Ibm Security Qradar Log Manager Administration Guide
Ibm Security Qradar Log Manager Administration Guide
Version 7.2.1
Administration Guide
Note
Before using this information and the product that it supports, read the information in “Notices” on page 225.
Chapter 1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Supported web browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Admin tab overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Deploying changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Updating user details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Monitoring systems with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Managing aggregated data views . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Contents v
Configuring an off-site source . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Configuring an off-site target . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Privacy policy considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Contents vii
viii QRadar Log Manager Administration Guide
About this guide
This guide provides information on managing IBM® Security QRadar® Log
Manager including the Dashboard, Log Activity, and Reports tabs.
Intended audience
This guide is intended for all IBM Security QRadar Log Manager users responsible
for investigating and managing network security. This guide assumes that you
have IBM Security QRadar Log Manager access and a knowledge of your
corporate network and networking technologies.
Technical documentation
This overview includes general information on how to access and use the user
interface and the Admin tab.
When you access the system, a prompt is displayed asking for a user name and a
password. The user name and password must be configured in advance by the
administrator.
Table 1. Supported web browsers
Web browser Supported version
Mozilla Firefox v 10.0 ESR
v 17.0 ESR
Deploying changes
You can update your configuration settings from the Admin tab. Your changes are
saved to a staging area where they are stored until you manually deploy the
changes.
Each time that you access the Admin tab and each time you close a window on
the Admin tab, a banner at the top of the Admin tab displays the following
message: Checking for undeployed changes.If undeployed changes are found, the
banner updates to provide information about the undeployed changes.
If the list of undeployed changes is lengthy, a scroll bar is provided. Scroll through
the list.
The banner message also suggests which type of deployment change to make.
Choose one of the two options:
v Deploy Changes - Click the Deploy Changes icon on the Admin tab toolbar to
deploy any configuration changes from the current session to your deployment.
v Deploy Full Configuration - Select Advanced > Deploy Full Configuration
from the Admin tab menu to deploy all configuration settings to your
deployment. All deployed changes are then applied throughout your
deployment.
After you deploy your changes, the banner clears the list of undeployed changes
and checks the staging area again for any new un`deployed changes. If none are
present, the following message is displayed: There are no changes to deploy.
Procedure
1. Click View Details
2. Choose one of the following options:
a. To expand a group to display all items, click the plus sign (+) beside the
text. When done, you can click the minus sign (-).
b. To expand all groups, click Expand All. When done, you can click Collapse
All.
c. Click Hide Details to hide the details from view again.
3. Perform the suggested task:
a. From the Admin tab menu, click Deploy Changes.
b. From the Admin tab menu, click Advanced > Deploy Full Configuration.
Procedure
1. Click Preferences
2. Optional. Update the configurable user details:
Option Description
Parameter Description
Email Type a new email address
Password Type a new password
Password (Confirm) Type the new password again
Enable Popup Notifications Popup system notifications are displayed at
the lower right corner of the user interface.
To disable popup notifications, clear this
check box.
3. Click Save.
QRadar Log Manager uses the Net-SNMP agent, which supports various system
resource monitoring MIBs. They can be polled by Network Management solutions
Chapter 1. Overview 3
for the monitoring and alerting of system resources. For more information about
Net-SNMP, see Net-SNMP documentation.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Aggregated Data Management icon.
4. To filter the list of aggregated data views, choose an option from one the
following options:
v Select an option from one of the following lists: View, Database, Show, or
Display.
v Type an aggregated data ID, report name, chart name, or saved search name
in the search field.
5. To manage an aggregated data view, select the view, and then the appropriate
action from the toolbar:
v If you select Disable View or Delete View, a window displays content
dependencies for the aggregated data view. After you disable or delete the
aggregated data view, the dependent components no longer use aggregated
data.
v If you enable a disabled aggregated data view, the aggregated data from the
deleted view is restored.
When you initially configure QRadar Log Manager, you must create user accounts
for all users that require access to QRadar Log Manager. After initial configuration,
you can edit user accounts to ensure that user information is current. You can also
add and delete user accounts as required.
Assign the following items for each new user account you create:
v User role - Determines the privileges that the user is granted to access functions
and information in QRadar SIEM. QRadar SIEM includes two default user roles:
Admin and All. Before you add user accounts, you must create more user roles
to meet the specific permissions requirement of your users.
v User role - Determines the privileges that the user is granted to access functions
and information in QRadar Log Manager. QRadar Log Manager includes two
default user roles: Admin and All. Before you add user accounts, you must
create more user roles to meet the specific permissions requirement of your
users.
v User role - Determines the privileges that the user is granted to access functions
and information in QRadar Network Anomaly Detection. QRadar Network
Anomaly Detection includes two default user roles: Admin and All. Before you
add user accounts, you must create more user roles to meet the specific
permissions requirement of your users.
v Security profile - Determines the networks and log sources the user is granted
access to. QRadar SIEM includes one default security profile for administrative
users. The Admin security profile includes access to all networks and log
sources. Before you add user accounts, you must create more security profiles to
meet the specific access requirements of your users.
v Security profile - Determines the networks and log sources the user is granted
access to. QRadar Log Manager includes one default security profile for
administrative users. The Admin security profile includes access to all networks
and log sources. Before you add user accounts, you must create more security
profiles to meet the specific access requirements of your users.
v Security profile - Determines the networks and log sources the user is granted
access to. QRadar Network Anomaly Detection includes one default security
profile for administrative users. The Admin security profile includes access to all
networks and log sources. Before you add user accounts, you must create more
security profiles to meet the specific access requirements of your users.
Role management
Using the User Roles window, you can create and manage user roles.
Using the User Roles window, you can create and manage user roles.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the User Roles icon.
4. On the toolbar, click New.
5. Configure the following parameters:
a. In the User Role Name field, type a unique name for this user role.
b. Select the permissions that you want to assign to this user role. See “User
role parameters” on page 17.
6. Click Save.
7. Close the User Role Management window.
8. On the Admin tab menu, click Deploy Changes.
To quickly locate the user role you want to edit on the User Role Management
window, you can type a role name in the Type to filter text box. This box is
located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the User Roles icon.
4. In the left pane of the User Role Management window, select the user role that
you want to edit.
5. On the right pane, update the permissions, as necessary. See “User role
parameters” on page 17.
6. Click Save.
7. Close the User Role Management window.
8. On the Admin tab menu, click Deploy Changes.
If user accounts are assigned to the user role you want to delete, you must
reassign the user accounts to another user role. The system automatically detects
this condition and prompts you to update the user accounts.
You can quickly locate the user role that you want to delete on the User Role
Management window. Type a role name in the Type to filter text box, which is
located above the left pane.
Procedure
1. Click the Admin tab.
2. On theNavigation menu, click System Configuration > User Management.
3. Click theUser Roles icon.
4. In the left pane of the User Role Management window, select the role that you
want to delete.
5. On the toolbar, click Delete.
6. Click OK.
v If user accounts are assigned to this user role, the Users are Assigned to this
User Role window opens. Go to Step 7.
v If no user accounts are assigned to this role, the user role is successfully
deleted. Go to Step 8.
7. Reassign the listed user accounts to another user role:
a. From the User Role to assign list box, select a user role.
b. Click Confirm.
8. Close the User Role Management window.
9. On the Admin tab menu, click Deploy Changes.
Using theSecurity Profile Management window, you can view, create, update, and
delete security profiles.
Permission precedences
This topic defines each of the permission precedence options.
For example, if an event is associated with a log source the security profile allows
access to, but the destination network is restricted, the event is not displayed in the
Log Activity tab. The event must match both requirements.
v Networks OR Log Sources - This option allows the user to view only events
that are associated with the log sources or networks that are specified in this
security profile.
For example, if an event is associated with a log source the security profile allows
access to, but the destination network is restricted, the event is displayed in the
Log Activity tab. The event must match one requirement.
QRadar Log Manager includes one default security profile for administrative users.
The Admin security profile includes access to all networks and log sources.
To select multiple items on the Security Profile Management window, hold the
Control key while you select each network or network group that you want to
add.
If after you add log sources or networks, you want to remove one or more before
you save the configuration, you can select the item and click the Remove (<) icon.
To remove all items, click Remove All.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Security Profiles icon.
4. On the Security Profile Management window toolbar, click New.
5. Configure the following parameters:
a. In the Security Profile Name field, type a unique name for the security
profile. The security profile name must meet the following requirements:
minimum of 3 characters and maximum of 30 characters.
b. OptionalType a description of the security profile. The maximum number
of characters is 255.
6. Click the Permission Precedence tab.
7. In the Permission Precedence Setting pane, select a permission precedence
option. See “Permission precedences” on page 7.
8. Configure the networks that you want to assign to the security profile:
a. Click the Networks tab.
b. From the navigation tree in the left pane of the Networks tab, select the
network that you want this security profile to have access to.
c. Click the Add (>) icon to add the network to the Assigned Networks pane.
d. Repeat for each network you want to add.
To quickly locate the security profile you want to edit on the Security Profile
Management window, type the security profile name in the Type to filter text box.
It is located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Security Profiles icon.
4. In the left pane, select the security profile you want to edit.
5. On the toolbar, click Edit .
6. Update the parameters as required.
7. Click Save .
8. If the Security Profile Has Time Series Data window opens, select one of the
following options:
Option Description
Keep Old Data and Save Select this option to keep previously
accumulated time series data. If you choose
this option, issues might occur when users
associated with this security profile views
time series charts.
Hide Old Data and Save Select this option to hide the time-series
data. If you choose this option, time series
data accumulation restarts after you deploy
your configuration changes.
To quickly locate the security profile you want to duplicate on the Security Profile
Management window, you can type the security profile name in the Type to filter
text box, which is located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration User Management.
3. Click the Security Profiles icon.
4. In the left pane, select the security profile you want to duplicate.
5. On the toolbar, click Duplicate .
6. In the Confirmation window, type a unique name for the duplicated security
profile.
7. Click OK .
8. Update the parameters as required.
9. Close the Security Profile Management window.
10. On the Admin tab menu, click Deploy Changes.
If user accounts are assigned to the security profiles you want to delete, you must
reassign the user accounts to another security profile. QRadar Log Manager
automatically detects this condition and prompts you to update the user accounts.
To quickly locate the security profile you want to delete on the Security Profile
Management window, you can type the security profile name in the Type to filter
text box. It is located above the left pane.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Security Profiles icon.
4. In the left pane, select the security profile that you want to delete.
5. On the toolbar, click Delete.
6. Click OK.
v If user accounts are assigned to this security profile, the Users are Assigned
to this Security Profile window opens. Go to “Deleting a user role” on page
6.
v If no user accounts are assigned to this security profile, the security profile is
successfully deleted. Go to “Deleting a user role” on page 6.
7. Reassign the listed user accounts to another security profile:
a. From the User Security Profile to assign list box, select a security profile.
b. Click Confirm.
8. Close the Security Profile Managementwindow.
9. On the Admin tab menu, click Deploy Changes.
When you initially configure your system, you must create user accounts for each
of your users. After initial configuration, you might be required to create more user
accounts and manage existing user accounts.
Before you can create a user account, you must ensure that the required user role
and security profile are created.
When you create a new user account, you must assign access credentials, a user
role, and a security profile to the user. User Roles define what actions the user has
permission to perform. Security Profiles define what data the user has permission
to access.
You can create multiple user accounts that include administrative privileges;
however, any Administrator Manager user accounts can create other administrative
user accounts.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Users icon.
4. On the User Management toolbar, click New.
5. Enter values for the following parameters:
a. In the Username field, type a unique user name for the new user. The user
name must contain a maximum 30 characters.
b. In the Password field, type a password for the user to gain access.
The password must meet the following criteria:
v Minimum of 5 characters
v Maximum of 255 characters
6. Click Save.
7. Close the User Details window.
8. Close the User Management window.
9. On the Admin tab menu, click Deploy Changes.
You can quickly locate the user account that you want to edit on the User
Management window. Type the user name in theSearch User text box, which is on
the toolbar.
After you delete a user, the user no longer has access to the user interface. If the
user attempts to log in, a message is displayed to inform the user that the user
name and password is no longer valid. Items that a deleted user created, such as
saved searches and reports remain associated with the deleted user.
To quickly locate the user account you want to delete on the User Management
window, you can type the user name in the Search User text box on the toolbar.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Users icon.
4. Select the user that you want to delete.
5. On the toolbar, click Delete.
6. Click OK.
7. Close the User Management window.
Authentication management
This topic provides information and instructions for how to configure
authentication.
QRadar Log Manager supports various authentication types. You can configure
authentication to validate users and passwords.
Authentication overview
When authentication is configured and a user enters an invalid user name and
password combination, a message is displayed to indicate that the login was
invalid.
If the user attempts to access the system multiple times with invalid information,
the user must wait the configured amount of time before another attempt to access
Before you can configure RADIUS, TACACS, Active Directory, or LDAP as the
authentication type, you must complete the following tasks:
v Configure the authentication server before you configure authentication in
QRadar Log Manager. For more information, see your server documentation
v Ensure that the server has the appropriate user accounts and privilege levels to
communicate with QRadar Log Manager. For more information, see your server
documentation.
v Ensure that the time of the authentication server is synchronized with the time
of the QRadar Log Manager server. For more information about setting time, see
Chapter 5, “Set up QRadar Log Manager,” on page 51.
v Ensure that all users have appropriate user accounts and roles to allow
authentication with the vendor servers.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration User Management.
3. Click the Authentication icon.
4. From the Authentication Module list box, select RADIUS Authentication.
5. Configure the parameters:
a. In the RADIUS Server field, type the host name or IP address of the
RADIUS server.
b. In the RADIUS Port field, type the port of the RADIUS server.
c. From the Authentication Type list box, select the type of authentication you
want to perform.
