3.DSM Configuration Guide
3.DSM Configuration Guide
IBM
Chapter 9. Protocol configuration options
Protocols in IBM QRadar provide the capability of collecting a set of data files by using various connection
options. These connections pull the data back or passively receive data into the event pipeline in QRadar.
Then, the corresponding Device Support Module (DSM) parses and normalizes the data.
The following standard connection options pull data into the event pipeline:
• JDBC
• FTP
• SFTP
• SCP
The following standard connection options receive data into the event pipeline:
• Syslog
• HTTP Receiver
• SNMP
QRadar also supports proprietary vendor-specific protocol API calls, such as Amazon Web Services.
Related information
Adding a log source
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
3Com 8800 Series Switch V3.01.30 Syslog Status and network condition Yes No No
events
Alibaba Cloud Alibaba ActionTrail Alibaba Cloud Object Storage Event format: JSON Yes Yes No
Syslog
Amazon Amazon AWS Application Load Balancer Access Logs Amazon AWS S3 REST API Event format: Space Yes No No
delimited pre-defined fields
Recorded event types: Access
logs
Amazon Amazon AWS CloudTrail Amazon AWS S3 REST API Event versions 1.0, 1.02, Yes No No
1.03, 1.04, 1.05, 1.06 and
Amazon Web Services
1.08 events.
Amazon Amazon AWS Config Amazon AWS S3 REST API Event format: JSON Yes No No
Amazon Amazon AWS Elastic Kubernetes Service Amazon Web Services Event format: JSON Yes No No
Supported version: Kubernetes API 1.19 Recorded event types:
Amazon AWS Kubernetes
Amazon Amazon AWS Network Firewall Amazon AWS S3 REST API Event format: JSON No No No
Recorded event types:
Firewall Alert logs, Firewall
Flow logs
Amazon Amazon AWS Route 53 • Amazon Web Services (Resolver and Event format: Yes No No
Public DNS query logs)
• JSON (Resolver query
• Amazon AWS S3 REST API (Resolver logs)
query logs only)
• Space delimited pre-
• Syslog defined fields (Public DNS
query logs)
Recorded event types: Event
versions 1.0
Amazon Amazon AWS Security Hub Amazon Web Services Event format: JSON No No No
Recorded event types: AWS
Security Finding Format
(ASFF)
Amazon Amazon AWS WAFCentrif Amazon AWS S3 REST API Event format: JSON No No No
Recorded event types: Traffic
allow, Traffic block
Amazon Amazon CloudFront Amazon Web Services Event format: Tab Separated Yes No No
Value (TSV)
Recorded event types:
RealTime Log - TSV
Amazon AWS Verified Access Amazon AWS S3 REST API, Syslog Event format: JSON Yes Yes Yes
Apple Apple Mac OS X version 10.12 Syslog Firewall, web server access, No Yes No
web server error, privilege,
and informational events
Application DbProtect V6.2, V6.3, V6.3sp1, V6.3.1, and v6.4 Syslog All events Yes No No
Security, Inc.
Arbor Networks Arbor Networks Pravail APS V3.1+ Syslog, TLS Syslog All events Yes No No
Arbor Networks Arbor Networks Peakflow SP V5.8 to V8.1.2 Syslog, TLS Syslog Denial of Service (DoS) Yes No No
Authentication
Exploit
Suspicious activity
System
Array Networks SSL VPN ArraySP v7.3 Syslog All events No Yes Yes
Aruba Networks Aruba ClearPass Policy Manager v6.5.0.71095 to Syslog Event format: LEEF Yes Yes No
v6.11.1
Event types: session, audit,
system, insight
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Avaya Inc. Avaya VPN Gateway v9.0.7.2 Syslog All events Yes Yes No
BalaBit IT MicrosoftWindows Security Event Log V4.x Syslog Microsoft Event Log events Yes Yes No
Security
BalaBit IT Microsoft ISA V\v4.x Syslog and WinCollect Microsoft Event Log vents Yes Yes No
Security
Barracuda Spam & Virus Firewall v5.x and later Syslog All events Yes No No
Networks
Barracuda Web Application Firewall v7.0.x Syslog System, web firewall, access, Yes No No
Networks and audit events
Barracuda Web Filter v6.0.x+ Syslog Web traffic and web interface Yes No No
Networks events
Blue Coat SG v4.x+ Syslog, Log File Protocol All events No No Yes
Broadcom CA Access Control Facility (ACF2) (Formerly known as Log File Protocol All events No No Yes
CA Technologies ACF2)
Broadcom CA Top Secret (Formerly known as CA Technologies Top Log File Protocol All events No No Yes
Secret)
