map file.
8. In the Date format mask field, specify a standard Java SimpleDateFormat mask
to use for date values that are written in mapped LEEF attributes.
This value controls both the value of the devTimeFormat attribute and the
formatting of date values in the event. The default value is the ISO 8601
standard mask, MMM dd yy HH:mm:ss, which creates a string, Oct 16 12
15:15:57.
The following table identifies the specifications for the IBM Fiberlink MaaS360
DSM:
Table 34. IBM Fiberlink MaaS360 DSM Specification
Specification Value
Manufacturer IBM
DSM name IBM Fiberlink MaaS360
RPM file name DSM-IBMFiberlinkMaaS360
Supported versions N/A
Event format LEEF
QRadar recorded event types Compliance rule events
Automatically discovered? No
Included identity? No
More information Fiberlink MaaS360 website
(http://www.maas360.com/)
To integrate IBM Fiberlink MaaS360 with QRadar, use the following steps:
1. If automatic updates are not enabled, download the latest versions of the
following RPMs:
v DSMCommon RPM
v IBM FiberLink REST API Protocol RPM
v IBM Fiberlink MaaS360 RPM
2. Configure your Fiberlink MaaS360 instance to enable communication with
QRadar.
3. Create an IBM Fiberlink MaaS360 log source on the QRadar Console.
Procedure
1. Access the IBM support website (http://www.ibm.com/support).
2. Download the RPM file to the system that hosts your QRadar Console.
3. Using SSH, log in to QRadar as the root user.
4. Go to the directory that includes the downloaded file.
5. Type the following command:
rpm -Uvh filename
6. Log in to theQRadar user interface.
Procedure
1. To enable the REST API for your Fiberlink MaaS360 account, contact Fiberlink
customer service.
2. Copy the public certificate from the Fiberlink login server to the
/opt/qradar/conf/trusted_certificates directory on your QRadar Console.
Ensure that the following conditions are met:
v The certificate is DER encoded.
v The file name extension is .DER. The extension is case-sensitive.
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select IBM Fiberlink MaaS360.
7. From the Protocol Configuration list, select IBM Fiberlink REST API.
8. Configure the following IBM Fiberlink REST API parameters:
Parameter Description
Login URL The URL for the Fiberlink MaaS login server.
Secret Key The secret key that is provided by Fiberlink
Customer Service when you enabled the
REST API.
App ID The App ID that was provided by Fiberlink
Customer Service when you enabled the
REST API.
Billing ID The Billing ID for your Fiberlink MaaS360
account.
Platform The platform version of the Fiberlink
MaaS360 console.
App Version The App Version of the application that
corresponds to your REST API account.
The following table identifies the specifications for the IBM Security Privileged
Identity Manager DSM:
Table 35. IBM Security Privileged Identity Manager DSM specifications
Specification Value
Manufacturer IBM
DSM name IBM Security Privileged Identity Manager
RPM file name DSM-
IBMSecurityPrivilegedIdentityManager-
Qradar_version-build_number.noarch.rpm
Supported versions V2.0
Protocol JDBC
Recorded event types Audit
Authentication
System
Automatically discovered? No
Includes identity? No
Includes custom properties? No
More information IBM Security Privileged Identity Manager
website (http://www-03.ibm.com/software/
products/en/pim/)
To collect events from IBM Security Privileged Identity Manager, complete the
following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the following RPMs on your QRadar Console:
v JDBC Protocol RPM
v IBM Security Privileged Identity Manager DSM RPM
2. Collect information from the IBM Security Privileged Identity Manager web
user interface.
3. Add an IBM Security Privileged Identity Manager log source on the QRadar
Console. The following table describes the parameters that require specific
values for IBM Security Privileged Identity Manager event collection:
Table 36. IBM Security Privileged Identity Manager log source parameters
Parameter Value
Log Source type IBM Security Privileged Identity Manager
Protocol Configuration JDBC
Log Source Identifier <DATABASE@HOSTNAME>
Database Type DB2
To communicate with QRadar, the IBM Security Privileged Identity Manager DB2
database must have incoming TCP connections enabled.
Procedure
1. Log in to IBM Security Privileged Identity Manager.
2. Click the Configure Privileged Identity Manager tab.
3. In the Manage External Entities pane, select Database Server Configuration.
4. Double-click the Identity data store row in the Database Server Configuration
column.
5. Record the values for the following parameters:
v Host name
v Port
v Database name
v Database Administrator ID
What to do next
Using a zSecure process, events from the System Management Facilities (SMF) are
recorded to an event file in the Log Enhanced Event format (LEEF). IBM Security
QRadar retrieves the LEEF event log files using the log file protocol and processes
the events. You can schedule to retrieve events on a polling interval, which allows
QRadar to retrieve the events on the schedule you have defined.
Before you can configure the data collection process, you must complete the basic
zSecure installation process.
After installing the software, you must also perform the post-installation activities
to create and modify the configuration. For instructions on installing and
Log files are transferred, one at a time, to QRadar for processing. The log file
protocol can manage plain text event logs, compressed files, or archives. Archives
must contain plain-text files that can be processed one line at a time. Multi-line
event logs are not supported by the log file protocol. IBM RACF integrated with
QRadar, using audit scripts, writes log files to a specified directory as plain text
files. QRadar processes the events, which are written as one event per line in the
file. QRadar extracts the archive and processes the events, which are written as one
event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
QRadar requires credentials to log in to the system hosting your event files and a
polling interval.
Procedure
1. Click the Admin tab.
2. Click the Log Sources icon.
3. Click Add.
4. In the Log Source Name field, type a name for the log source.
5. In the Log Source Description field, type a description for the log source.
6. From the Log Source Type list, select IBM Resource Access Control Faclilty
(RACF).
7. From the Protocol Configuration list, select Log File.
8. Configure the following values:
Table 37. IBM RACF log file protocol parameters
Parameter Description
Service Type From the list, select the protocol you want to
use when retrieving log files from a remote
server. The default is SFTP.
v SFTP - SSH File Transfer Protocol
v FTP - File Transfer Protocol
v SCP - Secure Copy
Remote Port Type the TCP port on the remote host that is
running the selected Service Type. The valid
range is 1 to 65535.
FTP Transfer Mode This option only displays if you select FTP
as the Service Type.
SCP Remote File If you select SCP as the Service Type you
must type the file name of the remote file.
Run On Save Select this check box if you want the log file
protocol to run immediately after you click
Save.
Processor None.
Ignore Previously Processed File(s) Select this check box to track and ignore files
that have already been processed by the log
file protocol.
9. Click Save.
10. On the Admin tab, click Deploy Changes.
The IBM RACF configuration is complete. If your IBM RACF requires custom
event properties, see the IBM Security QRadar Custom Event Properties for IBM
z/OS technical note.
QRadar records all relevant and available information from the event.
Note: zSecure integration is the only integration that provides custom events to
the log source. Custom events may be displayed even when you collect events by
using the Native QEXRACF integration.
Procedure
1. From the IBM support website (http://www.ibm.com/support), download the
following compressed file:
qexracf_bundled.tar.gz
2. On a Linux-based operating system, extract the file:
tar -zxvf qexracf_bundled.tar.gz
The following files are contained in the archive:
qexracf_jcl.txt
qexracfloadlib.trs
qexracf_trsmain_JCL.txt
3. Load the files onto the IBM mainframe using any terminal emulator file
transfer method.
Upload the qexracf_trsmain_JCL.txt and qexracf_jcl.txt files using the
TEXT protocol.
Upload the QexRACF loadlib.trs file using binary mode and append to a
pre-allocated data set. The QexRACF loadlib.trs file is a tersed file containing
the executable (the mainframe program QEXRACF). When you upload the .trs
file from a workstation, pre-allocate a file on the mainframe with the following
DCB attributes: DSORG=PS, RECFM=FB, LRECL=1024, BLKSIZE=6144. The file
transfer type must be binary mode and not text.
4. Customize the qexracf_trsmain_JCL.txt file according to your
installation-specific requirements.
The qexracf_trsmain_JCL.txt file uses the IBM utility Trsmain to uncompress
the program stored in the QexRACF loadlib.trs file.
An example of the qexracf_trsmain_JCL.txt file includes:
//TRSMAIN JOB (yourvalidjobcard),Q1labs, // MSGCLASS=V //DEL EXEC
PGM=IEFBR14 //D1 DD DISP=(MOD,DELETE),DSN=<yourhlq>.QEXRACF.TRS //
UNIT=SYSDA, // SPACE=(CYL,(10,10)) //TRSMAIN EXEC
PGM=TRSMAIN,PARM=’UNPACK’ //SYSPRINT DD
SYSOUT=*,DCB=(LRECL=133,BLKSIZE=12901,RECFM=FBA) //INFILE DD
DISP=SHR,DSN=<yourhlq>.QEXRACF.TRS //OUTFILE DD
DISP=(NEW,CATLG,DELETE), // DSN=<yourhlq>.LOAD, //
SPACE=(CYL,(10,10,5),RLSE),UNIT=SYSDA //
You must update the file with your installation specific information for
parameters, such as, jobcard, data set naming conventions, output destinations,
retention periods, and space requirements.
The .trs input file is an IBM TERSE formatted library and is extracted by
running the JCL, which calls the TRSMAIN. This tersed file, when extracted,
creates a PDS linklib with the QEXRACF program as a member.
5. You can STEPLIB to this library or choose to move the program to one of the
LINKLIBs that are in the LINKLST. The program does not require
authorization.
6. After uploading, copy the program to an existing link listed library or add a
STEPLIB DD statement with the correct dataset name of the library that will
contain the program.
The following table lists the specifications for the IBM Privileged Session Recorder
DSM.
Table 38. IBM Privileged Session Recorder specifications
Specification Value
Manufacturer IBM
DSM name Privileged Session Recorder
RPM filename DSM-IBMPrivilegedSessionRecorder
Protocol JDBC
QRadar recorded event types Command Execution Audit Events
Automatically discovered? No
Includes identity? No
More information IBM website (http://www.ibm.com/)
To collect IBM Privileged Session Recorder events, use the following procedures:
1. If automatic updates are not enabled, download and install the following RPMs
on your QRadar Console:
v Protocol-JDBC RPM
v IBM Privileged Session Recorder DSM RPM
2. On the IBM Security Privileged Identity Manager dashboard, obtain the
database information for the Privileged Session Recorder data store and
configure your IBM Privileged Session Recorder DB2 database to allow
incoming TCP connections.
3. For each instance of IBM Privileged Session Recorder, create an IBM Privileged
Session Recorder log source on the QRadar Console. Use the following table to
define the Imperva SecureSphere parameters:
Table 39. IBM Privileged Session Recorder log source parameters
Parameter Description
Log Source Type IBM Privileged Session Recorder
Protocol Configuration JDBC
Log Source Identifier DATABASE@HOSTNAME
Database Type DB2
Database Name The Session Recorder data store name that
you configured on the IBM Privileged
Identity Manager dashboard.
IP or Hostname The Session Recorder database server
address.
Port The port that is specified on IBM Privileged
Identity Manager dashboard.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring IBM Privileged Session Recorder to communicate with QRadar”
Before you can configure a log source in IBM Privileged Session Recorder for IBM
Security QRadar, obtain the database information for the Privileged Session
Recorder data store. You must also configure your IBM Privileged Session Recorder
DB2 database to allow incoming TCP connections from QRadar.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Log in to the IBM Security Privileged Identity Manager web user interface.
2. Select the Configure Privileged Identity Manager tab.
3. Select Database Server Configuration in the Manage External Entities section.
4. In the table, double-click the Session Recording data store row in the Database
Server Configuration column.
5. 5. Record the following parameters to use when you configure a log source in
QRadar:
The following table identifies the specifications for the IBM Security Network IPS
DSM:
Parameter Value
Manufacturer IBM
DSM Security Network IPS
RPM file name DSM-IBMSecurityNetworkIPS-QRadar_version-
Build_number.noarch.rpm
Supported versions v4.6 and later (UDP)
Health alerts
System alerts
To integrate the IBM Security Network IPS appliance with QRadar, use the
following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the IBM Security Network IPS RPMs on your QRadar Console.
2. For each instance of IBM Security Network IPS, configure your IBM Security
Network IPS appliance to enable communication with QRadar.
3. If QRadar does not automatically discover the log source, create a log source
for each instance of IBM Security Network IPS on your network.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Ensure that no firewall rules block the communication between your IBM Security
Network IPS appliance and QRadar.
Procedure
1. Log in to your IPS Local Management Interface.
2. From the navigation menu, select Manage System Settings > Appliance >
LEEF Log Forwarding.
3. Select the Enable Local Log check box.
4. In the Maximum File Size field, configure the maximum file size for your
LEEF log file.
5. From the Remote Syslog Servers pane, select the Enable check box.
6. In the Syslog Server IP/Host field, type the IP address of your QRadar Console
or Event Collector.
7. In the TCP Port field, type 514 as the port for forwarding LEEF log events.
Note: If you use v4.6.1 or earlier, use the UDP Port field.
8. From the event type list, enable any event types that are forwarded to QRadar.
9. If you use a TCP port, configure the crm.leef.fullavp tuning parameter:
a. From the navigation menu, select Manage System Settings > Appliance >
Tuning Parameters.
b. Click Add Tuning Parameters.
c. In the Name field, type crm.leef.fullavp.
d. In the Value field, type true.
e. Click OK.
Procedure
1. Click the Admin tab.
2. Click the Log Sources icon.
3. Click Add.
4. In the Log Source Name field, type a name for your log source.
5. From the Log Source Type list, select IBM Security Network IPS (GX).
6. Using the Protocol Configuration list, select Syslog.
7. Configure the parameters:
8. Click Save.
9. On the Admin tab, click Deploy Changes.
The following table identifies specifications for the IBM SmartCloud Orchestrator
DSM.