Choose from the following options:
Option Description
CHAP Challenge Handshake Authentication
Protocol (CHAP) establishes a Point-to-Point
Protocol (PPP) connection between the user
and the server.
MSCHAP Microsoft Challenge Handshake
Authentication Protocol (MSCHAP)
authenticates remote Windows workstations.
ARAP Apple Remote Access Protocol (ARAP)
establishes authentication for AppleTalk
network traffic.
PAP Password Authentication Protocol (PAP)
sends clear text between the user and the
server.
d. In the Shared Secret field, type the shared secret that QRadar Log Manager
uses to encrypt RADIUS passwords for transmission to the RADIUS server.
6. Click Save.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Authentication icon.
4. From the Authentication Module list box, select TACACS Authentication.
Option Description
ASCII American Standard Code for Information
Interchange (ASCII) sends the user name
and password in clear, unencrypted text.
PAP Password Authentication Protocol (PAP)
sends clear text between the user and the
server. This is the default authentication
type.
CHAP Challenge Handshake Authentication
Protocol (CHAP) establishes a Point-to-Point
Protocol (PPP) connection between the user
and the server.
MSCHAP Microsoft Challenge Handshake
Authentication Protocol (MSCHAP)
authenticates remote Windows workstations.
MSCHAP2 Microsoft Challenge Handshake
Authentication Protocol version 2
(MSCHAP2) authenticates remote Windows
workstations using mutual authentication.
EAPMD5 Extensible Authentication Protocol using
MD5 Protocol (EAPMD5) uses MD5 to
establish a PPP connection.
d. In the Shared Secret field, type the shared secret that QRadar SIEM uses to
encrypt TACACS passwords for transmission to the TACACS server.
6. Click Save.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration > User Management.
3. Click the Authentication icon.
4. From the Authentication Module list box, select Active Directory.
Configure the following parameters:
Parameter Description
Server URL Type the URL used to connect to the LDAP
server. For example, ldaps://<host>:<port>.
You can use a space-separated list to specify
multiple LDAP servers.
5. Click Save.
If you plan to enable the SSL or TLS connection to your LDAP server, you must
import the SSL or TLS certificate from the LDAP server to the
/opt/qradar/conf/trusted_certificates directory on your Console system. For
more information about configuring the SSL certificate, see “Configuring Your SSL
or TLS certificate” on page 17.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration User Management.
3. Click the Authentication icon.
4. From the Authentication Module list box, select LDAP. Configure the
following parameters:
Parameter Description
Server URL Type the URL used to connect to the LDAP
server. For example, ldaps://<host>:<port>.
You can use a space-separated list to specify
multiple LDAP servers.
SSL Connection Select True to use Secure Socket Layer (SSL)
encryption to connect to the LDAP server.
5. Click Save.
Procedure
1. Using SSH, log in to your system as the root user.
a. User name: root
b. Password: <password>
2. Type the following command to create the /opt/qradar/conf/
trusted_certificates/ directory:mkdir -p /opt/qradar/conf/
trusted_certificates
3. Copy the SSL or TLS certificate from the LDAP server to the
/opt/qradar/conf/trusted_certificates directory on your system.
4. Verify that the certificate file name extension is .cert, which indicates that the
certificate is trusted. QRadar Log Manager only loads .cert files.
The following table provides descriptions for the User Role Management window
parameters.
Table 3.
Parameter Description
User Role Name Type a unique name for the role. The user
role name must meet the following
requirements:
The following table provides descriptions of the User Management window toolbar
functions:
Table 6. User Management window toolbar functions
Function Description
New Click this icon to create a user account. For
more information about how to create a user
account, see “Creating a user account” on
page 11.
Edit Click this icon to edit the selected user
account. For more information about how to
edit a user account, see “Editing a user
account” on page 11.
The following table provides descriptions of the User Details window parameters:
Table 7. User Details window parameters
Parameter Description
Username Type a unique user name for the new user.
The user name must contain a maximum of
30 characters.
E-mail Type the user's email address. The email
address must meet the following
requirements:
v Must be a valid email address
v Minimum of 10 characters
v Maximum of 255 characters
Password Type a password for the user to gain access.
The password must meet the following
criteria:
v Minimum of 5 characters
v Maximum of 255 characters
Confirm Password Type the password again for confirmation.
Description Optional. Type a description for the user
account. The maximum number of
characters is 2,048.
User Role From the list box, select the user role that
you want to assign to this user.
You must allocate a license for each system in your deployment, including
software appliances.QFlow and Event Collectors do not require a license.
When you install a QRadar system, a default license key provides you with access
to the user interface for five weeks. Before the default license expires, you must
allocate a license key to your system. You can also add licenses to enable QRadar
products, such as QRadar Vulnerability Manager.
There is a 14 day grace period to reallocate a license. You can unlock a license if
the key is uploaded, after a host is patched with a fix, or after an unlock key is
uploaded. After the grace period is passed, the license is locked to the system.
If your license status is Invalid, the license must be replaced. The status might
indicate that your license has been altered without authorization.
The toolbar on the System and License Management window provides the
following functions:
Table 8. System and License Management toolbar functions
Function Description
Allocate License to System Use this function to allocate a license to a
system.
The Deployment Details pane provides information about your deployment. You
can expand or collapse the Deployment Details pane.
When you select Systems from the Display list box in the Deployment Details
pane, the System and License Management window displays the following
information:
Table 10. System and License Management window parameters - Systems view.
Parameter Description
Host Name Displays the host name of this system.
Host IP Displays the IP address of this system.
License Appliance Type Displays the appliance type of this system.
Version Displays the version number of the IBM
Security QRadar software that this system
uses.
Serial Number Displays the serial number of this system, if
available.
Host Status Displays the status of this system, if
available.
License Expiration Date Displays the expiration date of the license
that is allocated to this system.
When you select Licenses from the Display list box in the Deployment Details
pane, theSystem and License Management window displays the following
information:
Table 11. System and License Management window parameters - Licenses view.
Parameter Description
Host Name Displays the host name of the system that is
allocated to this license.
Host IP Displays the IP address of the system that is
allocated to this license.
Appliance Type Displays the appliance type of the system
that is allocated to this license.
License Identity Displays the name of the IBM Security
QRadar product this license provides.
License management
You use the options available on the System and License Management window to
manage your license keys.
A default license key provides you with access to the user interface for five weeks.
You must allocate a license key to your system.
When you initially set up a system, you must complete the following tasks:
Procedure
1. Obtain a license key. Choose one of the following options for assistance with
your license key:
v For a new or updated license key, contact your local sales representative.
v For all other technical issues, contact Customer Support.
2. Upload your license key. When you upload a license key, it is listed in the
System and License Management window, but remains unallocated. For more
information, see “Uploading a license key” on page 29
3. Allocate your license by choosing one of the following options:
Choose one of the following options for assistance with your license key:
1. For a new or updated license key, contact your local sales representative.
2. For all other technical issues, contact Customer Support.
If you log in to the user interface and your Console license key expired, you are
automatically directed to the System and License Management window. You must
upload a license key before you can continue. If one of your non-Console systems
includes an expired license key, a message is displayed when you log in indicating
a system requires a new license key. You must access the System and License
Management window to update that license key.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. On the toolbar, click Upload License.
5. In the dialog box, click Select File.
6. On the File Upload window, locate and select the license key.
7. Click Open.
8. Click Upload.
Results
The license is uploaded to your Console and is displayed in the System and
License Management window. By default, the license is not allocated.
What to do next
Before you begin, you must obtain and upload a license to your Console. See
“Uploading a license key.”
When you install a QRadar system, a default license key provides you with access
to the user interface for five weeks. Before the default license expires, you must
allocate a license key to your system. You can also add licenses to enable QRadar
products, such as QRadar Vulnerability Manager.
License Status displays the status of the license that is allocated to this system.
Statuses include:
v Unallocated - Indicates that this license is not allocated to a system.
v Undeployed - Indicates that this license is allocated to a system, but you have
not deployed the allocation change. This means that the license is not active in
your deployment yet.
v Deployed - Indicates that this license is allocated and active in your deployment.
v Unlocked - Indicates that this license has been unlocked. You can unlock a
license if it has been deployed within the last 14 days. This is the default grace
period to reallocate a license. After the grace period is passed, the license is
locked to the system. If you must unlock a license after that period, contact
Customer Support.
v Invalid - Indicates that this license is not valid and must be replaced. This status
may indicate that your license has been altered without authorization.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Licenses.
5. Select an unallocated license.
6. Click Allocate System to License.
7. Optional: To filter the list of licenses, type a keyword in the Upload License
search box.
8. From the list of licenses, select a license.
9. Select a system.
10. Click Allocate License to System.
Reverting an allocation
You can revert an allocated license within the 14 day grace period.
After you allocate a license to a system and before you deploy your configuration
changes, you can undo the license allocation. When you undo the license
allocation, the license that was last allocated and deployed on the system is
maintained.
Procedure
1. Click theAdmin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Licenses.
From the System and License Management window, you can view license details,
such as the number of allowable log sources and the expiration dates.
Note: If you exceed the limit of configured logs sources, an error message is
displayed. If log sources are auto-discovered and your limit is exceeded, they are
automatically disabled. To extend the number of log sources, contact your sales
representative.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Licenses.
5. To display the Current License Details window for a license, double-click the
license that you want to view.
What to do next
From the Current License window, you can complete the following tasks:
v Click Upload Licences to upload a license. See Uploading a license key.
v Click Allocate License to System on the toolbar to assign a license. See
Allocating a system to a license.
Exporting a license
Export license key information to a desktop system.
You can export license key information to an external file on your desktop system.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Licenses.
5. From the Actions menu, select Export Licenses.
6. Select one of the following options:
v Open with - Opens the license key data using the selected application.
v Save File - Saves the file to your desktop.
7. Click OK.
You use the options available on the System and License Management window to
manage the systems in your deployment. You can view system details, assign a
license to a system, or restart and shut down a system.
Open the System Details window to view information about the system and the
list of licenses that are allocated to the system.
The license list provides the following details for each license that is allocated to
this system:
Table 12. License parameters
Header Header
License Identity Displays the name of the QRadar product
this license provides.
License Status Displays the status of the license that is
allocated to this system. Statuses include:
v Unallocated - Indicates that this license is
not allocated to a system.
v Undeployed - Indicates that this license is
allocated to a system, but you have not
deployed the allocation change. This
means that the license is not active in
your deployment yet.
v Deployed - Indicates that this license is
allocated and active in your deployment.
v Unlocked - Indicates that this license has
been unlocked. You can unlock a license if
it has been deployed within the last 10
days. This is the default grace period to
reallocate a license. After the grace period
is passed, the license is locked to the
system. If you need to unlock a license
after that period, contact Customer
Support.
v Invalid - Indicates that this license is not
valid and must be replaced. This status
may indicate that your license has been
altered without authorization.
License Appliance Types Displays the appliance type that this license
is valid for.
License Expiration Date Displays the expiration date of this license.
Event Rate Limit Displays the event rate limit this license
allows.
What to do next
From the system details window, you can complete the following tasks:
v Select a license and click View License. See “Viewing license details” on page
31.
v Click Upload Licences to upload a license. See “Uploading a license key” on
page 29.
v Click Allocate License to System on the toolbar to assign a license. See
“Allocating a system to a license.”
You can allocate multiple licenses to a system. For example, in addition to the IBM
Security QRadar SIEM, you can allocate IBM Security QRadar Risk Manager, and
IBM Security QRadar Vulnerability Manager to your QRadar Console system.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select an available system.
6. Click Allocate License to System.
7. Optional: To filter the list of licenses, type a keyword in the Upload License
search box.
8. From the list of licenses, select a license.
9. Select a system.
10. Click Allocate License to System.
Restarting a system
Use the Restart System option on the System and License Management window to
restart a system in your deployment.
Data collection stops while the system is shutting down and restarting.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
Procedure
1. Click theAdmin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select the system that you want to shut down.
6. From the Actions menu, select Shutdown.
Use the Export Systems option on the System and License Management window
to export system information to an external file on your desktop system.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. From the Actions menu, select Export Systems.
6. Select one of the following options:
v Open with - Opens the license key data by using the selected application.
v Save File - Saves the file to your desktop.
7. Click OK.
Only the listed managed hosts that are listed in the Device Access box have access
to the selected system. For example, if you enter one IP address, only that IP
address is granted access to the Console. All other managed hosts are blocked.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select the host for which you want to configure firewall access settings.
6. From the Actions menu, select Manage System.
7. Log in to the System Setup window. The default is:
a. User Name: root
b. Password: <password> The user name and password are case sensitive.
8. From the menu, select Managed Host Config > Local Firewall.
9. Configure the following Device Access parameters:
Option Description
Device Access In the Device Access box, include any IBM
systems that you want to access to this
managed host. Only the listed managed
hosts have access. For example, if you enter
one IP address, only that IP address is
granted access to the managed host. All
other managed hosts are blocked.
IP Address Type the IP address of the managed host
you want to have access.
Protocol Select the protocol that you want to enable
access for the specified IP address and port.
Options include:
v UDP - Allows UDP traffic.
v TCP - Allows TCP traffic.
v Any - Allows any traffic.
Port Type the port on which you want to enable
communications.
The global configuration password does not accept special characters. The global
configuration password must be the same throughout your deployment. If you edit
this password, you must also edit the global configuration password on all systems
in your deployment.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select the host for which you want to update your host setup settings.
6. From the Actions menu, select Manage System.
7. Log in to the System Setup window. The default is:
a. User Name: root
b. Password: <password>
The user name and password are case-sensitive.