Broadcom Symantec SiteMinder (Formerly known as CA Syslog, Log File All events No Yes No
SiteMinder)
Carbon Black Carbon Black v5.1 and later Syslog Watchlist hits Yes No No
Carbon Black Carbon Black Bit9 Security Platform v6.0.2 Syslog All events Yes Yes No
Centrify Centrify Infrastructure Services 2017 Syslog and WinCollect WinCollect logs, Audit events Yes No No
Check Point Check Point versions NG, FP1, FP2, FP3, AI R54, AI Syslog or OPSEC LEA Event format: LEEF (versions Yes Yes Yes
R55, R65, R70, R75, R77, R80, R81, and NGX R77.30, R80.10, R80.20,
R81.10)
Event types: All events
Check Point VPN-1 versions NG, FP1, FP2, FP3, AI R54, AI R55, R65, Syslog or OPSEC LEA Event format: LEEF (versions Yes Yes No
R70, R77, R80, R81, and NGX R77.30, R80.10, R80.20,
R81.10)
Event types: All events
Check Point Check Point Multi-Domain Management (Provider-1) Syslog or OPSEC LEA Event format: LEEF (versions Yes Yes No
versions NG, FP1, FP2, FP3, AI R54, AI R55, R65, R70, R77.30, R80.10, R80.20,
R77, R80, R81, and NGX R81.10)
Event types: All events
Cilasoft Cilasoft QJRN/400 v5.14.K+ Syslog IBM audit events Yes Yes No
Cisco 4400 Series Wireless LAN Controller V7.2 Syslog All events No No No
SNMPv2
Cisco ACS V4.1 and later if directly from ACS V3.x and later if Syslog Failed Access Attempts Yes Yes No
using ALE
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Cisco ASA V7.x and later Syslog All events Yes Yes No
Cisco CSA V4.x, V5.x and V6.x Syslog SNMPv1 SNMPv2 All events Yes Yes No
Cisco CatOS for catalyst systems V7.3+ Syslog All events Yes Yes No
Cisco Cloud Web Security (CWS) Amazon AWS S3 REST API W3C No No No
All web usage logs
Cisco IPS V7.1.10 and later, V7.2.x, V7.3.x SDEE All events No No No
Cisco • Cisco IronPort V5.5, V6.5, V7.1, V7.5 (adds support Syslog, Log File protocol Event format: All events No No No
for access logs) Recorded event types:
• Cisco IronPort ESA: V10.0 Mail (syslog)
• Cisco IronPort WSA: V10.0 System (syslog)
Access (syslog)
Web content filtering (Log
File)
Important: Critical, Warning
and Information logs are
supported.
Cisco Cisco Duo Cisco Duo Event format: JSON Yes Yes No
Event types: Authentication
logs
Cisco Cisco Firepower Management Center V5.2 to V7.1 Cisco Firepower eStreamer protocol Discovery events No No No
(formerly known as Cisco FireSIGHT Management Correlation and White List
Center) events
Impact Flag alerts
User activity
Malware events
File events
Connection events
Intrusion events
Intrusion Event Packet Data
Intrusion Event Extra Data
Cisco Cisco Firepower Threat Defense Syslog Event format: Syslog, Yes Yes No
Comma-separated values
(CSV), Name-value pair (NVP)
Recorded event types:
Intrusion, Connection
Cisco Cisco Firewall Service Module (FWSM) v2.1+ Syslog All events Yes Yes Yes
Cisco Cisco Catalyst Switch IOS, 12.2, 12.5+ Syslog All events Yes Yes No
Cisco Cisco PIX Firewall v5.x, v6.3+ Syslog Cisco PIX events Yes Yes Yes
Cisco Cisco Identity Services Engine V1.1 to V2.2 UDP Multiline Syslog Event format: Syslog No Yes No
Event types: Device events
Cisco Cisco IOS 12.2, 12.5+ Syslog All events Yes Yes No
Cisco Cisco Umbrella Amazon AWS S3 REST API Event format: Cisco Umbrella No No No
CSV
Event types: DNS, Proxy, IP
Cisco Cisco VPN 3000 Concentrator versions VPN 3005, Syslog All events Yes Yes Yes
4.1.7.H
Cisco Cisco Wireless Services Modules (WiSM) V 5.1+ Syslog All events Yes No No
Citrix Citrix NetScaler V9.3 to V10.0 Syslog All events Yes Yes No
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Citrix Citrix Access Gateway V4.5 Syslog Access, audit, and diagnostic Yes No No
events
Cloudflare Cloudflare Logs Amazon AWS S3 REST API Event format: JSON Yes No No
HTTP Receiver Event types: HTTP events,
Firewall events
CrowdStrike Falcon Data Replicator Amazon AWS S3 REST API Event format: JSON Yes No No
CorreLog CorreLog Agent for IBM z/OS Syslog LEEF All events Yes No No
CyberArk CyberArk Identity Centrify Redrock REST API Event format: JSON No No No
Important: The Centrify Identity Platform DSM name is Event types: SaaS, Core,
now the CyberArk Identity DSM. The DSM RPM name Internal and Mobile
remains as Centrify Identity Platform in QRadar.
