QRadar Chapters 1-3
QRadar Chapters 1-3
QRadar uses rules to monitor the events and flows in your network to detect security
threats. When the events and flows meet the test criteria that is defined in the rules, an
offense is created to show that a security attack or policy breach is suspected. But knowing
that an offense occurred is only the first step. Offense Analysis is all about initially
identifying how it happened, where it happened, and who are the players involved in the
offense.
TASK: 1.1 Triage initial offense
Offense investigations
IBM® QRadar® uses rules to monitor the events and flows in your network to detect
security threats. When the events and flows meet the test criteria that is defined in the
rules, an offense is created to show that a security attack or policy breach is suspected.
But knowing that an offense occurred is only the first step; identifying how it happened,
where it happened, and who did it requires some investigation.
The Offense Summary window helps you begin your offense investigation by providing
context to help you understand what happened and determine how to isolate and resolve
the problem.
QRadar does not use device level user permissions to determine which offenses each user
is able to view. All users who have access to the network can view all offenses regardless of
which log source or flow source is associated with the offense.
MagnitudeIndicates the relative importance of the offense. This value is calculated based
on the relevance, severity, and credibility ratings.
Status Hover your mouse over the status icon to see the status.
• Review the information in the top portion of the Offense Summary window to
learn more about the type of attack and the timeframe when it occurred.
Learn more about the offense information:
Parameter Description
Chained offenses show Preceded by, indicating that the offense changed
over time as new events and flows were added to offense.
Offense The offense type is determined by the rule that created the offense. The
Type offense type determines what type of information is displayed in
the Offense Source Summary pane.
Event/Flow To see the list of events and flows that contributed to the offense, click
count the Event or Flow links.
If the flow count displays N/A, the offense might have a start date that
precedes the date when you upgraded to IBM QRadar version 7.1 (MR1).
The flows cannot be counted, but you can click the N/A link to
investigate the flows.
Source
Specifies the device that attempts to breach the security of a component
IP(s)
on your network. The device can have an IPv4 or IPv6 address.
Offenses of type Source IP always originate from only one source IP
address. Offenses of other types can have more than one source IP
address. You can see more information about the source IP address by
hovering the mouse over the address, or by using right-click and left-
click mouse actions.
Destination
Specifies the network device that the source IP address attempted to
IP(s)
access. The network device can have an IPv4 or IPv6 address.
If the offense has only one target, the IP address is displayed. If the
offense has multiple targets, the number of local or remote IP addresses
that were targeted. You can see more information by hovering the
mouse over the address, or by using right-click and left-click mouse
actions.
Start Specifies the date and time when the first event or flow occurred for the
offense.
Duration Specifies the amount of time that elapsed since the first event or flow that is
associated with the offense was created.
Network(s) Specifies the local networks of the local destination IP addresses that were
targeted. QRadar considers all networks that are specified in the network
hierarchy as local. The system does not associate remote networks to an
offense, even if they are specified as a remote network or a remote service on
the Admin tab.
• In the Offense Source Summary window, review the information about the source
of the offense.
The information that is shown in the Offense Source Summary window depends
on the Offense Type field.
Learn more about the source summary information:
Parameter Description
Chained
Specifies whether the destination IP address is chained.
A chained IP address is associated with other offenses. For example, a
destination IP address might become the source IP address for
another offense. If the destination IP address is chained, click Yes to
view the chained offenses.
Destination
Specifies the network device that the source IP address attempted to
IP(s)
access. The network device can have an IPv4 or IPv6 address.
If the offense has only one target, the IP address is displayed. If the
offense has multiple targets, this field shows the number of local or
remote IP addresses that were targeted. You can see more
information by hovering the mouse over the address, or by using
right-click and left-click mouse actions.
Location Specifies the network location of the source or destination IP address. If the
location is local, click the link to view the networks.
Hover your mouse over the user name to see the most recent
information in the asset model database for the user.
Events that do not include a user name in the payload, or system-
generated events that belong to a local computer or a system account,
show Unknown.
To access more information that is associated with a selected user
name, right-click the user name for View Assets and View
Events menu options.
VulnerabilitiesSpecifies the number of identified vulnerabilities that are associated with
the source or destination IP address. This value also includes the number of
active and passive vulnerabilities.
When you view the summary information for historical offenses, the Last
Known data fields are not populated.
• In the bottom portion of the Offense Summary window, review additional
information about the offense top contributors, including notes and annotations that
are collected about the offense.
To see all the information that QRadar collected in a category, click the links on the
right side of the category heading.
Learn more about the information presented in the offense details:
Offense
details
category Description
Last 5 Notes Use notes to track important information that is gathered during the offense
investigation. You can add a note to an offense, but you cannot edit or delete
notes.
Top 5 Shows the top 5 IP addresses with the highest magnitude, which is where the
Source IPs suspected attack or policy breach originated.
Offenses that have only one source IP address show only one entry in
the table.
Top 5 Shows the top 5 local IP addresses with the highest magnitude, which might
Destination indicate the target of the attack. Offenses that target less than 5 local IP
IPs addresses show fewer entries in the table.
Top 5 Shows the low-level categories that have the most events that contributed to
Categories the offense.
Last 10 Shows information about the last 10 flows that contributed to the offense.
Flows
The Total Bytes column shows the sum of the bytes transferred in both
directions.
AnnotationsAnnotations provide insight into why QRadar considers the event or observed
traffic to be threatening.
• If you installed IBM QRadar Risk Manager, click View Attack Path to see which
assets in your network are communicating to allow an offense to travel through the
network.
Investigating events
An event is a record from a log source, such as a firewall or router device, that describes an
action on a network or host. Events that are associated with an offense provide evidence
that suspicious activity is happening on your network. By examining the event data, you
can understand what caused the offense and determine how best to isolate and mitigate the
threat.
Start The time that QRadar received the raw event from the log source.
Time
Log The time that is recorded in the raw event from the log source.
Source
Time
• In the Payload Information box, review the raw event for information
that QRadar did not normalize.
Information that is not normalized does not appear in the QRadar interface, but it
may be valuable to your investigation
Investigating flows:
IBM® QRadar® correlates flows into an offense when it identifies suspicious activity in
network communications. The flow analysis provides visibility into layer 7, or the
application layer, for applications such as web browsers, NFS, SNMP, Telnet, and FTP. A
flow can include information such as IP addresses, ports, applications, traffic statistics, and
packet payload from unencrypted traffic.
By default, QRadar tries to extract normalized fields and custom flow properties from the
first 64 bytes of flow data, but administrators can increase the content capture length to
collect more data.
• In the Offense Summary window, click Flows in the upper right menu. The Flow
List window shows all flows that are associated with the offense.
• Specify the Start Time, End Time, and View options to view flows that occurred within a
specific time frame.
• Click the flow column header to sort the flow list.
• In the list of flows, right-click the flow name to apply quick filter options to reduce the
number of flows to review. You can apply quick filters to other columns in the flow list as
well.
• Double-click a flow to review the flow details.
Protecting offenses
You might have offenses that you want to retain regardless of the retention period. You can
protect offenses to prevent them from being removed from QRadar® after the retention
period has elapsed.
Offense chaining:
IBM® QRadar® chains offenses together to reduce the number of offenses that you need to
review, which reduces the time to investigate and remediate the threat.
Offense chaining helps you find the root cause of a problem by connecting multiple
symptoms together and showing them in a single offense. By understanding how an offense
changed over time, you can see things that might be overlooked during your analysis. Some
events that would not be worth investigating on their own might suddenly be of interest
when they are correlated with other events to show a pattern.
Offense chaining is based on the offense index field that is specified on the rule. For
example, if your rule is configured to use the source IP address as the offense index field,
there is only one offense that has that source IP address for while the offense is active.
You can identify a chained offense by looking for preceded by in the Description field on
the Offense Summary page. In the following example, QRadar combined all of the events
that fired for each of the three rules into one offense, and appended the rule names to
the Description field:
Offenses Retention:
QRadars dormancy period lasts 5 days. After these 5 days, an offense is marked as
inactive. New events triggering the Offense rule test will not contribute to the inactive
offense. Our Offense Model checks each day within these 5 days to determine which
offenses are still dormant and which are inactive. If an event is received during the
dormant time, the dormant time is reset back to zero. You will have to wait another 5
days of no events or flows triggering the rule test in order for the offense to become
inactive.
Note: By default, the system allows 2,500 open (active) offenses and 100,000 (inactive)
offenses. If these values are reached, a System Notification is generated to alert the
administrator that they might need to review offenses that can be closed or tune rules to
reduce the overall number of offenses that are being generated in QRadar. By default the
system will begin to remove 0.05 percent all inactive offenses every 2 hours.
Offenses Maintenance:
When an offense is closed either by manually closing an offense or by magistrate, which
makes the offense inactive, the Offense Retention Period setting is then applied. The
Offense Retention Period determines how long inactive offenses are kept before being
purged from the Console.
The administrator can manage offenses from Admin tab > Advanced> Clean SIM
Model. The options include:
• Soft Clean - this option closes all offenses, but does not remove them from
QRadar.
• Hard Clean - this option closes and removes all offenses from the system. It is not
advised to Hard Clean your SIM Model, unless advised by QRadar Support.
Custom rules
IBM® QRadar® includes rules that detect a wide range of activities, including excessive
firewall denies, multiple failed login attempts, and potential botnet activity. You can also
create your own rules to detect unusual activity.
What are custom rules?
Customize default rules to detect unusual activity in your network.
Rule types
Each of the event, flow, common, and offense rule types test against incoming data from
different sources in real time. There are multiple types of rule tests. Some check for
simple properties from the data set. Other rule tests are more complicated. They track
multiple, event, flow, and offense sequences over a period of time and use "counter" that
is on one or more parameters before a rule response is triggered.
Event rules
Test against incoming log source data that is processed in real time by the QRadar Event
Processor. You create an event rule to detect a single event or event sequences. For
example, to monitor your network for unsuccessful login attempts, access multiple hosts,
or a reconnaissance event followed by an exploit, you create an event rule. It is common
for event rules to create offenses as a response.
Flow rules
Test against incoming flow data that is processed by the QRadar Flow Processor. You can
create a flow rule to detect a single flow or flow sequences. It is common for flow rules to
create offenses as a response.
Common rules
Test against event and flow data. For example, you can create a common rule to detect
events and flows that have a specific source IP address. It is common for common rules to
create offenses as a response.
Offense rules
Test the parameters of an offense to trigger more responses. For example, a response
generates when an offense occurs during a specific date and time. An offense rule
processes offenses only when changes are made to the offense. For example, when new
events are added, or the system scheduled the offense for reassessment. It is common for
offense rules to email a notification as a response.
Managing rules
You can create, edit, assign rules to groups, and delete groups of rules. By categorizing your
rules or building blocks into groups, you can efficiently view and track your rules. For
example, you can view all rules that are related to compliance.
Domain-specific rules
If a rule has a domain test, you can restrict that rule so that it is applied only to events that
are happening within a specified domain. An event that has a domain tag that is different
from the domain that is set on, the rule does not trigger a response.
To create a rule that tests conditions across the entire system, set the domain condition
to Any Domain.
Rule conditions
Most rule tests evaluate a single condition, like the existence of an element in a reference
data collection or testing a value against a property of an event. For complex comparisons,
you can test event rules by building an Ariel Query Language (AQL) query with WHERE
clause conditions. You can use all of the WHERE clause functions to write complex criteria
that can eliminate the need to run numerous individual tests. For example, use an AQL
WHERE clause to check whether inbound SSL or web traffic is being tracked on a reference
set.
You can run tests on the property of an event, flow, or offense, such as source IP address,
severity of event, or rate analysis.
With functions, you can use building blocks and other rules to create a multi-event, multi-
flow, or multi-offense function. You can connect rules by using functions that support
Boolean operators, such as OR and AND. For example, if you want to connect event rules,
you can use when an event matches any|all of the following rules function
Creating a custom rule
IBM® QRadar® includes rules that detect a wide range of activities, including excessive
firewall denies, multiple failed login attempts, and potential botnet activity. You can also
create your own rules to detect unusual activity.
Bypass
further rule Forces the matched event or flow to bypass all other rules in the rule
correlation engine and prevents it from creating an offense. The event is written to
event storage for searching and reporting.
Select this check box to dispatch a new event in addition to the original
event or flow, which is processed like all other events in the system.
Dispatch Dispatches a new event with the original event, and is processed like all
New Event other events in the system.
The Dispatch New Event parameters are displayed when you select this
check box. By default, the check box is clear.
The severity level that you want to assign to the event, where 0 is the lowest
Severity and 10 is the highest. The severity is displayed in the Annotation pane of the
event details.
The credibility that you want to assign to the log source. For example, is the log
source noisy or expensive? The range is 0 (lowest) to 10 (highest) and the
Credibility
default is 10. Credibility is displayed in the Annotation pane of the event
details.
The relevance that you want to assign to the weight of the asset. For example,
how much do you care about the asset? The range is 0 (lowest) to 10 (highest)
Relevance
and the default is 10. Relevance is displayed in the Annotation pane of the
event details.
Email To change the Email Locale setting, select System Settings on the Admin tab.
Enter email
addresses toUse a comma to separate multiple email addresses.
notify
Remove
from
Reference To use this rule response, you must have a reference data collection.
Data
You can write scripts that do specific actions in response to network events.
For example, you might write a script to create a firewall rule that blocks a
Execute
particular source IP address from your network in response to repeated login
Custom
failures.
Action
You add and configure custom actions by using the Define Actions icon
on the Admin tab.
Publish on
If the IF-MAP parameters are configured and deployed in the system settings,
the IF-MAP
select this option to publish the event information about the IF-MAP server.
Server
Response
Configures the frequency in which you want this rule to respond.
Limiter
Table 1. Event , Flow and Common Rule, and Offense Rule Response page parameters
Procedure
• From the, Log Activity, or Network Activity tabs, click the pause on the upper right
to stop real-time streaming of events or flows.