8. From the menu, select Managed Host Config > QRadar Setup.
9. In the Mail Server field, type the address for the mail server you want to use.
QRadar Log Manager uses this mail server to distribute alerts and event
messages. To use the mail server that QRadar Log Manager provides, type
localhost.
10. In the Enter the global configuration password, type the password that you
want to use to access the host. Type the password again for confirmation.
11. Click Apply Configuration.
For assistance with determining the appropriate role for each interface, contact
Customer Support.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select the host for which you want to configure interface role settings.
6. From the Actions menu, select Manage System.
7. Log in to the System Setup window. The default is:
a. User Name: root
b. Password: <password>
The user name and password are case-sensitive.
8. From the menu, select Managed Host Config > Network Interfaces.
9. For each listed network interface, select the role that you want to assign to the
interface from the Role list box.
10. Click Save Configuration.
11. Wait for the System Setup window to refresh before you continue.
Changing passwords
You can change the root password for your system.
Procedure
1. Click theAdmin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select the host for which you want to configure interface role settings.
6. From the Actions menu, select Manage System.
7. Log in to the System Setup window. The default is:
a. User Name: root
b. Password: <password>
The user name and password are case-sensitive.
8. From the menu, select Managed Host Config > Root Password.
9. Update the password:
All system time changes must be made within the System Time page. You can
change the system time on the host that operates the Console. The change is then
distributed to all managed hosts in your deployment.
You are able to change the time for the following options:
v System time
v Hardware time
v Time Zone
v Time Server
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select the host for which you want to configure system time settings.
6. From the Actions menu, select Manage System.
7. Log in to the System Setup window. The default is:
a. User Name: root
b. Password: <password>
The user name and password are case-sensitive.
8. From the menu, select Managed Host Config > System Time.
9. Configure the time zone:
a. Click the Change time zone tab.
b. From the Change timezone to list box, select the time zone in which this
managed host is located.
c. Click Save.
10. Configure the time server:
a. Click the Time server sync tab.
Configure the following parameters:
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System and License Management icon.
4. From the Display list box, select Systems.
5. Select the host for which you want to configure system time settings.
6. From the Actions menu, select Manage System.
7. Log in to the System Setupwindow. The default is:
a. User Name: root
b. Password: <password>
The user name and password are case-sensitive.
8. From the menu, select Managed Host Config > System Time.
9. Click the Set time tab.
The Set Time page is divided into tabs. You must save each setting before you
continue. For example, when you configure system time, you must click
Apply in the System Time pane before you continue.
10. Set the system time:
a. Choose one of the following options:
v In the System Time pane, using the list boxes, select the current date
and time you want to assign to the managed host.
v Click Set system time to hardware time.
b. Click Apply.
11. Set the hardware time:
IBM Security QRadar Log Manager uses the information that is collected from the
endpoints to enrich the user information that is associated with the traffic and
events that occur on your network.
IBM Security QRadar Network Anomaly Detection uses the information that is
collected from the endpoints to enrich the user information that is associated with
the traffic and events that occur on your network.
Use the following utilities to configure and manage user information sources:
v Tivoli Directory Integrator- You must install and configure a Tivoli® Directory
Integrator on a non-QRadar host.
v UISConfigUtil.sh - Use this utility to create, retrieve, update, or delete user
information sources. You can use user information sources to integrate QRadar
Log Manager using a Tivoli Directory Integrator server.
v GetUserInfo.sh - Use this utility to collect user information from a user
information source and store the information in a reference data collection. You
can use this utility to collect user information on demand or on a schedule.
When QRadar Log Manager collects information from a user information source, it
automatically creates a reference data collection to store the information. The name
of the reference data collection is derived from the user information source group
name. For example, a reference data collection that is collected from Microsoft
Windows AD might be named Domain Admins.
The reference data collection type is a Map of Maps. In a Reference Map of Maps,
data is stored in records that map one key to another key, which is then mapped to
a single value.
For example:
v #
v # Domain Admins
v # key1,key2,data
v smith_j,Full Name,John Smith
v smith_j,account_is_disabled,0
For more information about reference data collections, see the Reference Data
Collections Technical Note.
You can create meaningful reports and alerts that characterize user adherence to
your company's security policies.
To ensure activities that are performed by privileged ISIM users comply with your
security policies, you can complete the following tasks:
Create a log source to collect and parse audit data for each ISIM server from which
the logs are collected. For more information about how to create a log source, see
the Managing Log Sources Guide.
1. Create a user information source for the ISIM server and collect ISIM
Administrators user group information. This step creates a reference data
collection that is called ISIM Administrators. See “Creating a user information
source” on page 46.
2. Configure a building block to test for events in which the source IP address is
the ISIM server and the user name is listed in the ISIM administrator reference
data collection. For more information about building blocks, see the User Guide
for your product.
3. Create an event search that uses the custom building block as a filter. For more
information about event searches, see the User Guide for your product.
4. Create a custom report that uses the custom event search to generate daily
reports on the audit activity of the privileged ISIM users. These generated
reports indicate whether any ISIM administrator activity breaches your security
policy. For more information about reports, see the User Guide for your product.
Note: If you want to collect application security logs, you must create a Device
Support Module (DSM). For more information, see the IBM Security QRadar DSM
Configuration Guide.
When you extract the QRadarIAM_TDI.zip file on the Tivoli Directory Integrator
server, the TDI directory is automatically created. The TDI directory includes the
following files:
v QradarIAM.sh, which is the TDI start up script for Linux
v QradarIAM.bat, which is the TDI start up script for Microsoft Windows
v QradarIAM.xml, which is the TDI xml script and must be stored in the same
location as the QradarIAM.properties file
v QradarIAM.properties, which is the properties file for TDI xml script
When you install Tivoli Directory Integrator, you must configure a name for the
Solutions directory. This task requires you to access the Solutions directory.
Therefore, in the task steps, <solution_directory> refers to the name that you
gave to the directory.
Procedure
1. Install Tivoli Directory Integrator on a non-QRadarhost. For more information
on how to install and configure Tivoli Directory Integrator, see your Tivoli
Directory Integrator (TDI) documentation.
2. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
3. Copy the QRadarIAM_TDI.zip file to the Tivoli Directory Integrator server.
Use the UISConfigUtli utility to create, retrieve, update, or delete user information
sources.
Before you create a user information source, you must install and configure your
Tivoli Directory Integrator server. For more information, see “Configuring the
Tivoli Directory Integrator server” on page 44.
When you create a user information source, you must identify the property values
required to configure the user information source. The following table describes the
supported property values:
Table 17. Supported user interface property values
Header Header
tdiserver Defines the host name of the Tivoli Directory
Integrator server.
tdiport Defines the listening port for the HTTP
connector on the Tivoli Directory Integrator
server.
hostname Defines the host name of the user
information source host.
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
2. To add a user information source, type the following command:
UISConfigUtil.sh add <name> -t <AD|ISAM|ISIM|ISFIM> [-d description] [-p
prop1=value1,prop2=value2...,propn=valuen]
Where:
v <name> Is the name of the user information source you want to add.
v <AD|ISAM|ISIM|ISFIM> Indicates the user information source type.
v [-d description] Is a description of the user information source. This
parameter is optional.
v [-p prop1=value1,prop2=value2,...,propn=valuen] Identifies the property
values required for the user information source. For more information about
the supported parameters, see “Creating a user information source” on page
46.
For example:
v /UISConfigUtil.sh add "UIS_ISIM" -t ISIM -d "UIS for ISIM" -p
"tdiserver=nc9053113023.tivlab.austin.ibm.com,tdiport=8080,hostname=vmibm7094.ottawa.ibm.com,port=389,username=cn=root,password=p
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
2. Choose one of the following options:
a. Type the following command to retrieve all user information sources:
UISConfigUtil.sh get <name>
b. Type the following command to retrieve a specific user information source:
UISConfigUtil.sh get <name>
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
2. Type the following command to edit a user information source:
UISConfigUtil.sh update <name> -t <AD|ISAM|ISIM|ISFIM> [-d description]
[-p prop1=value1,prop2=value2,...,propn=valuen]
Where:
v <name> Is the name of the user information source you want to edit.
v <AD|ISAM|ISIM|ISFIM> Indicates the user information source type. To update
this parameter, type a new value.
v [-d description] Is a description of the user information source. This
parameter is optional. To update this parameter, type a new description.
v [-p prop1=value1,prop2=value2,...,propn=valuen] Identifies the property
values required for the user information source. To update this parameter,
type new properties. For more information about the supported parameters,
see “Creating a user information source” on page 46.
For example:
./UISConfigUtil.sh update "UIS_AD_update" -t AD -d "UIS for AD" -p
"searchbase=DC=local"
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. Password: <password>
2. Type the following command to delete a user information source:
UISConfigUtil.sh delete <name>
Where <name> is the name of the user information source you want to delete.
What to do next
The collected user information is stored in a reference data collection on the IBM
Security QRadar SIEMdatabase. If no reference date collection exists, a new
reference data collection is created. If a reference data collection was previously
created for this user information source, the reference map is purged of previous
data and the new user information is stored. For more information about reference
data collections, see Reference data collections for user information.
Use this task to collect user information on demand. If you want to create
automatic user information collection on a schedule, create a cron job entry. For
more information about cron jobs, see your Linux documentation.
Procedure
1. Using SSH, log in to your Console as the root user.
a. User name: root
b. <password>
2. Type the following command to collect user information on demand:
GetUserInfo.sh <UISName>
Where <UISName> is the name of the user information source you want to
collect information from.
What to do next
You can configure your network hierarchy, automatic updates, system settings,
event retention buckets, system notifications, console settings, and index
management.
Network hierarchy
QRadar uses the network hierarchy to understand your network traffic and
provide you with the ability to view activity for your entire deployment.
When you develop your network hierarchy, consider the most effective method for
viewing network activity. The network hierarchy does not need to resemble the
physical deployment of your network. QRadar supports any network hierarchy
that can be defined by a range of IP addresses. You can base your network on
many different variables, including geographical or business units.
When you define your network hierarchy, you must consider the systems, users,
and servers that can be grouped.
You can group systems and user groups that have similar behavior. However, do
not group a server that has unique behavior with other servers on your network.
Placing a unique server alone provides the server greater visibility in QRadar, and
you can manage specific policies.
Within a group, you can place servers with high volumes of traffic, such as mail
servers, at the top of the group. This hierarchy provides you with a visual
representation when a discrepancy occurs.
If your deployment processes more than 600,000 flows, then you can create
multiple top-level groups.
You can organize your systems and networks by role or similar traffic patterns. For
example, mail servers, departmental users, labs, or development groups. Using this
organization, you can differentiate network behavior and enforce network
management security policies.
Large network groups can cause you difficulty when you view detailed
information for each object. Do not configure a network group with more than 15
objects.
10.10.1.4/32
10.10.1.5/32
Add key servers as individual objects and group other major but related servers
into multi-CIDR objects.
The following table provides a list of the CIDR values that QRadar accepts:
Table 20. Acceptable CIDR values
Number of
CIDR Length Mask Networks Hosts
/1 128.0.0.0 128 A 2,147,483,392
/2 192.0.0.0 64 A 1,073,741,696
/3 224.0.0.0 32 A 536,870,848
/4 240.0.0.0 16 A 268,435,424
/5 248.0.0.0 8A 134,217,712
/6 252.0.0.0 4A 67,108,856
/7 254.0.0.0 2A 33,554,428
/8 255.0.0.0 1A 16,777,214
/9 255.128.0.0 128 B 8,388,352
/10 255.192.0.0 64 B 4,194,176
/11 255.224.0.0 32 B 2,097,088
/12 255.240.0.0 16 B 1,048,544
/13 255.248.0.0 8B 524,272
/14 255.252.0.0 4B 262,136
/15 255.254.0.0 2B 131,068
For example, a network is called a supernet when the prefix boundary contains
fewer bits than the natural (or classful) mask of the network. A network is called a
subnet when the prefix boundary contains more bits than the natural mask of the
network:
v 209.60.128.0 is a class C network address with a mask of /24.
v 209.60.128.0 /22 is a supernet that yields:
– 209.60.128.0 /24
– 209.60.129.0 /24
– 209.60.130.0 /24
– 209.60.131.0 /24
v 192.0.0.0 /25
Subnet Host Range
0 192.0.0.1-192.0.0.126
1 192.0.0.129-192.0.0.254
v 192.0.0.0 /26
Subnet Host Range
0 192.0.0.1 - 192.0.0.62
1 192.0.0.65 - 192.0.0.126
2 192.0.0.129 - 192.0.0.190
3 192.0.0.193 - 192.0.0.254
v 192.0.0.0 /27
Subnet Host Range
0 192.0.0.1 - 192.0.0.30
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Network Hierarchy.
4. From the menu tree on the Network Views window, select the area of the
network in which you want to add a network object.
5. Click Add.
6. From Group list, select the group in which you want to add the new network
object.
7. Optional: Click Add Group to create a new group.
8. Type a unique name for the object.
9. Type or select the weight of the object. The range is 0 - 100 and indicates the
importance of the object in the system.
10. Type the CIDR range for this object and click Add.
11. Type a description for this network object.
12. Click Select Color and select a color for this object.
13. Select the database length.
14. Click Save.
15. Repeat for all network objects.
16. Optional: Click Re-Order and organize the network objects.
Related concepts:
“Acceptable CIDR values” on page 52
QRadar accepts specific CIDR values.
Automatic updates
You can automatically or manually update your configuration files to ensure that
your configuration files contain the latest network security information.
