IBM Qradar Users Guide
IBM Qradar Users Guide
IBM Qradar Users Guide
Version 7.2.5
Users Guide
Note
Before using this information and the product that it supports, read the information in Notices on page 243.
Product information
This document applies to IBM QRadar Security Intelligence Platform V7.2.5 and subsequent releases unless
superseded by an updated version of this document.
Copyright IBM Corporation 2012, 2015.
US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Contents v
Viewing rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Creating a custom rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Creating an anomaly detection rule . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Rule management tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Enabling and disabling rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Editing a rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Copying a rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Deleting a rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Rule group management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Viewing a rule group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Creating a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Assigning an item to a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Editing a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Copying an item to another group . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Deleting an item from a group . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Deleting a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Editing building blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Rule page parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Rules page toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Rule Response page parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Privacy policy considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
I. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
N . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
W . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Contents vii
viii QRadar Users Guide
About this guide
The IBM Security QRadar SIEM Users Guide provides information on managing
IBM Security QRadar SIEM including the Dashboard, Offenses, Log Activity,
Network Activity, Assets, and Reports tabs.
Intended audience
This guide is intended for all QRadar SIEM users responsible for investigating and
managing network security. This guide assumes that you have QRadar SIEM
access and a knowledge of your corporate network and networking technologies.
Technical documentation
Please Note:
Use of this Program may implicate various laws or regulations. including those
related to privacy, data protection, employment, and electronic communications
and storage. IBM Security QRadar may be used only for lawful purposes and in a
lawful manner. Customer agrees to use this Program pursuant to, and assumes all
responsibility for complying with, applicable laws, regulations and policies.
Licensee represents that it will obtain or has obtained any consents, permissions, or
licenses required to enable its lawful use of IBM Security QRadar.
Use historical correlation when analyzing events that were loaded in bulk, testing
new rules, and re-creating offenses that were lost or purged. Learn more...
Use X-Force Exchange to collect and lookup IP addresses and get more information
on URLs that were identified by QRadar in events, rules, flows, and offenses. You
can forward any IP address that is displayed in QRadar to X-Force Exchange. You
can also use URLs from events on the Log Activity tab. Learn more...
Reporting enhancements
You can share reports with groups of users. You can add a report to a report group
that is shared with everyone or a group that is shared only with users who have
You can set a classification for a report, such as confidential or internal only, which
appears in the report header and footer. You can also add page numbers and create
Use the TEXT SEARCH operator to perform full text searches and find specific text
Use the new AQL X-Force lookup functions to query X-Force IP address and URL
categorizations. The categorizations can be used in query result data or they can be
Modifying a custom rule keeps the state information for all rules
When you edit a custom rule and save the changes, only the rule that you are
modifying and any rules that depend on that rule are affected. All state
information, counters, and rule results for other rules are maintained. In previous
releases, when you edited a custom rule, all rules and counters in the custom rule
engine were reset. For example, if you were tracking a sequence of events, such as
5 failed logons followed by a successful logon, the count was reset when you
modified and saved any rule.
A default license key provides access to the user interface for five weeks. After you
log in to QRadar SIEM, a window displays the date that the temporary license key
expires. For more information about installing a license key, see the IBM Security
QRadar SIEM Administration Guide.
If you are using the Mozilla Firefox web browser, you must add an exception to
Mozilla Firefox to log in to QRadar SIEM. For more information, see your Mozilla
Firefox web browser documentation.
If you are using the Microsoft Internet Explorer web browser, a website security
certificate message is displayed when you access the QRadar SIEM system. You
must select the Continue to this website option to log in to QRadar SIEM.
When you use QRadar SIEM, use the navigation options available in the QRadar
SIEM user interface instead of your web browser Back button.
When you access the QRadar system, you are prompted for a user name and a
password. The user name and password must be configured in advance by the
administrator.
Procedure
1. In your Internet Explorer web browser, press F12 to open the Developer Tools
window.
2. Click Browser Mode and select the version of your web browser.
3. Click Document Mode.
v For Internet Explorer V9.0, select Internet Explorer 9 standards.
v For Internet Explorer V10.0, select Internet Explorer 10 standards.
Use the information in the following table when you log in to your IBM Security
QRadar console.
Table 2. Default login information for QRadar
Login information Default
URL https://<IP Address>, where <IP Address> is the IP address of the
QRadar console.
https://[<IP Address>]
User name admin
Password The password that is assigned to QRadar during the installation
process.
License key A default license key provides you access to the system for 5
weeks.
RESTful API
Use the representational state transfer (REST) application programming interface
(API) to make HTTPS queries and integrate IBM Security QRadar with other
solutions.
You must have administrative user role permissions in QRadar to access and use
RESTful APIs. For more information about how to manage user role permissions,
see the IBM Security QRadar SIEM Administration Guide.
The API user interface provides descriptions and capabilities for the following
REST API interfaces:
The REST API technical documentation interface provides a framework that you
can use to gather the required code that you need to implement QRadar functions
into other products.
1. Enter the following URL in your web browser to access the technical
documentation interface: https://ConsoleIPaddress/api_doc/.
2. Click the header for the API that you want to access, for example, /ariel.
3. Click the subheader for the endpoint that you want to access, for example,
/databases.
4. Click the Experimental or Provisional sub header.
Note:
The API forum provides more information about the REST API, including the
answers to frequently asked questions and annotated code samples that you can
use in a test environment. For more information, see API forum
(https://www.ibm.com/developerworks/community/forums/html/
forum?id=b02461a3-9a70-4d73-94e8-c096abe263ca).