Table 40. IBM SmartCloud Orchestrator specifications
Specification Value
Manufacturer IBM
DSM name SmartCloud Orchestrator
RPM file name DSM-IBMSmartCloudOrchestrator-
Qradar_version_build number.noarch.rpm
Supported versions V2.3 FP1 and later
Protocol type
IBM SmartCloud Orchestrator REST API
QRadar recorded event types
Audit Records
Log source type in the QRadar UI IBM SmartCloud Orchestrator
Automatically discovered? No
Includes identity? Yes
Includes custom properties No
More information http://ibm.com
Parameter Description
Log Source Type IBM SmartCloud Orchestrator.
Protocol Configuration IBM SmartCloud Orchestrator REST API
IP or Hostname The IP address or server name of the
SmartCloud Orchestrator.
Procedure
1. Download and install the latest DSMCommon RPM on your QRadar Console.
If automatic updates are configured to install DSM updates, this step is not
necessary.
2. Download and install the latest IBM SmartCloud Orchestrator RESTAPI
Protocol RPM on to your QRadar Console.
3. Download and install the latest IBM SmartCloud Orchestrator RPM on your
QRadar Console. If automatic updates are configured to install DSM updates,
this step is not necessary.
Procedure
1. Log in to QRadar.
2. Select the Admin tab.
3. On the navigation menu, click Data Sources.
4. Click the Log Sources icon and then click Add.
5. From the Log Source Type list, select IBM SmartCloud Orchestrator.
6. From the Protocol Configuration list, select IBM SmartCloud Orchestrator
REST API.
7. Configure the parameters:
Option Description
IP or Hostname The IP address or server name of the
SmartCloud Orchestrator.
Username The user name of the SmartCloud
Orchestrator console user.
Password The password of the SmartCloud
Orchestrator console user.
Confirm Password This option confirms that the password was
entered correctly.
EPS Throttle The maximum number of events per second
for this log source (default 5000).
Recurrence How often this log source attempts to obtain
data. Can be in Minutes, Hours, Days
(default 5 minutes).
The following table lists the specifications for the IBM Tivoli Endpoint Manager
DSM:
Table 41. IBM Tivoli Endpoint Manager specifications
Specification Value
Manufacturer IBM
DSM name IBM Tivoli Endpoint Manager
RPM file name DSM-IBMTivoliEndpointManager-
Qradar_version-build_number.noarch.rpm
Supported versions 8.2.x and later
To collect events from IBM Tivoli Endpoint Manager events, complete the
following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the IBM Tivoli Endpoint Manager RPM on your QRadar Console.
2. Configure your Tivoli Endpoint Manager server to communicate with QRadar:
a. Install the Web Reports application on the Tivoli Endpoint Manager server.
b. Create a user account that QRadar can use to access the Relevance database
in the Web Reports application.
Note: For more information, see your IBM Tivoli Endpoint Manager
documentation.
3. Create a log source on the QRadar Console. Use the following table to help you
configure the parameters that are specific to IBM Tivoli Endpoint Manager:
Table 42. IBM Tivoli Endpoint Manager log source parameters
Parameter Description
Log Source Type IBM Tivoli Endpoint Manager
Protocol Configuration IBM Tivoli Endpoint Manager SOAP
Port Use Port 80. If you use HTTPS, use port 443.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
The following table lists the specifications for the IBM Security Trusteer Apex
Advanced Malware Protection DSM:
Table 43. IBM Security Trusteer Apex Advanced Malware Protection DSM specifications
Specification Value
Manufacturer IBM
DSM name IBM Security Trusteer Apex Advanced
Malware Protection
RPM file name DSM-TrusteerApex-Qradar_version-
build_number.noarch.rpm
Supported versions Apex Local Manager V2.0.34 and later for
the syslog/LEEF event collection.
Log File
Recorded event types Malware Detection
Exploit Detection
The following table describes the parameters that require specific values for
IBM Security Trusteer Apex Advanced Malware Protection Log File collection:
Table 45. IBM Security Trusteer Apex Advanced Malware Protection log source parameters
for Log File Protocol
Parameter Value
Log Source type IBM Security Trusteer Apex Advanced
Malware Protection
Protocol Configuration Log File
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring IBM Security Trusteer Apex Advanced Malware Protection to send
syslog events to QRadar” on page 98
Configure IBM Security Trusteer Apex Advanced Malware Protection to send
syslog events to IBM Security QRadar.
“Configuring a Flat File Feed service” on page 98
For IBM Security QRadar to retrieve log files from IBM Security TrusteerApex
Advanced Malware Protection, you must set up a flat file feed service on an
intermediary SFTP-enabled server. The service enables the intermediary server to
host the flat files that it receives from IBM Security TrusteerApex Advanced
Malware Protection and allows for connections from external devices so that
QRadar can retrieve the log files.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
For more information about configuring your IBM Security Trusteer Apex
Advanced Malware Protection to communicate with QRadar, use the following
documentation from the IBM Knowledge Center:
v IBM Security Trusteer Apex Advanced Malware Protection Local Manager - Hybrid
Solution Reference Guide
v IBM Security Trusteer Apex Advanced Malware Protection Feeds Reference Guide
Procedure
1. Log in to Trusteer Management Application (TMA).
2. Select Apex Local Manager & SIEM Settings.
3. Optional: If the Apex Local Manager wizard does not automatically display,
click Add.
4. Type the name of the Apex Local Manager.
5. Check the Enable box and click Next.
6. Type the server settings for QRadar and click Next.
7. Optional: If you use a separate syslog server for the Apex Local Manager
system events, type the settings.
8. Click Finish.
Flat File Feeds use a CSV format. Each feed item is written to the file on a separate
line, which contains several comma-separated fields. Each field contains data that
describes the feed item. The first field in each feed line contains the feed type.
What to do next
After you set up the intermediary server, record the following details:
v Target SFTP server name and IP addresses
v SFTP server port (standard port is 22)
v The file path for the target directory
v SFTP user name if SSH authentication is not configured
v Upload frequency (from 1 minute to 24 hours)
v SSH public key in RSA format
IBM Trusteer support uses the intermediary server details when they configure
IBM Security TrusteerApex Advanced Malware Protection to send flat feel files..
The following table identifies the specifications for the IBM WebSphere DataPower
DSM.
Table 46. IBM WebSphere DataPower DSM specifications
Specification Value
Manufacturer IBM
DSM Name WebSphere DataPower
RPM file name DSM-IBMWebSphereDataPower-
Qradar_version-build_number.noarch.rpm
Supported versions FirmwareV6 and V7
Protocol Syslog
QRadar recorded event types All Events
Log source type in QRadar UI IBM WebSphere DataPower
Auto discovered? Yes
Includes identity? No
Includes custom properties? No
For more information IBM web page (http://www.ibm.com/)
Parameter Value
Log Source Type IBM WebSphere DataPower
Protocol Configuration Syslog
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring IBM WebSphere DataPower to communicate with QRadar” on page
102
To collect IBM WebSphere DataPower events, configure your third-party system to
send events to IBM Security QRadar.
Procedure
1. Log in to your IBM WebSphere DataPower system.
2. In the search box on the left navigation menu, type Log Target.
3. Select the matching result.
4. Click Add.
5. In the Main tab, type a name for the log target.
6. From the Target Type list, select syslog.
7. In the Local Identifier field, type an identifier to be displayed in the Syslog
event payloads parameter on the QRadar user interface.
8. In the Remote Host field, type the IP address or host name of your QRadar
Console or Event Collector.
9. In the Remote Port field, type 514.
10. Under Event Subscriptions, add a base logging configuration with the
following parameters:
Parameter Value
Event Category all
Minimum Event Priority warning
Important: To prevent a decrease in system
performance, do not use more than one
word for the Minimum Event Priority
parameter.
The following table identifies the specifications for the Kaspersky Security Center
DSM:
Table 47. Kaspersky Security Center DSM specifications
Specification Value
Manufacturer Kaspersky
DSM name Kaspersky Security Center
RPM file name DSM-KasperskySecurityCenter-
Qradar_version-build_number.noarch.rpm
Protocol JDBC: Versions 9.2-10.1
Server
Audit
Automatically discovered? No, if you use the JDBC protocol
To send Kaspersky Security Center events to QRadar, complete the following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the following RPMs on your QRadar Console:
v DSMCommon RPM
v Kaspersky Security Center DSM
2. Choose one of the following options:
v If you use syslog, configure your Kaspersky Security Center to forward
events to QRadar.
v If you use the JDBC protocol, create a database view on your Kaspersky
Security Center device.
3. Create a Kaspersky Security Center log source on the QRadar Console.
Configure all required parameters, and use the following tables to configure the
specific values that are required for Kaspersky Security Center event collection.
v If you use syslog, configure the following parameters:
<Kaspersky_Database>@<Server_Address>
For more information about the JDBC protocol parameters, see the Log Sources
User Guide
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Exporting syslog to QRadar from Kaspersky Security Center” on page 106
Configure Kaspersky Security Center to forward syslog events to your IBM
Security QRadar Console or Event Collector.
“Creating a database view for Kaspersky Security Center for JDBC event
collection” on page 105
To use the JDBC protocol to collect audit event data, you must create a database
view on your Kaspersky server that IBM Security QRadar can access.
Create a Kaspersky Security Center user for QRadar who can poll the database for
events.
Ensure that QRadar can poll the database for events on TCP port 1433 or the port
that is configured for your log source. Protocol connections are often disabled on
databases by default and extra configuration steps might be required to allow
connections for event polling. Configure any firewalls that are located between
Kaspersky Security Center and QRadar to allow traffic for event polling.
Procedure
1. Download the klsql2.zip file from the Kaspersky Labs (http://
support.kaspersky.com/9284) website.
2. Copy the klsql2.zip file to your Kaspersky Security Center Administration
Server.
3. Extract the klsql2.zip file to a directory.
4. In any text editor, edit the src.sql file to clear the contents.
5. Type the following statement to create the database view:
Tip: If you copy and paste this statement, ensure that you remove any line
breaks from your pasted text.
create view dbo.events as select e.nId, e.strEventType as ’EventId’,
e.wstrDescription as ’EventDesc’, e.tmRiseTime as ’DeviceTime’, h.nIp as
’SourceInt’, e.wstrPar1, e.wstrPar2, e.wstrPar3, e.wstrPar4, e.wstrPar5,
e.wstrPar6, e.wstrPar7, e.wstrPar8, e.wstrPar9 from dbo.v_akpub_ev_event
e, dbo.v_akpub_host h where e.strHostname = h.strName;
6. Save the src.sql file.
7. Go to the directory that contains the klsql2 files.
8. To create the database view on your Kaspersky Security Center appliance, type
the following command:
klsql2 -i src.sql -o result.xml
Results
The database view is named dbo.events. You will use this value when you
configure a Kaspersky Security Center log source in QRadar.
Related tasks:
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Kaspersky Security Center can forward events that are registered on the
Administration Server, Administration Console, and Network Agent appliances.
Procedure
1. Log in to Kaspersky Security Center.
2. In the console tree, expand the Reports and notifications folder.
3. Right-click Events and select Properties.
4. In the Exporting events pane, select the Automatically export events to SIEM
system database check box.
5. In the SIEM system list, select QRadar.
6. Type the IP address and port for the QRadar Console or Event Collector.
7. Optional: To forward historical data to QRadar, click Export archive to export
historical data.
8. Click OK.
The following table identifies the specifications for the Kisco Information Systems
SafeNet/i DSM:
Table 50. Kisco Information Systems SafeNet/i DSM specifications
Specification Value
Manufacturer Kisco Information Systems
DSM name Kisco Information Systems SafeNet/i
RPM file name DSM-KiscoInformationSystemsSafeNetI-
Qradar_version-build_number.noarch.rpm
Supported versions V10.11
Protocol Log File
Recorded event types All events
Automatically discovered? No
Includes identity? No
Includes custom properties? No
More information Kisco Information Systems website
(http://www.kisco.com/safenet/
summary.htm)
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring Kisco Information Systems SafeNet/i to communicate with QRadar”
To collect SafeNet/i events, configure your IBM iSeries system to accept FTP GET
requests from your QRadar through Kisco Information Systems SafeNet/i.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Use the following table when you configure the FTP access settings:
Table 52. FTP access settings
Parameter Value
Initial Name Format *PATH
Initial List Format *UNIX
Initial Library *USRPRF
Initial Home Directory Path The IFS directory
Procedure
1. Create an IFS directory on your IBM iSeries system.
a. Log in to your IBM iSeries system.
b. Create an IFS Directory to hold the Kisco Information Systems SafeNet/i
QRadar alert files.
Example: /SafeNet/QRadar/
c. Set up a user profile for QRadar to use to FTP into the IFS Directory
through SafeNet/i.
Paramter Value
Activate QRADAR Integration Yes
This Host Identifier The IP address or host name of the IBM
iSeries device.
IFS Path to QRADAR Alert File Use the following format: /SafeNet/QRadar/
Parameter Value
Alert Notification Status On
Summarized Alerts? Yes
The following table identifies the specifications for the Lastline Enterprise DSM:
Table 53. Lastline Enterprise DSM specifications
Specification Value
Manufacturer Lastline
DSM name Lastline Enterprise
RPM file name DSM-LastlineEnterprise-Qradar_version-
build_number.noarch.rpm
Supported versions 6.0
Protocol LEEF
Recorded event types Anti-malware
Automatically discovered? Yes
Includes identity? No
Includes custom properties? No
More information Lastline website (http://www.lastline.com/
platform/enterprise)
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring Lastline Enterprise to communicate with QRadar” on page 112
On the Lastline Enterprise system, use the SIEM settings in the notification
interface to specify a SIEM appliance where Lastline can send events.
Procedure
1. Log in to your Lastline Enterprise system.
2. On the sidebar, click Admin.
3. Click Reporting > Notifications.
4. To add a notification, click the Add a notification (+) icon.
5. From the Notification Type list, select SIEM.
6. In the SIEM Server Settings pane, configure the parameters for your QRadar
Console or Event Collector. Ensure that you select LEEF from the SIEM Log
Format list.