The Console must be connected to the Internet to receive the updates. If your
Console is not connected to the Internet, you must configure an internal update
server for your Console to download the files from.
http://www.ibm.com/support/fixcentral/
After you install updates on your Console and deploy your changes, the Console
updates its managed hosts if your deployment is defined in your deployment
editor. For more information about the deployment editor, see Chapter 9,
“Deployment editor,” on page 103.
CAUTION:
You must build your system and event views in the deployment editor before
you configure automatic or manual updates. Otherwise, your managed hosts are
not updated.
When you update your configuration files on a primary host and deploy your
changes, the updates are automatically made on the secondary host. If you do not
deploy your changes, the updates are made on the secondary host through an
automated process that runs hourly.
Related concepts:
“Set up a QRadar update server” on page 60
If your deployment includes a QRadar Console that is unable to access the Internet
or you want to manually manage updates to your system, you can set up a
QRadar update server to manage the update process.
Your system needs to be operational long enough to retrieve the weekly updates. If
no updates are displayed in the Updates window, either your system has not been
in operation long enough to retrieve the weekly updates or no updates have been
issued. If this occurs, you can manually check for new updates. For more
information about checking for new updates, see “Checking for new updates” on
page 58.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. To view details on an update, select the update.
You can select the Auto Deploy to automatically deploy updates. If Auto Deploy
is not selected, then you must manually deploy changes, from the Dashboard tab,
after updates are installed.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Change Settings.
5. On the Basic tab, select the schedule for updates.
6. In the Configuration Updates section, select the method that you want to use
for updating your configuration files.
7. In the DSM, Scanner, Protocol Updates section, select an option to install
updates.
8. In the Major Updates section, select an option for receiving major updates for
new releases.
9. In the Minor updates section, select an option for receiving patches for minor
system issues.
10. Select the Auto Deploy check box if you want to deploy update changes
automatically after updates are installed.
11. Select the Auto Restart Service check box if you want to restart the user
interface service automatically after updates are installed.
12. Click the Advanced tab.
13. In Web Serverfield, type the web server from which you want to obtain the
updates. The default web server is http://www.ibm.com/support/fixcentral.
14. In the Directory field, type the directory location on which the web server
stores the updates. The default directory is autoupdates/.
15. Optional: In the Proxy Server field, type the URL for the proxy server. The
proxy server is required if the application server uses a proxy server to
connect to the Internet.
16. Optional: In the Proxy Username field, type the user name for the proxy
server. A user name is required if you are using an authenticated proxy.
17. In the Proxy Password field, type the password for the proxy server. A
password is required if you are using an authenticated proxy.
18. Select the Send Feedback check box if you want to send feedback to IBM
about the update. If errors occur during an update, feedback is automatically
sent by a web form.
19. In the Backup Retention Period list, type or select the number of days that
you want to store files that are replaced during the update process. The files
are stored in the location that is specified in the Backup Location. The
minimum is one day and the maximum is 65535 years.
20. In the Backup Location field, type the location where you want to store
backup files.
21. In the Download Path field, type the directory path location to which you
want to store DSM, minor, and major updates. The default directory path is
/store/configservices/staging/updates.
22. Click Save.
For detailed information on each update, you can select the update. A description
and any error messages are displayed in the right pane of the window.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. ClickAuto Update.
4. Optional: If you want to schedule specific updates, select the updates that you
want to schedule.
5. From the Schedule list box, select the type of update you want to schedule.
6. Using the calendar, select the start date and time of when you want to start
your scheduled updates.
Scheduled updates display a status of Scheduled in the Status field. After the
schedule is cleared, the status of the update displays as New.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Check for Updates.
5. Optional: If you want to clear specific scheduled updates, select the updates
that you want to clear.
6. From the Unschedule list box, select the type of scheduled update that you
want to clear.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Check for Updates.
5. Optional: If you want to install specific updates, select the updates that you
want to schedule.
6. From the Install list box, select the type of update you want to install.
A description of the update and any installation error messages are displayed in
the right pane of the View Update History page. The View Update History page
provides the following information:
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click View Update History.
5. Optional: Using the Search by Name text box, you can type a keyword and
then press Enter to locate a specific update by name.
6. To investigate a specific update, select the update.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click Restore Hidden Updates.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Auto Update.
4. On the navigation menu, click View Log.
The autoupdate package includes all files necessary to manually set up an update
server in addition to the necessary system configuration files for each update. After
the initial setup, you only need to download and uncompress the most current
autoupdate package to manually update your configuration.
Procedure
1. Access your Apache server. By default, the update directory is in the web root
directory of the Apache server. You can place the directory in another location
if you configure QRadar accordingly.
2. Create an update directory named autoupdates/.
3. Optional: Create an Apache user account and password to be used by the
update process.
4. Download the autoupdate package from Fix Central: http://www.ibm.com/
support/fixcentral You can find QRadar products in the Security Systems
Product Group list on Fix Central.
To configure your QRadar console to be your upgrade server, you complete three
tasks:
v Create an autoupdate directory.
v Download the autoupdate package from Fix Central.
v Configure QRadar to accept the autoupdates.
Procedure
1. Log in to QRadar as the root user.
You must configure your update server and set up QRadar to receive updates from
the update server.
Procedure
1. Download the autoupdate package from Fix Central: http://www.ibm.com/
support/fixcentral You can find QRadar products in the Security Systems
Product Group list on Fix Central.
2. Save the autoupdate package file on your update server in the autoupdates/
directory that you created.
3. Type the following command to uncompress the autoupdate package.tar -zxf
updatepackage-[timestamp].tgz
4. Log in to QRadar as the root user.
5. Type the following command to test your update server, lynx https://<your
update server>/<directory path to updates>/manifest_list.
6. Type the user name and password of your update server.
On the System Settings window, you can configure the following parameters:
Table 22. System Settings window parameters
Parameter Description
System Settings
Database Settings
User Data Files The location of the user profiles. The default
location is /store/users.
Accumulator Retention - Minute-By-Minute
The period that you want to retain
minute-by-minute data accumulations.
This pane is only displayed if IBM Security QRadar Vulnerability Manager is installed on
your system.
Asset Profile Retention Period
The period, in days, that you want to store
the asset profile information.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the System Settings icon.
4. Configure the system settings.
5. Click Save.
6. On the Admin tab menu, select Advanced > Deploy Full Configuration.
Contact your IF-MAP server administrator to obtain a copy of the IF-MAP server
public certificate. The certificate must have the .cert file extension, for example,
ifmapserver.cert.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. Copy the certificate to the /opt/qradar/conf/trusted_certificates directory.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. Access the certificate to the /opt/qradar/conf/trusted_certificates directory
3. Copy the SSL intermediate certificate and SSL Verisign root certificate to your
IF-MAP server as CA certificates. For assistance, contact your IF-MAP server
administrator.
4. Type the following command to create the Public-Key Cryptography Standards
file with the .pkcs12 file extension using the following command:openssl
pkcs12 -export -inkey <private_key> -in <certificate> -out
<pkcs12_filename.pkcs12> -name "IFMAP Client"
5. Type the following command to copy the pkcs12 file to the
/opt/qradar/conf/key_certificates directory:cp <pkcs12_filename.pkcs12>
/opt/qradar/conf/key_certificates
6. Create a client on the IF-MAP server with the Certificate authentication and
upload the SSL certificate. For assistance, contact your IF-MAP server
administrator.
Data retention
Configure custom retention periods for specific data.
Retention buckets define retention policies for events that match custom filter
requirements. As QRadar receives events, each event is compared against retention
bucket filter criteria. When an event matches a retention bucket filter, it is stored in
that retention bucket until the retention policy time period is reached. This feature
enables you to configure multiple retention buckets.
Retention buckets are sequenced in priority order from the top row to the bottom
row on the Event Retention window. A record is stored in the bucket that matches
the filter criteria with highest priority. If the record does not match any of your
configured retention buckets, the record is stored in the default retention bucket,
which is always located below the list of configurable retention buckets.
The Event Retention window provide the following information for each retention
bucket:
Table 23. Retention window parameters
Parameter Description
Order The priority order of the retention buckets.
Name The name of the retention bucket.
Retention The retention period of the retention bucket.
Compression The compression policy of the retention
bucket.
Deletion Policy The deletion policy of the retention bucket.
Filters The filters applied to the retention bucket.
Move your mouse pointer over the Filters
parameter for more information on the
applied filters.
Distribution The retention bucket usage as a percentage
of total data retention in all your retention
buckets.
Enabled Specifies if the retention bucket is enabled
(true) or disabled (false).
Creation Date The date and time the retention bucket was
created.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources .
3. Click the Event Retention or icon.
4. Double-click the first available retention bucket.
5. Configure the following parameters:
Parameter Description
Name Type a unique name for the retention
bucket.
Keep data placed in this bucket for Select a retention period. When the retention
period is reached, data is deleted according
to the Delete data in this bucket parameter.
Allow data in this bucket to be compressed
Select the check box to enable data
compression, and then select a time frame
from the list box. When the time frame is
reached, all data in the retention bucket are
eligible to be compressed. This increases
system performance by guaranteeing that no
data is compressed within the specified time
period. Compression only occurs when used
disk space reaches 83% for payloads and
85% for records.
6. Click Save.
7. Click Save again.
Your retention bucket starts storing data that match the retention parameters
immediately.
Retention buckets are sequenced in priority order from the top row to the bottom
row on the Event Retention window. A record is stored in the first retention bucket
that matches the record parameters.
You cannot move the default retention bucket. It always resides at the bottom of
the list.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click Data Sources.
3. Click the Event Retention icon.
4. Click the icon.
5. Select and move the required retention bucket to the correct location.
The following table describes the Global System Notifications window parameters
Table 25. Global System Notifications window parameters
Parameter Description
System load over 1 minute Type the threshold system load average over
the last minute.
System load over 5 minutes Type the threshold system load average over
the last 5 minutes.
System load over 15 minutes Type the threshold system load average over
the last 15 minutes.
Percentage of swap used Type the threshold percentage of used swap
space.
Received packets per second Type the threshold number of packets
received per second.
Transmitted packets per second Type the threshold number of packets
transmitted per second.
Received bytes per second Type the threshold number of bytes received
per second.
Transmitted bytes per second Type the threshold number of bytes
transmitted per second.
Receive errors Type the threshold number of corrupted
packets received per second.
Transmit errors Type the threshold number of corrupted
packets transmitted per second.
Packet collisions Type the threshold number of collisions that
occur per second while transmitting packets.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Global System Notifications icon.
4. Enter values for each parameter that you want to configure.
5. For each parameter, select Enabled and Respond if value is and then select
one of the following options:
Option Description
Greater Than An alert occurs if the parameter value
exceeds the configured value.
Less Than An alert occurs if the parameter value is less
than the configured value.
Index management
The Index Management feature allows you to control database indexing on event
properties.
Indexing event properties allows you to optimize your searches. You can enable
indexing on any property that is listed in the Index Management window and you
can enable indexing on more than one property.
To enable payload indexing, you must enable indexing on the Quick Filter
property. For more information on payload indexing, see the Enable Payload
Indexing for Quick Filtering Technical Note.
Enabling indexes
The Index Management window lists all event properties that can be indexed and
provides statistics for the properties. Toolbar options allow you to enable and
disable indexing on selected event properties.
Procedure
1. On the navigation menu, click System Configuration .
2. Click the Index Management icon.
3. Select one or more properties from the Index Management list.
4. Choose one of the following options:
v Click Enable Index.
v Click Disable Index.
5. Click Save .
6. Click OK .
Results
In lists that include event properties, indexed property names are appended with
the following text: [Indexed] . Examples of such lists include the search parameters
on the Log Activity tab search criteria pages and the Add Filter window.
A reference set is a set of elements that are derived from events that occur on your
network. Examples of elements that are derived from events are IP addresses or
user names.
After you create a reference set, you can create rules to detect log activity that is
associated with the reference set. For example, you can create a rule to detect when
an unauthorized user attempts to access your network resources. You can also
configure a rule to add an element to a reference set when log activity matches the
rule conditions. For example, you can create a rule to detect when an employee
accesses a prohibited website and add that employee's IP address to a reference
set. For more information on configuring rules, see the Users Guide for your
product.
After you create a reference set, the reference set is listed on the Reference Set
Management window. In the Rule wizard, this reference set is listed as an option
on the Rule Response page. After you configure one or more rules to send
elements to this reference set, the Number of Elements, Associated Rules, and
Capacity parameters are automatically updated.
Procedure
1. On the Reference Set Management window, click New.
2. Configure the parameters:
Table 29. Reference Set parameters
Parameter Description
Name A unique name for this reference set.
Type You cannot edit the Type parameter after
you create a reference set.
Time to Live of Elements The amount of time that you want to
maintain each element in the reference set.
3. Click Create.
When you delete reference sets, a confirmation window indicates whether the
reference sets that you want to delete have rules that are associated with them.
After you delete a reference set, the Add to Reference Set configuration is cleared
from the associated rules.
Tip: Before you delete a reference set, you can view associated rules in the
Reference tab.
Procedure
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. To view contents, click the Content tab.
Tip: Use the Quick Search field to filter for specific elements. All elements that
match the keyword are listed in the Content list. Then, you can select the
action from the toolbar.
Table 30. Content tab parameters
Parameter Description
Value The value of the element.
Tip: Use the Quick Search field to filter for specific elements. All elements that
match the keyword are listed in the Content list. Then, you can select the
action from the toolbar.
5. To view or edit an associated rule, double-click the rule in the References list.
In the Rule wizard, you can edit the rule configuration settings.
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. Click the Content tab.
4. On the toolbar, click New.
5. Configure the following parameters:
Parameter Description
Value(s) If you want to type multiple values, include
a separator character between each value,
and then specify the separator character in
the Separator Character field.