CyberArk CyberArk Privileged Threat Analytics V3.1 Syslog Detected security events Yes No No
Digital China DCS and DCRS Series switches V1.8.7 Syslog DCS and DCRS IPv4 events No No No
Networks
ESET ESET Remote Administrator V6.4.270 Syslog Threat events Yes Yes No
LEEF Firewall Aggregated Event
HIPS Aggregated Event
Audit events
Extreme Dragon V5.0, V6.x, V7.1, V7.2, V7.3, and V7.4 Syslog SNMPv1 SNMPv3 All relevant Extreme Dragon Yes No No
events
Extreme Matrix Router V3.5 Syslog SNMPv1 SNMPv2 SNMPv3 SNMP and syslog login, Yes No No
logout, and login failed events
Extreme NetSight Automatic Security Manager V3.1.2 Syslog All events Yes No No
Extreme Matrix N/K/S Series Switch V6.x, V7.x Syslog All relevant Matrix K-Series, Yes No No
N-Series and S-Series device
events
Extreme Stackable and Standalone Switches Syslog All events Yes Yes No
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Epic Epic SIEM, Versions Epic 2014, Epic 2015, and Epic LEEF Audit, Authentication Yes Yes No
2017
Exabeam Exabeam 1.7 and 2.0 not applicable Critical, Anomalous Yes No No
Extreme Extreme Ware 7.7 and XOS 12.4.1.x Syslog All events No Yes No
Networks
F5 Networks F5 Networks BIG-IP AFM 11.3 and 12.x to 14.x Syslog Network, network DoS, Yes Yes No
protocol security, DNS, and
DNS DoS events
F5 Networks F5 Networks BIG-IP LTM 9.42 to 14.x Syslog, CSV All events No Yes No
F5 Networks F5 Networks BIG-IP ASM 10.1 to 16.x Syslog Event formats: CEF (CEF:0 is Yes Yes No
supported), JSON
Recorded event types: All
security events
F5 Networks F5 Networks BIG-IP APM 10.x to 14.x Syslog All events Yes No No
Fair Warning Fair Warning 2.9.2 Log File Protocol All events No No No
FireEye FireEye CMS, MPS, EX, AX, NX, FX, and HX Syslog, TLS Syslog Event formats: CEF (CEF:0 is Yes No No
supported), LEEF
Recorded event types: All
relevant events
Forcepoint Stonesoft Management Center 5.4 to 6.1 Syslog Event format: LEEF Yes No No
Event types: Management
Center, IPS, Firewall, and
VPN events
Forcepoint Forcepoint TRITON 7.7, and 8.2 Syslog Events for web content Yes No No
from several Forcepoint
(formerly known as Websense) LEEF
TRITON solutions, including
Web Security, Web Security
Gateway, Web Security
Gateway Anywhere, and V-
Series appliances.
All events
Forcepoint Forcepoint V-Series Data Security Suite (DSS) 7.1x Syslog All events Yes Yes Yes
(formerly known as Websense)
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Forcepoint Forcepoint V-Series Content Gateway V7.1x Log File Protocol All events No No No
(formerley known as Websense)
Fortinet Fortinet FortiGate Security Gateway FortiOS 6.4 and Syslog All events Yes Yes Yes
earlier
Syslog Redirect
Foundry FastIron 3.x.x and 4.x.x Syslog All events Yes Yes No
Google Google Cloud Audit Logs Google Cloud Pub/Sub Supported services: Yes No No
• Identity Access
Management
• Identity Platform
• Cloud Storage
Event format: JSON
Event types: Storage, list,
update
Google Google Cloud Platform Firewall Google Cloud Pub/Sub Event format: JSON No No No
Event types: Firewall Allow,
Firewall Deny
Google Google G Suite Activity Reports Google G Suite Activity Reports REST API Event format: JSON No No No
Recorded event types:
Admin, drive, login, user
accounts
H3C H3C Comware Platform, H3C Switches, H3C Routers, Syslog NVP No No No
Technologies H3C Wireless LAN Devices, and H3C IP Security Devices
System
version 7 is supported
HBGary Active Defense 1.2 and later Syslog All events Yes No No
Hewlett Packard HPE Network Automation 10.11 Syslog All operational and Yes Yes No
Enterprise configuration network events.
LEEF
Hewlett Packard HPE Tandem Log File Protocol Safe Guard Audit file events No No No
Enterprise
Hewlett Packard HPE UX V11.x and later Syslog All events No Yes No
Enterprise
Honeycomb Lexicon File Integrity Monitor mesh service V3.1 and Syslog integrity events Yes No No
Technologies later
Huawei S Series Switch S5700, S7700, and S9700 using Syslog IPv4 events from S5700, No No No
V200R001C00 S7700, and S9700 Switches
Huawei AR Series Router (AR150, AR200, AR1200, AR2200, Syslog IPv4 events No No No
and AR3200 routers using V200R002C00)
IBM IBM AIX V6.1 and V7.1 Syslog, Log File protocol Configured audit events Yes No No
IBM IBM AIX 5.x, 6.x, and v7.x Syslog Authentication and operating Yes Yes No
system events
IBM IBM BigFixV8.2.x to 9.5.2 IBM BigFix SOAP Protocol Server events No Yes No
(formerly known as Tivoli EndPoint Manager)
IBM IBM Cloud Activity Tracker Apache Kafka protocol Event format: JSON Yes No No
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
IBM IBM Cloud Platform (formerly known as IBM Bluemix Syslog, TLS Syslog All System (Cloud Foundry) Yes No No
Platform) events, some application
events
IBM IBM DLC Metrics Syslog, Forwarded Event format: LEEF Yes No No
Recorded event types: All
DLC Metrics event types
IBM IBM Federated Directory Server V7.2.0.2 and later LEEF FDS Audit Yes No No
IBM IBM Security Guardium Insights Syslog Out of Box Policy Violation Yes No No
Rules
IBM IBM i DSM V5R4 and later Log File Protocol Event format: No Yes No
(formerly known as AS/400iSeries) • CEF (CEF:0 is supported.)
• LEEF (LEEF:1.0 is
supported.)