• Select the event that you want to tune.
• Click False Positive.
• Select an event or flow property option.
• Select a traffic direction option.
• Click Tune.
Results
The event or flow that matches the specified criteria will no longer correlates into offenses.
To edit false positive tuning, use the User-BB_FalsePositive: User Defined Positive
Tunings building block in the Rules section on the Offenses tab
Anomaly detection rules
Anomaly detection rules test the results of saved flow or events searches to detect when
unusual traffic patterns occur in your network.
Anomaly detection rules require a saved search that is grouped around a common
parameter, and a time series graph that is enabled. Typically the search needs to
accumulate data before the anomaly rule returns any result that identifies patterns for
anomalies, thresholds, or behavior changes.
Anomaly rules
Test event and flow traffic for changes in short-term events when you are comparing
against a longer timeframe. For example, new services or applications that appear in a
network, a web server crashes, firewalls that all start to deny traffic.
Example: You want to be notified when one of your firewall devices is reporting more often than it
usually does because your network might be under attack. You want to be notified when you
receive twice as many events in 1 hour. You follow these steps:
• Create and save a search that groups by log source, and displays only the count
column.
• Apply the saved search to an anomaly rule, and add the rule test, and when the
average value (per interval) of count over the last 1 hour is at
least 100% different from the average value (per interval) of the same
property over the last 24 hours.
Threshold rules
Test events or flows for activity that is greater than or less than a specified range. Use these
rules to detect bandwidth usage changes in applications, failed services, the number of
users connected to a VPN, and detecting large outbound transfers.
Example: A user who was involved in a previous incident has large outbound transfer.
When a user is involved in a previous offense, automatically set the Rule response to add to
the Reference set. If you have a watch list of users, add them to the Reference set. Tune
acceptable limits within the Threshold rule.
A reference set, WatchUsers, and Key:username are required for your search.
Complete the following search, and then apply it to a Threshold rule.
select assetuser(sourceip, now()) as 'srcAssetUser',
Applicationname(applicationid)as 'AppName', long(sum(sourcebytes
+destinationbytes)) as 'flowsum' from flows where flowdirection = 'L2R' and
REFERENCESETCONTAINS('Watchusers', username)group by 'srcAssetUser',
applicationid order by 'flowsum' desc last 24 hours
Behavioral rules
Test events or flows for volume changes that occur in regular patterns to detect outliers.
For example, a mail server that has an open relay and suddenly communicates with many
hosts, or an IPS (intrusion protection system) that starts to generate numerous alert
activities.
A behavioral rule learns the rate or volume of a property over a pre-defined season. The
season defines the baseline comparison timeline for what you're evaluating. When you set
a season of 1 week, the behavior of the property over that 1 week is learned and then you
use rule tests to alert you to any significant changes.
After a behavioral rule is set, the season adjusts automatically. When the data in the season
is learned, it is continually evaluated so that business growth is profiled within the season;
you do not have to change your rules. The longer a behavioral rule runs, the more accurate
it becomes. You can then adjust the rule responses to capture more subtle changes.
The following table describes the behavioral rule test parameter options.
Rule test
Description
parameter
The most important value. The season defines the baseline behavior of the
property that you are testing and which the other rule tests use. To define a
season, consider the type of traffic that you are monitoring. For example, for
Season network traffic or processes that include human interaction, 1 week is a good
season timeframe. For tracking automated services where patterns are
consistent, you might want to create a season as short as 1 day to define that
pattern of behavior.
Weight of the original data with seasonal changes and random error accounted
Current for. This rule test asks the question, "Is the data the same as yesterday at the
traffic level same time?"
The weight must be in the range of 1 to 100. A higher value places more weight
on the previously recorded value.
Weight of changes in the data for each time interval. This rule test asks the
Current question, "How much does the data change when it compares this minute to the
traffic minute before?"
trend
The weight must be in the range of 1 to 100. A higher value places more weight
on traffic trends than the calculated behavior.
Weight of the seasonal effect for each period. This rule test asks the question,
Current "Did the data increase the same amount from week 2 to week 3, as it did from
traffic week 1 to week 2?"
behavior
The weight must be in the range of 1 to 100. A higher value places more weight
on the learned behavior.
Use predicted values to scale baselines to make alerting more or less sensitive.
Predicted
The sensitivity must be in the range of 1 to 100. A value of 1 indicates that the
value
measured value cannot be outside the predicted value. A value of 100 indicates
that the traffic can be more than four times larger than the predicted value.
Table 1. Behavioral rule test definitions
The forecast for value from (n+1)th interval is calculated by using the following formula:
Fn+1 = B n + T n + Tn+1-s
Where F is the predicted value, B is the base value for interval n, T is the trend value for
interval n, and T is the trend value for season intervals ago and s is the number of intervals
within the season.
The base value is calculated by using the following formula:
Bn+1 = (0.2 + 0.3*( <Current traffic level> / 100.0))*(value n+1 – T n+1-s) + (1 – (0.2 + 0.3*( <Current traffic level>
/ 100.0)))*T n
The trend value is calculated by using the following formula:
Tn+1 = (0.2 + 0.3*( <Current traffic trend> / 100.0))*(B n+1 - Bn) + (1 - (0.2 + 0.3*(<Current traffic trend> /
100.0)))*Tn
Smoothed deviation D is calculated by using the following formula:
Dn+1 = (0.2 + 0.3*( <Current traffic behavior> / 100.0))*|value n+1 – Fn+1| + (1 – (0.2 + 0.3*( <Current traffic
behavior> / 100.0)))*D n+1-s
The behavioral rule produces an alert for the interval if the following expression is false:
F – (1 + ( sensitivity / 100.0)*3)*D <= value <= F + (1 + ( sensitivity / 100.0)*3)*D
During the first season, the behavioral rule learns for future calculations and doesn't
produce any alerts.
Specifies that this rule dispatches a new event with the original event or flow,
Dispatch
which is processed like all other events in the system. By default, this check box
New Event
is selected and cannot be cleared.
If you want the Event Name information to contribute to the name of the
offense, select the This information should contribute to the name of
the associated offense(s) option.
If you want the configured Event Name to contribute to the offense, select
Offense
the This information should set or replace the name of the
Naming
associated offense(s).
Note: After you replace the name of the offense, the name won't change until the
offense is closed. For example, if an offense is associated with more than one
rule, and the last event doesn't trigger the rule that is configured to override the
name of the offense, the offense's name won't be updated by the last event.
Instead, the offense name remains the name that is set by the override rule.
The severity level that you want to assign to the event. The range is 0 (lowest) to
Severity 10 (highest) and the default is 5. The Severity is displayed in the Annotations
pane of the event details.
The credibility that you want to assign to the log source. For example, is the log
source noisy or expensive? Using the list boxes, select the credibility of the
Credibility
event. The range is 0 (lowest) to 10 (highest) and the default is 5. Credibility is
displayed in the Annotations pane of the event details.
The relevance that you want to assign to the weight of the asset. For example,
how much do you care about the asset? Using the list boxes, select the relevance
Relevance
of the event. The range is 0 (lowest) to 10 (highest) and the default is 5.
Relevance is displayed in the Annotations pane of the event details.
Ensure
that the
dispatched As a result of this rule, the event is forwarded to the magistrate. If an
event is offense exists, this event is added. If no offense was created on the
part of an Offenses tab, a new offense is created.
offense
Notify Events that generate as a result of this rule are displayed in the System
Notifications item in the Dashboard tab. If you enable notifications, configure
the Response Limiter parameter.
Select this check box if you want to log the event or flow locally. By default, the
Send to check box is clear.
Local Note: Only normalized events can be logged locally on a QRadar® appliance. If
SysLog you want to send raw event data, you must use the Send to Forwarding
Destinations option to send the data to a remote syslog host.
Adds events that are generated as a result of this rule to a reference set.
You must be an administrator to add data to a reference set.
Add to To add data to a reference set, follow these steps:
Reference
• From the first list, select the property of the event or flow
Set
that you want to add.
• From the second list, select the reference set to which you
want to add the specified data.
Add to
Reference To use this rule response, you must create the reference data collection.
Data
If you want this rule to remove data from a reference set, select this check
box.
Remove
from To remove data from a reference set, follow these steps:
Reference • From the first list, select the property of the event or flow
Set that you want to remove.
• From the second list, select the reference set from which
you want to remove the specified data.
Remove
from
Reference To use this rule response, you must have a reference data collection.
Data
You can write scripts that do specific actions in response to network events. For
example, you might write a script to create a firewall rule that blocks a
particular source IP address from your network in response to repeated login
Execute
failures.
Custom
Action Select this check box and select a custom action from the Custom action
to execute list.
You add and configure custom actions by using the Define Actions icon
on the Admin tab.
Publish on
If the IF-MAP parameters are configured and deployed in the system settings,
the IF-MAP
select this option to publish the offense information about the IF-MAP server.
Server
Response Select this check box and use the list boxes to configure the frequency with
Limiter which you want this rule to respond
Enable
Select this check box to enable this rule. By default, the check box is selected.
Rule
When rule performance visualization is turned on, the Performance column is added to
the Rules page. The Performance column is blank until a performance issue occurs in the
custom rule engine.
Figure 1. Performance column on the Rules page
When events or flows are routed to storage, QRadar begins collecting metrics on enabled
rules for efficiency measures. Metrics are collected on all event, common, and flow rules.
When you save rule updates, the metrics are cleared for the rules that you updated to avoid
any confusion around performance and updated rules. This option is configurable by an
Administrator.
You can sort rules by their performance metrics and identify the more expensive rules.
When you review the rules, you can adjust the tests to optimize each rule, and reduce the
load on the system.
With rule performance visualization, you see how expensive the rules
are. QRadar operations teams can monitor any expensive rules and ensure that they do not
cause future performance issues.
By having rules run efficiently, the workload on the system can decrease. Over time, this
efficiency can help QRadar avoid any performance degradations around rules, which cause
rules to bypass rule correlation. As a result, potential suspect activity might not trigger a
notification, potentially missing future security-related issues.
View the metrics for a rule
You can view the metrics for a rule from the Rules page when you move the mouse pointer
over the colored bars in the Performance column, and in the Performance
Analysis textbox, which is in the lower-right corner of the Rules page. You can also view
the metrics for a rule in the Rule Wizard when you edit a rule. The timestamp in
the Performance Analysis textbox shows when the metrics for the rule were updated. For
more information about creating rules, see the Rules topic.
From the Network Activity tab or the Log Activity tab, click Rules to display
the Rules page. Double-click a rule to open the Rule Wizard
The following image shows the default Custom Rule Settings in QRadar.
Figure 4. Custom Rule Settings
Offense prioritization:
The magnitude rating of an offense is a measure of the importance of the offense in your
environment. IBM® QRadar® uses the magnitude rating to prioritize offenses and help you
to determine which offenses to investigate first.
The magnitude rating of an offense is calculated based on relevance, severity, and
credibility.
• Relevance determines the impact of the offense on your network. For example, if a
port is open, the relevance is high.
• Credibility indicates the integrity of the offense as determined by the credibility
rating that is configured in the log source. Credibility increases as multiple sources
report the same event.
• Severity indicates the level of threat that a source poses in relation to how prepared
the destination is for the attack.
QRadar uses complex algorithms to calculate the offense magnitude rating, and the rating
is re-evaluated when new events are added to the offense and also at scheduled intervals.
The following information is considered when the offense magnitude is calculated:
• the number of events and flows that are associated with the offense
• the number of log sources
• the age of the offense
• the weight of the assets associated with the offense
• the categories, severity, relevance, and credibility of the events and flows that
contribute to the offense
• the vulnerabilities and threat assessment of the hosts that are involved in the
offense
The magnitude rating of an offense is different from the magnitude rating for an event. You
can influence the magnitude of an offense by setting the event magnitude in the rule
actions, but you cannot bypass the QRadar algorithms to set the offense magnitude
yourself.
Offense indexing
Offense indexing provides the capability to group events or flows from different rules
indexed on the same property together in a single offense.
IBM® QRadar® uses the offense index parameter to determine which offenses to chain
together. For example, an offense that has only one source IP address and multiple
destination IP addresses indicates that the threat has a single attacker and multiple victims.
If you index this type of offense by the source IP address, all events and flows that originate
from the same IP address are added to the same offense.
You can configure rules to index an offense based on any piece of
information. QRadar includes a set of predefined, normalized fields that you can use to
index your offenses. If the field that you want to index on is not included in the normalized
fields, create a custom event or a custom flow property to extract the data from the payload
and use it as the offense indexing field in your rule. The custom property that you index on
can be based on a regular expression, a calculation, or an AQL-based expression.
Offense indexing considerations
It is important to understand how offense indexing impacts your IBM®
QRadar® deployment.
System performance
Ensure that you optimize and enable all custom properties that are used for offense
indexing. Using properties that are not optimized can have a negative impact on
performance.
When you create a rule, you cannot select non-optimized properties in the Index offense
based on field. However, if an existing rule is indexed on a custom property, and then the
custom property is de-optimized, the property is still available in the offense index list. Do
not de-optimize custom properties that are used in rules.
Rule action and response
When the indexed property value is null, an offense is not created, even when you select
the Ensure the detected event is part of an offense check box in the rule action. For
example, if a rule is configured to create an offense that is indexed by host name, but the
host name in the event is empty, an offense is not created even though all of the conditions
in the rule tests are met.
When the response limiter uses a custom property, and the custom property value is null,
the limit is applied to the null value. For example, if the response is Email, and the limiter
says Respond no more than 1 time per 1 hour per custom property, if the rule fires a
second time with a null property within 1 hour, an email will not be sent.
When you index using a custom property, the properties that you can use in the rule index
and response limiter field depends on the type of rule that you are creating. An event rule
accepts custom event properties in the rule index and response limiter fields, while a flow
rule accepts only custom flow properties. A common rule accepts either custom event or
custom flow properties in the rule index and response limiter fields.