Separator Character Type the separator character that you used
in the Value(s) field.
6. Click Add.
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. Click the Content tab.
Ensure that the CSV or text file that you want to import is stored on your local
desktop.
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. Click the Content tab.
4. On the toolbar, click Import.
5. Click Browse.
6. Select the CSV or text file that you want to import.
7. Click Import.
Procedure
1. On the Reference Set Management window, select a reference set.
2. Click View Contents.
3. Click the Content tab.
4. On the toolbar, click Export.
5. Choose one of the following options:
6. If you want to open the list for immediate viewing, select the Open with
option and select an application from the list box.
7. If you want to save the list, select the Save File option.
8. Click OK.
The CSV file must follow the format in the examples reference data collections. The
# symbol in the first column indicates a comment line. The first non-comment line
is the column header and identifies the column name (ie., key1, key2, data). Then
each non-commented line that follows is a data record that is added to the map.
Keys are alphanumeric strings.
Procedure
1. Using SSH, log in to QRadar as the root user.
2. Go to the /opt/qradar/bin directory.
3. To create the reference data collection, type the following command:
./ReferenceDataUtil.sh create name count [MAP | MAPOFSETS | MAPOFMAPS |
REFTABLE] [ALN | NUM | IP | PORT | ALNIC | DATE] [TIMEOUT_TYPE]
[TIMETOLIVE]
4. To populate the map with data from an external file, type the following
command:
./ReferenceDataUtil.sh load name filename [-encoding=...] [-sdf=" ... "]
What to do next
Log in to the user interface to create rules that add data to your reference data
collections. You can also create rule tests that detect activity from elements that are
in your reference data collection. For more information about creating rules and
rule tests, see the Users Guide for your product.
create
Creates a reference data collection.
update
Updates a reference data collection.
name
The name of the reference data collection.
[-TIMEOUTTYPE=[FIRST_SEEN | LAST_SEEN]]
Specifies whether the amount of time the data elements remain in the reference
data collection is from the time the element was first seen or last seen.
[-timeToLive='']
The amount of time the data elements remain in the reference data collection.
[-keyType=name:elementType,name:elementType,...]
A mandatory REFTABLE parameter of consisting of key name to elementType
pairs.
[-key1Label='']
An optional label for key1.
[-valueLabel='']
An optional label for the values of the collection.
add
Adds a data element to a reference data collection
delete
Deletes an element from a reference data collection.
name
The name of the reference data collection.
<value> <key1> [key2]
The key value pair that you want to delete. MAP and MAPOFSETS require
Key 1. MAPOFMAPS and REFTABLE require Key 1 and Key 2. Keys are
alphanumeric strings.
[-sdf=" ... "]
The Simple Date Format string that is used to parse the date data.
remove
Removes a reference data collection.
name
The name of the reference data collection.
purge
Purges all elements from a reference data collection.
name
The name of the reference data collection.
list
Lists elements in a reference data collection.
name
The name of the reference data collection.
[displayContents]
Lists all elements in the specified reference data collection.
listall
Lists all elements in all reference data collection.
[displayContents]
Lists all elements in all reference data collections.
load
Populates a reference data collections with data from an external CSV file.
name
The name of the reference data collection.
You can use the backup and recovery feature to back up your event data; however,
you must restore event data manually. For assistance in restoring your event data,
see the Restoring Your Data Technical Note.
You can use two types of backups; configuration backups and data backups.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Backup and Recovery.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery icon.
4. In the Upload Archive field, click Browse.
5. Locate and select the archive file that you want to upload. The archive file must
include a .tgz extension.
6. Click Open.
7. Click Upload.
If a backup file is deleted, it is removed from the disk and from the database. Also,
the entry is removed from this list and an audit event is generated to indicate the
removal.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Backup and Recovery.
4. In the Existing Backups section, select the archive that you want to delete.
5. Click Delete.
By default, the nightly backup process includes only your configuration files. You
can customize your nightly backup process to include data from your Console and
selected managed hosts. You can also customize your backup retention period,
backup archive location, the time limit for a backup to process before timing out,
and the backup priority in relation to other QRadar processes.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery.
4. On the toolbar, click Configure.
You initiate an on-demand backup archive during a period when QRadar has low
processing load, such as after normal office hours. During the backup process,
system performance is affected.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click Backup and Recovery.
4. From the toolbar, click On Demand Backup.
5. Enter values for the following parameters:
Option Description
Name Type a unique name that you want to assign
to this backup archive. The name can be up
to 100 alphanumeric characters in length.
The name can contain following characters:
underscore (_), dash (-), or period (.).
Description Type a description for this configuration
backup archive. The description can be up to
255 characters in length.
During the restore process, the following steps are taken on the Console:
1. Existing files and database tables are backed up.
2. Tomcat is shut down.
3. All system processes are shut down.
4. Files are extracted from the backup archive and restored to disk.
5. Database tables are restored.
6. All system processes are restarted.
7. Tomcat restarts.
You can restart the Console only after the restore process is complete.
The restore process can take up to several hours; the process time depends on the
size of the backup archive that must be restored. When complete, a confirmation
message is displayed.
A window provides the status of the restore process. This window provides any
errors for each host and instructions for resolving the errors.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery.
4. Select the archive that you want to restore.
5. Click Restore.
6. On the Restore a Backup window, configure the parameters.
7. Click Restore.
8. Click OK.
9. Click OK.
10. Choose one of the following options:
v If the user interface was closed during the restore process, open a web
browser and log in to QRadar.
v If the user interface was not closed, the login window is displayed. Log in
to QRadar.
11. Follow the instructions on the status window.
What to do next
After you verify that your data is restored to your system, you must reapply RPMs
for any DSMs, vulnerability assessment (VA) scanners, or log source protocols.
If the backup archive originated on an HA cluster, you must click Deploy Changes
to restore the HA cluster configuration after the restore is complete. If disk
replication is enabled, the secondary host immediately synchronizes data after the
system is restored. If the secondary host was removed from the deployment after a
backup, the secondary host displays a failed status on the System and License
Management window.
You can restart the Console only after the restore process is complete.
The restore process can take up to several hours; the process time depends on the
size of the backup archive that must be restored. When complete, a confirmation
message is displayed.
Chapter 8. Manage backup and recovery 97
A window provides the status of the restore process. This window provides any
errors for each host and instructions for resolving the errors.
You must stop the iptables service on each managed host in your deployment. The
Iptables service is a Linux based firewall.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Backup and Recovery.
4. Select the archive that you want to restore.
What to do next
After you verify that your data is restored to your system, you must reapply RPMs
for any DSMs, vulnerability assessment (VA) scanners, or log source protocols.
If the backup archive originated on an HA cluster, you must click Deploy Changes
to restore the HA cluster configuration after the restore is complete. If disk
replication is enabled, the secondary host immediately synchronizes data after the
system is restored. If the secondary host was removed from the deployment after a
backup, the secondary host displays a failed status on the System and License
Management window.
Restoring data
You can restore the data on your QRadar Console and managed hosts from backup
files. The data portion of the backup files includes information about all offenses,
including source and destination IP address information, asset data, event category
information, vulnerability data, event data, and flow data.
Each managed host in your deployment, including the QRadar Console, creates all
backup files in the /store/backup/ directory. Your system might include a
/store/backup mount from an external SAN or NAS service. External services
provide long term, offline retention of data, which is commonly required for
compliancy regulations, such as PCI.
Procedure
1. Using SSH, log in to QRadar SIEM as the root user.
2. Go to the /store/backup directory.
3. To list the backup files, type ls -l
4. If backup files are listed, go to the root directory by typing cd /
Important: The restored files must be in the /store directory. If you type cd
instead of cd /, the files are restored to the /root/store directory.
5. To extract the backup files to their original directory, type the following
command:
tar -zxpvPf /store/backup/backup.<name>.<hostname_hostID>
.<target date>.<backup type>.<timestamp>.tgz
Table 36. Description of file name variables
File name variable Description
hostname_hostID The name of the QRadar system that hosts the backup
file followed by the identifier for the QRadar system
target date The date that the backup file was created. The format
of the target date is <day>_<month>_<year>
backup type The options are data or config
timestamp The time that the backup file was created.
Results
Daily backup of data captures all data on each host. If you want to restore data on
a managed host that contains only event or flow data, only that data is restored to
that host.
Procedure
1. To verify that the files are restored, review the contents of one of the restored
directories by typing the following command:
cd /store/ariel/flows/payloads/<yyyy/mm/dd>
What to do next
After you verified that your data is restored, you must reapply RPMs for any
DSMs, vulnerability assessment (VA) scanners, and log source protocols.
The deployment editor requires Java™ Runtime Environment (JRE). You can
download Java 1.6 or 1.7 from the Java website (www.java.com). If you are using
the Mozilla Firefox web browser, you must configure your browser to accept Java
Network Language Protocol (JNLP) files.
Many web browsers that use the Microsoft Internet Explorer engine, such as
Maxthon, install components that might be incompatible with the Admin tab. You
might be required to disable any web browsers that are installed on your system.
To access the deployment editor from behind a proxy server or firewall, you must
configure the appropriate proxy settings on your desktop. The s software can then
automatically detect the proxy settings from your browser.
To configure the proxy settings, open the Java configuration in your Control Pane
and configure the IP address of your proxy server. For more information, see the
Microsoft documentation.
You can access the deployment editor by using the Admin tab. You can use the
deployment editor to create your deployment, assign connections, and configure
each component.
After you update your configuration settings by using the deployment editor, you
must save those changes to the staging area. You must manually deploy all
changes by using the Admin tab menu option. All deployed changes are then
enforced throughout your deployment.
System View
Use the System View page to assign software component to managed hosts in your
deployment. The System View page includes all managed hosts in your
deployment. A managed host is a system in your deployment that has QRadar
software that is installed.
By default, the System View page also includes the following components:
On the System View page, the left pane provides a list of managed hosts, which
you can view and configure. The deployment editor polls your deployment for
updates to managed hosts. If the deployment editor detects a change to a managed
host in your deployment, a message is displayed notifying you of the change. For
example, if you remove a managed host, a message is displayed, indicating that
the assigned components to that host must be reassigned to another host.
Also, if you add a managed host to your deployment, the deployment editor
displays a message that indicates that the managed host was added.
Event View
On the Event View page, the left pane provides a list of components you can add
to the view. The right pane provides a view of your deployment.
Vulnerability View
Use the Vulnerability View page to create a view of your IBM Security QRadar
Vulnerability Manager components. You must install IBM Security QRadar
Vulnerability Manager to see this view. For more information, see the IBM Security
QRadar Vulnerability Manager User Guide
Procedure
1. Select File > Edit Preferences.
2. To configure the Presence Poll Frequencyparameter, type how often, in
milliseconds, you that want the managed host to monitor your deployment for
updates.
3. To configure the Zoom Incrementparameter, type the increment value when the
zoom option is selected.
For example, 0.1 indicates 10%.
Procedure
1. Build your Event View.
2. Build your System View.
3. Configure components.
4. To stage your deployment, from the deployment editor menu, click File > Save
to Staging
5. To deploy all configuration changes, on the Admin tab, click Advanced >
Deploy Changes
QRadar components
QRadar deployments consist of multiple components.
Event Collector
Collects security events from various types of security devices, which are known as
log sources, in your network.
The Event Collector gathers events from local and remote log sources. The Event
Collector then normalizes the events and sends the information to the Event
Processor. The Event Collector also bundles all identical events to conserve system
usage.
The Event Processor on the QRadar Console is always connected to the Magistrate.
This connection cannot be deleted.
Off-site Target
Indicates an off-site device that receives event or flow data. An off-site target can
receive data only from an Event Collector.
Magistrate
When processed, the Magistrate produces a list for each source, providing you
with a list of attackers and their response for each event. After the Magistrate
establishes the magnitude, the Magistrate then provides multiple options for
resolution.
Adding components
When you configure your deployment, you must use the Event View page in the
deployment editor to add your components.
You can add the following QRadar components to your Event View page:
v Event Collector
v Event Processor
v Off-site source
v Off-site target
Procedure
1. On the Admin tab, click Deployment Editor.
Connecting components
After you add all the necessary components in your Event View page, you must
connect them.
Use the Event View page to connect components together. Some restrictions are
enforced. For example, you can connect an Event Collector to an Event Processor,
but not a Magistrate component.
The following table describes the components that you can connect.
Table 37. Description of supported component connections
Source connection Target connection Description
Event Collector Event Processor An Event Collector can be connected
only to one Event Processor.
Procedure
1. In the Event View page, select the component for which you want to establish a
connection.
2. Click Actions > Add Connection.
An arrow is displayed in your map. The arrow represents a connection between
two components.
3. Drag the end of the arrow to the component you want to establish a connection
to.
4. Click Save.
5. Repeat these steps for all remaining components that require connections.
You can add the following components to your Event View page:
v An Off-site Source is an off-site Event Collector from which you want to
receive event data.
Example:
If you want to disconnect the off-site source, you must remove the connections
from both deployments. From deployment A, remove the off-site target and in
deployment B, remove the off-site source.
If the off-site source or target is an all-in-one system, the public key is not
automatically generated, therefore, you must manually generate the public key. For
more information about generating public keys, see your Linux documentation.
If you update your Event Collector configuration or the monitoring ports, you
must manually update your source and target configurations to maintain the
connection between deployments.
Procedure
1. On the Admin tab, click Deployment Editor.
2. In the Event Components pane, select Off-site Source or Off-site Target.
3. Type a unique name for the off-site source or off-site target. The name can be
up to 20 characters in length and might include underscores or hyphens. Click
Next.