You can easily navigate the tabs to locate the data or functionality you require.
Dashboard tab
The Dashboard tab is the default tab that is displayed when you log in.
Offenses tab
The Offenses tab will allow you to view offenses that occur on your network,
which you can locate by using various navigation options or through powerful
searches.
From the Offenses tab, you can investigate an offense to determine the root cause
of an issue. You can also resolve the issue.
The Log Activity tab will allow you to perform in-depth investigations on event
data.
Automatic discovery is based on passive flow data and vulnerability data, allowing
QRadar to build an asset profile.
Asset profiles provide information about each known asset in your network,
including identity information, if available, and what services are running on each
asset. This profile data is used for correlation purposes to help reduce false
positives.
For example, an attack tries to use a specific service that is running on a specific
asset. In this situation, QRadar can determine whether the asset is vulnerable to
this attack by correlating the attack to the asset profile. Using the Assets tab, you
can view the learned assets or search for specific assets to view their profiles.
Reports tab
The Reports tab will allow you to create, distribute, and manage reports for any
data within QRadar.
The Reports feature will allow you to create customized reports for operational
and executive use. To create a report, you can combine information (such as,
security or network) into a single report. You can also use preinstalled report
templates that are included with QRadar.
The Reports tab also will allow you to brand your reports with customized logos.
This customization is beneficial for distributing reports to different audiences.
IBM Security QRadar Risk Manager uses data that is collected by configuration
data from network and security device, such as firewalls, routers, switches, or IPSs,
vulnerability feeds, and vendor security sources. This data is used to identify
security, policy, and compliance risks within your network security infrastructure
and the probability of those risks that are being exploited.
Note: For more information about IBM Security QRadar Risk Manager, contact
your local sales representative.
Admin tab
Administrators use the Admin tab to configure and manage the users, systems,
networks, plug-ins, and components. Users with administration privileges can
access the Admin tab.
The administration tools that administrators can access in the Admin tab are
described in Table 1.
All configuration updates that you make in the Admin tab are saved to a staging
area. When all changes are complete, you can deploy the configuration updates to
the managed host in your deployment.
Viewing messages
The Messages menu, which is on the upper right corner of the user interface,
provides access to a window in which you can read and manage your system
notifications.
For system notifications to show on the Messages window, the administrator must
create a rule that is based on each notification message type and select the Notify
check box in the Custom Rules Wizard.
The Messages menu indicates how many unread system notifications you have in
your system. This indicator increments the number until you close system
notifications. For each system notification, the Messages window provides a
summary and the date stamp for when the system notification was created. You
can hover your mouse pointer over a notification to view more detail. Using the
functions on the Messages window, you can manage the system notifications.
System notifications are also available on the Dashboard tab and on an optional
pop-up window that can be displayed on the lower left corner of the user
interface. Actions that you perform in the Messages window are propagated to the
Dashboard tab and the pop-up window. For example, if you close a system
notification from the Messages window, the system notification is removed from
all system notification displays.
Procedure
1. Log in to QRadar .
2. On the upper right corner of the user interface, click Messages.
3. On the Messages window, view the system notification details.
4. Optional. To refine the list of system notifications, click one of the following
options:
v Errors
Option Description
Dismiss All Click to close all system notifications.
Dismiss Click the Dismiss icon next to the system
notification that you want to close.
6. Optional. To view the system notification details, hover your mouse pointer
over the system notification.
Sorting results
You sort the results in tables by clicking a column heading. An arrow at the top of
the column indicates the direction of the sort.
Procedure
1. Log in to QRadar.
2. Click the column header once to sort the table in descending order; twice to
sort the table in ascending order.
The Log Activity and Network Activity tabs automatically refresh every 60
seconds if you are viewing the tab in Last Interval (auto refresh) mode.
The timer, which is on the upper right corner of the interface, indicates the amount
of time until the tab is automatically refreshed.
When you view the Log Activity or Network Activity tab in Real Time (streaming)
or Last Minute (auto refresh) mode, you can use the Pause icon to pause the
current display.
You can also pause the current display in the Dashboard tab. Clicking anywhere
inside a dashboard item automatically pauses the tab. The timer flashes red to
indicate that the current display is paused.
Procedure
1. Log in to QRadar.
2. Click the tab that you want to view.
3. Choose one of the following options:
Option Description
Refresh Click Refresh, on the right corner of the tab,
to refresh the tab.
Pause Click to pause the display on the tab.
Investigating IP addresses
You can use several methods to investigate information about IP addresses on the
Dashboard, Log Activity, and Network Activity tabs.
Procedure
1. Log in to QRadar.
2. Click the tab that you want to view.
3. Move your mouse pointer over an IP address to view the location of the IP
address.
4. Right-click the IP address or asset name and select one of the following
options:
Table 6. IP addresses information
Option Description
Navigate > View by Network Displays the networks that are associated
with the selected IP address.
Navigate > View Source Summary Displays the offenses that are associated
with the selected source IP address.
Navigate > View Destination Summary Displays the offenses that are associated
with the selected destination IP address.
Information > DNS Lookup Searches for DNS entries that are based on
the IP address.
Information > WHOIS Lookup Searches for the registered owner of a
remote IP address. The default WHOIS
server is whois.arin.net.
Information > Port Scan Performs a Network Mapper (NMAP) scan
of the selected IP address. This option is
only available if NMAP is installed on your
system. For more information about
installing NMAP, see your vendor
documentation.