You cannot use custom properties to index an offense that is created by a dispatched event.
Payload contents
Offenses that are indexed by the Ariel Query Language (AQL), a regular expression (regex),
or by a calculated property include the same payload as the initial event that generated the
offense.
Offenses that are indexed by a normalized event field, such as Source IP or Destination IP,
include the event name and description as the custom rules engine (CRE) payload.
Offense retention
The state of an offense determines how long IBM® QRadar® keeps the offense in the
system. The offense retention period determines how long inactive and closed offenses are
kept before they are removed from the QRadar console.
Active offenses
When a rule triggers an offense, the offense is active. In this state, QRadar is
waiting to evaluate new events or flows against the offense rule test. When new
events are evaluated, the offense clock is reset to keep the offense active for
another 30 minutes.
Dormant offenses
An offense becomes dormant if new events or flows are not added to the offense
within 30 minutes, or if QRadar did not process any events within 4 hours. An
offense remains in a dormant state for 5 days. If an event is added while an offense
is dormant, the five-day counter is reset.
Inactive offenses
An offense becomes inactive after 5 days in a dormant state. In the inactive state,
new events that trigger the offense rule test do not contribute to the inactive
offense. They are added to a new offense.
Inactive offenses are removed after the offense retention period elapses.
Closed offenses
Closed offenses are removed after the offense retention period elapses. If more
events occur for an offense that is closed, a new offense is created.
If you include closed offenses in a search, and the offense wasn't removed from
the QRadar console, the offense is displayed in the search results.
The default offense retention period is 30 days. After the offense retention period expires,
closed and inactive offenses are removed from the system. Offenses that are not inactive
or closed are retained indefinitely.
Important: System performance is negatively impacted when the system retains many
inactive and closed offenses. For optimum performance, set the retention period for the
least amount of time possible. The suggested retention period is 3 days.
To prevent an offense from being removed from the system, you can protect it. Before you
protect offenses, consider the performance impact that it might have. Some offenses impact
system performance more than others. For example, offenses with large numbers of events
and flows have a greater impact on performance. Offenses that have many targets and
destinations impact performance more than an offense that has only a single target or
destination.
If you need to re-create an offense after it is removed from the system, run a historical
correlation job to analyze the historical data. For more information, see Historical
correlation
Investigating IP addresses:
You can use several methods to investigate information about IP addresses on
the Dashboard, Log Activity, and Network Activity tabs.
• Log in to QRadar®.
• Click the tab that you want to view.
• Hover over an IP address to view the location of the IP address.
• Right-click the IP address or asset name and select one of the following options:
TASK: 1.4 Recognize MITRE threat groups and actors
1.4.1 Open a Offense for investigation
- Select the rules contributing to offense by Clicking Display and Select Rules.
- Open the rule and review the MITRE threat from the rule and rule notes
1.4.2 Open a Offense for investigation
- Select the rules contributing to offense by Clicking Display and Select Annotations.
- Review the annotations to understand rule intent and MITRE threat
1.4.3 Use Case Manager to determine MITRE Threat group
- Open Use Case Manager App
- Select ATT&CK Actions -> Coverage Map and Report
- Review the rules and the corresponding MITRE threat group
MITRE ATTA & CK mapping and visualization:
The MITRE ATT & CK framework represents adversary tactics that are used in a security
attack. It documents common tactics, techniques, and procedures that can be used in
advanced persistent threats against enterprise networks.
The following phases of an attack are represented in the MITRE ATT & CK framework:
Tactics, techniques, and sub-techniques
Tactics represent the goal of an ATT & CK technique or sub-technique. For example, an
adversary might want to get credential access to your network.
Techniques represent how an adversary achieves their goal. For example, an adversary
might dump credentials to get credential access to your network.
Sub-techniques provide a more specific description of the behavior an adversary uses to
achieve their goal. For example, an adversary might dump credentials by accessing the
Local Security Authority (LSA) Secrets.
Workflow for MITRE ATT & CK mapping and visualization
Create your own rule and building block mappings in IBM® QRadar® Use Case Manager ,
or modify IBM QRadar default mappings to map your custom rules and building blocks to
specific tactics and techniques.
Save time and effort by editing multiple rules or building blocks at the same time, and by
sharing rule-mapping files between QRadar instances. Export your MITER mappings
(custom and IBM default) as a backup of custom MITER mappings in case you uninstall the
app and then decide later to reinstall it. For more information, see Uninstalling QRadar Use
Case Manager .
After you finish mapping your rules and building blocks, organize the rule report and then
visualize the data through diagrams and heat maps. Current® and potential MITRE
coverage data is available in the following reports: Detected in
timeframe report, Coverage map and report , and Coverage summary and trend .
TASK: 1.5 Perform offense management
1.5.1 Prioritize the offenses
- Click the offenses tab.
- Double click on the magnitude field of the list to arrange the offenses by magnitude
1.5.2 Assign an offense.
- Click the Offenses tab.
- Select the offense that you want to assign.
- To assign multiple offenses, hold the Control key while you select each offense.
- From the Actions list, select Assign.
- In the Assign To User list, select the user that you want to assign this offense to.
- Click save.
1.5.3 Document an offense.
- Click the Offenses tab. Select the offense to which you want to add the note.
- To add the same note to multiple offenses, press the Ctrl key while you select each offense.
- From the Actions list, select Add Note.
- Type the note that you want to include for this offense.
- Click Add Note.
1.5.4 Send Email notifications from an offense
- Click the Offenses tab.
- Select the offense for which you want to send an email notification.
- From the Actions list box, select Email.
- Configure the following parameters:
- To:
- From:
- Email Subject:
- Email Message:
- Click Send.
1.5.5 Hide an offense
- Click the Offenses tab.- Select the offense that you want to hide.
- To hide multiple offenses, hold the Control key while you select each offense.
- From the Actions list box, select Hide.
- Click OK.
1.5.6 Show a hidden offense.
- Click the Offenses tab
- To clear the filter on the offense list, click Clear Filter next to the Exclude Hidden Offenses
search parameter.
- To create a new search that includes hidden offenses, follow these steps:
- From the Search list box, select New Search.
- In the Search Parameters window, clear the Hidden Offenses check box in the Exclude
options list.
- Click Search.
- To remove the hidden flag from an offense:
- Select the offense for which you want to remove the hidden flag. To select multiple
offenses, hold the Control key while you click each offense.
- From the Actions list box, select Show.
1.5.7 Close an offense.
- Click the Offenses tab.
- Select the offense that you want to close.
- To close multiple offenses, hold the Control key while you select each offense.
- From the Actions list, select Close.
- In the Reason for Closing list, specify a closing reason.
- To add a close reason, click the icon beside Reason for Closing to open the Custom
Offense Close Reasons dialog box.
- Optional: In the Notes field, type a note to provide more information.
- The Notes field displays the note that was entered for the previous offense closing.
Notes must not exceed 2,000 characters.
1.5.8 Mark up an offense for follow up.
- Click the Offenses tab.
- Find the offense that you want to mark for follow-up.
- Double-click the offense.
- From the Actions list, select Follow up.
1.5.9 Protect an offense for follow up.
- Click the Offenses tab and click All Offenses.
- Choose one of the following options:
-Select the offense that you want to protect, and then select Protect from the Actions list.
- From the Actions list box, select Protect Listed.
- Click OK.
Assigning offenses to users:
By default, all new offenses are unassigned. You can assign an offense to an IBM®
QRadar® user for investigation.
When you assign an offense to a user, the offense is displayed on the My Offenses page for
that user. You must have the Assign Offenses to Users permission to assign offenses to
users. For more information about user role permissions, see the IBM QRadar
Administration Guide.
You can assign offenses to users from either the Offenses tab or Offense Summary pages.
This procedure provides instruction on how to assign offenses from the Offenses tab.
• Click the Offenses tab.
• Select the offense that you want to assign.
To assign multiple offenses, hold the Control key while you select each offense.
• From the Actions list, select Assign.
• In the Assign To User list, select the user that you want to assign this offense to.
Note: The Assign To User list displays only those users who have privileges to view
the Offenses tab. The security profile settings for the user are followed as well.
• Click Save.
Result: The offense is assigned to the selected user. The User icon is displayed in the Flag
column of the Offenses tab to indicate that the offense is assigned. The designated user
can see this offense on the My Offenses page.
Assigning notes:
Add notes to an offense to track information that is collected during an investigation. Notes
can include up to 2000 characters.
• Click the Offenses tab.
• Select the offense to which you want to add the note.
To add the same note to multiple offenses, press the Ctrl key while you select each
offense.
• From the Actions list, select Add Note.
• Type the note that you want to include for this offense.
• Click Add Note.
Result: The note is displayed in the Last 5 Notes pane on the Offense Summary window.
A Notes icon is displayed in the flag column of the offense list.
Hover your mouse over the notes indicator in the Flag column of the Offenses list to view
the note.
Sending email notifications:
Share the offense summary information with another person by sending an email.
The body of the email message includes the following information, if available:
• Source IP address
• Source user name, host name, or asset name
• Total number of sources
• Top five sources by magnitude
• Source networks
• Destination IP address
• Destination user name, host name, or asset name
• Total number of destinations
• Top five destinations by magnitude
• Destination networks
• Total number of events
• Rules that caused the offense or event rule to fire
• Full description of the offense or event rule
• Offense ID
• Top five categories
• Start time of the offense or the time the event was generated
• Top five annotations
• Link to the offense user interface
• Contributing CRE rules
Hiding offenses:
Hide an offense to prevent it from being displayed in the offense list. After you hide an
offense, the offense is no longer displayed in any list on the Offenses tab, including the All
Offenses list. However, if you perform a search that includes hidden offenses, the offense is
displayed in the search results.
• Click the Offenses tab.
• Select the offense that you want to hide.
To hide multiple offenses, hold the Control key while you select each offense.
• From the Actions list box, select Hide.
• Click OK.
Closing offenses:
Close an offense to remove it completely from your system.
The default offense retention period is 30 days. After the offense retention period expires,
closed offenses are deleted from the system. You can protect an offense to prevent it from
being deleted when the retention period expires.
Closed offenses are no longer displayed in any list on the Offenses tab, including the All
Offenses list. If you include closed offenses in a search, and the offense is still within the
retention period, the offense is displayed in the search results. If more events occur for an
offense that is closed, a new offense is created.
When you close offenses, you must select a reason for closing the offense. If you have
the Manage Offense Closing permission, you can add custom closing reasons. For more
information about user role permissions, see the IBM QRadar Administration Guide.
• Click the Offenses tab.
• Select the offense that you want to close.
To close multiple offenses, hold the Control key while you select each offense.
• From the Actions list, select Close.
• In the Reason for Closing list, specify a closing reason.
To add a close reason, click the icon beside Reason for Closing to open the Custom
Offense Close Reasons dialog box.
• Optional: In the Notes field, type a note to provide more information.
The Notes field displays the note that was entered for the previous offense closing.
Notes must not exceed 2,000 characters.
• Click OK.
Result: After you close offenses, the counts that are displayed on the By Category window
of the Offenses tab can take several minutes to reflect the closed offenses.
Marking an offense for follow-up:
Mark an offense for follow-up when you want to flag it for further investigation.
• Click the Offenses tab.
• Find the offense that you want to mark for follow-up.
• Double-click the offense.
• From the Actions list, select Follow up.
Result: The offense now displays the follow-up icon in the Flag column. To sort the
offense list to show flagged offenses at the top, click the Flags column header.
Protecting offenses:
You might have offenses that you want to retain regardless of the retention period. You can
protect offenses to prevent them from being removed from QRadar® after the retention
period has elapsed.
By default, offenses are retained for thirty days.
• Click the Offenses tab, and click All Offenses.
• Choose one of the following options:
• Select the offense that you want to protect, and then select Protect from
the Actions list.
• From the Actions list box, select Protect Listed.
• Click OK.
Result: The offense is protected and will not be removed from QRadar. In
the Offense window, the protected offense is indicated by a Protected icon in the Flag
column.
TASK: 1.6 Describe the use of the magnitude of an offense
1.6.1 Review offense by magnitude
- Open the offense tab
- Review the offense by magnitude by hovering on magnitude column
- select an offense with highest magnitude or magnitude with high severity
1.6.2 Review offense with high magnitude
- Review the severity, relevance and credibility contributing to the magnitude of the offense
- Review other contributing factors for the offense magnitude rating
- Number of events
- Number of Log Sources
- Age of the offense
- Weight of the assets
TASK: 1.7 Identify events not correctly parsed and their source (Stored events)
1.7 1 Identify Unknown Events
- Click Log Activity Tab
- Add a filter for High Level Category – Unknown
1.7.2 Select a timeline for last 30 mins based on the load.
1.7.3 Review and recommend parsing and mapping of unknown and stored events
• https://www.youtube.com/watch?v=GgPW5OVwoMY
Routing options for rules:
You can choose from four rule routing options: Forward, Drop, Bypass correlation, and Log
Only. The following table describes the different options and how to use them.
The following table describes different routing option combinations that you can use.
These options are not available in offline mode.
If data matches multiple rules, the safest routing option is applied. For example, if data that
matches a rule that is configured to drop and a rule to bypass CRE processing, the data is
not dropped. Instead, the data bypasses the CRE and is stored in the database.
Troubleshooting DSMs:
If you come across a problem with your DSM, you can troubleshoot the following issues.
What happens when events, which are parsed, are collected
with unofficial DSMs?
Not having an official DSM doesn't mean that the events aren't collected. It indicates that
the event that is received by IBM® QRadar® might be identified as "Unknown" on the Log
Activity tab of QRadar. "Unknown" means that IBM QRadar collected the event, but was
unable to parse the event format to categorize the event. However, some unique events in
unofficial DSMs cannot be parsed or identified if they don't follow an event format that is
expected. When an event cannot be understood by the system, they are categorized as
"Unknown".
What is the difference between an unknown event and a
stored event?