4. Enter values for the parameters and click Finish.
The host name for the Enter a name for the off-site hostfield can contain a
maximum of 20 characters and can include underscores or hyphens characters.
If you select the Encrypt traffic from off-site source the check box, you must
also select the encryption check box on the associated off-site source and target.
5. Repeat for all remaining off-site sources and targets.
6. From the deployment editor menu, click File > Save to staging.
7. On the Admin tab menu, select Advanced > Deploy Full Configuration.
Renaming components
You must rename a component in your view to uniquely identify components
through your deployment.
Procedure
1. In the Event Components pane, select the component that you want to rename.
2. Click Actions > Rename Component.
3. Type a new name for the component.
The name must be alphanumeric with no special characters.
4. Click OK.
Encryption
Encryption provides greater security for all traffic between managed hosts. To
provide enhanced security, QRadar also provides integrated support for OpenSSH.
When integrated with QRadar, OpenSSH provides secure communication between
components.
When you enable encryption on a managed host, the encryption SSH tunnel is
created on the client host. For example, the connection between the Event
Processor and Event Collector and the connection between the Event Processor and
Magistrate are encrypted. When you enable encryption on the QRadar Console, an
encryption tunnel is used when your search events by using the Offenses tab.
If you want to enable Network Address Translation (NAT) for a managed host, the
network must use static NAT translation. For more information, see “NAT
management” on page 116.
Procedure
1. Click Actions > Add a Managed Host.
2. Click Next.
3. Enter values for the parameters.
Use the following table to help you configure the parameters.
Table 38. Parameters for the managed host
Header Header
Host is NATed Select the check box to use an existing
Network Address Translation (NAT) on this
managed host.
Enable Encryption Select the check box to create an SSH
encryption tunnel for the host.
Select the check box to enable data
compression between two managed hosts.
4. If you selected the Host is NATed check box, configure the parameters.
Table 39. Parameters for a NAT-enabled network
Parameter Description
Enter public IP of the server or appliance The managed host uses this IP address to
to add communicate with other managed hosts in
different networks by using NAT.
Select NATed network If the managed host is on the same subnet
as the Console, select the Console of the
NAT-enabled network .
5. Click Next.
6. Click Finish.
7. Deploy your changes.
Related concepts:
If you want to enable Network Address Translation (NAT) for a managed host, the
network must use static NAT translation. For more information, see “NAT
management” on page 116.
Procedure
1. Click the System View tab.
2. Right-click the managed host that you want to edit and select Edit Managed
Host.
This option is available only when the selected component has a managed host
that is running a compatible version of QRadar.
3. Click Next.
4. Edit the parameter values, as necessary.
Use the following table to help you configure the parameters.
Table 40. Parameters for the managed host
Header Header
Host is NATed Select the check box to use an existing
Network Address Translation (NAT) on this
managed host.
Enable Encryption Select the check box to create an SSH
encryption tunnel for the host.
Select the check box to enable data
compression between two managed hosts.
5. If you selected the Host is NATed check box, configure the parameters.
Table 41. Parameters for a NAT-enabled network
Parameter Description
Enter public IP of the server or appliance The managed host uses this IP address to
to add communicate with other managed hosts in
different networks by using NAT.
Select NATed network If the managed host is on the same subnet
as the Console, select the Console of the
NAT-enabled network .
6. Click Next.
7. Click Finish.
Tip: The Remove host option is available only when the selected component has a
managed host that is running a compatible version of QRadar.
Procedure
1. Click the System View tab.
2. Right-click the managed host that you want to delete and select Remove host.
3. Click OK.
4. On the Admin tab menu, clickAdvanced > Deploy Full Configuration.
Procedure
1. From the System View page, right-click the managed host that you want to
configure and click Configure.
2. Enter values for the parameters:
In the Ports to exclude field, use a comma to separate multiple ports
3. Click Save.
Tip: The list box displays only the managed hosts that are running a compatible
version of QRadar.
Procedure
1. Click the System View tab.
2. From the Managed Host list, select the managed host that you want to assign a
QRadar component to.
3. Select the component that you want to assign to a managed host.
4. From the menu, select Actions > Assign.
5. From the Select a host list box, select the host that you want to assign to this
component. Click Next.
6. Click Finish.
The Host Context component monitors all QRadar components to make sure that
each component is operating as expected.
Procedure
1. In the deployment editor, click the System View tab.
2. Select the managed host that includes the host context you want to configure.
6. Click Save .
Configuring an accumulator
Use the System View page of the deployment editor to configure the accumulator
component on a managed host.
The accumulator component assists with data collection and anomaly detection for
the Event Processor on a managed host. The accumulator component is responsible
for receiving streams of events from the local Event Processor, writing database
data, and contains the anomaly detection engine (ADE).
Procedure
1. In the deployment editor, click the System View tab.
2. Select the managed host that you want to configure.
3. Select the accumulator component.
4. Click Actions > Configure.
5. Configure the parameters.
6. Click Save.
NAT management
Use the deployment editor to manage NAT-enabled deployments.
You can add a non-NAT-enabled managed host by using inbound NAT for a public
IP address. You can also use a dynamic IP address for outbound NAT. However,
both must be on the same switch as the Console or managed host. You must
configure the managed host to use the same IP address for the public and private
IP addresses.
When you add or edit a managed host, you can enable NAT for that managed
host. You can also use the deployment editor to manage your NAT-enabled
networks.
Ensure that you set up your NAT-enabled networks by using static NAT
translation. This setup ensures that communications between managed hosts that
exist within different NAT-enabled networks.
Procedure
1. In the deployment editor, click the NATed Networks icon.
2. Select the NAT-enabled network that you want to edit, and click Edit.
3. Type a new name for of the NAT-enabled network and click OK.
The Manage NATed Networks window shows the updated NAT-enabled
networks.
4. Click OK.
5. Click Yes.
Procedure
1. In the deployment editor, click the NATed Networks icon.
2. Select the NAT-enabled network you want to delete.
3. Click Delete.
4. Click OK.
5. Click Yes.
If you want to enable NAT for a managed host, the NAT-enabled network must be
using static NAT translation.
To change your NAT status for a managed host, make sure you update the
managed host configuration within QRadar before you update the device.
Updating the configuration first prevents the host from becoming unreachable and
you can deploy changes to that host.
Procedure
1. In the deployment editor, click the System View tab.
Important: When you change the NAT status for an existing managed host,
error messages might be displayed. Ignore these error messages.
5. If you enabled NAT, select a NAT-enabled network, and enter values for the
parameters:
Table 44.
Parameter Description
Change public IP of the server or appliance The managed host uses this IP address to
to add communicate with another managed host
that belongs to a different network by using
NAT.
Select NATed network Update the NAT-enabled network
configuration.
Manage NATs List - Network address translation (NAT)
translates an IP address in one network to a
different IP address in another network.
NAT provides increased security for your
deployment since requests are managed
through the translation process and hides
internal IP addresses.
6. Click Next.
7. Click Finish.
8. Update the configuration for the device (firewall) to which the managed host is
communicating.
9. On the Admin tab menu, click Advanced > Deploy Full Configuration.
Component configuration
Use the deployment editor to configure each component in your deployment.
Procedure
1. From either the Event View or System View page, select the Event Collector
that you want to configure.
2. Click Actions > Configure.
3. Enter values for the following parameters:
6. Click Save.
7. Repeat for all Event Collectors in your deployment you want to configure.
Related concepts:
“QRadar components” on page 105
QRadar deployments consist of multiple components.
Procedure
1. From either the Event View or System View page, select the Event Processor
that you want to configure.
2. Click Actions > Configure.
3. Enter values for the parameters:
6. Click Save.
Procedure
1. From either the Event View or System View page, select the Magistrate that
you want to configure.
2. Click Actions > Configure.
3. On the toolbar, click Advanced to display the advanced parameters.
4. In the Overflow Routing Threshold field, type the events per second threshold
that the Magistrate can manage events.
Events over this threshold are placed in the cache.
The default is 20,000.
5. Click Save.
Related concepts:
“QRadar components” on page 105
QRadar deployments consist of multiple components.
To prevent connection errors, when you configure off-site source and target
components, deploy the QRadar Console with the off-site source first. Then deploy
the QRadar Console with the off-site target.
Procedure
1. From either the Event View or System View page, select the Event Collector
that you want to configure.
2. Click Actions > Configure.
3. Enter the parameter values.
Parameter Description
Receive Events True enables the system to receive events
from the off-site source host.
4. Click Save.
5. Repeat for all off-site sources in your deployment you want to configure.
Related concepts:
“QRadar components” on page 105
QRadar deployments consist of multiple components.
To prevent connection errors, when you configure off-site source and target
components, deploy the QRadar Console with the off-site source first. Then, deploy
the QRadar Console with the off-site target.
Procedure
1. From either the Event View or System View page, select the Event Collector
that you want to configure.
2. Click Actions > Configure.
3. Enter values for the parameters:
Parameter Description
Event Collector Listen Port The Event Collector listen port for receiving
event data.
4. Click Save.
Related concepts:
“QRadar components” on page 105
QRadar deployments consist of multiple components.
Forwarding Destinations
You can forward raw event data that is received from log sources to one or more
vendor systems. In the user interface, these vendor systems are called forwarding
destinations. You can also forward normalized data to other QRadar systems.
QRadar ensures that all forwarded data is unaltered.
For example, you can configure all data from a specific event collector to forward
to a specific ticketing system. You can also choose from various routing options
such as removing the data that matches a routing rule and thereby bypassing
correlation.
Procedure
1. Click the Admin tab.
2. In the navigation pane, click System Configuration.
3. Click the Forwarding Destinations icon.
4. On the toolbar, click Add.
5. In the Forwarding Destinations window, enter values for the parameters.
The following table describes some of the Forwarding Destinations parameters.
Table 48. Forwarding Destinations parameters
Parameter Description
Event Format v Payload is the data in the format that the log source sent.
v Normalized is raw data that is parsed and prepared as readable
information for the user interface.
Destination The IP address or host name of the vendor system that you want to
Address forward data to.
6. Click Save.
Procedure
1. Click the Admin tab.
2. In the navigation pane, click System Configuration.
3. Click the Forwarding Destinations icon.
Statistics for the data sent to each forwarding destination is displayed. For
example, you can see the following information:
v The total number events that were seen for this forwarding destination.
v The number of events that were sent to this forwarding destination.
v The number of events that were dropped before the forwarding destination
was reached.
4. On the toolbar, click an action, as described in the following table.
Table 49. Description of the Forwarding Destination toolbar actions
Action Description
Reset Counters Resets the counters for the Seen, Sent, and
Dropped parameters to zero, and the
counters start accumulating again.
Tip: You can reset the counters to provide a
more targeted view of the performance of
your forwarding destinations.
Edit Changes the configured name, format, IP
address, port, or protocol.
You can configure routing rules to forward data in either online or offline mode:
v In Online mode, your data remains current because forwarding is performed in
real time. If the forwarding destination becomes unreachable, data can
potentially be lost.
v In Offline mode, all data is stored in the database and then sent to the
forwarding destination. This assures that no data is lost, however, there might be
delays in data forwarding.
Procedure
1. Click the Admin tab.
2. In the navigation pane, click System Configuration.
3. Click the Routing Rules icon.
4. On the toolbar, click Add.
5. In the Routing Rules window, enter values for the parameters.
a. Type a name and description for your routing rule.
b. From the Mode field, select one of the following options: Online or Offline.
c. From the Forwarding Event Collector or Forwarding Event Processor list,
select the event collector from which you want to forward data.
Restriction: If you select this check box, you cannot add a filter.
e. To add a filter, in the Event Filters section, select a filter from the first list
and an operand from the second list.
f. In the text box, type the value that you want to filter for, and then click Add
Filter.
g. Repeat the previous two steps for each filter that you want to add.
h. To forward log data that matches the current filters, select the Forward
check box, and then select the check box for each preferred forwarding
destination.
Restriction: If you select the Forward check box, you can also select either
the Drop or Bypass Correlation check boxes, but not both of them.
If you want to edit, add, or delete a forwarding destination, click the
Manage Destinations link.
6. Click Save.
Use the Event Routing Rules window to edit, enable, disable, or delete a rule. You
can edit a routing rule to change the configured name, Event Collector, filters, or
routing options.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Routing Rules icon.
4. Select the routing rule you want to manage.
5. To edit the routing rule, on the toolbar, click Edit and update the parameters.
6. To remove the routing rule, on the toolbar, click Delete.
7. To enable or disable the routing rule, on the toolbar, click Enable/Disable.
If you enable a routing rule that is configured to drop events, a confirmation
message is displayed.
The criteria that determines the event data that is sent to a forwarding destination
is based on the tests and building blocks that are included in the rule. When the
rule is configured and enabled, all event data that matches the rule tests are
automatically sent to the specified forwarding destinations. For more information
Procedure
1. Click the tab.
2. From the Rules menu, select Rules.
3. Edit or add a rule. On the Rule Response page in the Rule wizard, ensure that
you select the Send to Forwarding Destinations option.
The Store and Forward feature is supported on the Event Collector 1501 and Event
Collector 1590. For more information about these appliances, see the QRadar
Hardware Guide.
A dedicated Event Collector does not process events and it does not include an
on-board Event Processor. By default, a dedicated Event Collector continuously
forwards events to an Event Processor that you must connect by using the
Deployment Editor. Use the Store and Forward feature to schedule a time range
for when you want the Event Collector to forward events. During the time when
events are not forwarding, the events are stored locally on the appliance. The
events are not accessible in the QRadar Console user interface.
Use the scheduling feature to store events during your business hours. Forward
the events to an Event Processor when the transmission does not negatively affect
your network bandwidth. For example, you can configure an Event Collector to
forward events to an Event Processor during non-business hours.