Information > Asset Profile Displays asset profile information.
You can investigate user names when IBM Security QRadar Vulnerability Manager
is purchased and licensed. For more information, see the IBM Security QRadar
Vulnerability Manager User Guide.
When you right-click a user name, you can choose the following menu options.
Table 7. Menu options for user name investigation
Option Description
View Assets Displays current assets that are associated to
the selected user name. For more
information about viewing assets, see Asset
management.
View User History Displays all assets that are associated to the
selected user name over the previous 24
hours.
For more information about customizing the right-click menu, see the
Administration Guide for your product.
System time
The right corner of the QRadar user interface displays system time, which is the
time on the console.
The console time synchronizes QRadar systems within the QRadar deployment.
The console time is used to determine what time events were received from other
devices for correct time synchronization correlation.
When you apply time-based filters and searches on the Log Activity and Network
Activity tabs, you must use the console system time to specify a time range.
When you apply time-based filters and searches on the Log Activity tab, you must
use the console system time to specify a time range.
Procedure
1. To access your user information, click Preferences.
2. Update your preferences.
Option Description
Username Displays your user name. You cannot edit
this field.
Password The password must meet the following
criteria:
v Minimum of 6 characters
v Maximum of 255 characters
v Contain at least 1 special character
v Contain 1 uppercase character
Password (Confirm) Password confirmation
Email Address The email address must meet the following
requirements:
v Minimum of 10 characters
v Maximum of 255 characters
Related concepts:
Quick filter search options on page 137
Search event and flow payloads by typing a text search string that uses simple
words or phrases.
Resize columns
You can resize the columns on several tabs in QRadar.
Place the pointer of your mouse over the line that separates the columns and drag
the edge of the column to the new location. You can also resize columns by
double-clicking the line that separates the columns to automatically resize the
column to the width of the largest field.
Note: Column resizing does not work in Microsoft Internet Explorer, Version 7.0
web browsers when tabs are displaying records in streaming mode.
Page size
Users with administrative privileges can configure the maximum number of results
that display in the tables on various tabs in QRadar.
Dashboards allow you to organize your dashboard items into functional views,
which enable you to focus on specific areas of your network.
You can customize your dashboard. The content that is displayed on the
Dashboard tab is user-specific. Changes that are made within a session affect only
your system.
Default dashboards
Use the default dashboard to customize your items into functional views. These
functional views focus on specific areas of your network.
The Dashboard tab provides five default dashboards that are focused on security,
network activity, application activity, system monitoring, and compliance.
Each dashboard displays a default that is set of dashboard items. The dashboard
items act as starting point to navigate to more detailed data. The following table
defines the default dashboards.
Custom dashboards
You can customize your dashboards. The content that is displayed on the
Dashboard tab is user-specific. Changes that are made within a QRadar session
affect only your system.
To customize your Dashboard tab, you can perform the following tasks:
v Create custom dashboards that are relevant to your responsibilities. 255
dashboards per user is the maximum; however, performance issues might occur
if you create more than 10 dashboards.
v Add and remove dashboard items from default or custom dashboards.
v Move and position items to meet your requirements. When you position items,
each item automatically resizes in proportion to the dashboard.
v Add custom dashboard items that are based on any data.
For example, you can add a dashboard item that provides a time series graph or a
bar chart that represents top 10 network activity.
To create custom items, you can create saved searches on the Network Activity or
Log Activity tabs and choose how you want the results that are represented in
your dashboard. Each dashboard chart displays real-time up-to-the-minute data.
Time series graphs on the dashboard refresh every 5 minutes.
You can customize your dashboards to display and organize the dashboards items
that meet your network security requirements.
There are 5 default dashboards, which you can access from the Show Dashboard
list box on the Dashboard tab. If you previously viewed a dashboard and returned
to the Dashboard tab, the last dashboard you viewed is displayed.
Flow search
You can display a custom dashboard item that is based on saved search criteria
from the Network Activity tab.
Flow search items are listed in the Add Item > Network Activity > Flow Searches
menu. The name of the flow search item matches the name of the saved search
criteria the item is based on.
On a flow search dashboard item, search results display real-time last-minute data
on a chart. The supported chart types are time series, table, pie, and bar. The
default chart type is bar. These charts are configurable. For more information about
configuring charts, see Configuring charts.
Time series charts are interactive. Using the time series charts, you can magnify
and scan through a timeline to investigate network activity.
Offenses
You can add several offense-related items to your dashboard.
Note: Hidden or closed offenses are not included in the values that are displayed
in the Dashboard tab. For more information about hidden or closed events, see
Offense management.
Log activity
The Log Activity dashboard items will allow you to monitor and investigate
events in real time.
Note: Hidden or closed events are not included in the values that are displayed in
the Dashboard tab.
System summary
The System Summary dashboard item provides a high-level summary of activity
within the past 24 hours.
Within the summary item, you can view the following information:
v Current Flows Per Second - Displays the flow rate per second.
v Flows (Past 24 Hours) - Displays the total number of active flows that are seen
within the last 24 hours.
v Current Events Per Second - Displays the event rate per second.
v New Events (Past 24 Hours) - Displays the total number of new events that are
received within the last 24 hours.
v Updated Offenses (Past 24 Hours) - Displays the total number of offenses that
have been either created or modified with new evidence within the last 24
hours.
v Data Reduction Ratio - Displays the ratio of data reduced based on the total
events that are detected within the last 24 hours and the number of modified
offenses within the last 24 hours.