Recorded event types: All
security events
IBM IBM i - Robert Townsend Security Solutions V5R1 and Syslog Event format: Yes Yes No
later
• CEF (CEF:0 is supported.)
(formerly known as AS/400iSeries)
• LEEF (LEEF:1.0 is
supported.)
Recorded event types: All
security events
IBM IBM i - Powertech Interact V5R1 and later Syslog Event format: Yes Yes No
(formerly known as AS/400iSeries) • CEF (CEF:0 is supported.)
• LEEF (LEEF:1.0 is
supported.)
Recorded event types: All
security events
IBM IBM Proventia Management SiteProtector v2.0 and v2.9 JDBC IPS and audit events No No No
IBM IBM RACF v1.9 to v1.13 Log File Protocol All events No No Yes
IBM IBM CICS v3.1 to v4.2 Log File Protocol All events No No Yes
IBM IBM DB2 v8.1 to v10.1 Log File Protocol All events No No Yes
IBM IBM MaaS360 Security LEEF, JSON Compliance rule events No Yes No
(formerly known as IBM Fiberlink MaaS360) Device enrollment events
Action history events
IBM IBM QRadar Packet Capture Syslog, LEEF All events Yes No No
IBM QRadar Packet Capture V7.2.3 to V7.2.8
IBM QRadar Network Packet Capture V7.3.0
IBM IBM Red Hat OpenShift V5.2.4 Syslog Event format: JSON Yes No Yes
Event types: Audit and
Infrastructure
IBM IBM SAN Volume Controller Syslog CADF event format Yes No No
Activity, Control, and Monitor
audit events
IBM IBM z/OS v1.9 to v1.13 Log File Protocol All events No No Yes
IBM Security Access Manager for Mobile (ISAM) TLS Syslog IBM_SECURITY_AUTHN Yes No No
IBM_SECURITY_TRUST
IBM_SECURITY_RUNTIME
IBM_SECURITY_CBA_AUDIT
_MGMT
IBM_SECURITY_CBA_AUDIT
_RTE
IBM_SECURITY_RTSS_AUDI
T_AUTHZ
IBM_SECURITY_SIGNING
CloudOE
Operations
Usage
IDaaS Appliance Audit
IDaaS Platform Audit
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
IBM QRadar Network Security XGS v5.0 with fixpack 7 to Syslog System, access, and security Yes No No
v5.4 events
IBM Security Network IPS (GX) v4.6 and later Syslog Security, health, and system Yes No No
events
IBM Security Privileged Identity Manager V1.0.0 to V2.1.1 JDBC Audit, authentication and No No No
system events
IBM Security Identity Manager 6.0.x and later JDBC Audit and recertification No Yes No
events
IBM IBM Security Randori Recon IBM Security Randori REST API Event format: JSON Yes No No
Event types: Detections
IBM IBM Security QRadar EDR v3.9.0 IBM Security ReaQta REST API Event format: JSON Yes No Yes
(formerly known as IBM Security ReaQta) Event types: Alerts
IBM IBM Security Trusteer HTTP Receiver Event format: JSON Yes No No
Event types: Trusteer alerts
IBM IBM Security Trusteer Apex Advanced Malware Syslog/LEEF Malware Detection Yes Yes No
Protection
Log File Protocol Exploit Detection
Data Exfiltration Detection
Lockdown for Java Event
File Inspection Event
Apex Stopped Event
Apex Uninstalled Event
Policy Changed Event
ASLR Violation Event
ASLR Enforcement Event
Password Protection Event
IBM IBM SmartCloud Orchestrator v2.3 FP1 and later IBM SmartCloud Orchestrator REST API Audit Records No Yes No
IBM Tivoli Access Manager IBM Web Security Gateway v7.x Syslog audit, access, and HTTP Yes Yes No
events
IBM WebSphere Application Server v5.0 to v8.5 Log File Protocol All events No Yes No
IBM zSecure Alert v1.13.x and later UNIX syslog Alert events Yes Yes No
IBM Security Access Manager v8.1 and v8.2 Syslog Audit, system, and Yes No No
authentication events
IBM Security Verify Directory v6.3.1 and later (formerly Syslog LEEF All events Yes Yes No
known as Security Directory Server)
Imperva SecureSphere v6.2 and v7.x to v13 Release Enterprise Syslog Firewall policy events Yes No No
Edition (Syslog)
LEEF
SecureSphere v9.5 to v13 (LEEF)
cy
Infoblox NIOS Infoblox NIOS 6.x to 8.x Syslog ISC Bind No Yes No
Linux DHCP
Linux Server
Apache
Internet ISC BIND 9.9, 9.11, 9.12 Syslog All events Yes No No
Systems
Consortium
(ISC)
Intersect SNARE Enterprise Windows Agent Syslog Microsoft Event Logs Yes Yes No
Alliance
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Juniper Firewall and VPN v5.5r3 and later Syslog NetScreen Firewall events Yes Yes Yes
Networks
Juniper Junos WebApp Secure v4.2.x Syslog Incident and access events Yes No No
Networks
Juniper IDP v4.0, v4.1 & v5.0 Syslog NetScreen IDP events Yes No Yes
Networks
Juniper Network and Security Manager (NSM) and Juniper SSG Syslog NetScreen NSM events Yes No Yes
Networks v2007.1r2 to 2007.2r2, 2008.r1, 2009r1.1, 2010.x
Juniper Junos OS 7.x to 10.x Ex Series Syslog or PCAP Syslog*** All events Yes** Yes Yes
Networks
Ethernet Switch DSM only supports 9.0 to 10.x
Juniper Juniper Security Binary Log Collector Binary Audit, system, firewall, and No No Yes
Networks IPS events
SRX or J Series appliances at 12.1 or above
Juniper Steel-Belted Radius 5.x Log File All events Yes Yes Yes
Networks
Juniper vGW Virtual Gateway 4.5 Syslog Firewall, admin, policy and Yes No No
Networks IDS Log events
The Juniper Networks vGW Virtual Gateway product is
end of life (EOL), and is no longer supported by Juniper.