7. Configure the triggers for the notification:
a. To edit existing triggers in the list, click the Edit trigger icon, edit the
parameters, and click Update Trigger.
b. To add a trigger to the list, click the Add Trigger (+) icon, configure the
parameters, and click Add Trigger.
8. Click Save.
The following table identifies the specifications for the McAfee ePolicy Orchestrator
DSM:
Table 55. McAfee ePolicy Orchestrator
Specification Value
Manufacturer McAfee
DSM name McAfee ePolicy Orchestrator
RPM file name DSM-McAfeeEpo-QRadar_version-
build_number.noarch.rpm
Supported versions V3.5 to V5.x
Protocol type
JDBC
SNMPv2
SNMPv3
QRadar recorded event types AntiVirus events
Automatically discovered? No
Included identity? No
More information http://www.mcafee.com
(http://www.mcafee.com)
To integrate McAfee ePolicy Orchestrator with QRadar, use the following steps:
1. If automatic updates are not enabled, download the most recent version of the
McAfee ePolicy Orchestrator DSM RPM.
2. Configure your McAfee ePolicy Orchestrator DSM device to enable
communication with QRadar. Use one of the following options:
v To integrate
3. Create an McAfee ePolicy Orchestrator DSM log source on the QRadar Console.
Procedure
1. Click the Admin tab.
2. Click the Log Sources icon.
3. Click Add.
4. In the Log Source Name field, type a name for your McAfee ePolicy
Orchestrator log source.
5. From the Log Source Type list, select McAfee ePolicy Orchestrator.
6. From the Protocol Configuration list, select JDBC.
Option Description
Log Source Identifier The identifier for the log source in the following
format:
<McAfee ePO Database>@
<McAfee ePO Database Server IP or Host Name>
8. Click Save.
9. On the Admin tab, click Deploy Changes.
Procedure
1. Add a registered server.
2. Configure the SNMP trap notifications on your ePO device.
3. Configure the log source and protocol in QRadar.
4. Optional: Install the Java Cryptography Extension for high-level SNMP
decryption algorithms.
Procedure
1. Log in to your McAfee ePolicy Orchestrator console.
2. Select Menu > Configuration > Registered Servers.
Procedure
1. Add a registered server.
2. Configure the SNMP trap notifications on your ePO device.
3. Configure the log source and protocol in QRadar.
4. Optional: Install the Java Cryptography Extension for high-level SNMP
decryption algorithms.
Procedure
1. Click the Admin tab.
2. Click the Log Sources icon.
3. Click Add.
4. In the Log Source Name field, type a name for your McAfee ePolicy
Orchestrator log source.
5. From the Log Source Type list, select McAfee ePolicy Orchestrator.
6. From the Protocol Configuration list, select either SNMPv2 or SNMPv3.
7. If you chose SNMPv2, configure the following log source parameters:
Option Description
Log Source Identifier The unique IP address for the log source.
Community The SNMP community string for the SNMPv2
protocol, such as Public.
Include OIDs in Event Payload Select this check box to allow the McAfee ePO event
payloads to be constructed by using name-value pairs
instead of the standard event payload format.
9. Click Save.
10. On the Admin tab, click Deploy Changes.
Procedure
1. Download the latest version of the JavaTM Cryptography Extension from the
following website:
https://www14.software.ibm.com/webapp/iwm/web/
preLogin.do?source=jcesdk
The JavaTM Cryptography Extension version must match the version of the
Java™ installed on your McAfee ePO appliance.
Procedure
1. Download the latest version of the JavaTM Cryptography Extension from the
following website:
https://www14.software.ibm.com/webapp/iwm/web/
preLogin.do?source=jcesdk
The JavaTM Cryptography Extension version must match the version of the
Java™ installed on QRadar.
2. Extract the JCE file.
The following Java archive (JAR) files are included in the JCE download:
v local_policy.jar
v US_export_policy.jar
3. Log in to your QRadar Console or Event Collector as a root user.
4. Copy the JCE jar files to the following directory on your QRadar Console or
Event Collector:
/usr/java/latest/jre/lib/
Results
The JCE jar files are only copied to the system that receives the AES192 or AE256
encrypted files from McAfee ePolicy Orchestrator.
The following table identifies the specifications for the Microsoft Exchange Server
DSM when the log source is configured to collect LOGbinder EX events:
Table 57. LOGbinder for Microsoft Exchange Server
Specification Value
Manufacturer Microsoft
DSM name Microsoft Exchange Server
RPM file name DSM-MicrosoftExchange-QRadar_version-
build_number.noarch.rpm
Supported versions LOGbinder EX V2.0
Protocol type Syslog
LEEF
QRadar recorded event types
Admin
Mailbox
Automatically discovered? Yes
Included identity? No
More information Microsoft Exchange website
(http://www.office.microsoft.com/en-us/
exchange/)
The Microsoft Exchange Server DSM can collect other types of events. For more
information on how to configure for other Microsoft Exchange Server event
formats, see the Microsoft Exchange Server topic in the DSM Configuration Guide.
To collect LOGbinder events from Microsoft Exchange Server, use the following
steps:
1. If automatic updates are not enabled, download the most recent version of the
following RPMs:
v DSMCommon RPM
v Microsoft Exchange Server DSM RPM
2. Configure your LOGbinder EX system to send Microsoft Exchange Server event
logs to QRadar.
3. If the log source is not automatically created, add a Microsoft Exchange Server
DSM log source on the QRadar Console. The following table describes the
parameters that require specific values that are required for LOGbinder EX
event collection:
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Open the LOGbinder EX Control Panel.
2. Double-click Output in the Configure pane.
3. Choose one of the following options:
v Configure for Syslog-Generic output:
a. In the Outputs pane, double-click Syslog-Generic.
b. Select the Send output to Syslog-Generic check box, and then enter the
IP address and port of your QRadar Console or Event Collector.
v Configure for Syslog-LEEF output:
a. In the Outputs pane, double-click Syslog-LEEF.
b. Select the Send output to Syslog-LEEF check box, and then enter the IP
address and port of your QRadar Console or Event Collector.
4. Click OK.
5. To restart the LOGbinder service, click the Restart icon.
The following table identifies the specifications for the Microsoft SharePoint DSM
when the log source is configured to collect LOGbinder SP events:
Table 59. LOGbinder for Microsoft SharePoint specifications
Specification Value
Manufacturer Microsoft
DSM name Microsoft SharePoint
RPM file name DSM-MicrosoftSharePoint-QRadar_version-
build_number.noarch.rpm
Supported versions LOGbinder SP V4.0
Protocol type Syslog
LEEF
QRadar recorded event types All events
Automatically discovered? Yes
Included identity? No
More information http://office.microsoft.com/en-sg/sharepoint/
(http://office.microsoft.com/en-sg/
sharepoint/)
http://www.logbinder.com/products/logbindersp/
(http://www.logbinder.com/products/
logbindersp/)
The Microsoft SharePoint DSM can collect other types of events. For more
information about other Microsoft SharePoint event formats, see the Microsoft
SharePoint topic in the DSM Configuration Guide.
To collect LOGbinder events from Microsoft SharePoint, use the following steps:
1. If automatic updates are not enabled, download the most recent version of the
following RPMs:
v DSMCommon RPM
v Microsoft SharePoint DSM RPM
2. Configure your LOGbinder SP system to send Microsoft SharePoint event logs
to QRadar.
3. If the log source is not automatically created, add a Microsoft SharePoint DSM
log source on the QRadar Console. The following table describes the
parameters that require specific values that are required for LOGbinder event
collection:
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring your LOGbinder SP system to send Microsoft SharePoint event logs
to QRadar”
To collect Microsoft SharePoint LOGbinder events, you must configure your
LOGbinder SP system to send events to IBM Security QRadar.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Open the LOGbinder SP Control Panel.
2. Double-click Output in the Configure pane.
3. Choose one of the following options:
v Configure for Syslog-Generic output:
a. In the Outputs pane, double-click Syslog-Generic.
b. Select the Send output to Syslog-Generic check box, and then enter the
IP address and port of your QRadar Console or Event Collector.
v Configure for Syslog-LEEF output:
a. In the Outputs pane, double-click Syslog-LEEF.
b. Select the Send output to Syslog-LEEF check box, and then enter the IP
address and port of your QRadar Console or Event Collector.
4. Click OK.
5. To restart the LOGbinder service, click the Restart icon.
The following table identifies the specifications for the Microsoft SQL Server DSM
when the log source is configured to collect LOGbinder SQL events:
Table 61. LOGbinder for Microsoft SQL Server specifications
Specification Value
Manufacturer Microsoft
DSM name Microsoft SQL Server
RPM file name DSM-MicrosoftSQL-QRadar_version-
build_number.noarch.rpm
Supported versions LOGBinder SQL V2.0
Protocol type Syslog
QRadar recorded event types All events
Automatically discovered? Yes
Included identity? Yes
More information LogBinder SQL website
(http://www.logbinder.com/products/
logbindersql/)
The Microsoft SQL Server DSM can collect other types of events. For more
information about other Microsoft SQL Server event formats, see the Microsoft SQL
Server topic in the DSM Configuration Guide.
To collect LOGbinder events from Microsoft SQL Server, use the following steps:
1. If automatic updates are not enabled, download the most recent version of the
following RPMs:
v DSMCommon RPM
v Microsoft SQL Server DSM RPM
2. Configure your LOGbinder SQL system to send Microsoft SQL Server event
logs to QRadar.
3. If the log source is not automatically created, add a Microsoft SQL Server DSM
log source on the QRadar Console. The following table describes the
parameters that require specific values that are required for LOGbinder event
collection:
Table 62. Microsoft SQL Server log source parameters for LOGbinder event collection
Parameter Value
Log Source type Microsoft SQL Server
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Configure LOGbinder SQL to collect events from your Microsoft SQL Server. For
more information, see your LOGbinder SQL documentation.
Procedure
1. Open the LOGbinder SQL Control Panel.
2. Double-click Output in the Configure pane.
3. Choose one of the following options:
v Configure for Syslog-Generic output:
a. In the Outputs pane, double-click Syslog-Generic.
b. Select the Send output to Syslog-Generic check box, and then enter the
IP address and port of your QRadar Console or Event Collector.
v Configure for Syslog-LEEF output:
a. In the Outputs pane, double-click Syslog-LEEF.
b. Select the Send output to Syslog-LEEF check box, and then enter the IP
address and port of your QRadar Console or Event Collector.
4. Click OK.
5. To restart the LOGbinder service, click the Restart icon.
The following table identifies the specifications for the Microsoft Exchange Server
DSM:
Table 63. Microsoft Exchange Server
Specification Value
Manufacturer Microsoft
DSM name Exchange Server
RPM file name DSM-MicrosoftExchange-QRadar_version-
build_number.noarch.rpm
Supported versions
Microsoft Exchange 2003
To integrate Microsoft Exchange Server with QRadar, use the following steps:
1. If automatic updates are not enabled, download the most recent version of the
Microsoft Exchange Server DSM RPM.
2. Configure your Microsoft Exchange Server DSM device to enable
communication with QRadar.
3. Create an Microsoft Exchange Server DSM log source on the QRadar Console.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Ensure that the firewalls that are located between the Exchange Server and the
remote host allow traffic on the following ports:
v TCP port 13 for Microsoft Endpoint Mapper.
v UDP port 137 for NetBIOS name service.
v UDP port 138 for NetBIOS datagram service.
v TCP port 139 for NetBIOS session service.
v TCP port 445 for Microsoft Directory Services to transfer files across a Windows
share.
Procedure
1. Configure OWA logs.
2. Configure SMTP logs.
3. Configure MSGTRK logs.
Procedure
1. Log into your Microsoft Internet Information System (IIS) Manager.
2. On the desktop, select Start > Run.
3. Type the following command:
inetmgr
4. Click OK.
5. In the menu tree, expand Local Computer.
6. If you use IIS 6.0 Manager for Microsoft Server 2003, complete the following
steps:
a. Expand Web Sites.
b. Right-click Default Web Site and select Properties.
c. From the Active Log Format list, select W3C.
d. Click Properties.
e. Click the Advanced tab.
f. From the list of properties, select the Method (cs-method) and Protocol
Version (cs-version) check boxes
g. Click OK.
7. If you use IIS 7.0 Manager for Microsoft Server 2008 R2, complete the following
steps:
a. Click Logging.
b. From the Format list, select W3C.
c. Click Select Fields.
d. From the list of properties, select the Method (cs-method) and Protocol
Version (cs-version) check boxes
e. Click OK.
Procedure
1. Start the Exchange Management Console.
2. To configure your receive connector, choose one of the following options:
v For edge transport servers, select Edge Transport in the console tree and
click the Receive Connectors tab.
v For hub transport servers, select Server Configuration > Hub Transport in
the console tree, select the server, and then click the Receive Connectors
tab.
3. Select your receive connector and click Properties.
4. Click the General tab.
5. From the Protocol logging level list, select Verbose.
6. Click Apply.
7. Click OK.
8. To configure your send connector, choose one of the following options:
v For edge transport servers, select Edge Transport in the console tree and
click the Send Connectors tab.
v For hub transport servers, select Organization Configuration > Hub
Transport in the console tree, select your server, and then click the Send
Connectors tab.
9. Select your send connector and click Properties.
10. Click the General tab.
11. From the Protocol logging level list, select Verbose.
12. Click Apply.
13. Click OK.
If a log folder path on the Exchange Server contains an administrative share (C$),
ensure that users with NetBIOS access have local or domain administrator
permissions.
The folder path fields for OWA, SNMP, and MSGTRK define the default file path
with a drive letter and path information. If you changed the location of the log
files on the Microsoft Exchange Server, ensure that you provide the correct file
paths in the log source configuration. The Microsoft Exchange Protocol can read
subdirectories of the OWA, SMTP, and MSGTRK folders for event logs.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. Click the Log Sources icon.