By default, the Risk Monitoring dashboard displays Risk and Risk Change items
that monitor the policy risk score for assets in the High Vulnerabilities, Medium
Vulnerabilities, and Low Vulnerabilities policy groups, as well as compliance pass
rates and historical changes in policy risk score in the CIS policy group.
The Risk Monitoring dashboard items do not display any results unless IBM
Security QRadar Risk Manager is licensed. For more information, see QRadar Risk
Manager Users Guide.
To view the default Risk Monitoring dashboard, select Show Dashboard > Risk
Monitoring on the Dashboard tab.
Related tasks:
Monitoring policy compliance
Create a dashboard item that shows policy compliance pass rates and policy risk
score for selected assets, policies, and policies groups.
Monitoring risk change on page 21
Create a dashboard item that shows policy risk change for selected assets, policies,
and policies groups on a daily, weekly, and monthly basis.
Procedure
1. Click the Dashboard tab.
2. On the toolbar, click New Dashboard.
10. From the Policy Group list, select the policy groups that you want to monitor.
11. Click Save.
Use this dashboard item to compare changes in the Policy Risk Score, Policies
Checks, and Policies values for a policy group over time.
The Risk Change dashboard item uses arrows to indicate where policy risk for
selected values that increased, decreased, or stayed the same over a chosen time
period:
v The number beneath the red arrow indicates the values that show an increased
risk.
v The number beneath the gray arrows indicates the values where there is no
change in risk.
v The number beneath the green arrow indicates the values that show a decreased
risk.
Procedure
1. Click the Dashboard tab.
2. On the toolbar, click New Dashboard.
3. Type a name and description for your historical policy compliance dashboard.
4. Click OK.
5. On the toolbar, select Add Item > Risk Manager > Risk Change.
Risk Manager Dashboard items are displayed only when IBM Security
QRadar Risk Manager is licensed.
For more information, see the IBM Security QRadar Vulnerability Manager User
Guide.
You can display a custom dashboard item that is based on saved search criteria
from the Vulnerabilities tab. Search items are listed in the Add Item >
Vulnerability Management > Vulnerability Searches menu. The name of the
search item matches the name of the saved search criteria the item is based on.
The supported chart types are table, pie, and bar. The default chart type is bar.
These charts are configurable.
System notification
The Systems Notification dashboard item displays event notifications that are
received by your system.
For more information about how to configure event notifications and create event
rules, see the IBM Security QRadar SIEM Administration Guide.
On the System Notifications dashboard item, you can view the following
information:
You can point your mouse over a notification to view more details:
v Host IP - Displays the host IP address of the host that originated the
notification.
v Severity - Displays the severity level of the incident that created this
notification.
v Low Level Category - Displays the low-level category that is associated with the
incident that generated this notification. For example: Service Disruption.
v Payload - Displays the payload content that is associated with the incident that
generated this notification.
v Created - Displays the amount of time elapsed since the notification was created.
When you add the System Notifications dashboard item, system notifications can
also display as pop-up notifications in the QRadar user interface. These pop-up
notifications are displayed in the lower right corner of the user interface, regardless
of the selected tab.
Pop-up notifications are only available for users with administrative permissions
and are enabled by default. To disable pop-up notifications, select User Preferences
and clear the Enable Pop-up Notifications check box.
The Current Threat Level diagram indicates the current threat level and provides
a link to the Current Internet Threat Level page of the IBM Internet Security
Systems website.
Current advisories are listed in the dashboard item. To view a summary of the
advisory, click the Arrow icon next to the advisory. The advisory expands to
display a summary. Click the Arrow icon again to hide the summary.
After you create a custom dashboard, the new dashboard is displayed in the
Dashboard tab and is listed in the Show Dashboard list box. A new custom
dashboard is empty by default; therefore, you must add items to the dashboard.
Procedure
1. Click the Dashboard tab.
2. Click the New Dashboard icon.
3. In the Name field, type a unique name for the dashboard. The maximum
length is 65 characters.
4. In the Description field, type a description of the dashboard. The maximum
length is 255 characters. This description is displayed in the tooltip for the
dashboard name in the Show Dashboard list box.
5. Click OK.
The Network Activity tab is displayed, displaying results and two charts that
match the parameters of your dashboard item. The chart types that are displayed
on the Log activity or Network Activity tab depend on which chart is configured
in the dashboard item:
Configuring charts
You can configure Log Activity, Network Activity, and Connections, if applicable,
dashboard items to specify the chart type and how many data objects you want to
view.
Your custom chart configurations are retained, so that they are displayed as
configured each time that you access the Dashboard tab.
Data is accumulates so that when you perform a time series saved search, there is
a cache of event or flow data available to display the data for the previous time
period. Accumulated parameters are indicated by an asterisk (*) in the Value to
Graph list box. If you select a value to graph that is not accumulated (no asterisk),
time series data is not available.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard that contains the item
you want to customize.
3. On the header of the dashboard item you want to configure, click the Settings
icon.
4. Configure the chart parameters.
When you remove an item from the dashboard, the item is not removed
completely.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard from which you want
to remove an item.
3. On the dashboard item header, click the red [x] icon to remove the item from
the dashboard.
When you detach a dashboard item, the original dashboard item remains on the
Dashboard tab, while a detached window with a duplicate dashboard item
remains open and refreshes during scheduled intervals. If you close the QRadar
application, the detached window remains open for monitoring and continues to
refresh until you manually close the window or shut down your computer system.