Events comprise three different categories:
Parsed events
QRadar collects, parses, and categorizes the event to the proper log source.
Unknown events
The event is collected and parsed, but cannot be mapped or categorized to a specific log
source. The Event Name and the Low-Level Category are set as Unknown. Log sources
that aren't automatically discovered are typically identified as Unknown Event Log until a
log source is manually created in the system. When an event cannot be associated to a log
source, the event is assigned to a generic log source. You can identify these events by
searching for events that are associated with the SIM Generic log source or by using
the Event is Unparsed filter.
Stored events
The event cannot be understood or parsed by QRadar. When QRadar cannot parse an event,
it writes the event to disk and categorize the event as Stored.
How can you find these events in the Log Activity tab?
To find events specific to your device, you can search in QRadar for the source IP address of
your device. You can also select a unique value from the event payload and search
for Payload Contains. One of these searches might locate your event, and it is likely either
categorized as Unknown or Stored.
The easiest way to locate unknown or stored events is to add a search filter for Event in
Unparsed. This search filter locates all events that either cannot be parsed (stored) or events
that might not be associated with a log source or auto discovered (Unknown Log Event).
For more information about officially supported DSMs, see QRadar supported DSMs.
What do you do if you have an unknown event log from a log
source that is not auto discovered?
The Event Collection Service (ECS) contains a traffic analysis process that automatically
discovers and creates new log sources from events. Traffic analysis tries to identify the log
source by analyzing the event payloads. At minimum, 25 events are required to identify a
log source. If the log source cannot be identified by traffic analysis after 1,000 events,
then QRadar abandons the auto discovery process. When a log source cannot be identified
by the event payload and reaches the maximum threshold for traffic analysis,
then QRadar generates a notification that specifies the IP address of the log
source. QRadar generates the following notification:
Unable to automatically detect the associated log source for IP address <IP>
QRadar then categorizes the log source as SIM Generic and labels the events as Unknown
Event Log.
QRadar can auto discover certain log sources, but some supported log sources cannot be
detected. Common causes of this notification are:
• The device is a newer version than the DSM that QRadar supports to parse events.
• The device type does not support automatic log source discovery. Review the
documentation for your DSM to see whether it is automatically discovered.
• The logs might not follow an expected format. A customizable event format or
required field might be missing.
• The device might be creating an event format due to an incorrect configuration.
• The logs are coming from a device that is not an officially supported DSM in QRadar.
To resolve the unknown event log:
• Review the IP address to determine which device is sending unparsed events. After
you identify the device, you can manually create a log source by using the IBM
QRadar Log Source Management app.
• Review any log sources that forward events at a low rate. Log sources with low
event rates are a common cause of this notification.
• Ensure that auto update downloads the latest DSMs to properly parse events for
your QRadar system.
• Review any log sources that provide events through a central log server. Logs that
are provided from central log servers or management consoles might require their
log sources to be created manually.
• Review the Log Activity tab to determine the appliance type from the IP address in
the notification message and manually create a log source in QRadar.
What do you do if the product version or device you have is
not listed in the DSM Configuration Guide?
Sometimes a version of a vendor product or a device is not listed as supported. If the
product or device is not listed, follow these guidelines:
Version not listed
If the DSM for your product is officially supported by QRadar, but your product version is
not listed in the IBM QRadar DSM Configuration Guide, you have the following options:
• Try the DSM to see whether it works. The product versions that are listed in
the guide are tested by IBM, but newer untested versions can also work.
• If you tried the DSM and it didn’t work, open a support ticket for a review of
the log source to troubleshoot and rule out any potential issues.
Tip: In most cases, no changes are necessary, or perhaps a minor update to
the IBM QRadar Identifier (QID) Map might be all that is required. Software
updates by vendors might on rare occasions add or change event formats
that break the DSM, requiring an RFE for the development of a new
integration. This is the only scenario where an RFE is required.
Device not listed
When a device is not officially supported, you have the following options:
• Open a request for enhancement (RFE) to have your device become officially
supported.
• Go to the QRadar SIEM RFE page (https://ibm.biz/BdRPx5).
• Log in to the support portal page.
• Click the Submit tab and type the necessary information.
Tip: If you have event logs from a device, attach the event information
and include the product version of the device that generated the event
log.
• Write a log source extension to parse events for your device. For more
information, see Log source extensions and the DSM Editor.
• You can use content extensions for sending events to QRadar that are
provided by some third-party vendors. They can be found on the IBM
Security App Exchange (https://exchange.xforce.ibmcloud.com/hub/). These
third-party DSM integrations are supported by the vendor, not by IBM. For a
list of available third-party DSMs, see DSMs supported by third-party
vendors.
User response
Review the following options:
• Verify the incoming event and flow rates. If the event pipeline is queuing events,
expand your license to hold more data. To determine how close you are to your
EPS/FPM license limit, monitor the Event Rate (Events Per Second Raw) graph on
the System Monitoring dashboard. The graph shows you the current data rate.
Compare the data rate to the per-appliance license configuration in your
deployment.
For more information about EPS/FPM license limits, see QRadar: About EPS
HYPERLINK "https://www.ibm.com/support/pages/qradar-about-eps-fpm-
limits"& HYPERLINK "https://www.ibm.com/support/pages/qradar-about-eps-
fpm-limits" FPM Limits (https://www.ibm.com/support/pages/qradar-about-eps-
fpm-limits).
• Review recent changes to rules or custom properties. Rule or custom property
changes might cause sudden changes to your event or flow rates. Changes might
affect performance or cause the system to route events to storage.
• DSM parsing issues can cause the event data to route to storage. To verify whether
the log source is officially supported, see the DSM Configuration Guide.
• SAR notifications might indicate that queued events and flows are in the event
pipeline.
• Tune the system to reduce the volume of events and flows that enter the event
pipeline. Events must be tuned at the source, not in the product. You can set
coalescing on and configure your retention buckets to limit the number of stored
events. License throttling monitors the number of incoming events to the system to
manage input queues and licensing.
User response
• Adjust the license pool allocations to increase the EPS and FPM capacity for the
appliance.
• Tune the system to reduce the volume of events and flows that enter the event
pipeline.
Stored events:
Stored events do indeed use license capacity. Events being Stored can be caused because
the DSM can't parse the events or because the DSMFilter queue is full due to license or
performance problems. Routing to stored (on disk storage) for license/performance
happens when the in-memory queue of the relevant components above is full and so events
cannot be put in the queue of the downstream component. The queue fills when those
processing components have a processing rate lower than the ingestion rate to that
component. Each segment of the pipeline needs to have space for the next component in
line to take the incoming data. There are two locations in the QRadar event pipeline where
components can route to storage in two locations in QRadar where backups can occur
(incoming events (parsing/DSMFilter) and the custom rules engine (CRE). This is a
protection mechanism to keep data routing to disk when the event pipeline is backing up
due to a performance problem, such as license overages, under-performant regex, DSM
performance issues, or rules being backed up, etc.
TASK: 1.8 Outline simple offense naming mechanisms
1.8.1 Review offense names
- Open offense tab
- Review different Description column of offense and the rule associated with offense
1.8.2 Review rules to manage offense names
- Select Display -> Rules from Offense summary
- Review the rule name and Offense description
- Click and open the rule and go to Rule Response and review offense naming
1.8.3 Change offense naming
- If the offense description does not explain the attack properly, dispatch a new event with
information
- Use the event information to set or replace the name of the associated offense
TASK: 1.9 Create customized searches
1.9.1 Search offenses on my offenses / all offenses page
- Click the Offenses tab.
- From the Search list box, select New Search.
- Choose one of the following options:
- Select a previously saved search using one of the following options:
- From the Available Saved Searches list, select the saved search that you want to load.
- In the Type Saved Search or Select from List field, type the name of the search you
want to load.
- Click Load.
- Click Search
1.9.2 Search offenses on my offenses / all offenses page creating a new search
- Click the Offenses tab.
- From the Search list box, select New Search.
- On the Time Range pane, select an option for the time range you want to capture for this
search.
- On the Search Parameters pane, define your specific search criteria.
- On the Offense Source pane, specify the offense type and offense source you want to search:
- From the list box, select the offense type that you want to search for.
- Type your search parameters.
- In the Column Definition pane, define the order in which you want to sort the results:
- From the first list box, select the column by which you want to sort the search results.
- From the second list box, select the order that you want to display for the search results.
Options include Descending and Ascending.
- Click Search.
1.9.3 Search offenses by source IP.
- Click the Offenses tab.
- Click by Source IP. - From the Search list box, select New Search.
- On the Time Range pane, select an option for the time range you want to capture for this
search.
- On the Search Parameters pane, define your specific search criteria. -- On the Column
Definition pane, define the order in which you want to sort the results:
- From the first list box, select the column by which you want to sort the search results.
- From the second list box, select the order that you want to display for the search results.
Options include Descending and Ascending.
- Click Search.
1.9.4 Search offenses by destination IP
- Click the Offenses tab.
- On the navigation menu, click By Destination IP.
- From the Search list box, select New Search.
- On the Time Range pane, select an option for the time range you want to capture for this
search.
- On the Search Parameters pane, define your specific search criteria.
- On the Column Definition pane, define the order in which you want to sort the results:
- From the first list box, select the column by which you want to sort the search results.
- From the second list box, select the order in which you want to display the search
results. Options include Descending and Ascending.
- Click Search.
1.9.5 Saving Search criteria on the offenses tab
- Perform a search. See Offense searches.
- Click Save Criteria.
- Enter values for the following parameters
- Search Name
- Manage Groups
- Time span options (all offenses, Recent, Specific Interval)
- Set as Default (to make the search a default search)
- Click OK
Scheduled search:
Use the Scheduled search option to schedule a search and view the results.
You can schedule a search that runs at a specific time of day or night. If you schedule a
search to run in the night, you can investigate in the morning. Unlike reports, you have the
option of grouping the search results and investigating further. You can search on number
of failed logins in your network group. If the result is typically 10 and the result of the
search is 100, you can group the search results for easier investigating. To see which user
has the most failed logins, you can group by user name. You can continue to investigate
further.
You can schedule a search on events or flows from the Reports tab. You must select a
previously saved set of search criteria for scheduling.
• Create a report
Specify the following information in the Report Wizard window:
• The chart type is Events/Logs or Flows.
• The report is based on a saved search.
Note: QRadar® does not support reports based on AQL searches that contain
subselect statements.
• Generate an offense.
You can choose the create an individual offense option or the add result to
an existing offense option.
You can also generate a manual search.
• View search results
You can view the results of your scheduled search from the Offenses tab.
• Scheduled search offenses are identified by the Offense Type column.
If you create an individual offense, an offense is generated each time that the report
is run. If you add the saved search result to an existing offense, an offense is created
the first time that the report runs. Subsequent report runs append to this offense. If
no results are returned, the system does not append or create an offense.
• To view the most recent search result in the Offense Summary window, double-click
a scheduled search offense in the offense list. To view the list of all scheduled search
runs, click Search Results in the Last 5 Search Results pane.
You can assign a Scheduled search offense to a user.
Exporting events:
You can export events in Extensible Markup Language (XML) or Comma-Separated Values
(CSV) format.
The length of time that is required to export your data depends on the number of
parameters specified.
• Click the Log Activity tab.
• Optional. If you are viewing events in streaming mode, click the Pause icon to pause
streaming.
• From the Actions list box, select one of the following options:
• Export to XML > Visible Columns - Select this option to export only the
columns that are visible on the Log Activity tab. This is the recommended
option.
• Export to XML > Full Export (All Columns) - Select this option to export all
event parameters. A full export can take an extended period of time to
complete.
• Export to CSV > Visible Columns - Select this option to export only the
columns that are visible on the Log Activity tab. This is the recommended
option.
• Export to CSV > Full Export (All Columns) - Select this option to export all
event parameters. A full export can take an extended period of time to
complete.
• If you want to resume your activities while the export is in progress, click Notify
When Done.
When the export is complete, you receive notification that the export is complete. If you
did not select the Notify When Done icon, the status window is displayed.
Quick filter search options:
Search event and flow payloads by typing a text search string that uses simple words or
phrases.
Quick filter is one of the fastest methods that you use to search for event or flow payloads
for specific data. For example, you can use quick filter to find these types of information:
• Every firewall device that is assigned to a specific address range in the past week
• A series of PDF files that were sent by a Gmail account in the past five days
• All records in a two-month period that exactly match a hyphenated user name
• A list of website addresses that end in .ca
You can filter your searches from these locations:
Log Activity toolbar and Network Activity toolbars
Select Quick Filter from the list box on the Search toolbar to type a text search
string. Click the Quick Filter icon to apply your Quick Filter to the list of
events or flows.
Add Filter Dialog box
Click the Add Filter icon on the Log Activity or Network Activity tab.
Select Quick Filter as your filter parameter and type a text search string.
Flow search pages
Add a quick filter to your list of filters.
Note: Quick Filter searches that use a time frame outside of the Payload Index Retention
setting can trigger slow and resource-intensive system responses. For example, if the
payload index retention is set for 1 day, and you use a time frame for the last 30 hours in
the search.
When you view flows in real-time (streaming) or last interval mode, you can type only
simple words or phrases in the Quick Filter field. When you view events or flows in a
time-range, follow these syntax guidelines:
Limitations
Quick filter searches operate on raw event or flow log data and don't distinguish between
the fields. For example, quick filter searches return matches for both source IP address and
destination IP address, unless you include terms that can narrow the results.
Search terms are matched in sequence from the first character in the payload word or
phrase. The search term user matches user_1 and user_2, but does not match the following
phrases: ruser, myuser, or anyuser.
Quick filter searches use the English locale. Locale is a setting that identifies language or
geography and determines formatting conventions such as collation, case conversion,
character classification, the language of messages, date and time representation, and
numeric representation.
The locale is set by your operating system. You can configure QRadar® to override the
operating system locale setting. For example, you can set the locale to English and
the QRadar Console can be set to Italiano (Italian).