4. In the Log Source Name field, type a name for the log source.
5. In the Log Source Description field, type a description for the log source.
6. From the Log Source Type list, select Microsoft Exchange Server.
7. From the Protocol Configuration list, select Microsoft Exchange.
8. Configure the following parameters:
Option Description
Log Source Identifier The IP address or host name to identify the Windows
Exchange event source in the QRadar user interface.
Server Address The IP address of the Microsoft Exchange server.
SMTP Log Folder Path The directory path to access the SMTP log files. Use one of
the following directory paths:
v For Microsoft Exchange 2003, use c$/Program
Files/Microsoft/Exchange Server/TransportRoles/
Logs/ProtocolLog/ .
v For Microsoft Exchange 2007, use c$/Program
Files/Microsoft/Exchange Server/TransportRoles/
Logs/ProtocolLog/.
v For Microsoft Exchange 2010, use c$/Program
Files/Microsoft/Exchange Server/V14/TransportRoles/
Logs/ProtocolLog/.
OWA Log Folder Path The directory path to access the OWA log files. Use one of
the following directory paths:
v For Microsoft Exchange 2003, use c$/WINDOWS/system32/
LogFiles/W3SVC1/ .
v For Microsoft Exchange 2007, use c$/WINDOWS/system32/
LogFiles/W3SVC1/ .
v For Microsoft Exchange 2010, use c$/inetpub/logs/
LogFiles/W3SVC1/ .
MSGTRK Log Folder Path The directory path to access message tracking log files.
Message tracking is only available on Microsoft Exchange
2007 servers assigned the Hub Transport, Mailbox, or Edge
Transport server role. Use one of the following directory
paths:
v For Microsoft Exchange 2007, use c$/Program
Files/Microsoft/Exchange Server/TransportRoles/
Logs/MessageTracking/.
v For Microsoft Exchange 2010, use c$/Program
Files/Microsoft/Exchange Server/V14/TransportRoles/
Logs/MessageTracking/.
Force File Read Forces the protocol to read the log file. By default, the
check box is selected. If the check box is cleared, the log
file is read when the log file modified time or file size
attributes change.
The following table identifies the specifications for the Microsoft SQL Server DSM:
Table 64. Microsoft SQL Server DSM
Specification Value
Manufacturer Microsoft
DSM name SQL Server
RPM file name DSM-MicrosoftSQL-QRadar-version-
Build_number.noarch.rpm
Supported versions 2008, 2012, and 2014 (Enterprise editions
only)
Event format syslog, JDBC, WinCollect
QRadar recorded event types SQL error log events
Automatically discovered? Yes
Includes identity? Yes
More information Microsoft website (http://
www.microsoft.com/en-us/server-cloud/
products/sql-server/)
You can integrate Microsoft SQL Server with QRadar by using one of the following
methods:
JDBC Microsoft SQL Server Enterprise can capture audit events by using the
JDBC protocol. The audit events are stored in a table view. Audit events
are only available in Microsoft SQL Server 2008, 2012, and 2014 Enterprise.
WinCollect
You can integrate Microsoft SQL Server 2000, 2005, 2008, 2012, and 2014
with QRadar by using WinCollect to collect ERRORLOG messages from
the databases that are managed by your Microsoft SQL Server. For more
information, see your WinCollect documentation.
To integrate the Microsoft SQL Server DSM with QRadar, use the following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the Microsoft SQL Server RPM on your QRadar Console.
2. For each instance of Microsoft SQL Server, configure your Microsoft SQL Server
appliance to enable communication with QRadar.
3. If QRadar does not automatically discover the Microsoft SQL Server log source,
create a log source for each instance of Microsoft SQL Server on your network.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
Procedure
1. Log in to your Microsoft SQL Server Management Studio.
2. From the navigation menu, select Security > Audits.
3. Right-click Audits and select New Audit.
4. In the Audit name field, type a name for the new audit file.
5. From the Audit destination list, select File.
6. From the File path field, type the directory path for your Microsoft SQL Server
audit file.
7. Click OK.
8. Right-click your audit object and select Enable Audit.
You must create an audit object. See “Creating a Microsoft SQL Server auditing
object.”
You can create an audit specification at the server level or at the database level.
Depending on your requirements, you might require both a server and database
audit specification.
Procedure
1. From the Microsoft SQL Server Management Studio navigation menu, select
one of the following options:
v Security > Server Audit Specifications
v <Database> > Security > Database Audit Specifications
2. Right-click Server Audit Specifications, and then select one of the following
options:
v New Server Audit Specifications
v New Database Audit Specifications
3. In the Name field, type a name for the new audit file.
4. From the Audit list, select the audit object that you created.
5. In the Actions pane, add actions and objects to the server audit.
6. Click OK.
Procedure
1. From the Microsoft SQL Server Management Studio toolbar, click New Query.
2. Type the following Transact-SQL statement:
create view dbo.AuditData as
SELECT * FROM sys.fn_get_audit_file
(’<Audit File Path and Name>’,default,default);
GOa
For example:
create view dbo.AuditData as
SELECT * FROM sys.fn_get_audit_file
(’C:\inetpub\logs\SQLAudits*',default,default);
GO
3. From the Standard toolbar, click Execute.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. Click the Log Sources icon.
4. Click the Add button.
5. From the Log Source Type list, select Microsoft SQL Server.
6. From the Protocol Configuration list, select JDBC or WinCollect.
7. Optional. If you want to configure events for JDBC, configure the following
Microsoft SQL Server log source parameters:
Where:
8. Optional. If you want to configure events for WinCollect, see the IBM Security
WinCollect User Guide.
9. Click Save.
10. On the Admin tab, click Deploy Changes.
For event collection from Microsoft operating systems, QRadar supports the
following protocols:
v MSRPC (Microsoft Security Event Log over MSRPC)
v Syslog (Intended for Snare, BalaBit, and other third-party Windows solutions)
– Common Event Format (CEF) is also supported.
v WMI ( Microsoft Security Event Log). This is a legacy protocol.
v WinCollect. See the WinCollect User Guide (http://public.dhe.ibm.com/
software/security/products/qradar/documents/7.2.4/QRadar/EN/
b_wincollect.pdf)
Related tasks:
“Enabling MSRPC on Windows hosts”
To enable communication between your Windows host and QRadar over MSRPC,
configure the Remote Procedure Calls (RPC) settings on the Windows host for the
Microsoft Remote Procedure Calls (MSRPC) protocol.
“Enabling a Snare Agent on Windows hosts” on page 142
To enable communication between your Windows host and IBM Security QRadar,
you can use a Snare Agent to forward Windows events.
“Enabling WMI on Windows hosts” on page 143
To enable communication between your Windows host and IBM Security QRadar,
you can use Windows Management Instrumentation (WMI).
Specification Value
Manufacturer Microsoft
Protocol type Microsoft Security Event Log over MSRPC
Windows 7
Windows 8
Windows 8.1
Windows Vista
Intended application Agentless event collection for Windows
operating systems that can support 100 EPS
per log source.
Maximum number of supported log sources 500 MSRPC protocol log sources for each
managed host (16xx or 18xx appliance)
Maximum overall EPS rate of MSRPC 8500 EPS for each managed host
Special features Supports encrypted events by default.
Required permissions The log source user must be a member of
the Event Log Readers group. If this group
is not configured, then domain admin
privileges are required in most cases to poll
a Windows event log across a domain. In
some cases, the Backup operators group can
also be used depending on how Microsoft
Group Policy Objects are configured.
System
Security
DSN Server
File Replication
DSM-MicrosoftWindows-QRadar_release-
Build_number.noarch.rpm
DSM-DSMCommon-QRadar_release-
Build_number.noarch.rpm
More information Microsoft support (support.microsoft.com/)
Troubleshooting tools available Yes, an MSRPC test tool is available through
IBM support.
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. Click the Log Sources icon.
4. From the Log Source Type list, select Microsoft Windows Security Event
Log.
5. From the Protocol Configuration list, select Microsoft Security Event Log
over MSRPC.
6. From the Log Source Identifier list, type the IP address or the host name of
the Windows system that you intend to poll for events. Host names must be
entered as fully qualified domain names (FQDN), such as myhost.example.com.
7. From the Domain field, type the domain of the Windows system.
8. Configure the log source user name and password parameters.
9. Optional: Configure the Polling Interval field.
Note: The Polling Interval (Sec) field does not tune log source performance
like with WinCollect log sources. To poll low event rate systems with limited
bandwidth, you can increase the polling interval to reduce network usage.
10. Configure the Event Throttle field.
11. Select at least one of the Standard Log Types check boxes.
Syslog collection of Windows events can come from a number of different sources.
The instructions provided in this guide outline configuration for the free version of
Snare by Intersect Alliance. Several other third-party products can use the Syslog
protocol.
Specification Value
Manufacturer Microsoft
Protocol type Syslog
Supported versions See your vendor documentation.
Products that commonly use this DSM Snare
BalaBit
Snare Epilogue
Supported event types Security
System, Application
DNS Server
File Replication
Directory Service
Intended application Agent solution for parsing and collection of
Windows events from partner and
third-party products.
Automatically discovered? Yes
Includes identity? Yes
Includes custom properties? A security content pack with Windows
custom event properties is available on IBM
Fix Central.
Required RPM files
DSM-MicrosoftWindows-QRadar_release-
Build_number.noarch.rpm
DSM-DSMCommon-QRadar_release-
Build_number.noarch.rpm
Procedure
1. Log in to your Windows host.
2. Download and install the Snare Agent from the Snare website
(http://www.intersectalliance.com/SnareWindows/index.html).
3. On the navigation menu, select Network Configuration.
4. In the Destination Snare Server address field, type the IP address of the
QRadar system.
5. Select the Enable SYSLOG Header check box.
6. Click Change Configuration.
7. On the navigation menu, select Objectives Configuration.
8. In the Identify the event types to be captured field, select check boxes to
define the event types to forward to QRadar.
Tip: The DSM for Microsoft Windows Event Log supports Informational,
Warning, Error, Success Audit, and Failure Audit event types.
9. In the Identify the event logs field, select the check boxes to define the event
logs to forward to QRadar.
Tip: The Microsoft Windows Event Log DSM supports Security, System,
Application, DNS Server, File Replication, and Directory Service log types.
10. Click Change Configuration.
11. On the navigation menu, select Apply the Latest Audit Configuration.
12. Record the value in the override host name detection with field. The value
must match the IP address or host name that is assigned to the device that is
configured in the QRadar log source.
Results
The Microsoft Security Event Log protocol (WMI) is not recommended for event
collection where more than 50 EPS is required or for servers over slow network
Specification Value
Manufacturer Microsoft
DSM name Windows Security Event Log
Supported versions
Windows Server 2003 (most recent)
Windows 7
Windows Vista
Windows XP
Special features Supports encrypted events by default.
Intended application Agentless event collection for Windows
operating systems over WMI that is capable
of 50 EPS per log source.
Important: This is a legacy protocol. In most
cases, new log sources should be configured
by using the Microsoft Security Event Log
over MSRPC protocol.
Special configuration instructions Configuring DCOM and WMI to Remotely
Retrieve Windows 7 Events
(http://www.ibm.com/support/
docview.wss?uid=swg21678809)
System
Security
DNS Server
File Replication
DSM-MicrosoftWindows-QRadar_release-
Build_number.noarch.rpm
DSM-DSMCommon-QRadar_release-
Build_number.noarch.rpm
More information Microsoft support (support.microsoft.com/)
Troubleshooting tools available Yes, a WMI test tool is available in
/opt/qradar/jars.
The following table identifies the specifications for the Netskope Active DSM:
Table 65. Netskope Active DSM specifications
Specification Value
Manufacturer Netskope
DSM name Netskope Active
RPM file name DSM-NetskopeActive-Qradar_version-
build_number.noarch.rpm
Protocol Netskope Active REST API
Recorded event types Alert, All
Automatically discovered? No
Includes identity? Yes
More information Netskope Active website
(www.netskope.com)
To integrate Netskope Active DSM with QRadar complete the following steps:
Note: If multiple DSM RPMs are required, the integration sequence must reflect
the DSM RPM dependency.
1. If automatic updates are not enabled, download and install the most recent
version of the following DSMs on your QRadar Console.
v Netskope Active DSM RPM
v Netskope Active REST API Protocol RPM
v PROTOCOL-Common RPM
2. Configure the required parameters, and use the following table for the
Netskope Active log source specific parameters:
Table 66. Netskope Active log source parameters
Parameter Value
Log Source type Netskope Active
Protocol Configuration Netskope Active REST API
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Configuring QRadar to collect events from your Netskope Active system” on page
148
To collect all audit logs and system events from Netskope Active servers, you must
configure QRadar to collect audit logs and system events from your Netskope
Active system.
The following table describes the parameters that are required to collect Netskope
Active events:
Table 67. Netskope Active DSM log source parameters
Parameter Description
IP or Hostname partners.goskope.com
Authentication Token The authentication token is generated in the
Netskope WebUI and is the only credential
that is required for Netskope Active REST
API usage. To access the token generation
option in the Netskope WebUI, select
Settings > REST API.
Automatically Acquire Server Certificates If you choose Yes from the drop-down list,
QRadar automatically downloads the
certificate and begins trusting the target
server. The correct server must be entered in
the IP or Hostname field.
Throttle The maximum number of events per second.
The default is 5000.
Recurrence You can specify when the log source
attempts to obtain data. The format is
M/H/D for Months/Hours/Days. The
default is 1 M.
Collection Type
All Events
Select to collect all events.
Alerts Only
Select to collect only alerts.