Renaming a dashboard
You can rename a dashboard and update the description.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard that you want to edit.
3. On the toolbar, click the Rename Dashboard icon.
4. In the Name field, type a new name for the dashboard. The maximum length is
65 characters.
5. In the Description field, type a new description of the dashboard. The
maximum length is 255 characters
6. Click OK.
Deleting a dashboard
You can delete a dashboard.
After you delete a dashboard, the Dashboard tab refreshes and the first dashboard
that is listed in the Show Dashboard list box is displayed. The dashboard that you
deleted is no longer displayed in the Show Dashboard list box.
Procedure
1. Click the Dashboard tab.
2. From the Show Dashboard list box, select the dashboard that you want to
delete.
3. On the toolbar, click Delete Dashboard.
4. Click Yes.
Procedure
1. On the System Notification dashboard item header, click the Settings icon.
2. From the Display list box, select the number of system notifications you want
to view.
To add an event and flow search dashboard item to the Add Item menu on the
Dashboard tab, you must access the Log Activity or Network Activity tab to
create search criteria that specifies that the search results can be displayed on the
Dashboard tab. The search criteria must also specify that the results are grouped
on a parameter.
Procedure
1. Choose:
v To add a flow search dashboard item, click the Network Activity tab.
v To add an event search dashboard item, click the Log Activity tab.
2. From the Search list box, choose one of the following options:
v To create a search, select New Search.
v To edit a saved search, select Edit Search.
3. Configure or edit your search parameters, as required.
v On the Edit Search pane, select the Include in my Dashboard option.
v On the Column Definition pane, select a column and click the Add Column
icon to move the column to the Group By list.
4. Click Filter. The search results are displayed.
5. Click Save Criteria. See Saving search criteria on the Offense tab
6. Click OK.
7. Verify that your saved search criteria successfully added the event or flow
search dashboard item to the Add Items list
a. Click the Dashboard tab.
b. Choose one of the following options:
a. To verify an event search item, select Add Item > Log Activity > Event
Searches > Add Item.
b. To verify a flow search item, select Add Item > Network Activity > Flow
Searches. The dashboard item is displayed on the list with the same name
as your saved search criteria.
You can navigate the various pages of the Offenses tab to investigate event and
flow details to determine the unique events and flows that caused the offense.
Offense Overview
Using the Offenses tab, you can investigate an offense, source and destination IP
addresses, network behaviors, and anomalies on your network.
You can also search for offenses that are based on various criteria. For more
information about searching offenses, see Offense searches on page 139.
The Offenses tab does not use device level user permissions to determine which
offenses each user is able to view; as determined by network permissions.
For more information about device level permissions, see the IBM Security QRadar
SIEM Administration Guide.
Key Terms
Using the Offenses tab, you can access and analyze Offenses, Source IP addresses,
and Destination IP addresses.
Item Description
Offenses An offense includes multiple events or flows
that originate from one source, such as a
host or log source. The Offenses tab
displays offenses, which include traffic and
vulnerabilities that collaborate and validate
the magnitude of an offense. The magnitude
of an offense is determined by several tests
performed on the offense each time it is
re-evaluated. Re-evaluation occurs when
events are added to the offense and at
scheduled intervals.
Source IP addresses A source IP address specifies the device that
attempts to breach the security of a
component on your network. A source IP
address can use various methods of attack,
such as reconnaissance or Denial of Service
(DoS) attacks to attempt unauthorized
access.
Offense Retention
On the Admin tab, you can configure the offense retention period system settings
to remove offenses from the database after a configured time period.
The default offense retention period is three days. You must have administrative
permission to access the Admin tab and configure system settings. When you
configure the thresholds, five days are added to any defined threshold.
When you close offenses, the closed offenses are removed from the database after
the offense retention period elapses. If more events occur for an offense, a new
offense is created. If you perform a search that includes closed offenses, the item is
displayed in the search results if it has not been removed from the database.
Offense Monitoring
Using the different views available on the Offenses tab, you can monitor offenses
to determine what offenses are currently occurring on your network.
Offenses are listed with the highest magnitude first. You can locate and view the
details of a particular offense, and then take action on the offense, if required.
After you start navigating through the various views, the top of the tab displays
the navigation trail to your current view. If you want to return to a previously
viewed page, click the page name on the navigation trail.
From the navigation menu on the Offenses tab, you can access the following pages
that are listed in the table below.
Table 11. Pages that can be accessed from the Offenses tab
Page Description
My Offenses Displays all offenses that are assigned to
you.
All Offenses Displays all global offenses on the network.
By Category Displays all offenses that are grouped by the
high and low-level category.
By Source IP Displays all offenses that are grouped by the
source IP addresses that are involved in an
offense.
By Destination IP Displays all offenses that are grouped by the
destination IP addresses that are involved in
an offense.
By Network Displays all offenses that are grouped by the
networks that are involved in an offense.
The All Offenses page displays a list of all offenses that are occurring in your
network. The My Offenses page displays a list of offenses that are assigned to you.
The top of the table displays the details of the offense search parameters, if any,
applied to the search results. To clear these search parameters, you can click Clear
Filter. For more information about searching offenses, see Offense searches.
Note: To view a pane on the summary page in greater detail, click the associated
toolbar option. For example, if you want to view the details of the source IP
addresses, click Sources. For more information about the toolbar options, see
Offense tab toolbar functions.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, select All Offenses or My Offenses.