If you use Unicode characters in your quick filter search query, unexpected search results
might be returned.
If you choose a locale that is not English, you can use the Advanced search option
in QRadar for searching event and payload data.
How does Quick Filter search and payload tokens work?
Text that is in the payload is split into words, phrases, symbols, or other elements. These
tokens are delimited by space and punctuation. The tokens don't always match user-
specified search terms, which cause some search terms not to be found when they don't
match the generated token. The delimiter characters are discarded but exceptions exist
such as the following exceptions:
• Periods that are not followed by white space are included as part of the token.
For example, 192.0.2.0:56 is tokenized as host token 192.0.2.0 and port token 56.
• Words are split at hyphens, unless the word contains a number, in which case, the
token is not split and the numbers and hyphens are retained as one token.
• Internet domain names and email addresses are preserved as a single token.
192.0.2.0/home/www is tokenized as one token and the URL is not separated.
192.0.2.7:/calling1/www2/scp4/path5/fff is tokenized as host 192.0.2.7 and the
remainder is one token /calling1/www2/scp4/path5/fff
File names and URL names that contain more than one underscore are split before a period
(.).
Example of multiple underscores in a file name:
If you use hurricane_katrina_ladm118.jpg as a search term, it is split into the following
tokens:
• hurricane
• katrina_ladm118.jpg
Search the payload for the full search term by placing double quotation marks around the
search term: "hurricane_katrina_ladm118.jpg"
Example of multiple underscores in a relative file path:
The thumb.ladm1180830/thumb.ladm11808301806.hurricane_katrina_ladm118.jpg is
split into the following tokens:
• thumb.ladm1180830/thumb.ladm11808301806.hurricane
• katrina_ladm118.jpg
To search for hurricane_katrina_ladm118.jpg, which consists of one partial and one full
token, place an asterisk in front of the query term, *hurricane_katrina_ladm118.jpg
The Advanced Search field has auto completion and syntax highlighting.
Use auto completion and syntax highlighting to help create queries. For information about
supported web browsers, see Supported web browsers
Note: If you use a quick filter on the Log Activity tab, you must refresh your browser window
before you run an advanced search.
The following table provides examples of AQL search strings for X-Force®.
Creating a customized search:
You can search for data that match your criteria by using more specific search options. For
example, you can specify columns for your search, which you can group and reorder to
more efficiently browse your search results.
The duration of your search varies depending on the size of your database.
You can add new search options to filter through search results to find a specific event or
flow that you are looking for.
The following table describes the search options that you can use to search event and
flow data:
Procedure
• Choose a search option:
• To search events, click the Log Activity tab.
• To search flows, click the Network Activity tab.
• From the Search list, select New Search.
• Select a previously saved search.
• To create a search, in the Time Range pane, select the options for the time range that
you want to capture for this search.
Note: The time range that you select might impact performance, when the time
range is large.
• Enable unique counts in the Data Accumulation pane.
Note: Enabling unique counts on accumulated data, which is shared with many
other saved searches and reports might decrease system performance.
• In the Search Parameters pane, define your search criteria.
• From the first list, select a parameter that you want to search for.
• From the second list, select the modifier that you want to use for the search.
Note:
To search for an event or flow whose custom property does not have a value,
use the "is N/A" operator. To search for an event or flow whose custom
property has a value, use the "is not N/A" operator.
• From the entry field, type specific information that is related to your search
parameter.
• Click Add Filter.
• Repeat these steps for each filter that you are adding to the search criteria.
• To automatically save the search results when the search is complete, select
the Save results when search is complete check box, and then type a name for the
saved search.
• In the Column Definition pane, define the columns and column layout that you want
to use to view the results:
• From the Display list, select the preconfigured column that is set to associate
with this search.
• Click the arrow next to Advanced View Definition to display advanced
search parameters.
• Customize the columns to display in the search results.
• In the Results Limit field, type the number of rows that you want the search
to return.
• Click Filter.
Creating a custom column layout
Create a custom column layout by adding or removing columns in an existing layout.
Procedure
• On the Log Activity or the Network Activity tab, click Search > Edit Search.
• In the Column Definition pane, select an existing column layout in the Display list.
When you modify the layout, the name in the Display list is automatically changed
to Custom.
• Modify your search grouping.
• To add a column to your search group, select a column from the Available
Columns list and click the right arrow to move the column to the Group
By list.
• To move a column from the Columns list to your search group, select a
column from the Columns list and drag it to the Group By list.
• To remove a column from your search group, select the column from
the Group By list and click the left arrow.
• To change the order of your column groupings, use the up and down arrows
or drag the columns into place.
• Modify your column layout.
• To add a column to your custom layout, select a column from the Available
Columns list and click the right arrow to move the column to
the Columns list.
• To move a column from the Group By list to your custom layout, select a
column from the Group By list and drag it to the Columns list.
• To remove a column from your custom layout, select the column from
the Columns list and click the left arrow.
• To change the order of your columns, use the up and down arrows or drag
the columns into place.
• In the Name field, enter the name of your custom column layout.
• Click Save Column Layout
Deleting a custom column layout
You can delete an existing user-created column layout.
Procedure
• On the Log Activity or the Network Activity tab, click Search > Edit Search.
• In the Column Definition pane, select an existing user-created column layout in
the Display list.
• Click Delete Column Layout
You can configure the search feature to send you an email notification when a search is
complete. At any time while a search is in progress, you can view partial results of a search
in progress.
The search results toolbar provides the following options:
Procedure
• Click the Risks tab.
• On the navigation menu, click Connections.
• From the menu, select Search > Manage Search Results.
Saving search results from a connection search or a sub-
search
You can save your search results. You can save results from both connection searches and
sub-searches.
Procedure
• Click the Risks tab.
• On the navigation menu, click Connections.
• Perform a connection search or sub-search.
• From the Search Results window, select Search > Manage Search Results and
select a search result.
• Click Save Results.
• Type a name for the search results.
• Click OK.
Saving search criteria on the Offenses tab:
On the Offenses tab, you can save configured search criteria so that you can reuse the
criteria for future searches. Saved search criteria does not expire.
Procedure
• Procedure
• Perform a search. See Offense searches.
• Click Save Criteria.
• Enter values for the following parameters:
• Click OK.
Chapter 2: Rules & Building Block Design
Rules and Building Block Design QRadar rules are applied to all incoming events, flows, or
offenses to search for or detect anomalies. If all the conditions of a test are met, the rule
generates a response. A building block is a collection of tests that don't result in a response
or an action. A building block groups commonly used tests to build complex logic so that it
can be reused in rules. As an Analyst you need to fully understand how rules and building
blocks are designed and used, and although you are not responsible for implementing new
or tuning existing rules and building blocks, you can and should make recommendations on
updating QRadar components that may improve rules and building block design based on
your daily exposure to them.
2.1.2 Identify regular expressions to match patterns of text in the log source file
If you want to use the same reference data in both QRadar SIEM and QRadar Risk Manager,
use a reference set. You can't use other types of reference data collections with QRadar
Risk Manager.
TASK: 2.2 Create and manage reference sets and populate them with data
2.2.1 Review the types of Reference Data
2.2.2 Investigate reference sets via the GUI
2.2.3 Create, edit, and delete reference sets
- GUI
- API
- Command Line
2.2.4 Understand Building Blocks and reference sets
• https://youtu.be/mNyd8FNns_4
• To view or edit an associated rule, double-click the rule in the References list and
complete the rule wizard
You can also create reference data collections by using the /reference_data endpoint in
the QRadar RESTful API.
Procedure
• Using SSH, log in to IBM QRadar as the root user.
• Go to the /opt/qradar/bin directory.
• To create the reference data collection, type the following command
• To populate the map with data from an external file, type the following command:
Example
Here are some examples of how to use the command line to create different types of
reference data collections:
Command reference for reference data utilities
You can manage your reference data collections by using the ReferenceDataUtil.sh utility on the
command line. The following commands are available to use with the script.
Create
Creates a reference data collection.
name
The name of the reference data collection.
[SET | MAP | MAPOFSETS | MAPOFMAPS | REFTABLE]
The type of reference data collection.
[ALN | ALNIC | NUM | IP | PORT | DATE]
The type of data in the reference set.
• ALN specifies alphanumeric values. This data type supports IPv4 and IPv6
addresses.
• ALNIC specifies alphanumeric values, but rule tests ignore the case. This data
type supports IPv4 and IPv6 addresses.
• NUM specifies numeric values.
• IP specifies IP addresses. This data type supports only IPv4 address.
• PORT specifies port addresses.
• DATE specifies date values.
[-timeoutType=[FIRST_SEEN | LAST_SEEN]]
Specifies whether the amount of time the data elements remain in the reference
data collection is from the time the element was first seen or last seen.
[-TimeToLive='']
The amount of time the data elements remain in the reference data collection.
[-keyType=name:elementType,name:elementType,...]
A mandatory REFTABLE parameter of consisting of key name
to ELEMENTTYPE pairs.
[-key1Label='']
An optional label for key1, or the primary key. A key is a type of information, such
as an IP address.
[-valueLabel='']
An optional label for the values of the collection
Update
Updates a reference data collection.
name
The name of the reference data collection.
[-timeoutType=[FIRST_SEEN | LAST_SEEN]]
Specifies whether the amount of time the data elements remain in the reference
data collection is from the time the element was first seen or last seen.
[-timeToLive='']
The amount of time the data elements remain in the reference data collection.
[-keyType=name:elementType,name:elementType,...]
A mandatory REFTABLE parameter of consisting of key name
to elementType pairs.
[-key1Label='']
An optional label for key1.
[-valueLabel='']
An optional label for the values of the collection.
Add
Adds a data element to a reference data collection
name
The name of the reference data collection.
<value> <key1> [key2]
The key value pair that you want to add. The keys are alphanumeric strings.
• MAP and MAPOFSETS require Key 1.
• MAPOFMAPS and REFTABLE require Key 1, and the second-level Key 2.
[-sdf=" ... "]
The Simple Date Format string that is used to parse the date data
Delete
Deletes an element from a reference data collection.
name
The name of the reference data collection.
<value> <key1> [key2]
The key value pair that you want to delete. The keys are alphanumeric strings.
• MAP and MAPOFSETS require Key 1.
• MAPOFMAPS and REFTABLE require Key 1, and the second-level Key 2.
[-sdf=" ... "]
The Simple Date Format string that is used to parse the date data.
Remove
Removes a reference data collection.
name
The name of the reference data collection.
Purge
Purges all elements from a reference data collection.
name
The name of the reference data collection
List
Lists elements in a reference data collection.
name
The name of the reference data collection.
[displayContents]
Lists all elements in the specified reference data collection.
Listall
Lists all elements in all reference data collection.
[displayContents]
Lists all elements in all reference data collections.
Load
Populates a reference data collection with data from an external .csv file.
name
The name of the reference data collection.
filename
The fully qualified file name to be loaded. Each line in the file represents a record
to be added to the reference data collection.
[-encoding=...]
Encoding that is used to read the file.
[-sdf=" ... "]
The Simple Date Format string that is used to parse the date data.
TASK: 2.3 Install QRadar Content Packs using the QRadar Assistant App
2.3.1 Navigating to the QRadar Assistant App
2.3.2 Search for Content Packs
2.3.3 Install Content Packs
Use the IBM® QRadar® Assistant app to manage your app and content extension inventory, view
app and content extension recommendations, follow the QRadar Twitter feed, and get links to
useful information.
• Click Settings, select the API Authentications tab, and enter your X-Force®
Exchange API Key and API Password. For more information, see Obtaining an
API Key and Password (https://api.xforce.ibmcloud.com/doc/#auth).
• For Assistant 3.5.0 or later, click the gear icon on the Assistant app page to go
to the Settings page, and then enter the authorized service token, your X-
Force® Exchange API Key, and API password.
After an Admin configures the authorized service token and API key and password,
other Admin users do not need to perform this configuration. Non-Admin users can
use the Assistant app, but are not authorized to download and install apps.
• To configure a proxy server for communication with X-Force Exchange,
click Settings, select the Proxy tab, and enter the following information for your
proxy server:
• Protocol
• Address
• Port
• User name
• Password
• Click Save, then close the Settings window.
• If you want to use the QRadar Phone Home Service, click Agree.
Managing installed extensions
You can use the Installed section on the Applications page to view and manage currently installed
QRadar extensions and contents.
Procedure
Phone Home
QRadar® Assistant app V 1.1.5 and later include a new Phone Home feature, which anonymously
shares data with the IBM® X-Force® Exchange to monitor QRadar and detect issues early.
Why should I opt in to the Phone Home feature?
Opting in allows IBM to proactively detect issues in QRadar before they affect your assets.
It also helps IBM evaluate how you use QRadar, to more effectively develop product
features and services in those areas.
How do I opt in?
After you update the QRadar Assistant app, a window will prompt you to agree or disagree
to using the Phone Home feature. Select Agree to start using the feature.
If you want to opt in at a later time, select to the Help tab on the User Settings window,
and select Opt In.
How do I opt out?
If you select Disagree, you are not prompted again until you update the app again. If you
want to opt in later, click the Help tab on the User Settings window, and select Opt Out.
What information is shared?
The following table describes the information you can share with IBM.
Privacy information
This feature does not collect personally identifiable information. Information you share
with the IBM X-Force Exchange does not include IP addresses, host names, log source
information, or any other information that identifies specific customers. To delete your
information please contact [email protected] and include your X-Force
Exchange username.
• https://api.xforce.ibmcloud.com/
• http://www-01.ibm.com/support/
• https://www.googleapis.com/youtube-nocookie.com/v3/
• https://www.googleapis.com/youtube/v3/
• https://www.securitylearningacademy.com/
• https://ibmmaas360.secure.force.com/(specifically https://ibmmaas360.secure.for
ce.com/ForumsRSSFeed)
• https://www.ibm.com/mysupport
Running the Assistant app in offline mode
Last Updated: 2022-06-01
Admin can run the QRadar Assistant app V3.1.0 or later in offline mode to manage installed
extensions.