Procedure
1. Log in to QRadar.
2. Click Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select Netskope Active.
7. From the Protocol Configuration list, select Netskope Active REST API.
8. Configure the parameters.
9. Click Save.
The following table identifies the specifications for the OpenStack DSM:
Table 68. OpenStack DSM specifications
Specification Value
Manufacturer OpenStack
DSM name OpenStack
RPM file name DSM-OpenStackCeilometer-Qradar_version-
build_number.noarch.rpm
Supported versions v 2014.1
Protocol HTTP Receiver
Recorded event types Audit event
Automatically discovered? No
Includes identity? No
Includes custom properties? No
More information OpenStack website (http://
www.openstack.org/)
Procedure
1. Log in to your OpenStack device.
2. Edit the /etc/nova/api-paste.ini file.
3. At the end of the file, add the following text:
[filter:audit]
paste.filter_factory = pycadf.middleware.audit:AuditMiddleware.factory
audit_map_file = /etc/nova/api_audit_map.conf
4. Review the [composite:openstack_compute_api_v2] settings and verify that
the values match the following sample:
[composite:openstack_compute_api_v2]
use = call:nova.api.auth:pipeline_factory
noauth = faultwrap sizelimit noauth ratelimit osapi_compute_app_v2
keystone = faultwrap sizelimit authtoken keystonecontext ratelimit audit osapi_compute_app_v2
keystone_nolimit = faultwrap sizelimit authtoken keystonecontext audit osapi_compute_app_v2
5. Copy the api_audit_map.conf file to the /etc/nova/ directory.
6. Restart the api service.
The command to restart the API service depends on what operating system
your OpenStack node is hosted on. On Redhat Enterprise Linux systems, the
command is service openstack-nova-api restart.
7. Open the entry_points.txt file in the egg-info subdirectory of your
OpenStack installation directory.
For PackStack installations, the file path resembles the following path:
/usr/lib/python2.7/site-packages/ceilometer-2014.2-py2.7.egg-info/
entry_points.txt.
8. Add the http dispatcher to the [ceilometer.dispatcher] section.
[ceilometer.dispatcher]
file = ceilometer.dispatcher.file:FileDispatcher
database = ceilometer.dispatcher.database:DatabaseDispatcher
http = ceilometer.dispatcher.http:HttpDispatcher
9. Copy the supplied http.py script to the dispatcher subdirectory of the
Ceilometer installation directory.
The exact location depends on your operating system and OpenStack
distribution. On the Redhat Enterprise Linux Distribution of OpenStack, the
directory is /usr/lib/python2.7/site-packages/ceilometer/dispatcher/.
10. Edit the /etc/ceilometer/ceilometer.conf file.
11. Under the [default] section, add dispatcher=http.
The following table lists the specifications for the Oracle Enterprise Manager DSM:
Table 70. Oracle Enterprise Manager DSM specifications
Specification Value
Manufacturer Oracle
DSM name Oracle Enterprise Manager
RPM file name DSM-OracleEnterpriseManager-
Qradar_version-
Buildbuild_number.noarch.rpm
Supported versions Oracle Enterprise Manager Cloud Control
12c
Protocol JDBC
Recorded event types Audit
Compliance
Automatically discovered? No
Includes identity? Yes
Includes custom properties? No
More information Oracle Enterprise Manager
(http://www.oracle.com/us/products/
enterprise-manager/index.html)
To collect events from Oracle Enterprise Manager, complete the following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the Oracle Enterprise Manager DSM RPM on your QRadar Console.
2. Ensure that the Oracle Enterprise Manager system is configured to accept
connections from external devices.
3. Add an Oracle Enterprise Manager log source on the QRadar Console. The
following table describes the parameters that require specific values for Oracle
Enterprise Manager event collection:
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
The following table identifies the specifications for the Palo Alto PA Series DSM:
Table 72. DSM specifications for Palo Alto PA Series
Specification Value
Manufacturer Palo Alto Networks
DSM name Palo Alto PA Series
RPM file name DSM-PaloAltoPaSeries-
build_number.noarch.rpm
Supported versions PanOS v3.0 and later
Event format Syslog
LEEF
QRadar recorded event types All events
Automatically discovered? Yes
Includes identity? Yes
Includes custom properties? No
More information Palo Alto Networks website
(http://www.paloaltonetworks.com)
To send events from Palo Alto PA Series to QRadar, complete the following steps:
1. If automatic updates are not enabled, download the most recent version of the
Palo Alto PA Series DSM RPM.
2. Configure your Palo Alto PA Series device to communicate with QRadar. You
must create a syslog destination and forwarding policy on the Palo Alto PA
Series device.
3. If QRadar does not automatically detect Palo Alto PA Series as a log source,
create a Palo Alto PA Series log source on the QRadar Console. Use the
following Palo Alto values to configure the log source parameters:
Parameter Description
Log Source Identifier The IP address or host name of the Palo Alto
PA Series device.
Log Source Type Palo Alto PA Series
Protocol Configuration Syslog
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Creating a syslog destination on your Palo Alto device” on page 158
Before you can send Palo Alto events to IBM Security QRadar, create a syslog
destination on the Palo Alto PA Series device.
Procedure
1. Log in to the Palo Alto Networks interface.
2. Click the Device tab.
3. Click Server Profiles > Syslog.
4. Click Add.
5. Create a syslog destination:
a. In the Syslog Server Profile dialog box, click Add.
b. Specify the name, server IP address, port, and facility of the QRadar system
that you want to use as a syslog server:
c. Click OK.
6. Configure LEEF events:
Attention: The line breaks in these examples will cause this configuration to
fail. For each of the substeps, copy the code blocks into a text editor, remove
the line breaks, and paste as a single line in the Custom Format column.
a. Click the Custom Log Format tab.
b. Copy the following text and paste it in the Custom Format column for the
Config log type.
LEEF:1.0|Palo Alto Networks|PAN-OS Syslog Integration|4.0|$result|cat=$type|
usrName=$admin|src=$host|devTime=$cef-formatted-receive_time|client=$client|
sequence=$seqno|serial=$serial|msg=$cmd
c. Copy the following text and paste it in the Custom Format column for the
System log type.
LEEF:1.0|Palo Alto Networks|PAN-OS Syslog Integration|4.0|$eventid|cat=$type
|subtype=$subtype|devTime=$cef-formatted-receive_time|sev=$severity
|Severity=$number-of-severity|msg=$opaque|Filename=$object
d. Copy the following text and paste it in the Custom Format column for the
Threat log type.
LEEF:1.0|Palo Alto Networks|PAN-OS Syslog Integration|4.0|$threatid|cat=$type
|subtype=$subtype|src=$src|dst=$dst|srcPort=$sport|dstPort=$dport|proto=$proto
|usrName=$srcuser|SerialNumber=$serial|srcPostNAT=$natsrc|dstPostNAT=$natdst
|RuleName=$rule|SourceUser=$srcuser|DestinationUser=$dstuser|Application=$app
|VirtualSystem=$vsys|SourceZone=$fromDestinationZone=$to|IngressInterface=$inbound_if
|EgressInterface=$outbound_if|LogForwardingProfile=$logset|SessionID=$sessionid
|RepeatCount=$repeatcnt|srcPostNATPort=$natsport|dstPostNATPort=$natdport
|Flags=$flags|URLCategory=$category|sev=$severity|Severity=$number-of-severity
|Direction=$direction|ContentType=$contenttype|action=$action|Miscellaneous=$misc
e. Copy the following text and paste it in the Custom Format column for the
Traffic log type.
LEEF:1.0|Palo Alto Networks|PAN-OS Syslog Integration|4.0|$action|cat=$type|src=$src
|dst=$dst|srcPort=$sport|dstPort=$dport|proto=$proto|usrName=$srcuser| SerialNumber=
$serial|Type=$type|Subtype=$subtype|srcPostNAT=$natsrc|dstPostNAT=$natdst|RuleName=
$rule|SourceUser=$srcuser|DestinationUser=$dstuser|Application=$app| VirtualSystem=
$vsys|SourceZone=$from|DestinationZone=$to|IngressInterface=$inbound_if
|EgressInterface=$outbound_if|LogForwardingProfile=$logset|SessionID=$sessionid|
What to do next
To allow communication between your Palo Alto Networks device and QRadar,
create a forwarding policy. See “Creating a forwarding policy on your Palo Alto
device.”
Related concepts:
Chapter 46, “Palo Alto Networks,” on page 157
Use the IBM Security QRadar SIEM DSM for Palo Alto PA Series to collect events
from Palo Alto PA Series devices.
Procedure
1. Log in to Palo Alto Networks.
2. On the dashboard, click the Policies tab.
3. Click Policies > Policy Based Forwarding.
4. Click New.
5. Configure the parameters. For descriptions of the policy-based forwarding
values, see your Palo Alto Networks Administrator’s Guide.
Related concepts:
Chapter 46, “Palo Alto Networks,” on page 157
Use the IBM Security QRadar SIEM DSM for Palo Alto PA Series to collect events
from Palo Alto PA Series devices.
Before you configure QRadar to integrate with RSA Authentication Manager, select
your configuration preference:
v “Configuring syslog for RSA”
v “Configuring the log file protocol for RSA” on page 162
Note: You must apply the most recent hot fix on RSA Authentication Manager 7.1
primary, replica, node, database and radius installations before configuring syslog.
If you are using RSA Authentication Manager on Linux, see “Configuring Linux.”
Configuring Linux
You can configure RSA Authentication Manager for syslog on Linux-based
operating systems:
Procedure
1. Log in to the RSA Security Console command-line interface (CLI).
2. Open the following file for editing based on your operating system:
/usr/local/RSASecurity/RSAAuthenticationManager/utils/resources
/ims.properties
3. Add the following enteries to the ims.properties file:
ims.logging.audit.admin.syslog_host = <IP address>
ims.logging.audit.admin.use_os_logger = true
ims.logging.audit.runtime.syslog_host = <IP address>
ims.logging.audit.runtime.use_os_logger = true
ims.logging.system.syslog_host = <IP address>
ims.logging.system.use_os_logger = true
Where <IP address> is the IP address or hostname of QRadar.
4. Save the ims.properties files.
5. Open the following file for editing:
/etc/syslog.conf
6. Type the following command to add QRadar as a syslog entry:
*.* @<IP address>
Where <IP address> is the IP address or hostname of QRadar.
7. Type the following command to restart the syslog services for Linux.
Configuring Windows
To configure RSA Authentication Manager for syslog using Microsoft Windows:
Procedure
1. Log in to the system hosting your RSA Security Console.
2. Open the following file for editing based on your operating system:
/Program Files/RSASecurity/RSAAuthenticationManager/utils/
resources/ims.properties
3. Add the following enteries to the ims.properties file:
ims.logging.audit.admin.syslog_host = <IP address>
ims.logging.audit.admin.use_os_logger = true
ims.logging.audit.runtime.syslog_host = <IP address>
ims.logging.audit.runtime.use_os_logger = true
ims.logging.system.syslog_host = <IP address>
ims.logging.system.use_os_logger = true
Where <IP address> is the IP address or hostname of QRadar.
4. Save the ims.properties files.
5. Restart RSA services.
6. You are now ready to configure the log source in QRadar.
To configure QRadar to receive events from your RSA Authentication Manager:
a. From the Log Source Type list, select the RSA Authentication Manager
option.
For more information, see the IBM Security QRadar Log Sources User
Guide. For more information on configuring syslog forwarding, see your
RSA Authentication Manager documentation.
The procedure to configure your RSA Authentication Manager using the log file
protocol depends on the version of RSA Authentication Manager:
v If you are using RSA Authentication Manager v7.x, see “Configuring RSA
Authentication Manager 7.x.”
v If you are using RSA Authentication Manager v6.x, see “Configuring RSA
Authentication Manager 6.x” on page 163.
Note: The Export and Purge operation exports log records from the database to
the archive and then purges the logs form the database. The Export Only
operation exports log records from the database to the archive and the records
remain in the database.
5. For Administration, Runtime, and System, configure an Export Directory to
which you want to export your archive files.
Ensure that you can access the Administration Log, Runtime Log, and System
Log by using FTP before you continue.
6. For Administration, Runtime, and System parameters, set the Days Kept Online
parameter to 1. Logs older than 1 day are exported. If you selected Export and
Purge, the logs are also purged from the database.
7. Click Save.
8. You are now ready to configure the log sources and protocol within QRadar:
a. To configure QRadar to receive events from an RSA device, you must select
the RSA Authentication Manager option from the Log Source Type list.
b. To configure the log file protocol, you must select the Log File option from
the Protocol Configuration list.
For more information about configuring log sources and protocols, see the
IBM Security QRadar Log Sources User Guide.
Procedure
1. Log in to the RSA Security Console.
2. Log in to the RSA Database Administration tool:
a. Click the Advanced tool.
The system prompts you to login again.
3. Click Database Administration.
For complete information on using SecurID, see your vendor documentation.
4. From the Log list, select Automate Log Maintenance.
The Automatic Log Maintenance window is displayed.
5. Select the Enable Automatic Audit Log Maintenance check box.
6. Select Delete and Archive.
7. Select Replace files.
8. Type an archive filename.
9. In the Cycle Through Version(s) field, type a value.
For example, 1.
10. Select Select all Logs.
The following table identifies the specifications for the Riverbed SteelCentral
NetProfiler DSM:
Table 73. Riverbed SteelCentral NetProfiler specifications
Specification Value
Manufacturer Riverbed
DSM name SteelCentral NetProfiler
RPM file name DSM-RiverbedSteelCentralNetProfiler-
Qradar_version-build_number.noarch.rpm
Event format JDBC
Recorded event types Alert Events
Automatically discovered? No
Includes identity? No
Includes custom properties? No
More information Riverbed website (http://
www.riverbed.com/)
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Log in to your Riverbed SteelCentral NetProfiler host user interface.