3. You can refine the list of offenses with the following options:
v From the View Offenses list box, select an option to filter the list of offenses
for a specific time frame.
v Click the Clear Filter link beside each filter that is displayed in the Current
Search Parameters pane.
4. Double-click the offense that you want to view.
5. On the Offense Summary page, review the offense details. See Offense
parameters.
6. Perform any necessary actions on the offense.
Count fields, such as Event/Flow Count and Source Count, do not consider
network permissions of the user.
A source IP address specifies the host that has generated offenses as a result of an
attack on your system. All source IP addresses are listed with the highest
magnitude first. The list of offenses only displays source IP addresses with active
offenses.
Procedure
1. Click the Offenses tab.
2. Click By Source IP.
3. You can refine the list of offenses that use the following options:
v From the View Offenses list box, select an option to filter the list of offenses
for a specific time frame.
v Click the Clear Filter link beside each filter that is displayed in the Current
Search Parameters pane.
4. Double-click the group that you want to view.
5. To view a list of local destination IP addresses for the source IP address, click
Destinations on the Source page toolbar.
6. To view a list of offenses that are associated with this source IP address, click
Offenses on the Source page toolbar.
7. Double-click the offense that you want to view.
8. On the Offense Summary page, review the offense details. See Offense
parameters.
9. Perform any necessary actions on the offense. See Offense management tasks.
All destination IP addresses are listed with the highest magnitude first.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click By Network.
3. Double-click the network that you want view.
4. To view a list of source IP addresses associated with this network, click Sources
on the Network page toolbar.
5. To view a list of destination IP addresses associated with this network, click
Destinations on the Network page toolbar.
6. To view a list of offenses that are associated with this network, click Offenses
on the Network page toolbar.
7. Double-click the offense that you want to view.
8. On the Offense Summary page, review the offense details. See Offense
parameters.
9. Perform any necessary actions on the offense. See Offense management tasks.
To perform an action on multiple offenses, hold the Control key while you select
each offense you want to select. To view offense details on a new page, hold the
Control key while you double-click an offense.
Adding notes
You can add notes to any offense on the Offenses tab. Notes can include
information that you want to capture for the offense, such as a Customer Support
ticket number or offense management information.
Procedure
1. Click the Offenses tab.
2. Navigate to the offense to which you want to add notes.
3. Double-click the offense.
4. From the Actions list box, select Add Note.
5. Type the note you want to include for this offense.
6. Click Add Note.
Results
The note is displayed in the Last 5 Notes pane on the offense summary. A Notes
icon is displayed in the flag column of the offenses list. If you hover your mouse
over the notes indicator in the Flag column of the Offenses list, the note for that
offense is displayed.
Hiding offenses
To prevent an offense from being displayed in the Offenses tab, you can hide the
offense.
After you hide an offense, the offense is no longer displayed in any list (for
example, All Offenses) on the Offenses tab; however, if you perform a search that
includes the hidden offenses, the item is displayed in the search results.
Procedure
1. Click the Offenses tab.
2. Click All Offenses.
3. Select the offense that you want to hide.
4. From the Actions list box, select Hide.
5. Click OK.
To show hidden offenses, you must perform a search that includes hidden offenses.
The search results include all offenses, including hidden and non-hidden offenses.
Offenses are specified as hidden by the Hidden icon in the Flag column.
Procedure
1. Click the Offenses tab.
2. Click All Offenses.
3. Search for hidden offenses:
a. From the Search list box, select New Search.
b. In the Exclude option list on the Search Parameters pane, clear the Hidden
Offenses check box.
c. Click Search.
4. Locate and select the hidden offense that you want to show.
5. From the Actions list box, select Show.
Closing offenses
To remove an offense completely from your system, you can close the offense.
After you close (delete) offenses, the offenses are no longer displayed in any list
(for example, All Offenses) on the Offenses tab. The closed offenses are removed
from the database after the offense retention period elapses. The default offense
retention period is three days. If more events occur for an offense, a new offense is
created. If you perform a search that includes closed offenses, the item is displayed
in the search results if it has not been removed from the database.
When you close offenses, you must select a reason for closing the offense and you
can add a note. The Notes field displays the note that is entered for the previous
offense closing. Notes must not exceed 2,000 characters. This note displays in the
Notes pane of this offense. If you have the Manage Offense Closing permission,
you can add new custom reasons to the Reason for Closing list box.
For more information, see the IBM Security QRadar SIEM Administration Guide.
Procedure
1. Click the Offenses tab.
2. Click All Offenses.
3. Choose one of the following options:
v Select the offense that you want to close, and then select Close from the
Actions list box.
v From the Actions list box, select Close Listed.
4. From the Reason for Closing list box, select a reason. The default reason is
non-issue.
Results
After you close offenses, the counts that are displayed on the By Category pane of
the Offenses tab can take several minutes to reflect the closed offenses.
Protecting offenses
You can prevent offenses from being removed from the database after the retention
period elapses.
Offenses are retained for a configurable retention period. The default retention
period is three days; however, Administrators can customize the retention period.
You might have offenses that you want to retain regardless of the retention period.
You can prevent these offenses from being removed from the database after the
retention period has elapses.
For more information about the Offense Retention Period, see the IBM Security
QRadar SIEM Administration Guide.
CAUTION:
When the SIM data model is reset from the Hard Clean option, all offenses,
including protected offenses, are removed from the database and the disk. You
must have administrative privileges to reset the SIM data model.
Procedure
1. Click the Offenses tab.
2. Click All Offenses.
3. Choose one of the following options:
v Select the offense that you want to protect, and then select Protect from the
Actions list box.
v From the Actions list box, select Protect Listed.