• Click the Assistant app icon , and then the QRadar Assistant is running in
offline mode banner appears in the bottom.
• In the Use Application Manager in offline mode banner, click the hyperlink
text Here.
• In the QRadar Assistant is running in offline mode window, click Continue
• See Managing installed extensions for the steps to manage installed extensions.
• Optional: Perform one of the following steps to configure a proxy server for
communication with X-Force Exchange.
• In the tooltip under the Offline indicator in the upper right corner of the
page, click the hyperlink text here to configure the QRadar Assistant app
settings.
• Click Settings, and then select the Proxy tab
QRadar Rules
Rules perform tests on events, flows, or offenses. If all the conditions of a test are met, the rule
generates a response.
IBM® QRadar® includes rules that detect a wide range of activities, including excessive
firewall denies, multiple failed login attempts, and potential botnet activity. For more
information about rules, see the IBM QRadar Administration Guide.
The following list describes the two rule categories:
• Custom rules perform tests on events, flows, and offenses to detect unusual activity
in your network.
• Anomaly detection rules perform tests on the results of saved flow or event
searches to detect when unusual traffic patterns occur in your network.
Network hierarchy
IBM® QRadar® uses the network hierarchy objects and groups to view network activity and
monitor groups or services in your network.
When you develop your network hierarchy, consider the most effective method for viewing
network activity. The network hierarchy does not need to resemble the physical
deployment of your network. QRadar supports any network hierarchy that can be defined
by a range of IP addresses. You can base your network on many different variables,
including geographical or business units.
You can view different areas of your network that is organized by business function and
prioritize threat and policy information according to business value risk.
IBM® QRadar® uses the network hierarchy to do the following tasks:
• Understand network traffic and view network activity.
• Monitor specific logical groups or services in your network, such as marketing, DMZ,
or VoIP.
• Monitor traffic and profile the behavior of each group and host within the group.
• Determine and identify local and remote hosts.
When you develop your network hierarchy, consider the most effective method for viewing
network activity. The network hierarchy does not need to resemble the physical
deployment of your network. QRadar supports any network hierarchy that can be defined
by a range of IP addresses. You can base your network on many different variables,
including geographical or business units.
The objects that are defined in your network hierarchy do not have to be physically in your
environment. All logical network ranges belonging to your infrastructure must be defined
as a network object.
• Define an all-encompassing group so that when you define new networks, the
appropriate policies and behavior monitors are applied.In the following example, if
you add an HR department network, such as 10.10.50.0/24, to the Cleveland group,
the traffic displays as Cleveland-based and any rules you apply to the Cleveland
group are applied by default
• Click Install
• Review the installation summary and lick OK
TASK: 2.5 Analyze Building Blocks: Host definition, category definition, Port definition
2.5.1 Identify Host Definition
- From Log Activity tab -> Rules
- Select Building Blocks from Display
- Search for HostDefinition and HostReference
- Review the configuration of hosts
2.5.2 Identify Port Definition
- From Log Activity tab -> Rules
- Select Building Blocks from Display
- Search for Port Definition
- Review the configuration of hosts
2.5.3 Identify Building Block definitions and tuning opportunities
- Host Definitions
- Port Definitions
- False Positive Definitions
- Network Definitions
- Compliance Definitions
2.5.4 View of Building Blocks and reference sets
• https://youtu.be/mNyd8FNns_4
• https://www.youtube.com/watch?v=xhrYeD3Pxiw
• https://www.youtube.com/watch?v=UmKMbfmjqKQ
Tuning building blocks
You can edit building blocks to reduce the number of false positives that are generated by IBM®
QRadar®.
About this task
To edit building blocks, you must add the IP address or IP addresses of the server or
servers into the appropriate building blocks.
Procedure
• Click the Offenses tab.
• On the navigation menu, click Rules.
• From the Display list, select Building Blocks.
• Double-click the building block that you want to edit.
• Update the building block.
• Click Finish.
The following table describes editable building blocks.
• https://www.ibm.com/docs/en/qsip/7.4?topic=blocks-tuning-building
Question
What is QRadar Flow Bias?
Answer
Flow Bias is used to describe the relative size, or data transfer bias, of a flow, based
on transfer into or out of the network, where local network resources are defined as
those entered into the Network Hierarchy. Any address not defined in the Network
Hierarchy are thus ‘unknown’, and are effectively considered as external or
‘Remote’. In/Out Bias requires traffic to be entering into or leaving your network.
The possible values for Flow Bias are:
• Mostly Out/In Communication - The ratio on these Flows is more than 70% in one
direction.
• For most enterprise users, the majority of your traffic should be Mostly In,
if most of your endpoints are user workstations, which would be pulling
information towards the local workstations.
• Mostly out, could represent local file or web servers, which are sending out
more data in the form of html responses or file downloads than they are
receiving URL requests. An example use case for monitoring for DLP in
QRadar, is to watch your user segments for “Mostly Out” traffic, indicating
some sort of large outbound file transfer.
• Near Same Communication - The ratio of these flows is between 30% and 70%
per direction. Near Same communication is not as common as Mostly In/Out.
• Other - Local to Local (Internal) and Remote to Remote (both Source and
Destination address unknown) traffic. If you are monitoring Internal Network
Points within your organization, you should expect to see a fair amount
of Other or Local to Local data.
Procedure
• From the main navigation menu in the app, click Host Definitions.
• Optional: Watch tuning videos to learn more about the importance of defining host
definitions, and to get tips on how to automatically populate them.
• Click Host definitions and review and update IPs and ports in BBs from the Host
Definition group or check when BBs were last updated.
• Optional: To instantly refresh the rules from QRadar, click the Refresh icon.
Otherwise, the app automatically updates data from the Console every 15 minutes.
• To edit IPs in reference sets in building blocks, complete the following steps:
• Click Host definitions > IPs & Ports.
• Click a link or the pencil icon (Edit).
• On the Edit reference set page, add an IP or select an existing IP and delete it
from the reference set.
The reference set opens in the QRadar Reference Data Management app, if
the app is installed on the QRadar Console.
• To edit ports in building blocks or rules sets, complete the following steps:
• Click Host definitions > IPs & Ports.
• Click a link or the pencil icon (Edit).
• In the Edit ports window, edit the list of ports as needed, and click OK.
A list accumulates the ports as you edit, displaying a star next to each update.
• Click Save when you're done.
Investigating QRadar rules and building blocks
Investigate your rules by filtering different properties to ensure that the rules are defined and
working as intended, including log source coverage. Determine which rules you might need to edit
in IBM® QRadar® or investigate further in the IBM QRadar Use Case Manager app.
Before you begin
Ensure you have the proper user permissions to view and maintain QRadar rules. For more
information, see Assigning user permissions for QRadar Use Case Manager.
Procedure
• Go to the Use Case Explorer page, click the list icon, and pick a template to use.
• Filter rules and building blocks by attributes, activity, tests, MITRE ATT&CK tactics
and techniques, or content extension attributes.
• To find the rule you want to edit or search, filter on the rule name, tactic, or
technique by using a regular expression. You can also use the Group filter to select
the group you want to search, such as authentication or compliance.
• To create rules, click the plus sign icon and select either Event or
Flow or Offense to open the rule wizard.
It might take several minutes for the new rule to appear in the report. To see the
new rule immediately, click the Refresh icon in the report menu bar.
• Customize the report presentation to make it easier to investigate the rules and
building blocks.
• To investigate an individual rule or building block, make sure that the report table is
ungrouped. Then, select the rule name to open the rule investigation page, which
provides details about the rule or building block you selected.
• To investigate multiple rules or building blocks simultaneously, click the pencil icon
in the report table to display checkboxes for each table row. Select the relevant rules
or building blocks that you want to edit, and then click Open in rule wizard.
Important:
On QRadar 7.4.1 Fix Pack 2 or later, you can change the date range for the trend of
the selected rule in the Offense creation by current rule in a certain time chart.
The date range defaults back to the filtered date range (1 month) when you close
and reopen the rule.
On QRadar 7.3.3, the default date range is 3 days and cannot be edited.
• To enable or disable rules, make sure that the Rule enabled column is visible in the
report, and then switch the toggle to On or Off.
Important: You cannot disable an enabled rule if it has dependents. You cannot
enable a rule if it has any disabled or noninstalled dependencies. A list of
dependents or dependencies is available for review in the warning messages.
• Edit MITRE mappings for rules or building blocks. For more information, see Editing
MITRE mappings in a rule or building block.
• To add custom rule attributes to the selected rule or building block, follow these
steps:
• Click Open in rule wizard on the report menu bar.
• In the center pane of the screen, expand the Custom attributes section.
• If no custom attributes are currently added to the rule, click the plus sign
icon and select the checkbox for each relevant attribute and value. Then,
click Save and apply.
Tip: You can also define new custom attributes in this window.
• If you want to add more values to the custom attributes already added to the
rule, click the plus sign icon for the attribute and select values from the list.
Tip: You can also define new custom attribute values in this window.
• Close the wizard.
Tip: To fully manage custom rule attributes and their values, such as editing
or deleting, go to Settings > Custom Rule Attributes.
• To investigate QRadar User Behavior Analytics rules, see Investigating user
behavior analytics rules.
• Visualize your rules and building blocks after you organize the report data.
• Export the report as a CSV or XML file to share with others.
• Export the MITRE mappings as a JSON file to share with others.
As you select filters, the unapplied filter tags appear in the filters row with a lighter colored
background. After you apply the filters, the tags change to a darker colored background.
Procedure
• On the Use Case Explorer page, select from the filters in the Rule attributes section.
The following list describes some of the rule attributes you can filter and how to use
them:
Rule name
Enter a specific rule name or search for it by using regular expressions.
Rule enabled
See which rules are enabled or disabled to ensure that your system generates
meaningful offenses for your environment.
Rule category
Filter by custom or anomaly detection rules in the report. Custom rules perform
tests on events, flows, and offenses to detect unusual activity in your network.
Anomaly detection rules perform tests on the results of saved flow or event
searches as a means to detect when unusual traffic patterns occur in your network.
Group
Categorize the rules or building blocks into groups to help you efficiently view and
track your rules. For example, you can view all rules that are related to
compliance. Select specific groups or click Select all.
Tip: The Unassigned filter helps you see which rules don't belong to a group, such
as "Amazon AWS" or "Compliance". Apply the filter and then edit the filtered rules in
the rule wizard to add more information and make them more robust.
Action
Select the action that you want the rule to take when an event occurs.
Tip: The Unassigned filter helps you see which rules don't have an action, such as
"Event is part of an offense" or "Severity is set". Apply the filter and then edit the
filtered rules in the rule wizard to add more information and make them more
robust.
Response
Select the response that you want QRadar to take when a rule is triggered.
Tip: The Unassigned filter helps you see which rules don't have a response, such as
"Email" or "Send to Local Syslog". Apply the filter and then edit the filtered rules in
the rule wizard to add more information and make them more robust.
Creation and modification dates
Use the date filters to see what changed during the last week, or to see rules that
were modified. The modification date shows the rules that were modified but not
the modified content of the rules.
Notes
Enter a specific note or search for it by using regular expressions. For example, you
can enter ^$ to find rules with empty notes and then add information to the note.
User Behavior Analytics rules
Filter rules on whether they are related to IBM QRadar User Behavior Analytics.
This filter displays only when the QRadar User Behavior Analytics app is installed in
your QRadar deployment.
Tips: For a rule to be considered related to QRadar User Behavior Analytics, the
following conditions must be met:
• The Dispatch New Event option must be selected in the Rule Response.
• The User Behavior Analytics risk score must be set on the Rule
Details page in QRadar Use Case Manager.
For more information, see Integrating new or existing QRadar content.
• Select from the filters in the Rule activity section. Filtering for inactive rules is
supported on QRadar 7.4.1 or later.
Rule active
Select Never to see which rules have never assigned an event to an offense since
they were installed in QRadar.
Rule not active (timeframe)
The default date is in the past week. Change the time period, or choose to filter rules
that aren't active since a specific date.
• Select from the filters in the Rule tests section. The following list describes some of
the rule tests you can filter:
Test definition
Enter a specific test definition or search for it by using regular expressions.
Log source type
A rule relates to log source types if it directly references the log source type, or if it
references a log source, QID, or event category that maps to the log source type. By
default, you see only the log source types that are used by log sources in
your QRadar environment. Click Show all types to see the log source types that you
can use directly in a test or by the QID or event categories.
Log sources
A rule relates to log sources when the log source that is referenced by a test is used
in the rule. Use the search filter to find specific log sources to filter or click Select
all to filter all of the log sources in the list. You can filter on the log source name or
by using a regular expression. This type of search is useful when you have hundreds
of thousands of log sources in your environment.
Log source group
A rule relates to log source groups when a log source in the log source group that is
referenced by a test is used in the rule. For example, you can select sensor device as
the log source group and see only rules that run tests on log sources that are part of
the sensor device log source group.
Domains
A rule can work in the context of a single domain or in the context of all domains. If
there is more than one domain in your environment, they are added to the filter list.
Use this option to filter the domains in a multi-domain environment by each
individual domain.
To add a domain column to the rule report, click the gear icon. Scroll down to
the Rule tests section of the window, select Domain in the Test option list, and
then click Apply.
Other tests
Hover over each checkbox label to see the specific rule tests. For example, search for
a rule that references a specific value of a test, such as an IP like "Identity IP is not
0".
Tips:
• To identify source IP addresses only, add a column for Test: IP, and then
a source filter in the Test definition field.
• If you have multi-tenancy, use the Domain test to distinguish rules from one
tenant to another. Select the Domain filter, and then add the Domain column.
• If you're looking for custom properties or reference sets, use the predefined
templates.
• If you want to see the log source types that are used or unused, select the
appropriate filter. For example, the Log source coverage by rule template
shows the rules that are related to log source types based on tests. Assume
that 342 log source types are available in your environment. To see only the
rules for log source types that are currently used (log source types that have
at least one log source), select the Log source type - used filter.