2. Select Configuration > Appliance Security > Security Compliance.
3. Check the Enable ODBC Access check box.
4. Select Configuration > Account Management > User Accounts.
5. Add an account that QRadar can use to access to the PostgreSQL database.
The following table identifies the specifications for the Salesforce Security Auditing
DSM:
Table 75. Salesforce Security Auditing DSM specifications
Specification Value
Manufacturer Salesforce
DSM Salesforce Security Auditing
RPM file name DSM-SalesforceSecurityAuditing-
QRadar_Version-Build_Number.noarch.rpm
Protocol Log File
QRadar recorded events Setup Audit Records
Automatically discovered No
Includes identity No
More information Salesforce web site (http://
www.salesforce.com/)
To integrate Salesforce Security Auditing DSM with QRadar, use the following
procedures:
1. If automatic updates are not enabled, download and install the most recent
versions of the following RPMs on your QRadar Console:
v Log File Protocol RPM
v Salesforce Security Auditing RPM
2. Download the Salesforce audit trail file to a remote host that QRadar can
access.
3. For each instance of Salesforce Security Auditing, create a log source on the
QRadar Console.
You must use this procedure each time that you want to import an updated set of
audit data into QRadar. When you download the audit trail file, you can overwrite
the previous audit trail CSV file. When QRadar retrieves data from the audit trail
file, QRadar processes only audit records that were not imported before.
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select Salesforce Security Auditing.
7. From the Protocol Configuration list, select Log File.
8. Configure the following Salesforce Security Auditing parameters:
Parameter Description
Event Generator RegEx Based Multiline
Start Pattern (\d{1,2}/\d{1,2}/\d{4} \d{1,2}:\d{2}:\d{2} \w+)
End Pattern Ensure that this parameter remains empty.
Date Time RegEx (\d{1,2}/\d{1,2}/\d{4} \d{1,2}:\d{2}:\d{2} \w+)
Date Time Format dd/MM/yyyy hh:mm:ss z
Attention: These values are based on the Winter 2015 version of Salesforce
Security Auditing. For previous versions, use the following regex statements:
v For the Start Pattern parameter, use the following statement:
(\d{1,2}/\d{1,2}/\d{4} \d{1,2}:\d{2}:\d{2} [APM]{2} \w+)
v For the Date Time RegEx parameter, use the following statement:
(\d{1,2}/\d{1,2}/\d{4} \d{1,2}:\d{2}:\d{2} \w{2} \w+)
v For the Date Time Format parameter, use MM/dd/yyyy hh:mm:ss aa z
9. Configure the remaining parameters.
10. Click Save.
11. On the Admin tab, click Deploy Changes.
The following table identifies the specifications for the Salesforce Security
Salesforce Security Monitoring DSM:
Table 76. Salesforce Security Salesforce Security Monitoring DSM specifications
Specification Value
Manufacturer Salesforce
DSM Salesforce Security Monitoring
RPM file name DSM-SalesforceSecurityMonitoring-
QRadar_Version-Build_Number.noarch.rpm
Protocol Salesforce REST API Protocol
QRadar recorded events Login History, Account History, Case
History, Entitlement History, Service
Contract History, Contract Line Item History,
Contract History, Contact History, Lead
History, Opportunity History, Solution
History
Automatically discovered No
Includes identity Yes
More information Salesforce website (http://
www.salesforce.com/)
To integrate Salesforce Security Monitoring DSM with QRadar, use the following
procedures:
1. If automatic updates are not enabled, download and install the most recent
versions of the following RPMs on your QRadar Console.
v DSMCommon RPM
v SalesforceRESTAPI Protocol RPM
v Salesforce Security Monitoring RPM
2. Configure the Salesforce Security Monitoring server to communicate with
QRadar.
3. Obtain and install a certificate to enable communication between Salesforce
Security Monitoring and QRadar. The certificate must be in the
/opt/QRadar/conf/trusted_certificates/ folder and be in .DER format.
4. For each instance of Salesforce Security Monitoring, create a log source on the
QRadar Console.
If the RESTful API is not enabled on your Salesforce server, contact Salesforce
support.
Procedure
1. Log in to your Salesforce Security Monitoring server.
2. From the Setup menu, click Create > Apps > New.
3. Type the name of your application.
4. Type the contact email information.
5. Select Enable OAuth Settings.
6. From the Selected OAuth Scopes list, select Full Access.
7. In the Info URL field, type a URL where the user can go for more information
about your application.
8. Configure the remaining optional parameters.
9. Click Save.
What to do next
The Connected App generates the information that is required for when you to
configure a log source on QRadar. Record the following information:
Consumer Key
Use the Consumer Key value to configure the Client ID parameter for the
QRadar log source.
Consumer Secret
You can click the link to reveal the consumer secret. Use the Consumer
Secret value to configure the Secret ID parameter for the QRadar log
source.
Ensure that the trusted certificate from the Salesforce Security Monitoring instance
is copied to the /opt/qradar/conf/trusted_certificates/ folder in .DER format
on QRadar system.
Procedure
1. Log in toQRadar.
2. Click the Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select Salesforce Security Monitoring.
7. From the Protocol Configuration list, select Salesforce Rest API.
8. Configure the following values:
Parameter Description
Login URL The URL of the Salesforce security console.
Username The user name of the Salesforce security
console.
Security Token The security token that was sent to the email
address configured as the contact email for
the Connected App on the Salesforce
security console.
Client ID The Consumer Key that was generated
when you configured the Connected App on
the Salesforce security console.
Secret ID The Consumer Secret that was generated
when you configured the Connected App on
the Salesforce security console.
Use Proxy When a proxy is configured, all traffic for
the log source travels through the proxy for
QRadar to access the Salesforce Security
buckets.
9. Click Save.
10. On the Admin tab, click Deploy Changes.
To collect events from Sun Solaris Sendmail, you must configure syslog to forward
events to QRadar.
Procedure
1. Log in to the Sun Solaris command-line interface.
2. Open the /etc/syslog.conf file.
3. To forward system authentication logs to QRadar, add the following line to the
file:
mail.*; @<IP address>
Where <IP address> is the IP address of your QRadar. Use tabs instead of
spaces to format the line.
Note: Depending on the version of Solaris you are running, you might need to
add additional log types to the file. Contact your system administrator for more
information.
4. Save and exit the file.
5. Type the following command:
kill -HUP ’cat /etc/syslog.pid’
You are now ready to configure the log source QRadar.
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. On the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. In the Log Source Name field, type a name for your log source.
7. In the Log Source Description field, type a description for the log source.
10. If you want to configure a Log File protocol, select it from the Protocol
Configuration list and configure the following values:
Table 78. Log file parameters
Parameter Description
Log Source Identifier Type the IP address or host name for the log
source. The log source identifier must be
unique for the log source type.
Service Type From the list, select the protocol that you
want to use when retrieving log files from a
remove server. The default is SFTP.
v SFTP - SSH File Transfer Protocol
v FTP - File Transfer Protocol
v SCP - Secure Copy
Chapter 51. Configuring Sun Solaris Sendmail to communicate with QRadar 175
Table 78. Log file parameters (continued)
Parameter Description
Recurrence Type the frequency, beginning at the Start
Time, that you want the remote directory to
be scanned. Type this value in hours (H),
minutes (M), or days (D).
The following table identifies the specifications for the SSH CryptoAuditor DSM.
Table 79. SSH CryptoAuditor DSM specifications
Specification Value
Manufacturer SSH Communications Security
Product CryptoAuditor
DSM Name SSH CryptoAuditor
RPM filename DSM-SSHCryptoAuditor-QRadar_release-
Build_number.noarch.rpm
Supported versions 1.4.0 or later
Event format Syslog
QRadar recorded event types Audit, Forensics
Log source type in QRadar UI SSH CryptoAuditor
Auto discovered? Yes
Includes identity? No
Includes custom properties? No
More information SSH Communications Security website
(http://www.ssh.com/)
To send events from SSH CryptoAuditor to QRadar, complete the following steps:
1. If automatic updates are not enabled, download and install the most recent
version of the following RPMs on your QRadar Console:
v DSMCommon RPM
v SSH CryptoAuditor RPM
2. For each instance of SSH CryptoAuditor, configure your SSH CryptoAuditor
system to communicate with QRadar.
3. If QRadar does not automatically discover SSH CryptoAuditor, create a log
source on the QRadar Console for each instance of SSH CryptoAuditor. Use the
following SSH CryptoAuditor specific parameters:
Parameter Value
Log Source Type SSH CryptoAuditor
Protocol Configuration Syslog
Related tasks:
“Configuring an SSH CryptoAuditor appliance to communicate with QRadar” on
page 178
To collect SSH CryptoAuditor events, you must configure your third-party
appliance to send events to IBM Security QRadar.
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
Procedure
1. Log in to SSH CryptoAuditor.
2. Go to the syslog settings in Settings > External Services > External Syslog
Servers.
3. To create server settings for QRadar, click Add Syslog Server.
4. Type the QRadar server settings: address (IP address or FQDN) and port in
which QRadar collects log messages.
5. To set the syslog format to Universal LEEF, select the Leef format check box.
6. To save the configuration, click Save.
7. Configure SSH CryptoAuditor alerts in Settings > Alerts. The SSH
CryptoAuditor alert configuration defines which events are sent to external
systems (email or SIEM/syslog).
a. Select an existing alert group, or create new alert group by clicking Add
alert group.
b. Select the QRadar server that you defined earlier in the External Syslog
Server drop box.
c. If you created a new alert group, click Save. Save the group before binding
alerts to the group.
d. Define which alerts are sent to QRadar by binding alerts to the alert group.
Click [+] next to the alert that you want to collect in QRadar, and select the
alert group that has QRadar as external syslog server. Repeat this step for
each alert that you want to collect in QRadar.
e. Click Save.
8. Apply the pending configuration changes. The saved configuration changes do
not take effect until you apply them from pending state.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
Procedure
1. Log in to your STEALTHbits StealthINTERCEPT server.
2. Start the Administration Console.
3. Click Configuration > Syslog Server.
4. Configure the following parameters:
Parameter Description
Host Address The IP address of the QRadar Console
Port 514
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select STEALTHbits StealthINTERCEPT.
7. From the Protocol Configuration list, select Syslog.
8. Configure the remaining parameters.
9. Click Save.
10. On the Admin tab, click Deploy Changes.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
Procedure
1. Log in to your STEALTHbits StealthINTERCEPT server.
2. Start the Administration Console.
3. Click Configuration > Syslog Server.
4. Configure the following parameters:
Parameter Description
Host Address The IP address of the QRadar Console
Port 514
Related tasks:
Procedure
1. Log in to your STEALTHbits StealthINTERCEPT server.
2. Start the Administration Console.
3. Click Configuration > Syslog Server.
4. Configure the following parameters:
Parameter Description
Host Address The IP address of the QRadar Console
Port 514
The following table identifies the specifications for the Symantec Critical System
Protection DSM.
Table 86. Symantec Critical System Protection DSM specifications
Specification Value
Manufacturer Symantec
DSM Name Critical System Protection
RPM file name DSM-SymantecCriticalSystemProtection-
Qradar_version_build number.noarch.rpm
Supported versions 5.1.1
Event format DB Entries
QRadar recorded event types All events from the ‘CSPEVENT_VWu view
Log source type in QRadar UI Symantec Critical System Protection
Auto discovered? No
Includes identity? No
Includes custom properties No
For more information Symantec Web Page (http://
www.symantec.com/)
Parameter Description
Log Source Type Symantec Critical System Protection
Protocol Configuration JDBC
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
You must download and install one of the following patches from the Sourcefire
website to collect Sourcefire Defense Center 5.x events in QRadar:
v Sourcefire_hotfix-v5.1.0-0-build_1.tar
v Sourcefire_hotfix-v5.1.1-0-build_1.tar
For more information about patches for your Sourcefire appliance, see the
Sourcefire website.
Configuration overview
To integrate with Sourcefire Defense Center, you must create certificates in the
Sourcefire Defense Center interface, and then add the certificates to the QRadar
appliances that receive eStreamer event data.
To integrate QRadar with Sourcefire Defense Center, use the following steps:
1. Create the eStreamer certificate on your Sourcefire Defense Center appliance.
2. Add the Sourcefire Defense Center certificate files to QRadar.
3. Configure a log source in QRadar for your Sourcefire Defense Center
appliances.
QRadar supports the following event types from Sourcefire Defense Center:
v Intrusion events and extra data
Intrusion events that are categorized by the Sourcefire Defense Center DSM in
QRadar use the same QRadar Identifiers (QIDs) as the Snort DSM. To ensure
that all intrusion events are categorized properly.
Intrusion events in the 1,000,000 - 2,000,000 range are user-defined rules in
Sourcefire Defense Center. User-defined rules that generate events are added as
an Unknown event in QRadar, and include additional information that describes
the event type. For example, a user-defined event can identify as
Unknown:Buffer Overflow for Sourcefire Defense Center.
v Correlation events
v Metadata events
v Discovery events
v Host events
v User events
Procedure
1. Log in to your Sourcefire Defense Center interface.
2. Select Operations > Configuration > eStreamer.
3. Click the eStreamer tab.
4. Click Create Client.
5. Select check boxes for the event types Sourcefire Defense Center provides to
QRadar.
6. Click + Create Client in the upper right-side of the interface.
7. In the Hostname field, type the IP address or host name.
v If you use a QRadar Console or use an All-in-one appliance to collect
eStreamer events, type the IP address or host name of your QRadar Console.
v If you use a remote Event Collector to collect eStreamer events, type the IP
address or host name for the remote Event Collector.
v If you use High Availability (HA), type the virtual IP address.
8. In the Password field, leave the password field blank or type a password for
your certificate and click Save.
The new client is added to the Streamer Client list and the host is allowed to
communicate with the eStreamer API on port 8302.
9. From the Certificate Location column, click the client that you created to save
the pkcs12 certificate to a file location and click OK.
What to do next
You are now ready to import your Sourcefire Defense Center certificate to your
QRadar appliance.