Kisco Kisco Information Systems SafeNet/i 10.11 Log File All events No No No
LightCyber LightCyber Magna 3.9 Syslog, LEEF C&C, exfilt, lateral, malware Yes No No
and recon
Linux Open Source Linux OS 2.4 and later Syslog Operating system events Yes Yes No
Linux DHCP Server 2.4 and later Syslog All events from a DHCP server Yes Yes No
Linux IPtables kernel 2.4 and later Syslog Accept, Drop, or Reject Yes No No
events
McAfee McAfee Application / Change Control v4.5.x JDBC Change management events No Yes No
McAfee McAfee ePolicy Orchestrator 3.5 to 5.10 JDBC: 3.5 to 5.9 AntiVirus events No No No
SNMPv1, SNMPv2, SNMPv3: 3.5 to 5.9
TLS Syslog: 5.10
McAfee McAfee MVISION Cloud 2.4 and 3.3 Syslog Event format: Yes No No
(formerly known as Skyhigh Networks Cloud Security Log Event Extended Format
Platform) (LEEF)
Recorded event types:
Privilege Access, Insider
Threat, Compromised
Account, Access, Admin,
Data, Policy, and Audit
McAfee McAfee Network Security Platform 2.x - 5.x Syslog Alert notification events Yes No No
(Formerly known as McAfee Intrushield) Important: Supported alert
notification events do not
include custom events with
IDs that begin with Oxc, Oxcc,
Oxe, or Oxee.
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
McAfee McAfee Network Security Platform 6.x - 7.x and 8.x - Syslog Alert and fault notification Yes No No
10.x events
(Formerly known as McAfee Intrushield) Important: Supported alert
notification events do not
include custom events with
IDs that begin with Oxc, Oxcc,
Oxe, or Oxee.
McAfee McAfee Web Gateway 6.0.0 Syslog Event format: LEEF Yes No No
Log File protocol Recorded event types: All
events
Microsoft Microsoft 365 Defender Microsoft Defender for Endpoint SIEM REST Event format: JSON Yes Yes No
API
Important: The Microsoft Windows Defender ATP DSM The Microsoft 365 Defender
is now the Microsoft 365 Defender DSM. The DSM RPM Microsoft Azure Event Hubs DSM supports the following
name remains as Microsoft Windows Defender ATP in events when you use the
Microsoft Graph Security API
QRadar. Microsoft Azure Event Hubs
protocol:
Alerts (Alerts are supported
only for Microsoft Defender
for Endpoint.):
• AlertInfo
• AlertEvidence
Device:
• DeviceInfo
• DeviceNetworkInfo
• DeviceProcessEvents
• DeviceNetworkEvents
• DeviceFileEvents
• DeviceRegistryEvents
• DeviceLogonEvents
• DeviceEvents
• DeviceFileCertificateInfo
• DeviceImageLoadEvents
Email:
• EmailEvents
• EmailAttachmentInfo
• EmailPostDeliveryEvents
• EmailUrlInfo
The Microsoft 365 Defender
DSM supports the following
events when you use
the Microsoft Defender for
Endpoint REST API protocol:
• Third party TI
• Customer TI
• Bitdefender
The Microsoft 365 Defender
DSM supports the following
events when you use the
Microsoft Graph Security API
protocol:
Microsoft Microsoft Entra ID (formerly Microsoft Azure Active Microsoft Azure Event Hubs Event format: JSON Yes No No
Directory)
Recorded event types: Sign-
In logs, Audit logs
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Microsoft Microsoft Azure Platform Microsoft Azure Event Hubs Event format: JSON Yes No No
Recorded event types:
Platform level activity logs
For more information
about Platform level
activity logs, see Azure
Resource Manager resource
provider operations (https://
docs.microsoft.com/en-us/
azure/role-based-access-
control/resource-provider-
operations).
Note: This DSM automatically
discovers only Activity Log
Events that are forwarded
directly from the Activity Log
to the Event Hub.
Microsoft Microsoft Defender for Cloud Microsoft Graph Security API Event format: JSON No No No
Important: The Microsoft Azure Security Center DSM is Microsoft Azure Event Hubs Recorded event types:
now the Microsoft Defender for Cloud DSM. The DSM Security alert
RPM name remains as Microsoft Azure Security Center
in QRadar.