You must create a schedule. By default, the first time that you access the Store and
Forward window, no schedules are listed.
You can use options on the toolbar and the Display list box to change your view
of the schedule list. Change your view of the list to focus on the statistics from
various points of view. For example, if you want to view the statistics for a
particular Event Collector, you can select Event Collectors from the Display list.
The list then groups by the Event Collector column and makes it easier for you to
locate the Event Collector that you want to investigate.
By default, the Store and Forward list is configured to display the list that is
organized by the schedule (Display > Schedules).
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Store and Forward icon.
4. In the Store and Forward window, view the parameters for each schedule.
You can create and manage multiple schedules to control event forwarding from
multiple Event Collectors in a geographically distributed deployment.
Ensure that your dedicated Event Collector is added to your deployment and
connected to an Event Processor. The connection between an Event Collectorand an
Event Processor is configured in the Deployment Editor.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Store and Forward icon.
4. Click Actions > Create.
a. Click Next to move to the Select Collectors page.
b. On the Select Collectors page, configure the parameters.
If the Event Collector that you want to configure is not listed, it might not
be added to your deployment. If so, use the Deployment Editor to add the
Event Collector and then proceed.
c. On the Schedule Options page, configure the parameters.
To configure the forward transfer rate, the minimum transfer rate is 0. The
maximum transfer rate is 9,999,999. A value of 0 means that the transfer rate
is unlimited.
d. Finish the configuration.
You can now view the schedule in the Store and Forward window. After
you create a new schedule, it might take up to 10 minutes for statistics to
start displaying in the Store and Forward window.
Related concepts:
“Event view management” on page 105
Use the Event View page to create and manage the components for your
deployment.
Chapter 9, “Deployment editor,” on page 103
Use the deployment editor to manage the individual components of your QRadar.
After you configure your deployment, you can access and configure the individual
components of each managed host in your deployment.
Procedure
1. Click the Admin tab.
2. On the navigation menu, click System Configuration.
3. Click the Store and Forward icon.
4. Select the schedule that you want to edit.
5. Click Actions > Edit.
You can also double-click a schedule for editing.
6. Click Next to move to the Select Collectors page.
7. On the Select Collectors page, edit the parameters.
8. Click Next to move to the Schedule Options page.
9. On the Schedule Options page, edit the scheduling parameters.
10. Click Next to move to the Summary page.
11. On the Summary page, confirm the options that you edited for this schedule.
After you edit a schedule, it might take up to 10 minutes for statistics to
update in the Store and Forward window.
Procedure
1. On the navigation menu, click System Configuration .
2. Click the Store and Forward icon.
3. Select the schedule that you want to delete.
4. Click Actions > Delete.
After the schedule is deleted, the associated Event Collectors resume
continuous forwarding of events to their assigned Event Processor.
Any information from the event payload, such as user name, card number, or host
name fields can be obfuscated. Use data obfuscation to help meet regulatory
commission requirements and corporate privacy policies.
Data obfuscation occurs at the event level in your QRadar deployment. As events
are provided to the appliances in your deployment, the raw event is processed and
normalized. The obfuscation process evaluates the obfuscation expression and
verifies that the raw event and normalized event contain the data that is required
The obfuscated data from the event pipeline is written in the obfuscated format to
the Ariel database. Unauthorized users that attempt to query the database directly
cannot view sensitive data without the public and private decryption key.
The obfuscation process requires that you create a public and private key for your
Console. The public key remains on the Console and the private key must be
stored in a secure location. The private key contains the decryption key that is
required for administrators to view the unobfuscated data.
Data obfuscation encrypts new events as they are received by QRadar. Events in
the /store directory prior to enabling data obfuscation will remain in their current
state.
Any log source extensions that change the format of the event payload can cause
issues with data obfuscation.
User names and host name data that are part of the asset profile before your
upgrade to QRadar 7.2 might not display obfuscated data as expected. To
obfuscate asset profile data, you can use the Delete Listed option from the Assets
tab, which removes the unobfuscated hosts and user names. You can then run
vulnerability scans and wait for the asset data to repopulate. After a few days you
can run the Server Discovery tool to repopulate the data for building blocks on
your system.
Example: The following command writes the private key in PKCS #8 format
and uses PEM input format. The private key is output in PEM format, is
named mykey.pem, and uses an unencrypted format.
openssl pkcs8 -topk8 -inform PEM -outform PEM -in mykey.pem -out
private_key.pem -nocrypt
4. To generate the RSA public key, type the following command:
openssl rsa [-in filename] [-pubout] [-outform DER] [-out filename]
The following table describes the command options
Table 54. Command options for generating the public key
Option Description
[-in filename] Specifies the input file name
obfuscation_updater.sh -k public_key.der
Restriction: Only one public key can be installed for each system. After you
install a public key, the key cannot be overwritten.
After you install the public key on your QRadar Console, the QRadar Console
ensures that the managed hosts obfuscate the data to match your obfuscation
expression patterns.
What to do next
To avoid unauthorized access to the obfuscated data, remove the private key file
from your system. Store it in a secure location and create a backup of the private
key. Follow local regulations for storage of the private key.
Restriction: Events that are in the /store directory before you enable data
obfuscation remain in their current state.
Any log source extensions that change the format of the event payload can cause
issues with data .
Procedure
1. Using SSH, log in to your QRadar Console as the root user:
2. To configure data obfuscation, type the following command:
You can run the obfuscation_updater.sh script from any directory on your
QRadar Console.
<expression name="VMwarehosts">
<regex>ruser=(\S+)</regex>
<deviceTypeId>-1</deviceTypeId>
<deviceId>-1</deviceId>
<qidId>-1</qidId>
<category>-1</category>
<enabled>false</enabled>
</expression>
</ObfuscationExpressions>
3. The following example shows the regular expressions that can parse user
names.
Table 56. Example regex patterns that can parse user names.
Example regex patterns Matches
You can view the audit logs to monitor changes to QRadar and the users who
change settings.
All audit logs are stored in plain text and are archived and compressed when the
audit log file reaches 200 MB. The current log file is named audit.log. When the
file reaches 200 MB, the file is compressed and renamed to audit.1.gz,
audit.2.gz. The file number increments each time that a log file is archived.
QRadar stores up to 50 archived log files.
You can use Log Activity tab to view normalized audit log events.
The maximum size of any audit message, excluding date, time, and host name, is
1024 characters.
Each entry in the log file displays by using the following format:
Logged actions
Understand the content of QRadar audit log file int the /var/log/auditdirectory.
The audit log file contains logged actions.
The following list describes the categories of actions that are in the audit log file:
Administrator Authentication
v Log in to the Administration Console
v Log out of the Administration Console.
Assets
v Delete an asset.
v Delete all assets.
Audit Log Access
A search that includes events that have a high-level event category of
Audit.
Backup and Recovery
v Edit the configuration.
v Initiate the backup.
v Complete the backup.
v Fail the backup.
v Delete the backup.
v Synchronize the backup.
v Cancel the backup.
v Initiate the restore.
v Upload a backup.
v Upload an invalid backup.
v Initiate the restore.
v Purge the backup.
Custom Properties
v Add a custom event property.
v Edit a custom event property.
v Delete a custom event property.
Chart Configuration
Save flow or event chart configuration.
Custom Property Expressions
v Add a custom event property expression.
v Edit a custom event property expression.
Events that occur on your network are aggregated into high-level and low-level
categories. Each high-level category contains low-level categories and an associated
severity level. You can review the severity levels that are assigned to events and
adjust them to suit your corporate policy needs.
Categorizing the incoming events ensures that you can easily search the data..
Recon
The Recon category contains events that are related to scanning and other
techniques that are used to identify network resources.
The following table describes the low-level event categories and associated severity
levels for the Recon category.
Table 60. Low-level categories and severity levels for the Recon events category
Low-level event category Description Severity level (0 - 10)
Unknown Form of Recon An unknown form of 2
reconnaissance.
Application Query Reconnaissance to 3
applications on your system.
Host Query Reconnaissance to a host in 3
your network.
Network Sweep Reconnaissance on your 4
network.
Mail Reconnaissance Reconnaissance on your mail 3
system.
Windows Reconnaissance Reconnaissance for Windows 3
operating system.
Portmap / RPC r\Request Reconnaissance on your 3
portmap or RPC request.
Host Port Scan Indicates that a scan 4
occurred on the host ports.
DoS
The DoS category contains events that are related to denial-of-service (DoS) attacks
against services or hosts.
The following table describes the low-level event categories and associated severity
levels for the DoS category.
Table 61. Low-level categories and severity levels for the DoS events category
Low-level event category Description Severity level (0 - 10)
Unknown DoS Attack Indicates an unknown DoS 8
attack.
ICMP DoS Indicates an ICMP DoS 9
attack.
TCP DoS Indicates a TCP DoS attack. 9
UDP DoS Indicates a UDP DoS attack. 9
DNS Service DoS Indicates a DNS service DoS 8
attack.
Authentication
The authentication category contains events that are related to authentication,
sessions, and access controls that monitor users on the network.
The following table describes the low-level event categories and associated severity
levels for the authentication category.
Table 62. Low-level categories and severity levels for the authentication events category
Low-level event category Description Severity level (0 - 10)
Unknown Authentication Indicates unknown 1
authentication.
Host Login Succeeded Indicates a successful host 1
login.
Host Login Failed Indicates that the host login 3
failed.
Misc Login Succeeded Indicates that the login 1
sequence succeeded.
Misc Login Failed Indicates that login sequence 3
failed.
Privilege Escalation Failed Indicates that the privileged 3
escalation failed.
Privilege Escalation Indicates that the privilege 1
Succeeded escalation succeeded.
Mail Service Login Indicates that the mail 1
Succeeded service login succeeded.
Mail Service Login Failed Indicates that the mail 3
service login failed.
Access
The access category contains authentication and access controls that are used for
monitoring network events.
The following table describes the low-level event categories and associated severity
levels for the access category.
Exploit
The exploit category contains events where a communication or an access exploit
occurred.
The following table describes the low-level event categories and associated severity
levels for the exploit category.
Table 64. Low-level categories and severity levels for the exploit events category
Low-level event category Description Severity level (0 - 10)
Unknown Exploit Attack Indicates an unknown 9
exploit attack.
Buffer Overflow Indicates a buffer overflow. 9
Malware
The malicious software (malware) category contains events that are related to
application exploits and buffer overflow attempts.
The following table describes the low-level event categories and associated severity
levels for the malware category.
Table 65. Low-level categories and severity levels for the malware events category
Low-level event category Description Severity level (0 - 10)
Unknown Malware Indicates an unknown virus. 4
Backdoor Detected Indicates that a back door to 9
the system was detected.
Hostile Mail Attachment Indicates a hostile mail 6
attachment.
Malicious Software Indicates a virus. 6
Hostile Software Download Indicates a hostile software 6
download to your network.
Virus Detected Indicates that a virus was 8
detected.
Misc Malware Indicates miscellaneous 4
malicious software
Trojan Detected Indicates that a trojan was 7
detected.
Spyware Detected Indicates that spyware was 6
detected on your system.
Content Scan Indicates that an attempted 3
scan of your content was
detected.
Content Scan Failed Indicates that a scan of your 8
content failed.
Content Scan Successful Indicates that a scan of your 3
content was successful.
Suspicious Activity
The suspicious category contains events that are related to viruses, trojans, back
door attacks, and other forms of hostile software.
The following table describes the low-level event categories and associated severity
levels for the suspicious activity category.
Table 66. Low-level categories and severity levels for the suspicious activity events category
Low-level event category Description Severity level (0 - 10)
Unknown Suspicious Event Indicates an unknown 3
suspicious event.
Suspicious Pattern Detected Indicates that a suspicious 3
pattern was detected.
Content Modified By Indicates that content was 3
Firewall modified by the firewall.
Invalid Command or Data Indicates an invalid 3
command or data.
Suspicious Packet Indicates a suspicious packet. 3
Suspicious Activity Indicates suspicious activity. 3
Suspicious File Name Indicates a suspicious file 3
name.
Suspicious Port Activity Indicates suspicious port 3
activity.
Suspicious Routing Indicates suspicious routing. 3
Potential Web Vulnerability Indicates potential web 3
vulnerability.
Unknown Evasion Event Indicates an unknown 5
evasion event.
IP Spoof Indicates an IP spoof. 5
IP Fragmentation Indicates IP fragmentation. 3
Overlapping IP Fragments Indicates overlapping IP 5
fragments.
IDS Evasion Indicates an IDS evasion. 5
System
The system category contains events that are related to system changes, software
installation, or status messages.
The following table describes the low-level event categories and associated severity
levels for the system category.
Policy
The policy category contains events that are related to administration of network
policy and the monitoring network resources for policy violations.
The following table describes the low-level event categories and associated severity
levels for the policy category.
Table 68. Low-level categories and severity levels for the policy category
Low-level event category Description Severity level (0 - 10)
Unknown Policy Violation Indicates an unknown policy 2
violation.
Unknown
The Unknown category contains events that are not parsed and therefore cannot be
categorized.
The following table describes the low-level event categories and associated severity
levels for the Unknown category.
CRE
The custom rule event (CRE) category contains events that are generated from an
event rule.
The following table describes the low-level event categories and associated severity
levels for the CRE category.
Table 70. Low-level categories and severity levels for the CRE category
Low-level event category Description Severity level (0 - 10)
Unknown CRE Event Indicates an unknown 5
custom rules engine event.
Single Event Rule Match Indicates a single event rule 5
match.
Event Sequence Rule Match Indicates an event sequence 5
rule match.