• Select from the filters in the MITRE ATT&CK section. The following options are
available to filter:
Tactics
Select tactics from the list. For example, an Initial Access tactic is used by
adversaries who are trying to get into your network.
Technique
Search for techniques and their sub-techniques or select them from the list. The
techniques are pre-filtered to match the selected tactic. For example, an Account
Discovery technique occurs when adversaries attempt to get a list of your local
system or domain accounts.
Sub-techniques are identified by a dot in the ID, such as "T1003.002 Security
Account Manager". Sub-techniques provide a more specific description of the
behavior an adversary uses to achieve their goal. For example, an adversary might
dump credentials by accessing the Local Security Authority (LSA) Secrets.
Mapping confidence
Indicates mappings that are assigned a specific level of confidence for rule coverage.
Mapping enabled
Indicates for each rule whether the mapping between the tactic or technique and
rules is turned on. Mappings that are not enabled are not added to the technique
coverage heat map.
• If you have many log sources in your environment, you can search for specific ones
by using the Search field in the Filters pane and then select them to fine-tune the
report. This search can make it easier to find a specific filter in the large list of filters
and log sources.
• To filter content extension attributes, follow the steps in Identifying gaps in QRadar
rule coverage from content extensions.
• To clear the report results, click Clear filters, choose new filters in the left pane, and
then click Apply filters to display new results.
TASK: 2.6 Review and recommend updates to the network hierarchy
2.6.1 Organize systems and networks by roles or similar traffic patterns in the network
hierarchy
2.6.2 Combine multiple CIDRs or subnets into a single network group
2.6.3 Consider using the most effective method to viewing network activity.
- Net Hierarchy does not need to resemble the physical deployment
TASK: 2.7 Review and recommend updates to building blocks and rules
2.7.1 Review active rules that generates offenses
- From QRadar, use Case Manager, Click Active Rules
- Apply filters to active rules to fine-tune the investigation pg. 17
- Filter rules that contribute to offense by time frame
- Select parameters to exclude offenses from results
- Select the closure reason for an offense as filters
- Review offense by rule
Procedure
• From the QRadar Use Case Manager main menu, click Active Rules.
• Apply filters to the active rules to fine-tune your investigation.
• Filter the rules that started to contribute to offenses according to the
calendar or by timeframe. The default date is in the last three days. Change
the timeframe, or choose to filter the rules that began to contribute to
offenses between specific dates and times.
• Select parameters to exclude offenses from the results, such as hidden or
closed offenses. Offenses that are marked for follow-up are flagged for
further investigation. You might have offenses that you want to retain
regardless of the retention period; those offenses are protected to prevent
them from being removed from QRadar after the retention period elapses.
Inactive offenses can be removed from visualization so that reports aren't
cluttered.
• Select the closure reason for an offense. For example, you can filter to see
which rules generated the offenses that were closed as false positives. Rules
with many false positives likely need tuning. Offenses that are closed as a
non-issue are usually considered not critical to your organization.
• Click Apply Filters.
• Review the Offenses by rule, Offenses by category and rule, Closed offenses by
reason and rule, Events count trend by rule, and Offense creation trend by
rule charts.
Tip: The Offense creation trend by rule chart is supported on QRadar 7.4.1 Fix
Pack 2 or later.
• Hover over the chart segments to see more details about an offense.
• Hide or show chart legends.
• Click legend keys to fine-tune the chart display.
• Zoom in for further investigation.
• Expand bar and timeline charts to full screen.
• Export bar and timeline charts to CSV, PNG, or JPG formats.
• View bar and timeline chart data in tabular format. Then, export the data in
CSV format to view offline or share with colleagues.
• In the table, tune the rules by choosing from the following methods:
• Toggle between the top noisy rules or all the rules from the list.
• Add more rules to investigate by selecting a group of rule or an individual
rule from the list.
Tip: The Event count column in the report indicates how many events the
rule associated to the offenses counted in the Offense count column.
The Event count column is supported on QRadar 7.4.1 Fix Pack 2 or later.
• Click Investigate.
• Watch a short video to learn how to use the rule wizard.
• Review each individual rule and the BBs that contribute to the active rule.
For each rule, you can further investigate it by clicking Show dependency
tree or Edit in rule wizard.
• Use the visualization diagram to further fine-tune any related options for the
rule or building block, such as log source types, custom properties, or
reference sets.
• Review the offenses that are generated by each active rule.
• Review the values in the various groups of tests, and tune if necessary.
• Review the MITRE ATT&CK mappings for the rule, and edit if necessary.
• To add custom rule attributes to the selected rule or building block, see Step
10 in Investigating QRadar rules and building blocks.
• To investigate QRadar User Behavior Analytics rules, see Investigating user
behavior analytics rules.
• To return to the Active Rules page, click Active Rules in the breadcrumbs.
• To export selected rule data in the report to CSV format that you can further process
or view in Excel, select the relevant checkboxes and then click Export
QRadar Use Case Manager app
Use the guided tips in the IBM® QRadar® Use Case Manager app to help you ensure that IBM
QRadar is optimally configured to accurately detect threats throughout the attack chain.
QRadar Use Case Manager includes a use case explorer that offers flexible reports that are
related to your rules. QRadar Use Case Manager also exposes pre-defined mappings to
system rules and helps you map your own custom rules to MITRE ATT&CK tactics and
techniques.
Explore rules through visualization and generated reports
• Explore the rules through different filters to ensure that they work as intended.
• Generate reports from predefined templates, such as searches based on rule
response and actions, log source coverage, and many others.
• Customize reports to see only the information that is critical to your analysis.
Tune your environment based on built-in analysis
• Gain tuning recommendations unique to your environment right within the app.
• Identify the topmost offense-generating or CRE-generating rules, and then follow
the guide to tune them.
• Reduce the number of false positives by reviewing the most common configuration
steps. Easily update network hierarchy, building blocks, and server discovery based
on recommendations.
Procedure
• From the main menu, click CRE Report.
• Filter the rules according to the calendar or by timeframe. The default date is in the
last three days. Change the timeframe, or choose to filter the rules that began to
contribute to offenses between specific dates and times.
• Select the number of results to return, and click Apply Filters.
• Review the CRE events by rule and the CRE events by category and rule reports.
• Hover over the chart segments to see more details about an offense.
• Hide or show chart legends.
• Click the legend keys in the CRE events by rule report to fine-tune the chart
display.
• Zoom in for further investigation.
• Expand the CRE events by category and rule chart to full screen.
• Export the CRE events by category and rule chart to CSV, PNG, or JPG
formats.
• View the CRE events by category and rule chart data in tabular format.
Then, export the data in CSV format to view offline or share with colleagues.
• Tune the rules by choosing from the following methods:
• Toggle between the topmost noisy rules or all the rules from the list.
• Add another rule to investigate by selecting a group of rule or an individual
rule from the list.
• Click Investigate.
• Review each individual rule and the BBs that contribute to the CRE event. For
each rule, you can further investigate it by clicking Show dependency
tree or Edit in rule wizard.
• Use the visualization diagram to further fine-tune any related options for the
rule or building block, such as log source types, custom properties, or
reference sets.
• Review the events that are generated by the current rule you selected.
• To instantly refresh the rules from QRadar®, click the Refresh icon.
Otherwise, the app automatically updates data from the Console every 15
minutes.
• Review the threshold values in the tests, and tune if necessary.
• Review the values in the various groups of tests, and tune if necessary.
• Review the MITRE ATT&CK mappings for the rule, and edit if necessary.
• To add custom rule attributes to the selected rule or building block, see step
9 in Investigating QRadar rules and building blocks.
• To investigate QRadar User Behavior Analytics rules, see Investigating user
behavior analytics rules.
• To return to the CRE events page, click CRE Report in the breadcrumbs.
• To export selected rule data in the report to CSV format to process or view in Excel,
select the relevant checkboxes and then click Export.
TASK: 2.8 Describe the different types of rules, including behavioral, anomaly and
threshold
2.8.2 Understand how an Anomaly rule is created and how that is different than a Custom
Rule
2.8.3 Create behavior, anomaly and threshold rules in QRadar
• https://www.youtube.com/watch?v=LgksZvchS38
After the initial Offense Analysis and based on technical skills in understanding QRadar
rules and building block design, it is time to focus on the Analyst’s main task of Threat
Hunting. Starting with the results presented in an offense, the Analyst will investigate the
evidence inside an offense, such as event and flow details, triggered rules, payloads, and
more. Utilizing filters and advanced searches the Analyst will be able to distinguish real
threats from false positives.
TASK: 3.1 Investigate Event and Flow parameters
3.2.1 Perform detailed searches to find similar log and flow activity at any level of
granularity:
- On the QRadar Log and Network Activity tabs, select "Advanced" in the list beside the
search field.
- Enter an AQL query and click Search
WHERE
Use the WHERE clause to insert a condition that filters the output, for
example, WHERE logsourceid='65'.
GROUP BY
Use the GROUP BY clause to group the results by one or more columns that you
specify in the query, for example, GROUP BY logsourceid.
HAVING
Use the HAVING clause to specify a condition after the GROUP BY clause, for
example, HAVING MAG > 3.
ORDER BY
Use the ORDER BY clause to order the results for a column in the AQL query in an
ascending or descending order, for example, ORDER BY username DESC.
LIMIT
Use a LIMIT clause to limit the number of results that are returned to a specific
number, for example LIMIT 50 to limit the output to 50 results.
LAST
Use a LAST clause to specify a time frame for the query, for example LAST 1 HOURS.
The following example incorporates all of the clauses that are described in the list:
SELECT sourceip, destinationip, username
FROM events
WHERE username = 'test name'
GROUP by sourceip, destinationip
ORDER BY sourceip DESC
LIMIT 10
LAST 2 DAYS
• SELECT statement
Use the SELECT statement to define the criteria that you use to retrieve event or
flow data.
• WHERE clause
Filter your AQL queries by using WHERE clauses. The WHERE clause describes the
filter criteria that you apply to the query and filters the resulting view to accept only
those events or flows that meet the specified condition.
• GROUP BY clause
Use the GROUP BY clause to aggregate your data by one or more columns. To
provide meaningful results of the aggregation, usually, data aggregation is combined
with aggregate functions on remaining columns.
• HAVING clause
Use the HAVING clause in a query to apply more filters to specific data by applying
filters to the results after the GROUP BY clause.
• ORDER BY clause
Use the ORDER BY clause to sort the resulting view that is based on expression
results. The result is sorted by ascending or descending order.
• LIKE clause
Use the LIKE clause to retrieve partial string matches in the Ariel database.
• COUNT function
The COUNT function returns the number of rows that satisfy the WHERE clause of a
SELECT statement.
• Quotation marks
In an AQL query, query terms and queried columns sometimes require single or
double quotation marks so that QRadar can parse the query.
• Sample AQL queries
Use Ariel Query Language (AQL) queries to retrieve data from the Ariel database
based on specific criteria.
Time criteria in AQL queries:
Define time intervals in your AQL queries by using START and STOP clauses, or use the
LAST clause for relative time references.
Define the time settings that are passed to the AQL query
The SELECT statement supports an arieltime option, which overrides the time settings.
You can limit the time period for which an AQL query is evaluated by using the following
clauses and functions:
• START
• STOP
• LAST
• NOW
• PARSEDATETIME
START
You can pass a time interval to START selecting data (from time), in the following formats:
yyyy-MM-dd HH:mm
yyyy-MM-dd HH:mm:ss
yyyy/MM/dd HH:mm:ss
yyyy/MM/dd-HH:mm:ss
yyyy:MM:dd-HH:mm:ss
The timezone is represented by 'z or Z' in the following formats:
yyyy-MM-dd HH:mm'Z'
yyyy-MM-dd HH:mm'z'
Use START in combination with STOP.
Examples
SELECT *
FROM events WHERE userName IS NULL
START '2014-04-25 15:51'
STOP '2014-04-25 17:00'
Returns results from: 2014-04-25 15:51:00 to 2014-04-25 16:59:59
SELECT *
FROM events WHERE userName IS NULL
START '2014-04-25 15:51:20'
STOP '2014-04-25 17:00:20'
Returns results from: 2014-04-25 15:51:00 to 2014-04-25 17:00:59
STOP
You can pass a time interval to STOP selecting data (end time), in the following formats:
yyyy-MM-dd HH:mm
yyyy-MM-dd HH:mm:ss
yyyy/MM/dd HH:mm:ss
yyyy/MM/dd-HH:mm:ss
yyyy:MM:dd-HH:mm:ss
The timezone is represented by 'z or Z' in the following formats:
yyyy-MM-dd HH:mm'Z'
yyyy-MM-dd HH:mm'z'
Use STOP in combination with START.
Examples
SELECT * FROM events
WHERE username IS NULL
START '2016-04-25 14:00'
STOP '2016-04-25 16:00'
SELECT * FROM events
WHERE username IS NULL
START '2016-04-25 15:00:30'
STOP '2016-04-25 15:02:30'
LAST
You can pass a time interval to the LAST clause to specify a specific time to select data from.
The valid intervals are MINUTES, HOURS, and DAYS
Examples
SELECT * FROM events
LAST 15 MINUTES
SELECT * FROM events
LAST 2 DAYS
SELECT * from events
WHERE userName ILIKE '%dm%'
LIMIT 10
LAST 1 HOURS
Note: If you use a LIMIT clause in your query, you must place it before START and STOP
clauses, for
example:
SELECT *
FROM events
LIMIT 100
START '2016-06-28 10:00'
STOP '2016-06-28 11:00'
Time functions
Use the following time functions to specify the parse time for the query.
NOW
Purpose
Returns the current time that is expressed as milliseconds since the time 00:00:00
Coordinated Universal Time (UTC) on January 1, 1970.