Microsoft DNS Debug WinCollect Microsoft DNS Debug LEEF Yes Yes No
Supported versions:
Windows Server 2016, Windows Server 2012 R2,
Windows Server 2008 R2
Microsoft IIS 6.0, 7.0 and 8.x Syslog and WinCollect HTTP status code events Yes No No
Microsoft Internet and Acceleration (ISA) Server or Threat Syslog and WinCollect ISA or TMG events Yes No No
Management Gateway 2006
Microsoft Microsoft Exchange Server 2003, 2007, 2010, 2013, Windows Exchange Protocol Outlook Web Access events No No No
2016 and 2019 (OWA)
Simple Mail Transfer Protocol
events (SMTP
Message Tracking Protocol
events (MSGTRK)
Microsoft Microsoft Office 365 Message Trace Office 365 Message Trace REST API Event format: JSON No No No
Event types: Email security
threat classification
Microsoft Microsoft Windows Defender ATP Microsoft Defender for Endpoint REST API Event format: JSON No No No
Event types:
Windows Defender ATP
Windows Defender AV
Third Party TI
Customer TI
Bitdefender
Microsoft Microsoft Windows Security Event Log Syslog All events, including Sysmon Yes Yes Yes
and winlogbeats.json
supported versions: Forwarded
Windows Server 2016 TLS Syslog
Windows Server 2012 (most recent) TCP Multiline Syslog
Windows Server 2012 Core Windows Event Log (WMI)
Windows Server 2008 (most recent) Windows Event Log Custom (WMI)
Windows Server 2008 Core MSRPC
Windows 10 (most recent) WinCollect
Windows 8 (most recent) WinCollect NetApp Data ONTAP
Windows 7 (most recent)
Windows Vista (most recent)
Microsoft SQL Server 2008, 2012, 2014 (Enterprise editions only), Syslog, JDBC and WinCollect SQL Audit events No No No
and 2016
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Microsoft SharePoint 2010 and 2013 JDBC SharePoint audit, site, and file No No No
events
Microsoft DHCP Server 2000/2003 Syslog and WinCollect All events Yes Yes No
NCC Group NCC Group DDos 5.13.1-2s to 516.1-0 Syslog Event format: LEEF Yes No No
Event types: All events
NetApp Data ONTAP WinCollect NetApp Data ONTAP CIFS events Yes Yes No
Netskope Netskope Active Netskope Active REST API Alert, All events No Yes No
Important:
The IBM QRadar DSM for Netskope Active is
deprecated.
To continue taking advantage of this integration,
please download the Netskope Security Cloud
DSM from the IBM Security App Exchange
website (https://exchange.xforce.ibmcloud.com/hub/
extension/ff97aaadc10ed96b0e05d1a1f24af2f7).
NGINX NGINX HTTP Server 1.15.5 Syslog Syslog, Standard syslog Yes No No
Nokia Firewall NG FP1, FP2, FP3, AI R54, AI R55, NGX on Syslog or OPSEC LEA All events Yes Yes No
IPSO v3.8 and later
Nokia VPN-1 NG FP1, FP2, FP3, AI R54, AI R55, NGX on IPSO Syslog or OPSEC LEA All events Yes Yes No
v3.8 and later
Nortel Application Switch v3.2 and later Syslog Status and network condition No Yes No
events
Nortel* Ethernet Routing Switch 2500 v4.1 Syslog All events No Yes No
Nortel* Ethernet Routing Switch 4500 v5.1 Syslog All events No Yes No
Nortel* Ethernet Routing Switch 5500 v5.1 Syslog All events No Yes No
Nortel Ethernet Routing Switch 8300 v4.1 Syslog All events No Yes No
Nortel Ethernet Routing Switch 8600 v5.0 Syslog All events No Yes No
Nortel VPN Gateway v6.0, 7.0.1 and later, v8.x Syslog All events Yes Yes No
Nortel Secure Router v9.3, v10.1 Syslog All events Yes Yes No
Nortel Secure Network Access Switch v1.6 and v2.0 Syslog All events Yes Yes No
Nortel Switched Firewall 5100 v2.4 Syslog or OPSEC All events Yes Yes No
Nortel Switched Firewall 6000 v4.2 Syslog or OPSEC All events Yes Yes No
Nortel Threat Protection System v4.6 and v4.7 Syslog All events No No No
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Onapsis Onapsis Security Platform v1.5.8 and later Log Event Extended Format (LEEF) Assessment Yes No No
Attack signature
Correlation
Compliance
Open Suratica v6.0.3 and earlier Syslog Event format: JSON Yes No No
Information
TLS Syslog Recorded event types: Alerts
Security
Foundation
(OISF)
Open LDAP Open LDAP 2.4.x UDP Multiline Syslog All events No No No
Foundation
Oracle Oracle RDBMS Audit Record versions 9i, 10g, 11g, 12c JDBC, Syslog Event format: Name-Value Yes Yes No
(includes unified auditing) Pair
Recorded event types: Audit
records
Oracle Audit Vault V10.3 and V12.2 JDBC All audit records from No Yes No
the AVSYS.AV$ALERT_STORE
table for V10.3, or
from the custom
AVSYS.AV_ALERT_STORE_V
view for V12.2.
Oracle Oracle OS Audit 9i, 10g, and 11g Syslog Event format: name-value Yes Yes No
pair (NVP)
Event types: Oracle events
Oracle Oracle Database Listener 9i, 10g, and 11g Syslog Oracle events Yes No No
Oracle Oracle Fine Grained Auditing 9i and 10g JDBC Select, insert, delete, or No No No
update events for tables
configured with a policy
Palo Alto Palo Alto PA Series Syslog Event types: Yes Yes No
Networks
TLS Syslog Traffic
Threat
Config
System
HIP Match
Authentication
Tunnel Inspection (for PAN-
OS 8.0 - 9.1) or Tunnel (for
PAN-OS 10.0)
Correlation
SCTP
File Data
GTP
HIP Match
IP-Tag
Global Protect - Important:
To use this log type, you must
enable the EventStatus/
Status field on your Palo Alto
PA Series device.