QRadar requires a certificate for every Sourcefire Defense Center appliance in your
deployment. Certificates are generated in pkcs12 format and must be converted to
a keystore and truststore file, which are usable by QRadar appliances.
Procedure
1. Log in to your Sourcefire Defense Center interface.
2. Select System > Local > Registration.
3. Click the eStreamer tab.
4. Select check boxes for the event types Sourcefire Defense Center provides to
QRadar and click Save.
Important: For Sourcefire Defense Center 5.x, you must clear the Impact Flag
Alerts check box.
188 IBM Security QRadar: DSM Configuration Guide Addendum
5. Click + Create Client in the upper right-side of the interface.
6. In the Hostname field, type the IP address or host name.
v If you use QRadar Console or use an All-in-one appliance to collect
eStreamer events, type the IP address or host name of your QRadar Console.
v If you use an Event Collector to collect eStreamer events, type the IP address
or host name for the Event Collector.
v If you use High Availability (HA), type the virtual IP address.
7. In the Password field, type a password for your certificate or leave the field
blank and click Save.
The new client is added to the Streamer Client list and the host is allowed to
communicate with the eStreamer API on port 8302.
8. Click the download arrow for your host to save the pkcs12 certificate to a file
location.
9. Click OK to download the file.
What to do next
You are now ready to import your Sourcefire Defense Center certificate to your
QRadar appliance.
The script converts and imports one pkcs12 file at a time. You are required only to
import a certificate for the QRadar appliance that manages the Sourcefire Defense
Center log source. For example, after the Sourcefire event is categorized and
normalized by an Event Collector in a QRadar deployment, it is forwarded to the
QRadar Console. In this scenario, you would import a certificate to the Event
Collector.
When you import a new certificate, existing Sourcefire Defense Center certificates
on the QRadar appliance are renamed to estreamer.keystore.old and
estreamer.truststore.old.
Procedure
1. Log in to your QRadar Console or Event Collector as the root user.
2. Copy the pkcs12 certificate from your Sourcefire Defense Center appliance to
the following directory:
Parameter Description
-f Identifies the file name of the pkcs12 files to
import.
-o Overrides the default estreamer name for
the keystore and truststore files. Use the -o
parameter when you integrate multiple
Sourcefire Defense Center devices. For
example, /opt/qradar/bin/estreamer-cert-
import.pl -f <file name> -o
192.168.1.100
Results
The import script creates a keystore and truststore file in the following locations:
v /opt/qradar/conf/estreamer.keystore
v /opt/qradar/conf/estreamer.truststore
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. On the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select Sourcefire Defense Center.
Parameter Description
Server Address The IP address or host name of the
Sourcefire Defense Center device.
Server Port The port number QRadar uses to receive
Sourcefire Defense Center Estreamer events.
Keystore Filename The directory path and file name for the
keystore private key and associated
certificate.
Truststore Filename The directory path and file name for the
truststore files. The truststore file that
contains the certificates that are trusted by
the client.
Request Extra Data Select this option to request extra data from
Sourcefire Defense Center Estreamer, for
example, extra data includes the original IP
address of an event.
Use Extended Requests Select this option to use an alternative
method for retrieving events from an
eStreamer source.
Procedure
1. Log in to your Sourcefire user interface.
2. On the navigation menu, select Intrusion Sensor > Detection Policy > Edit.
3. Select an active policy and click Edit.
4. Click Alerting.
5. In the State field, select on to enable the syslog alert for your policy.
6. From the Facility list, select Alert.
7. From the Priority list, select Alert.
8. In the Logging Host field, type the IP address of the QRadar Console or
Event Collector.
9. Click Save.
10. On the navigation menu, select Intrusion Sensor > Detection Policy > Apply.
11. Click Apply.
What to do next
Procedure
1. Log in to QRadar.
2. Click the Admin tab.
3. On the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. From the Log Source Type list, select Sourcefire Defense Center.
7. From the Protocol Configuration list, select Sourcefire Defense Center
Estreamer.
8. Configure the following parameters:
Parameter Description
Server Address The IP address or host name of the
Sourcefire Defense Center device.
The following table identifies the specifications for the Trend Micro Deep
Discovery Analyzer DSM:
Table 87. Trend Micro Deep Discovery Analyzer DSM specifications
Specification Value
Manufacturer Trend Micro
DSM name Deep Discovery Analyzer
RPM file name DSM-TrendMicroDeepDiscoveryAnalyzer-
build_number.noarch.rpm
Supported versions 1.0
Event format LEEF
QRadar recorded event types All events
Automatically discovered? Yes
Includes identity? No
Includes custom properties? No
More information Trend Micro website (www.trendmicro.com/
DeepDiscovery)
To send Trend Micro Deep Discovery events to QRadar, complete the following
steps:
1. If automatic updates are not enabled, download the most recent versions of the
following RPMs.
v DSMCommon
v Trend Micro Deep Discovery DSM
2. Configure your Trend Micro Deep Discovery device to communicate with
QRadar.
3. If QRadar does not automatically detect Trend Micro Deep Discovery as a log
source, create a Trend Micro Deep Discovery log source on the QRadar
Console. Configure all required parameters and use the following table to
determine specific values that are required for Trend Micro Deep Discovery
Inspector event collection:
Table 88. Trend Micro Deep Discovery Analyzer log source parameters
Parameter Value
Log Source type Trend Micro Deep Discovery Analyzer
Protocol Configuration Syslog
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
Procedure
1. Log in to the Deep Discovery Analyzer web console.
2. Click Administrator > Log Settings.
3. Select Forward logs to a syslog server.
4. Select LEEF as the log format.
5. In the Syslog server field, type the IP address of your QRadar Console or
Event Collector.
6. In the Port field, type 514.
The following table identifies the specifications for the WatchGuard Fireware OS
DSM:
Table 89. WatchGuard Fireware DSM specifications
Specification Value
Manufacturer WatchGuard
DSM name WatchGuard Fireware OS
RPM file name DSM-WatchGuardFirewareOS-QRadar-
version-Build_number.noarch.rpm
Supported versions Fireware XTM OS v11.9 and later
Event format syslog
QRadar recorded event types All events
Automatically discovered? Yes
Includes identity? No
More information WatchGuard Website (http://
www.watchguard.com/)
To integrate the WatchGuard Fireware OS with QRadar, use the following steps:
1. If automatic updates are not enabled, download and install the most recent
versions of the following RPMs on your QRadar Console.
v DSMCommon RPM
v WatchGuard Fireware OS RPM
2. For each instance of WatchGuard Fireware OS, configure your WatchGuard
Fireware OS appliance to enable communication with QRadar. You can use one
the following procedures:
v “Configuring your WatchGuard Fireware OS appliance in Policy Manager for
communication with QRadar” on page 198
v “Configuring your WatchGuard Fireware OS appliance in Fireware XTM for
communication with QRadar” on page 198
3. If QRadar does not automatically discover the WatchGuard Fireware OS log
source, create a log source for each instance of WatchGuard Fireware OS on
your network.
Related tasks:
“Adding a single DSM” on page 2
If your system is disconnected from the Internet, you might need to install a DSM
RPM manually.
“Adding a log source” on page 3
If a log source is not automatically discovered, you can manually add a log source
to receive events from your network devices or appliances.
Procedure
1. Open the WatchGuard System Manager.
2. Connect to your Firebox or XTM device.
3. Start the Policy Manager for your device.
4. To open the Logging Setup window, select Setup > Logging.
5. Select the Send log messages to this syslog server check box.
6. In the IP address text box, type the IP address for your QRadar Console or
Event Collector.
7. In the Port text box, type 514.
8. From the Log Format list, select IBM LEEF.
9. Optional: Specify the details to include in the log messages.
a. Click Configure.
b. To include the serial number of the XTM device in the log message details,
select the The serial number of the device check box.
c. To include the syslog header in the log message details, select the The
syslog header check box.
d. For each type of log message, select one of the following syslog facilities:
v For high-priority syslog messages, such as alarms, select Local0.
v To assign priorities to other types of log messages, select an option from
Local1 through Local7. Lower numbers have greater priority.
v To not send details for a log message type, select NONE.
e. Click OK.
10. Click OK.
11. Save the configuration file to your device.
Procedure
1. Log in to the Fireware XTM web user interface for your Fireware or XTM
device.
2. Select System > Logging.
Procedure
1. Log in to QRadar
2. Click the Admin tab.
3. In the navigation menu, click Data Sources.
4. Click the Log Sources icon.
5. Click Add.
6. In the Log Source Identifier field, type the IP address or host name of the
WatchGuard Fireware OS device.
7. From the Log Source Type list, select WatchGuard Fireware OS.
8. From the Protocol Configuration list, select Syslog.
9. Configure the remaining parameters.
10. Click Save.
The following table identifies the specifications for the Universal CEF DSM:
Table 90. Universal CEF DSM specifications
Specification Value
DSM name Universal CEF
RPM file name DSM-UniversalCEF-Qradar_version-
build_number.noarch.rpm
Protocol syslog
Log File
Recorded event types CEF-formatted events
Automatically discovered? No
Includes identity? No
Includes custom properties? No
Parameter Description
Log Source Type Universal DSM
Protocol Configuration Syslog or Log File
Ensure that you installed the Universal CEF DSM and added log source for it in
QRadar.
By default, the Universal CEF DSM categorizes all events as unknown. All
Universal CEF events display a value of unknown in the Event Name and Low
Level Category columns on the Log Activity tab. You must modify the QID map
to individually map each event for your device to an event category in QRadar.
Mapping events allows QRadar to identify, coalesce, and track events from your
network devices.
For more information about event mapping, see the IBM Security QRadar SIEM
Users Guide.
Procedure
1. Log in to QRadar.
2. Click the Log Activity tab.
3. Click Add Filter.
4. From the first list, select Log Source.
5. From the Log Source Group list, select Other.
6. From the Log Source list, select your Universal CEF log source.
7. Click Add Filter.
8. From the View list, select Last Hour.
9. Optional: Click Save Criteria to save your existing search filter.
10. On the Event Name column, double-click an unknown event for your
Universal CEF DSM.
11. Click Map Event.
12. From the Browse for QID pane, select any of the following search options to
narrow the event categories for a QRadar Identifier (QID):
v From the High-Level Category list, select a high-level event category. For a
full list of high-level and low-level event categories or category definitions,
see the Event Categories section of the IBM Security QRadar SIEM
Administration Guide.
v From the Low-Level Category list, select a low-level event category.
v From the Log Source Type list, select a log source type.
Tip: Searching for QIDs by log source is useful when the events from your
Universal CEF DSM are similar to another existing network device. For
example, if your Universal CEF provides firewall events, you might select
Cisco ASA, as another firewall product that likely captures similar events.
v To search for a QID by name, type a name in the QID/Name field.
13. Click Search.
14. Select the QID that you want to associate to your unknown Universal CEF
DSM event and click OK.
If you can't find the documentation for your DSM in the IBM Knowledge Center,
view the PDF library on the customer support web site (http://www-01.ibm.com/
support/docview.wss?uid=swg21614644). All DSM documentation for each QRadar
release is available from here in PDF format.
The following table lists supported DSMs for third-party and IBM security
solutions. The documentation for the DSMs that are marked with an asterisk (*) in
the Device name and version column is not yet available in the IBM Knowledge
Center. Click the link in the column to download the IBM Security QRadar DSM
Configuration Guide (PDF download).
Table 91. QRadar Supported DSMs
Includes
Recorded events Auto Includes custom
Manufacturer Device name and version Protocol and formats discovered? identity? properties?