4. Click OK.
Results
Unprotecting offenses
You can unprotect offenses that were previously protected from removal after the
offense retention period has elapsed.
To list only protected offenses, you can perform a search that filters for only
protected offenses. If you clear the Protected check box and ensure that all other
options are selected under the Excludes option list on the Search Parameters pane,
only protected offenses are displayed.
Exporting offenses
You can export offenses in Extensible Markup Language (XML) or
comma-separated values (CSV) format.
If you want to reuse or store your offense data, you can export offenses. For
example, you can export offenses to create non QRadar product based reports. You
can also export offenses as a secondary long-term retention strategy. Customer
Support might require you to export offenses for troubleshooting purposes.
The resulting XML or CSV file includes the parameters that are specified in the
Column Definition pane of your search parameters. The length of time that is
required to export your data depends on the number of parameters specified.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click All Offenses.
3. Select the offense that you want to export.
4. Choose one of the following options:
v To export the offenses in XML format, select Actions > Export to XML from
the Actions list box.
v To export the offenses in CSV format, select Actions > Export to CSV from
the Actions list box
5. Choose one of the following options:
v To open the list for immediate viewing, select the Open with option and
select an application from the list box.
v To save the list, select the Save to Disk option.
6. Click OK.
Note: The Username list box will only display users who have Offenses tab
privileges.
Procedure
1. Click the Offenses tab.
2. Click All Offenses.
3. Select the offense that you want to assign.
4. From the Actions list box, select Assign.
5. From the Username list box, select the user that you want to assign this offense
to.
6. Click Save.
Results
The offense is assigned to the selected user. The User icon is displayed in the Flag
column of the Offenses tab to indicate that the offense is assigned. The designated
user can see this offense in their My Offenses page.
The body of the email message includes the following information, if available :
v Source IP address
v Source user name, host name, or asset name
v Total number of sources
v Top five sources by magnitude
v Source networks
v Destination IP address
v Destination user name, host name, or asset name
v Total number of destinations
v Top five destinations by magnitude
v Destination networks
v Total number of events
v Rules that caused the offense or event rule to fire
v Full description of offense or event rule
v Offense ID
v Top five categories
v Start time of offense or time the event generated
v Top five Annotations
v Link to the offense user interface
v Contributing CRE rules
Option Description
Parameter Description
To Type the email address of the user you want
to notify if a change occurs to the selected
offense. Separate multiple email addresses
with a comma.
From Type the default originating email address.
The default is [email protected].
Email Subject Type the default subject for the email. The
default is Offense ID.
Email Message Type the standard message that you want to
accompany the notification email.
6. Click Send.
Procedure
1. Click the Offenses tab.
2. Navigate to the offense you want to mark for follow-up.
3. Double-click the offense.
4. From the Actions list box, select Follow up.
Results
The offense now displays a flag in the Flags column, indicating the offense is
flagged for follow-up. If you do not see your flagged offense on the offenses list,
you can sort the list to display all flagged offenses first. To sort an offense list by
flagged offense, double-click the Flags column header.
Offense parameters
This table provides descriptions of parameters that are provided on the Offenses
tab.
The following table provides descriptions of parameters that are provided on all
pages of the Offenses tab.
Table 13. Description of Offenses tab parameters
Parameter Location Description
Annotation Top 5 Annotations table Specifies the details for the
annotation. Annotations are
text descriptions that rules
can automatically add to
offenses as part of the rule
response. .
Anomaly Last 10 Events (Anomaly Select this option to display
Events) table the saved search results that
caused the anomaly
detection rule to generate the
event.
v By Network - List of
Sources page
v By Network - List of Local
Destinations page
Flows v All Offenses page Specifies the number of
flows for the offense.
v My Offenses page
Note: If the Flows column
v By Source IP - List of displays N/A, the offense
Offenses page might have a start date that
v By Network - List of precedes the date you
Offenses page upgraded to QRadar 7.1.0
v By Destination IP - List of (MR1).
Offenses page
Group v Offense Source table, if the Specifies to which group the
Offense Type is Log Source log source belongs.
v Top 5 Log Sources table
Group(s) Offense Source table, if the Specifies which rule group
Offense Type is Rule the rule belongs to.
View Offenses v By Source IP Details page Select an option from this list
box to filter on the offenses
v By Destination IP Details
you want to view on this
page
page. You can view all
offenses or filter by the
offenses that are based on a
time range. From the list box,
select the time range that
you want to filter by.
Vulnerabilities Offense Source table, if the Specifies the number of
Offense Type is Source IP or identified vulnerabilities that
Destination IP are associated with the
source or destination IP
address. This value also
includes the number of
active and passive
vulnerabilities.
Vulnerabilities By Destination IP - List of Specifies whether a source IP
Sources page address has vulnerabilities.
Vulnerability v Top 5 Source IPs table Specifies whether the source
or destination IP address has
v By Source IP Details page
vulnerabilities.
v By Network - List of
Sources page
v Top 5 Destination IPs table
v By Source IP - List of
Local Destinations page
v By Destination IP Details
page
v By Network - List of Local
Destinations page
v By Destination IP - List of
Sources page
v By Network - List of
Sources page
v By Network - List of Local
Destinations page
v Top 5 Annotations table
Using the Log Activity tab, you can monitor and investigate log activity (events) in
real time or perform advanced searches.
The Log Activity tab specifies which events are associated with offenses.