Potential Exploit
The potential exploit category contains events that are related to potential
application exploits and buffer overflow attempts.
The following table describes the low-level event categories and associated severity
levels for the potential exploit category.
User Defined
The User Defined category contains events that are related to user-defined objects
SIM Audit
The SIM Audit category contains events that are related to user interaction with
the QRadar Console and administrative features.
The following table describes the low-level event categories and associated severity
levels for the SIM Audit category.
Table 73. Low-level categories and severity levels for the SIM Audit category
Low-level event category Description Severity level (0 - 10)
SIM User Authentication Indicates a user login or 5
logout on the Console.
SIM Configuration Change Indicates that a user changed 3
the SIM configuration or
deployment.
SIM User Action Indicates that a user initiated 3
a process, such as starting a
backup or generating a
report, in the SIM module.
Session Created Indicates that a user session 3
was created.
Session Destroyed Indicates that a user session 3
was destroyed.
Admin Session Created Indicates that an admin
session was created.
Admin Session Destroyed Indicates that an admin 3
session was destroyed.
Session Authentication Indicates an invalid session 5
Invalid authentication.
Session Authentication Indicates that a session 3
Expired authentication expired.
Risk Manager Configuration Indicates that a user changed 3
the IBM Security QRadar
Risk Managerconfiguration.
Application
The application category contains events that are related to application activity,
such as email or FTP activity.
Audit
The audit category contains events that are related to audit activity, such as email
or FTP activity.
Control
The control category contains events that are related to your hardware system.
The following table describes the low-level event categories and associated severity
levels for the control category.
Table 76. Low-level categories and severity levels for the control category
Low-level event category Description Severity level (0 - 10)
Device Read Indicates that a device was 1
read.
Device Communication Indicates communication 1
with a device.
Device Audit Indicates that a device audit 1
occurred.
Device Event Indicates that a device event 1
occurred.
Device Ping Indicates that a ping action 1
to a device occurred.
Device Configuration Indicates that a device was 1
configured.
Asset Profiler
The asset profiler category contains events that are related to asset profiles.
The following table describes the low-level event categories and associated severity
levels for the asset profiler category.
Table 77. Low-level categories and severity levels for the asset profiler category
Low-level event category Description Severity level (0 - 10)
Asset Created Indicates that an asset was 1
created.
Asset Updated Indicates that an asset was 1
updated.
Asset Observed Indicates that an asset was 1
observed.
Asset Moved Indicates that an asset was 1
moved.
Asset Deleted Indicates that an asset was 1
deleted.
Asset Hostname Cleaned Indicates that a host name 1
was cleaned.
Asset Hostname Created Indicates that a host name 1
was created.
Asset Hostname Updated Indicates that a host name 1
was updated.
Asset Hostname Observed Indicates that a host name 1
was observed.
Asset Hostname Moved Indicates that a host name 1
was moved.
Asset Hostname Deleted Indicates that a host name 1
was deleted.
Asset Port Cleaned Indicates that a port was 1
cleaned.
Asset Port Created Indicates that a port was 1
created.
Asset Port Updated Indicates that a port was 1
updated.
Asset Port Observed Indicates that a port was 1
observed.
Asset Port Moved Indicates that a port was 1
moved.
Asset Port Deleted Indicates that a port was 1
deleted.
Asset Vuln Instance Cleaned Indicates that a vulnerability 1
instance was cleaned.
For example, you can determine the ports that must be opened for the QRadar
Console to communicate with remote Event Processors.
The listen ports for QRadar are valid only when iptables is enabled on your
QRadar system.
All the ports that are described in following table can be tunneled, by encryption,
through port 22 over SSH. Managed hosts that use encryption can establish
multiple bidirectional SSH sessions to communicate securely. These SSH sessions
are initiated from the managed host to provide data to the host that needs the data
in the deployment. For example, Event Processor appliances can initiate multiple
SSH sessions to the QRadar Console for secure communication. This
communication can include tunneled ports over SSH, such as HTTPS data for port
443 and Ariel query data for port 32006. QRadar QFlow Collectors that use
encryption can initiate SSH sessions to Flow Processor appliances that require data.
QRadar ports
Unless otherwise noted, information about the assigned port number, descriptions,
protocols, and the signaling direction for the port applies to all IBM Security
QRadar products.
The following table lists the ports, protocols, communication direction, description,
and the reason that the port is used.
High-availability
(HA)
25 SMTP TCP From all managed hosts to the Emails from QRadar
SMTP gateway to an SMTP gateway
QRadar managed
hosts that connect to
the QRadar Console
Procedure
1. Using SSH, log in to your QRadar Console, as the root user.
2. To display all active connections and the TCP and UDP ports on which the
computer is listening, type the following command:
netstat -nap
3. To search for specific information from the netstat port list, type the following
command:
netstat -nap | grep port
Examples:
v To display all ports that match 199, type the following command: netstat
-nap | grep 199
v To display all postgres related ports, type the following command: netstat
-nap | grep postgres
v To display information on all listening ports, type the following command:
netstat -nap | grep LISTEN
Important: Random port associations are not static port numbers. If a service is
restarted, the ports that generated for a service are reallocated and the service is
assigned a new set of port numbers.
Procedure
1. Using SSH to log in to the QRadar Console, as the root user.
2. To display a list of associated ports for the IMQ messaging connection, type the
following command:
telnet localhost 7676
3. If no information is displayed, press the Enter key to close the connection.
Glossary 215
Host Context IP Multicast
Monitors all QRadar components to IP Multicast reduces traffic on a network
ensure that each component is operating by delivering a single stream of
as expected. information to multiple users at one time.
IP network
I A group of IP routers that route IP
datagrams. These routers are sometimes
ICMP See Internet Control Message Protocol. referred to as Internet gateways. Users
identity access the IP network from a host. Each
QRadar collects identity information, if network in the Internet includes some
available, from log source messages. combination of hosts and IP routers.
Identity information provides additional IPS See Intrusion Prevention System.
details about assets on your network. Log
sources only generate identity information item A Dashboard option that creates a
if the log message sent to QRadar customized portal that displays any
contains an IP address and at least one of permissible view for monitoring
the following items: user name or MAC purposes.
address. Not all log sources generate
identity information. L
IDS See Intrusion Detection System.
L2L See Local To Local.
Internet Control Message Protocol (ICMP)
L2R See Local To Remote.
An Internet network-layer protocol
between a host and gateway. LAN See Local Area Network.
Internet Protocol (IP) LDAP See Lightweight Directory Access
The method or protocol by which data is Protocol.
sent from one computer to another on the
leaves Children or objects which are part of a
Internet. Each computer (known as a
parent group.
host) on the Internet has at least one IP
address that uniquely identifies it from all Lightweight Directory Access Protocol (LDAP)
other systems on the Internet. An IP A set of protocols for accessing
address includes a network address and a information directories. LDAP is based on
host address. An IP address can also be the standards contained within the X.500
divided by using classless addressing or standard, but is significantly simpler. And
subnetting. unlike X.500, LDAP supports TCP/IP,
which is necessary for any type of
Internet Service Provider (ISP)
Internet access to a directory server.
An Internet Service Provider (ISP)
provides users access to the Internet and Local Area Network (LAN)
other related services. A non-public data network in which serial
transmission is used for direct data
interval
communication among data stations
The default time period in the system.
located on the user's premises.
Affects the update intervals of the graphs
and how much time each flow log file Local To Local (L2L)
contains. Internal traffic from one local network to
another local network.
Intrusion Detection System (IDS)
An application or device that identifies Local To Remote (L2R)
suspicious activity on the network. Internal traffic from a local network to a
remote network.
Intrusion Prevention System (IPS)
Application that reacts to network log source
intrusions. Log sources are external event log sources
such as security equipment (for example,
IP See Internet Protocol.
Glossary 217
OSVDB R2R See Remote To Remote.
Open Source Vulnerability Database
refresh timer
(OSVDB) is an open source database
The Dashboard, Log Activity, and
created for and by the network security
Network Activity tabs feature a dynamic
community. The database provides
status bar that displays the amount of
technical information on network security
time until the current network activity
vulnerabilities.
data is automatically refreshed; built-in
refresh can be manually refreshed at any
P time.
Packeteer relevance
Packeteer devices collect, aggregate, and Relevance determines the impact on your
store network performance data. When network of an event, category, or offense.
you configure an external flow source for For example, if a certain port is open, the
Packeteer, you can send flow information relevance is high.
from a Packeteer device to QRadar. Remote To Local (R2L)
payload data External traffic from a remote network to
The actual application data, excluding any a local network.
header or administrative information, Remote To Remote (R2R)
contained in an IP flow. External traffic from a remote network to
primary HA host another remote network.
In an HA cluster, the primary HA host is reports
the host to which you want to add HA A function that creates executive or
protection. You can configure HA for any operational level charting representations
system (Console or non-Console) in your of network activity based on time,
deployment. When you configure HA, the sources, offenses, security, and events.
IP address of the primary HA host
becomes the Cluster Virtual IP address; report interval
therefore, you must configure a new IP A configurable time interval at which the
address for the primary host. Event Processor must send all captured
event and flow data to the Console.
protocol
A set of rules and formats that determines routing rules
the communication behavior of layer Collection of conditions and consequent
entities in the performance of the layer routing that are performed when event
functions. It might still require an data matches each rule.
authorization exchange with a policy rule Collection of conditions and consequent
module or external policy server before actions. You can configure rules to capture
admission. and respond to specific event sequences.
The rules allow you to detect specific,
Q specialized events and forward
notifications to either the Offenses tab or
QFlow Collector log file, or email a user.
Collects data from devices and various
live or recorded data feeds, such as,
network taps, span/mirror ports, S
NetFlow, and QRadar flow logs. secondary HA host
QID QRadar Identifier. A mapping of a single In an HA cluster, the secondary HA host
event of an external device to a unique is the standby for the primary host. If the
identifier. primary HA host fails, the secondary HA
host automatically assumes all
responsibilities of the primary HA host.
R
severity
R2L See Remote To Local. Indicates the amount of threat a source
Glossary 219
time. This chart focuses on the networks
or IP address data information from the
selected networks.
TopN Displays the top N networks or IP
address information for the data you are
viewing. For example, using the chart
feature, you can display the top five
networks generating traffic in the U.S.
Transmission Control Protocol (TCP)
A reliable stream service that operates at
the transport-layer Internet protocol,
which ensures successful end-to-end
delivery of data packets without error.
V
violation
Includes a violation of corporate policy.
W
Whois Allows you to look up information about
registered Internet names and numbers.
L P S
parameters scheduling your backup 93
LDAP or active directory 12 description 86 security profile 5, 8, 9, 10
license passwords 37 Security profile parameters 21
allocating 29 policy category security profiles 7
license allocation 30 description 172 setting-up 36
license details ports shutting down 34
viewing 31 searching 212 shutting down system 34
license key 28, 29, 31 portsusage 205 SIM Audit category 178
license management 23 potential exploit category source
licenses description 174 off-site 108
allocating 33
SSL certificate
list of licenses 32
configuring 17
logged actions
audit log file 144
Q store and forward
QRadar SIEM components 118 creating a new schedule 132
deleting a schedule 133
editing a schedule 133
M R viewing the schedule list 129
Magistrate store user information 49
configuring 121 RADIUS 12 suspicious category
malware category RADIUS authentication 12 description 165
description 164 RDATE 38 syslog
managed host 36 recon category forwarding 123
adding 111 description 150 system 12, 33, 34
assigning components 113 reference data collection 42 system and license management 34
editing 112 creating 86 system authentication 12
removing 113 overview 85 system category
management task overview 43 reference map description 168
managing 5, 11, 28, 46 description 85 system details 32
masking reference map of maps system management 23, 32
See obfuscation description 85 system settings 62
reference map of sets system setup 34
description 85 system time 38
reference sets 81
N adding 81
system view
adding a host 111
NAT adding elements 83 assigning components 113
adding 116 deleting 82 description 103
editing 117 deleting elements 83 Host Context 113
enabling 112 exporting elements 84 managed host 113
removing 117 importing elements 84 managing 110
using with QRadar 116 viewing 81
Net-SNMP 3 viewing contents 82
Network Address Translation. reference table
See See NAT description 85 T
network administrator ix restarting 33 TACACS 12
network hierarchy 54 restarting system 33 TACACS authentication 12
creating 51 restored data target
verifying 100 encryption 108
restoring off-site 108
data 100 thresholds 74
U
undo license allocation 30
unknown category
description 173
update 3
update history 59
updates
scheduling 58
upload 29
user 12
user accounts 11
User Defined category
description 176
user details
user 3
User Details window 22
user information 42, 49
user information source 43, 46
user information sources 41, 46, 47, 48
user interface 1
user management 5, 21
user management window
parameters 21
user management window toolbar 21
user role 5
user role management 17
user roles 5
users 5, 11, 12
V
viewing backup archives 91
viewing the schedule list 129
W
web browsers
supported versions 1
Index 223
224 QRadar Log Manager Administration Guide
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
170 Tracer Lane,
Waltham MA 02451, USA
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries,
or both. If these and other IBM trademarked terms are marked on their first
occurrence in this information with a trademark symbol (® or ™), these symbols
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
Microsoft, Windows NT, and the Windows logo are trademarks of Microsoft
Corporation in the United States, other countries, or both.
Other company, product, and service names may be trademarks or service marks
of others.
Depending upon the configurations deployed, this Software Offering may use
session cookies that collect each user’s session id for purposes of session
management and authentication. These cookies can be disabled, but disabling them
will also eliminate the functionality they enable.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, See IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details the
section entitled “Cookies, Web Beacons and Other Technologies” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
Notices 227