Example
SELECT ASSETUSER(sourceip, NOW())
AS 'Asset user' FROM events
PARSEDATETIME
Purpose
Pass a time value to the parser, for example, PARSEDATETIME('time reference').
This 'time reference' is the parse time for the query.
Example
SELECT * FROM events
START PARSEDATETIME('1 hour ago')
TASK: 3.3 Search & filter logs by specific log source type
Searching events:
You can search for all authentication events that IBM® QRadar® received in the last 6 hours.
Procedure
• Click the Log Activity tab.
• On the toolbar, select Search > New Search.
• In the Time Range pane, define the time range for the event search:
• Click Recent.
• In the Recent list, select Last 6 Hours.
• In the Search Parameters pane, define the search parameters:
• In the first list, select Category [Indexed].
• In the second list, select Equals to.
• In the High Level Category list, select Authentication.
• In the Low Level Category list, accept the default value of Any.
• Click Add Filter.
• In the Column Definition pane, select Event Name in the Display list and drag it to
the Columns list.
• Click Search.
Filtering events:
Filter the QRadar Analyst Workflow Events page to display only the specific events you want to
investigate.
As you apply filters, the events table displays only the events that meet your filter criteria.
Tip: You can copy and paste the URL from your browser to share the events page, including
all filters and configuration options.
Procedure
• To apply a filter, click any of the following categories to see filtering options for that
category:
• Event Time
• Magnitude
• Log Source Name
• Category
• Source IP
• Source Port
• Destination IP
• Destination Port
• Event Name
• User
• To include only events with specific attributes, select that attribute in the filters list.
To exclude events with specific attributes, click the vertical ellipsis icon [ ] next
to the attribute, and click Apply IS NOT Filter.
Tip: You can right-click on a Log Source, Source IP, Destination IP, Category, or
Username in the events table and quickly apply an IS or IS NOT filter to the events.
• To sort the events table in ascending or descending order by an attribute, click the
appropriate table heading.
• To clear individual filters, click the close icon [x] on the filter indicator. To clear all
filters, click Clear filters.
• Click Update events to refresh the events results.
TASK: 3.4 Configure a search to utilize time series
Procedure
• In the chart title bar, click the Configure icon.
• In the Value to Graph list, select Destination IP (Unique Count).
• In the Chart Type list, select Time Series.
• Click Capture Time Series Data.
• Click Save.
• Click Update Details.
• Filter your search results:
• Right-click the event that you want to filter.
• Click Filter on Event Name is <Event Name>.
• To display the event list that is grouped by the user name, select Username from
the Display list.
• Verify that your search is visible on the Dashboard tab:
• Click the Dashboard tab.
• Click the New Dashboard icon.
• In the Name field, type Example Custom Dashboard.
• Click OK.
• In the Add Item list, select Log Activity > Event Searches > Example
Search 1.
Result: The results from your saved event search display in the Dashboard.
The amount of returned data can result in a noisy chart that doesn't provide much
information. The event start times might not occur at regular intervals, which can create
gaps in the data set.Figure 1. Too much data results in noisy results
Creating intervals in a time series query
The first step is to decide the type of interval to use for your data analysis. Do you want to
look at data from a narrow interval, such as every second? Or in larger intervals of every
minute or every hour? This decision is important because data points must be grouped in
intervals so that a metric is calculated.
Using the original query, you can group the data by using one of the following techniques:
• Using the GROUP BY clause to create an interval: GROUP BY starttime/60000.
Because starttime is in displayed in milliseconds, if you divide by 60,000 (60
seconds x 1000 milliseconds), you create groups or intervals of 60 seconds (1
minute).
• Changing the ORDER BY clause to use the aggregate sTime.
The query changes to the following code:
The data is now more visually consumable and ensures that one data point occurs every
minute. Now that the intervals are properly defined, you can use a few strategies to
format the data into a more friendly time series format.
Figure 2. More consumable data results with properly defined intervals
One method for creating a time series chart involves pivoting the rows of data into
columns that directly represent a series in Pulse. For example, if your use case is to count
events for a specific device for each 1-minute interval, you must create a separate
conditional aggregate for each series that you want to plot on the graph.
SUM(IF LOGSOURCETYPENAME(devicetype) = 'System Notification' THEN 1.0 ELSE 0.0)
as system_notification
SUM(IF LOGSOURCETYPENAME(devicetype) = 'SIM Audit' THEN 1.0 ELSE 0.0) as sim_audit
The query takes the row data for both System Notification and SIM Audit devices and
pivots them into separate columns that correspond to a series on the chart:
Figure 3. Returned results for separate columns
The following image shows the view configuration and chart display for pivoting the
rows.Figure 4. Configuring the view and chart display
While this method is fairly efficient to transform relational data into time series data, you
must know ahead of time what data you're looking for.
The query is more efficient, and ensures that the three rendered series correspond to the
top three active devices in the selected time span.
• Tracking the top five most active devices in the last ten minutes
In this example, you create a dynamic time series chart to track the top five most
active devices in your environment in the last ten minutes. In QRadar Pulse V2.1.4
or later, the time series chart has a dynamic series option that is useful when you
don't know which devices you want to track, or find it difficult to make time series
charts work properly. It automatically detects series and displays them as separate
lines on the time series chart.
• Tracking flow data trends over 24 hours
In this example, you learn how to create a time series chart to track all flow data
from a specific interface over the last 24 hours.
• Aggregating data to create a time series chart
In this example, you learn how to create a time series chart to show the number of
events every minute for the SIM User Authentication category. You use global views
to aggregate the data into a format that IBM QRadar Pulse can display.
Creating an aggregated data view in the Log Activity tab
Aggregated data views are accumulated buckets of data that is used to generate reports and
dashboards. These global views are based on saved searches that accumulate the data regularly in
the background. Use the following procedure to create a time series graph for a SIM User
Authentication category.
Procedure
• In IBM® QRadar®, go to the Log Activity tab and switch to the Advanced
Search field.
• To make the global view reusable for any category, remove the "where" clause in the
previous example, enter the following AQL query, and then click Search.
select categoryname(category) as catname, category, count(category) as catcount, first(starttime) as Time
from events
group by category, starttime/60000
order by Time
last 1 hours
Note:
By default, QRadar displays two "Top 10" charts above the results list. You work with these
charts to create the Global View. By default, it looks something like the following example:
• To convert the chart into a time series chart that works with Pulse,
select Time in the Value to Graph list, and then change the chart type
to Time Series.
• From the Value to Graph list, select COUNT.
• Select the Capture Time Series Data check box, and then click Save.
The Save Criteria page opens, where you create a saved search and a Global
View.
• Enter Pulse Category Count in the search name.
• Enter values for the following parameters:
• Click OK
Note: After the criteria is saved, the Global View is now active and ready for you to use in IBM
QRadar Pulse.
Procedure
• From the QRadar Use Case Manager main menu, click Active Rules.
• Apply filters to the active rules to fine-tune your investigation.
• Filter the rules that started to contribute to offenses according to the
calendar or by timeframe. The default date is in the last three days. Change
the timeframe, or choose to filter the rules that began to contribute to
offenses between specific dates and times.
• Select parameters to exclude offenses from the results, such as hidden or
closed offenses. Offenses that are marked for follow-up are flagged for
further investigation. You might have offenses that you want to retain
regardless of the retention period; those offenses are protected to prevent
them from being removed from QRadar after the retention period elapses.
Inactive offenses can be removed from visualization so that reports aren't
cluttered.
• Select the closure reason for an offense. For example, you can filter to see
which rules generated the offenses that were closed as false positives. Rules
with many false positives likely need tuning. Offenses that are closed as a
non-issue are usually considered not critical to your organization.
• Click Apply Filters.
• Review the Offenses by rule, Offenses by category and rule, Closed offenses by
reason and rule, Events count trend by rule, and Offense creation trend by
rule charts.
Tip: The Offense creation trend by rule chart is supported on QRadar 7.4.1 Fix
Pack 2 or later.
• Hover over the chart segments to see more details about an offense.
• Hide or show chart legends.
• Click legend keys to fine-tune the chart display.
• Zoom in for further investigation.
• Expand bar and timeline charts to full screen.
• Export bar and timeline charts to CSV, PNG, or JPG formats.
• View bar and timeline chart data in tabular format. Then, export the data in
CSV format to view offline or share with colleagues.
• In the table, tune the rules by choosing from the following methods:
• Toggle between the top noisy rules or all the rules from the list.
• Add more rules to investigate by selecting a group of rule or an individual
rule from the list.
Tip: The Event count column in the report indicates how many events the
rule associated to the offenses counted in the Offense count column.
The Event count column is supported on QRadar 7.4.1 Fix Pack 2 or later.
• Click Investigate.
• Watch a short video to learn how to use the rule wizard.
• Review each individual rule and the BBs that contribute to the active rule.
For each rule, you can further investigate it by clicking Show dependency
tree or Edit in rule wizard.
• Use the visualization diagram to further fine-tune any related options for the
rule or building block, such as log source types, custom properties, or
reference sets.
• Review the offenses that are generated by each active rule.
• Review the values in the various groups of tests, and tune if necessary.
• Review the MITRE ATT&CK mappings for the rule, and edit if necessary.
• To add custom rule attributes to the selected rule or building block, see Step
10 in Investigating QRadar rules and building blocks.
• To investigate QRadar User Behavior Analytics rules, see Investigating user
behavior analytics rules.
• To return to the Active Rules page, click Active Rules in the breadcrumbs.
• To export selected rule data in the report to CSV format that you can further process
or view in Excel, select the relevant checkboxes and then click Export.
• Reviewing your network hierarchy
A well-defined and maintained network hierarchy can help prevent the generation
of false positive offenses. The network hierarchy is used to define which IP
addresses and subnets are part of your network. Ensure that all internal address
spaces, both routable and non-routable, are defined within your IBM
QRadar network hierarchy. QRadar can then distinguish your local network from
the remote network. Event and flow context is based on whether the source and
destination IPs are local or remote. Event and flow context, and data from your
network hierarchy are used in rule tests.
• Reviewing building blocks
Building blocks are a reusable set of rule tests that can be used within rules when
needed. Host definition building blocks (BB:HostDefinition) categorize assets and
server types into CIDR/IP ranges. By populating host definition building blocks, IBM
QRadar can identify the type of appliance that belongs to an address or address
range. These building blocks can then be used in rules to exclude or include entire
asset categories in rule tests.
Q: What is the difference between Start Time, Storage Time,
and Log Source Time on the Event Information screen in
QRadar?
Cause
QRadar displays three time stamp fields on events when users view the details of an event. These
three timestamps can have different values depending on where the data originated, when data
arrives, and when it is written to disk in QRadar.
As shown in the example image above, there is a six second delay when the remote Syslog
event "An account was logged off" and when QRadar received it as represented by the
Start Time and Log Source Time.
Answer
Start Time
The Start Time in an event record and represents the time at which the event arrived at
the QRadar appliance. When an event arrives in the event Pipeline an Object is created in
memory, then the start time is set to that time.
Note: In QRadar version 7.3.1 and above the Start Time begins after the EC-ECS Ingress
component of the Event Pipeline.
Storage Time
The Storage Time is when data is written out to disk by the Ariel component at the end of
the Event Pipeline. This can be useful for determining if the Event Pipeline is backed up,
for performance or licensing reasons. When investigating events delayed in the pipeline,
or messages about licensing or dropped events because of licensing, you can look at the
start timestamps and storage timestamps to see how far apart they are. This will give an
indication of how delayed the pipeline may be.
Note:
• If there is no time available in the payload at all, then the log source time field is
populated with the same value as the start time.
• If an event includes a time zone, then we adjust the Log Source Time to account for
the time zone change.
Example:
If an event includes a time zone that is GMT+8 to the Console, the Log Source Time should
be listed as GMT-8 from the time stamp in the event payload. This is so users can
understand when the event occurred based on the Console time.
TASK: 3.7 Recommend changes to tune QRadar SIEM after offense analysis identifies
issues
The tests in a rule are executed in the order that they are displayed in the user interface.
The most memory intensive tests for the CRE are the payload and regular expression
searches. To ensure that these tests run against a smaller subset of data and execute faster,
you must first include one of the following tests:
• when the event(s) were detected by one or more of these log source types
• when the event QID is one of the following QIDs
• when the source IP is one of the following IP addresses
• when the destination IP is one of the following IP addresses
• when the local IP is one of the following IP addresses
• when the remote IP is one of the following IP addresses
• when either the source or destination IP is one of the following IP addresses
• when the event(s) were detected by one of more of these log sources
You can further optimize QRadar® by exporting common tests to building blocks. Building
blocks execute per event as opposed to multiple times if tests are individually included in a
rule.
For more information about optimizing custom rules, see the IBM® QRadar User Guide.
False positives configuration
Manage the configuration of false positives to minimize their impact on legitimate threats and
vulnerabilities. To prevent IBM® QRadar® from generating an excessive number of false positives,
you can tune false positive events and flows to prevent them from creating offenses.
False positive rule chains
The first rule to execute in the custom rules engine (CRE) is FalsePositive:False Positive Rules
and Building Blocks. When it loads, all of its dependencies are loaded and tested.
When an event or flow successfully matches the rule, it bypasses all other rules in the CRE
to prevent it from creating an offense.
3.9.1 This task is covered under Search & filter logs task.
TASK: 3.10 Investigate the payload for additional details on the offense
strings:
$str1 = "pattern of interest"
condition:
$str1 at 25
}
The following example shows a more complex Yara rule that flags content that contains the hex
sequence, and str1 at least three times:
condition:
$hex1 and (#str1 > 3)
}
When the Yara rule is uploaded, the decapper uses rules that are specified when it finds a
file in a recovery or a PCAP upload. If there is matching content that is found,
a SuspectContent field is added under the Attributes tab for a document. The Suspect
Content Description property is populated with the Yara rule name and any tags that are
identified by the rule.
Restriction: Implementation of Yara modules is not currently available.
TASK: 3.11 Recommend adding new custom properties based on payload data