3Com 8800 Series Switch v3.01.30 Syslog Status and network Yes No No
condition events
AccessData AccessData InSight Log File Log file No No No
AhnLab AhnLab Policy Center AhnLabPolicy Spyware detection No Yes No
Audit
Amazon Amazon AWS CloudTrail Log File All events No Yes No
v1.0
Ambiron TrustWave ipAngel v4.0 Syslog Snort-based events No No No
Apache HTTP Server v1.3 and later* Syslog HTTP status Yes No No
APC UPS Syslog Smart-UPS series No No No
events
Apple Mac OS X (10)* Syslog Firewall, web server No Yes No
(access/ error),
privilege, and
information events
Application DbProtect v6.2, v6.3, v6.3sp1, Syslog All events Yes No No
Security, Inc. v6.3.1, and v6.4*
Arbor Pravail APS v3.1 and later Syslog All events Yes No No
Networks
Arpeggio SIFT-IT v3.1 and later* Syslog All events Yes No No
Software configured in the
SIFT-IT rule set
Array SSL VPN ArraySP v7.3* Syslog All events No Yes Yes
Networks
Aruba Mobility Controllers v2.5 Syslog All events Yes No No
Networks and later*
Avaya Inc. Avaya VPN Gateway Syslog All events Yes Yes No
v9.0.7.2*
BalaBit IT Microsoft Windows Security Syslog Microsoft Event Log Yes Yes No
Security Event Log v4.x* Events
BalaBit IT Microsoft ISA v4.x* Syslog Microsoft Event Log Yes Yes No
Security Events
Barracuda Spam & Virus Firewall v5.x Syslog All events Yes No No
Networks and later*
Barracuda Web Application Firewall Syslog System, web Yes No No
Networks v7.0.x firewall, access, and
audit events
Barracuda Web Filter 6.0.x and later* Syslog Web traffic and web Yes No No
Networks interface events
Bit9 Security Platform v6.0.2 and Syslog All events Yes Yes No
later
Common Event
Format (CEF)
formatted messages
Log Extended
Format (LEEF)
FreeRADIUS FreeRADIUS V2.x Syslog All events Yes Yes No
ForeScout CounterACT v7.x and later* Syslog Denial of Service, No No No
system, exploit,
authentication, and
suspicious events
Fortinet FortiGate FortiOS v2.5 and Syslog All events Yes Yes Yes
later*
Foundry FastIron v3.x.x and v4.x.x* Syslog All events Yes Yes No
High availability
General relay
messages
Relay-specific
messages
genua
programs/daemons
EPSI Accounting
Daemon -
gg/src/acctd
Configfw FWConfig
ROFWConfig
User-Interface
Webserver
Great Bay Beacon* Syslog All events Yes Yes No
HBGary Active Defense v1.2 and Syslog All events Yes No No
later*
HP Tandem* Log File Protocol Safe Guard Audit No No No
file events
HP ProCurve K.14.52* Syslog All events Yes No No
HP UX v11.x and later* Syslog All events No Yes No
Honeycomb Lexicon File Integrity Syslog integrity events Yes No No
Technologies Monitor mesh service v3.1
and later*
Huawei S Series Switch S5700, S7700, Syslog IPv4 events from No No No
and S9700 using S5700, S7700, and
V200R001C00 S9700 Switches
Huawei AR Series Router (AR150, Syslog IPv4 events No No No
AR200, AR1200, AR2200,
and AR3200 routers using
V200R002C00)
IBM AIX® v6.1 and v7.1 Syslog, Log File Configured audit Yes No No
Protocol events
IBM AIX 5.x, 6.x, and v7.x Syslog Authentication and Yes Yes No
operating system
events
IBM AS/400iSeries DSM V5R4 Log File Protocol All events No Yes No
and later
IBM AS/400 iSeries - Robert Syslog CEF formatted Yes Yes No
Townsend Security Solutions messages
V5R1 and later
IBM AS/400 iSeries - Powertech Syslog CEF formatted Yes Yes No
Interact V5R1 and later messages
IBM Federated Directory Server LEEF FDS Audit Yes No No
V7.2.0.2 and later*
IBM InfoSphere® 8.2p45 Syslog Policy builder events No No No
IBM ISS Proventia M10 SNMP All events No No No
v2.1_2004.1122_15.13.53*
IBM Lotus® Domino® v8.5* SNMP All events No No No
IBM Proventia Management JDBC IPS and audit events No No No
SiteProtector™ v2.0 and v2.9*
IBM RACF® v1.9 to v1.13* Log File Protocol All events No No Yes
IBM CICS® v3.1 to v4.2* Log File Protocol All events No No Yes
IBM DB2® v8.1 to v10.1* Log File Protocol All events No No Yes
IBM z/OS® v1.9 to v1.13 Log File Protocol All events No No Yes
IBM Informix® v11* Log File Protocol All events No No No
IBM IMS™* Log File Protocol All events No No No
IBM Security Network Protection Syslog System, access, and Yes No No
(XGS) v5.0 with fixpack 7* security events
Data Exfiltration
Detection
Apex Uninstalled
Event
Policy Changed
Event
ASLR Violation
Event
ASLR Enforcement
Event
Password Protection
Event
IBM IBM SmartCloud IBM SmartCloud Audit Records No Yes No
Orchestrator v2.3 FP1 and Orchestrator REST
later API
IBM Tivoli® Access Manager IBM Syslog audit, access, and Yes Yes No
Web Security Gateway v7.x* HTTP events
IBM Tivoli Endpoint Manager IBM Tivoli Server events No Yes No
v8.2.x and later Endpoint Manager
SOAP Protocol
IBM WebSphere® Application Log File Protocol All events No Yes No
Server 5.0.x to 6.1
IBM WebSphere DataPower® Syslog All events Yes No No
FirmwareV6 and V7
IBM zSecure™ Alert v1.13.x and UNIX syslog Alert events Yes Yes No
later*
IBM Security Access Manager Syslog Audit, system, and Yes No No
v8.1 and v8.2* authentication
events
IBM Security Directory v6.3.1 and Syslog LEEF All events Yes Yes No
later*
Imperva SecureSphere v6.2 and v7.x Syslog All events Yes No No
or 9.5 and 10.0 (LEEF)*
Infoblox NIOS v6.x* Syslog All events No Yes No
Internet BIND v9.9* Syslog All events Yes No No
Systems
Consortium
(ISC)
iT-CUBE agileSI v1.x* SMB Tail AgileSI SAP events No Yes No
Itron Openway Smart Meter* Syslog All events Yes No No
Juniper AVT* JDBC All events No No Yes
Networks
Juniper DDoS Secure* Syslog All events Yes No No
Networks
Juniper DX* Syslog Status and network Yes No Yes
Networks condition events
Juniper Infranet Controller v2.1, v3.1 Syslog All events No Yes Yes
Networks* & v4.0*
Juniper Firewall and VPN v5.5r3 Syslog NetScreen Firewall Yes Yes Yes
Networks and later* events
Juniper Junos WebApp Secure v4.2.x Syslog Incident and access Yes No No
Networks events
Common Event
Format (CEF)
format,
Log Event
Extended Format
(LEEF)
Microsoft SQL Server 2008, 2012, and JDBC SQL Audit events No No No
2014
Microsoft SharePoint 2010* JDBC SharePoint audit, No No No
site, and file events
Microsoft DHCP Server 2000/2003* Syslog All events Yes Yes No
Microsoft Operations Manager 2005* JDBC All events No No No
Microsoft System Center Operations JDBC All events No No No
Manager 2007*
Motorola Symbol AP firmware v1.1 to Syslog All events No No No
2.1*
NetApp Data ONTAP* Syslog CIFS events Yes Yes No
Netskope Netskope Active Netskope Active Alert, All events No Yes No
REST API
Niksun NetVCR 2005 v3.x* Syslog Niksun events No No No
Nokia Firewall NG FP1, FP2, FP3, Syslog or OPSEC All events Yes Yes No
AI R54, AI R55, NGX on LEA
IPSO v3.8 and later*
Nokia VPN-1 NG FP1, FP2, FP3, AI Syslog or OPSEC All events Yes Yes No
R54, AI R55, NGX on IPSO LEA
v3.8 and later
Nominum Vantio v5.3* Syslog All events Yes No No
Nortel Contivity * Syslog All events Yes No No
Nortel Application Switch v3.2 and Syslog Status and network No Yes No
later* condition events
Nortel ARN v15.5 Syslog All events Yes No No
Nortel* Ethernet Routing Switch Syslog All events No Yes No
2500 v4.1*
Nortel* Ethernet Routing Switch Syslog All events No Yes No
4500 v5.1*
Nortel* Ethernet Routing Switch Syslog All events No Yes No
5500 v5.1*
Nortel Ethernet Routing Switch Syslog All events No Yes No
8300 v4.1*
Nortel Ethernet Routing Switch Syslog All events No Yes No
8600 v5.0*
Nortel VPN Gateway v6.0, 7.0.1 Syslog All events Yes Yes No
and later, v8.x*
Nortel Secure Router v9.3, v10.1* Syslog All events Yes Yes No
Nortel Secure Network Access Syslog All events Yes Yes No
Switch v1.6 and v2.0*
Nortel Switched Firewall 5100 v2.4* Syslog or OPSEC All events Yes Yes No
Nortel Switched Firewall 6000 v4.2* Syslog or OPSEC All events Yes Yes No
Nortel Threat Protection System Syslog All events No No No
v4.6 and v4.7*
Novell eDirectory v2.7* Syslog All events Yes No No
User Activity
System Events
Session Activity
DBA Activity
OpenBSD OpenBSD v4.2 and later* Syslog All events No Yes No
Project
Open LDAP Open LDAP 2.4.x* UDP Multiline All events No No No
Foundation Syslog
Open Source SNORT v2.x* Syslog All events Yes No No
OpenStack OpenStack V2014.1 HTTP Reciever Audit events No No No
Oracle Audit Records v9i, v10g, Syslog JDBC All relevant Oracle Yes Yes No
and v11g* events
Oracle Audit Vault v10.2.3.2 and JDBC Oracle events No No No
later*
Oracle OS Audit v9i, v10g, and Syslog Oracle events Yes Yes No
v11g*
Oracle BEA WebLogic v10.3.x* Log File Protocol Oracle events No No No
Oracle Database Listener v9i, v10g, Syslog Oracle events Yes No No
and v11g*
Oracle Fine Grained Auditing v9i JDBC Select, insert, delete, No No No
and v10g* or update events for
tables configured
with a policy
OSSEC OSSEC v2.6 and later* Syslog All relevant Yes No No
Palo Alto PanOS v3.0 and later Syslog All events Yes Yes No
Networks
Pirean Access: One v2.2 with DB2 JDBC Access management No No No
v9.7* and authentication
events
PostFix Mail Transfer Agent v2.6.6 UDP Multiline Mail events No No No
and later* Protocol or Syslog
ProFTPd ProFTPd v1.2.x, v1.3.x* Syslog All events Yes Yes No
Proofpoint Proofpoint Enterprise Syslog System, email audit, No No No
Protection and Enterprise email encryption,
Privacy versions 7.0.2, 7.1, or and email security
7.2* threat classification
events
Radware DefensePro v4.23 and 5.01* Syslog All events Yes No No
Raz-Lee AS/400 iSeries Firewall 15.7 Syslog Security and audit Yes Yes No
iSecurity and Audit 11.7* events
Redback ASE v6.1.5* Syslog All events Yes No No
Networks
Riverbed SteelCentral NetProfiler JDBC Alert events No No No
Riverbed SteelCentral NetProfiler Log file protocol Audit events No Yes No
Audit
RSA Authentication Manager Syslog or Log File All events No No No
v6.x, v7.x and v8.x Protocol
SafeNet DataSecure v6.3.0 and later Syslog All events Yes No No
Salesforce Security Auditing Log File Setup Audit Records No No No
Account History
Case History
Entitlement History
Service Contract
History
Contract History
Contact History
Lead History
Opportunity History
Solution History
Samhain Labs HIDS v2.4* All events Yes No No
Syslog
JDBC
Secure Sidewinder G2 v61* Syslog All events Yes No No
Computing
Sentrigo Hedgehog v2.5.3* Syslog All events Yes No No
SolarWinds Orion v2011.2* Syslog All events Yes No No
SonicWALL UTM/Firewall/VPN Syslog All events Yes No No
Appliance v3.x and later*
Sophos Astaro v8.x* Syslog All events Yes No No
Sophos Enterprise Console v4.5.1 All events No No No
and v5.1* Sophos Enterprise
Console protocol
JDBC
Sophos PureMessage v3.1.0.0 and JDBC Quarantined email No No No
later for Microsoft Exchange events
v5.6.0 for Linux*
Sophos Web Security Appliance Syslog Transaction log Yes No No
v3.x* events
Sourcefire Intrusion Sensor IS 500, v2.x, Syslog All events Yes No No
3.x, 4.x
Sourcefire Defense Center v4.8.0.2 to Sourcefire Defense All events No No No
v5.2.0.4. Center
Splunk Microsoft Windows Security Windows-based All events No Yes No
Event Log* event provided by
Splunk Forwarders
Squid Web Proxy v2.5 and later* Syslog All cache and access Yes No No
log events
Startent Startent Networks* Syslog All events Yes No No
Networks
STEALTHbits StealthINTERCEPT Syslog LEEF Active Directory Yes No No
Technologies Audit Events
STEALTHbits STEALTHbits Syslog LEEF Active Directory Yes No No
Technologies StealthINTERCEPT Alerts Alerts Events
STEALTHbits STEALTHbits Syslog LEEF Active Directory Yes No No
Technologies StealthINTERCEPT Analytics Analytics Events
Stonesoft Management Center v5.4* Syslog Management Center, Yes No No
IPS, Firewall, and
VPN Events
Sun Solaris v5.8, v5.9, Sun OS Syslog All events Yes Yes No
v5.8, v5.9*
Sun Solaris DHCP v2.8* Syslog All events Yes Yes No
Syslog
TippingPoint Intrusion Prevention System Syslog All events No No No
(IPS) v1.4.2 to v3.2.x*
TippingPoint X505/X506 v2.5 and later* Syslog All events Yes Yes No
Top Layer IPS 5500 v4.1 and later* Syslog All events Yes No No
Trend Micro Control Manager v5.0 or All events Yes No No
v5.5 with hotfix 1697 or SNMPv1
hotfix 1713 after SP1 Patch
1*
SNMPv2
SNMPv3
Trend Micro Deep Discovery v3.x Syslog All events Yes No No
Trend Micro InterScan VirusWall v6.0 and Syslog All events Yes No No
later*
Trend Micro Office Scan v8.x and v10.x* SNMPv2 All events No No No
Tripwire Enterprise Manager v5.2 and Syslog Resource additions, Yes No No
later* removal, and
modification events
Tropos Tropos Control v7.7* Syslog Fault management, No No No
Networks login/logout,
provision, and
device image upload
events
Trusteer® Apex Local Event Syslog Malware, exploit, Yes No No
Aggregator v1304.x and and data exfiltration
later* detection events
Universal Syslog and SNMP All events No Yes No
Syslog
SNMP
SDEE
Universal Syslog All events No Yes No
Syslog
VMWare protocol
VMware vCenter v5.x* VMWare protocol All events No No No
Alarm
Warn
Learn Mode
System
Watchguard WatchGuard Fireware OS Syslog All events Yes No No
Websense TRITON v7.7* Syslog All events Yes No No
Websense V Series Data Security Suite Syslog All events Yes No No
(DSS) v7.1.x and later*
Websense V Series Content Gateway Log File Protocol All events No No No
v7.1.x and later*
Zscaler Zscaler NSS v4.1* Syslog Web log events Yes No No
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
170 Tracer Lane,
Waltham MA 02451, USA
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries,
or both. If these and other IBM trademarked terms are marked on their first
occurrence in this information with a trademark symbol (® or ™), these symbols
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Depending upon the configurations deployed, this Software Offering may use
session cookies that collect each user’s session id for purposes of session
management and authentication. These cookies can be disabled, but disabling them
will also eliminate the functionality they enable.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, See IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details the
section entitled “Cookies, Web Beacons and Other Technologies” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
Notices 217
218 IBM Security QRadar: DSM Configuration Guide Addendum
Printed in USA