Claroty CTD-QRadar-Installation Guide
Claroty CTD-QRadar-Installation Guide
Installation Guide
Version 7
05-Jan-2022
Confidential & Proprietary |Copyright © 2022 Claroty Ltd. All rights reserved
CTD - QRadar Installation Solution Overview
Guide
1. Solution Overview
The Claroty Continuous Threat Detection (CTD) add-on for IBM's QRadar delivers comprehensive
security, visibility, and alert management capabilities for operational technology (OT) environ-
ments. This integration enables QRadar to automatically ingest OT events, alerts and traffic base-
lines from Claroty CTD.
Users can monitor all assets and potential threats in their OT environment on a single pane of
glass in real-time, leading to more effective and efficient OT security monitoring and stronger OT
security posture. Benefits include:
• Continuous monitoring of ICS and industrial network assets - With a unified, real-time view into
security threats targeting PLCs/RTs, embedded PCs, process control software and additional net-
work assets, enterprises can identify threats early before they can impact their business.
• Single view for IT SOC teams to identify threats across both IT and OT environments -- enabling
Companies to have a true enterprise view of all threats and risks across the business.
• IBM® QRadar® uses the Device Support Modules (DSMs) to log and correlate the data that is
collected from external log sources, such as firewalls, switches, or routers. DSMs are regularly
updated to ensure that QRadar can correctly interpret and parse security event information that
is provided by external devices.
• DSMs can be updated both automatically from IBM's AppExchange and manually.
• This DSM integration supports both CTD's legacy CEF and the new CEF structure.
• See the FAQ (page 15) for the log types supported.
1. Download the DSM .zip file from the IBM App Exchange, IBM X-Force Exchange.
2. In QRadar under the Admin tab go to Extensions Management:
3. Click Add.
4. Select the .zip file and select the Install immediately checkbox, then click Add:
5. If you get a message like the following, select Replace existing items:
To update automatically:
4. Select Save.
8. Type your EMC IP address in the Log Source Identifier field and click on Finish:
9. Go back to the Admin page and click on Deploy Changes to deploy the new changes:
2. Click on Add:
1. In the CTD EMC, click on the gear icon and then Integrations > SIEM Syslog.
IMPORTANT
TCP is the recommended protocol.
4. Click Save.
3. Select the log source name that you defined in the Log Source Management app as the Log
Source.
4. Click on Add Filter again.
5. Select the relevant time interval for your search and you should see the mapped data:
3. Troubleshooting
• Make sure you correctly defined the connection between QRadar and your EMC:
• Claroty is selected as the Log Source Type
• The current identifier of your EMC is correct
• ClarotyCustom_ext is selected as the Log Source Extension
• Make sure you click on the Deploy Changes button after setting up the connection in your QRa-
dar machine:
• Make sure your select TCP over UDP as the Protocol when you define the connection in your
EMC
• You may need to increase the size of the TCP payload you allow on your QRadar machine:
5. Look for Max TCP Syslog Payload Length and increase the length as needed:
Baseline Yes No
Event QID
Protocol 1002500003
NOTE
The Policy Violation Event and Policy
Violation Alert both have the same ID