Decryption
User ID
URL Filtering (for PAN-OS 8.0
- 9.1) or URL (for PAN-OS
10.0)
WildFire
Event Formats:
LEEF for PAN-OS v3.0 to
v10.2, and Prisma Access
v2.1
CEF for PAN-OS v4.0 to v6.1
(CEF:0 is supported)
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Palo Alto Palo Alto Endpoint Security Manager 3.4.2.17401 Syslog Agent Yes No No
Networks
Config
Policy
System
Threat
Event formats: CEF (CEF:0 is
supported), LEEF
Pirean Access: One 2.2 with DB2 9.7 JDBC Access management and No No No
authentication events
PostFix Mail Transfer Agent 2.6.6 and later UDP Multiline Protocol or Syslog Mail events No No No
Proofpoint Proofpoint Enterprise Protection and Enterprise Privacy Syslog Event types: No No No
versions 7.0.2, 7.1, 7.2, 7.5, 8.0
Log File System
Email security threat
classification
Email audit and encryption
Pulse Secure Pulse Secure Infranet Controller 2.1, v3.1 and 4.0 Syslog All events No Yes Yes
Pulse Secure Pulse Secure Pulse Connect Secure 8.2R5 Syslog Event types: Yes Yes Yes
TLS Syslog Admin
Authentication
System
Network
Error
Radware DefensePro 4.23, 5.01, 6.x and 7.x Syslog All events (Event mapping is Yes No No
required when Event IDs are
300,000 or more.)
Tip: If you have custom
events that display as
unknown in QRadar,
see the IBM Support
article about QRadar:
Custom events for Radware
DefensePro display 'parsed,
but not mapped' (https://
www.ibm.com/support/
pages/node/6960301).
Raz-Lee IBM i Firewall 15.7 and Audit 11.7 Syslog Security, compliance, firewall, Yes Yes No
iSecurity and audit events
Red Hat Red Hat Advanced Cluster Security for Kubernetes HTTP Receiver JSON Yes No No
Recorded event types: audit
and alert events
Riverbed SteelCentral NetProfiler Audit Log file protocol Audit events No Yes No
RSA Authentication Manager 6.x, 7.x, and 8.x v6.x and v7.x use Syslog or Log File Protocol All events No No No
v8.x uses Syslog only
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Salesforce Salesforce Security Salesforce REST API Protocol Login History No Yes No
Account History
Case History
Entitlement History
Service Contract History
Contract Line Item History
Contract History
Contact History
Lead History
Opportunity History
Solution History
Salesforce Security Auditing
audit trail
SAP SAP Enterprise Threat Detection V1.0 SP6 to V2.0 SP5 SAP Enterprise Threat Detection Alert API LEEF No No No
Seculert Seculert v1 Seculert Protection REST API Protocol All malware communication No No No
events
Seculert Seculert Seculert protection REST API Protocol All malware communication No No No
events
SonicWALL UTM/Firewall/VPN Appliance 3.x and later Syslog All events Yes No No
Sophos Sophos Astaro Security Gateway 17.x Syslog All events Yes No No
Sophos Sophos Enterprise Console 4.5.1 and 5.1 Sophos Enterprise Console protocol All relevant anti-virus events No No No
JDBC protocol
Sophos Sophos PureMessage 3.1.0.0 for Microsoft Exchange JDBC Quarantined email events No No No
5.6.0 for Linux
Sophos Sophos Web Security Appliance 3.x Syslog Transaction log events Yes No No
Sourcefire Sourcefire Intrusion Sensor IS 500, 2.x, 3.x, 4.x Syslog All events Yes No No
Splunk MicrosoftWindows Security Event Log Windows-based event provided by Splunk All events No Yes No
Forwarders
Squid Squid Web Proxy 2.5 and later Syslog All cache and access log Yes No No
events
STEALTHbits STEALTHbits File Activity Monitor Syslog LEEF File Activity Monitor Events
Technologies
STEALTHbits STEALTHbits StealthINTERCEPT Alerts Syslog LEEF Active Directory Alerts Events Yes No No
Technologies
STEALTHbits STEALTHbits StealthINTERCEPT Analytics Syslog LEEF Active Directory Analytics Yes No No
Technologies Events
Sun Sun Solaris DHCP 2.8 Syslog All events Yes Yes No
Sun Sun Solaris OS 5.8, 5.9 Syslog All events Yes Yes No
Sun Sun Solaris Basic Security Mode (BSM) 5.10 and 5.11 Log File Protocol All events No Yes No
Sun Sun ONE LDAP v11.1 Log File Protocol All relevant access and LDAP No No No
events
(Known as Oracle Directory Server) UDP Multiline Syslog
Symantec Symantec Endpoint Protection 11, 12, and 14 Syslog All Audit and Security Logs Yes No Yes
Symantec Symantec SGS Appliance 3.x and later Syslog All events Yes No Yes
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Symantec Symantec Data Loss Prevention (DLP) 8.x Syslog All events No No No
Symantec Symantec Encryption Management Server 3.0x Syslog All events Yes No No
formerly known as PGP Universal Server
ThreatGRID Malware Threat Intelligence Platform 2.0 Log file protocol Malware events No No No
Syslog
TippingPoint Intrusion Prevention System (IPS) 1.4.2 to 3.2.x Syslog All events No No No
TippingPoint SMS 5.2.0
TippingPoint X505/X506 2.5 and later Syslog All events Yes Yes No
Top Layer IPS 5500 4.1 and later Syslog All events Yes No No
Trend Micro Trend Micro Apex Central (version 1) Syslog, TLS syslog Event format: CEF Yes No No
Event types:
Attack discovery detection
logs
Behavior monitoring logs
C&C callback logs
Content security logs
Data loss prevention logs
Device access control logs
Endpoint application control
logs
Engine update status logs
Intrusion prevention logs
Network content inspection
logs
Pattern Update Status Logs
Predictive machine learning
logs
Sandbox detection logs
Spyware/Grayware logs
Suspicious file logs
Virus/Malware logs
Web security logs
Trend Micro Trend Micro Apex One 8.x and 10.x SNMPv2 All events No No No
Formerly known as Trend Micro Office Scan. The name
remains the same in QRadar.
Trend Micro Trend Micro Control Manager 5.0 or 5.5 with hotfix 1697 SNMPv1 All events Yes No No
or hotfix 1713 after SP1 Patch 1; 6.0 and 7.0.
SNMPv2
SNMPv3
Trend Micro Trend Micro Deep Discovery Analyzer 5.0, 5.5, 5.8 and Syslog Event format: LEEF Yes No No
6.0
Events: All events
Trend Micro Trend Micro Deep Discovery Director 3.0 Syslog Event format: LEEF Yes No No
Events: Trend Micro Deep
Discovery Inspector events
Trend Micro Trend Micro Deep Discovery Email Inspector 3.0 Syslog Event format: LEEF Yes No No
Events: Detections, Virtual
Analyzer Analysis logs,
System events, Alert events
Trend Micro Trend Micro Deep Discovery Inspector 3.0 to V3.8, 5.0 Syslog Event format: LEEF Yes No No
and 5.1
Events:
Malicious content
Malicious behavior
Suspicious behavior
Exploit
Grayware
Web reputation
Disruptive application
Sandbox
Correlation
System
Update
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Trend Micro Trend Micro Deep Security 9.6.1532 to 12.0 Syslog Event format: LEEF Yes No No
Events:
Anti-Malware
Deep Security
Firewall
Integrity Monitor
Intrusion Prevention
Log Inspection
System
Web Reputation
Tripwire Tripwire Enterprise Manager 5.2 and later Syslog Event format: CEF (CEF:0 is Yes No No
supported)
Event types: Resource
additions, removal, and
modification events
Trusteer Apex Local Event Aggregator 1304.x and later Syslog Malware, exploit, and data Yes No No
exfiltration detection events
Vectra Networks Vectra Networks Vectra v2.2 Syslog Host scoring, command Yes No No
and control, botnet
Important: The IBM QRadar DSM for Vectra Networks
activity, reconaissance,
Vectra is deprecated.
lateral movement, exfiltration
To continue taking advantage of this integration,
Event format: CEF (CEF:0 is
please download the Vectra Networks Vectra
supported)
DSM from the IBM Security App Exchange
website (https://exchange.xforce.ibmcloud.com/hub/
extension/47f3e9afff5e0281d6684bb633d769f2).
Verdasys Digital Guardian 6.0.x (Syslog only) Syslog Event format: LEEF Yes No No
Digital Guardian 6.1.1 and 7.2 (LEEF only) Events: All events
VMware Carbon Black App Control 8.0.x to 8.5.x Syslog Event format: LEEF Yes Yes No
(Formerly known as Carbon Black Protection) Event types: computer
management, server
management, session
management, policy
management, policy
enforcement, internal events,
general management,
discovery
VMware VMware ESX or ESXi 3.x, 4.x, 5.x and 6.x Syslog Account Information Yes if syslog No No
EMC VMware protocol Notice
Warning
Error
System Informational
System Configuration
System Error
User Login
Misc Suspicious Event
Access Denied
License Expired
Information
Authentication
Session Tracking
VMware VMware vCenter v5.x and v6.x EMC VMware protocol Account Information No No No
Notice
Warning
Error
System Informational
System Configuration
System Error
User Login
Misc Suspicious Event
Access Denied
License Expired
Information
Authentication
Session Tracking
VMware VMware vCloud Director 5.1 - 10.0 VMware vCloud Director protocol All events No Yes No
Manufacturer Device name and version Protocol Recorded events and Auto Includes Includes
formats discovered? identity? custom
properties?
Websense
(now known as
Forcepoint)
Zscaler Zscaler Nanolog Streaming Service (Zscaler NSS) 6.0 Syslog Event format: LEEF Yes No No
HTTP receiver Event types: Web log events,
Firewall events (including
Important: When you use the HTTP receiver
DNS)
protocol with Zscaler NSS, you need a
certificate that is issued by a certificate
authority (CA). It can't be a self-signed
certificate because it must be validated by a
CA. For more information about certificates
and configuring the log source parameters for
HTTP receiver, see HTTP Receiver protocol
configuration options.