Status bar
When streaming events, the status bar displays the average number of results that
are received per second.
This is the number of results the Console successfully received from the Event
processors. If this number is greater than 40 results per second, only 40 results are
displayed. The remainder is accumulated in the result buffer. To view more status
information, move your mouse pointer over the status bar.
When events are not being streamed, the status bar displays the number of search
results that are currently displayed on the tab and the amount of time that is
required to process the search results.
For more information about streaming mode, see Viewing streaming events. You
can specify a different time range to filter events by using the View list box.
If you previously configured saved search criteria as the default, the results of that
search are automatically displayed when you access the Log Activity tab. For more
information about saving search criteria, see Saving event and flow search criteria.
If you apply any filters on the Log Activity tab or in your search criteria before
enabling streaming mode, the filters are maintained in streaming mode. However,
streaming mode does not support searches that include grouped events. If you
enable streaming mode on grouped events or grouped search criteria, the Log
Activity tab displays the normalized events. See Viewing normalized events.
When you want to select an event to view details or perform an action, you must
pause streaming before you double-click an event. When the streaming is paused,
the last 1,000 events are displayed.
Procedure
1. Click the Log Activity tab.
2. From the View list box, select Real Time (streaming). For information about
the toolbar options, see Table 4-1. For more information about the parameters
that are displayed in streaming mode, see Table 4-7.
3. Optional. Pause or play the streaming events. Choose one of the following
options:
v To select an event record, click the Pause icon to pause streaming.
v To restart streaming mode, click the Play icon.
Normalization involves parsing raw event data and preparing the data to display
readable information about the tab. When events are normalized, the system
normalizes the names as well. Therefore, the name that is displayed on the Log
Activity tab might not match the name that is displayed in the event.
Note: If you selected a time frame to display, a time series chart is displayed. For
more information about using time series charts, see Time series chart overview.
The Log Activity tab displays the following parameters when you view
normalized events:
Table 16. Log Activity tab - Default (Normalized) parameters
Parameter Description
Current Filters The top of the table displays the details of
the filters that are applied to the search
results. To clear these filter values, click
Clear Filter.
Note: This parameter is only displayed after
you apply a filter.
Procedure
1. Click the Log Activity tab.
2. From the Display list box, select Default (Normalized).
3. From the View list box, select the time frame that you want to display.
4. Click the Pause icon to pause streaming.
5. Double-click the event that you want to view in greater detail. For more
information, see Event details.
When you view raw event data, the Log Activity tab provides the following
parameters for each event.
Table 17. Raw Event parameters
Parameter Description
Current Filters The top of the table displays the details of
the filters that are applied to the search
results. To clear these filter values, click
Clear Filter.
Note: This parameter is only displayed after
you apply a filter.
View From this list box, you can select the time
range that you want to filter for.
Current Statistics When not in Real Time (streaming) or Last
Minute (auto refresh) mode, current statistics
are displayed, including:
Note: Click the arrow next to Current
Statistics to display or hide the statistics
v Total Results - Specifies the total number
of results that matched your search
criteria.
v Data Files Searched - Specifies the total
number of data files searched during the
specified time span.
v Compressed Data Files Searched -
Specifies the total number of compressed
data files searched within the specified
time span.
v Index File Count - Specifies the total
number of index files searched during the
specified time span.
v Duration - Specifies the duration of the
search.
Note: Current statistics are useful for
troubleshooting. When you contact
Customer Support to troubleshoot events,
you might be asked to supply current
statistical information.
Charts Displays configurable charts that represent
the records that are matched by the time
interval and grouping option. Click Hide
Charts if you want to remove the charts
from your display. The charts are only
displayed after you select a time frame of
Last Interval (auto refresh) or above, and a
grouping option to display.
Note: If you use Mozilla Firefox as your
browser and an ad blocker browser
extension is installed, charts do not display.
To displayed charts, you must remove the
ad blocker browser extension. For more
information, see your browser
documentation.
Procedure
1. Click the Log Activity tab.
2. From the Display list box, select Raw Events.
3. From the View list box, select the time frame that you want to display.
4. Double-click the event that you want to view in greater detail. See Event
details.
The Display list box is not displayed in streaming mode because streaming mode
does not support grouped events. If you entered streaming mode by using
non-grouped search criteria, this option is displayed.
After you select an option from the Display list box, the column layout of the data
depends on the chosen group option. Each row in the events table represents an
event group. The Log Activity tab provides the following information for each
event group
Table 19. Grouped event parameters
Parameter Description
Grouping By Specifies the parameter that the search is
grouped on.
Current Filters The top of the table displays the details of
the filter that is applied to the search results.
To clear these filter values, click Clear Filter.
View From the list box, select the time range that
you want to filter for.
Procedure
1. Click the Log Activity tab.
2. From the View list box, select the time frame that you want to display.
3. From the Display list box, choose which parameter you want to group events
on. See Table 2.The events groups are listed. For more information about the event group details. See Table 1.
4. To view the List of Events page for a group, double-click the event group that
you want to investigate. The List of Events page does not retain chart configurations that you might have
defined on the Log Activity tab. For more information about the List of Events page parameters, see Table 1.
Event details
You can view a list of events in various modes, including streaming mode or in
event groups. In, whichever mode you choose to view events, you can locate and
view the details of a single event.
For more information about rules, see the IBM Security QRadar SIEM Administration
Guide.
When you view an offense from the Log Activity tab, the offense might not
display if the Magistrate has not yet saved the offense that is associated with the
selected event to disk or the offense has been purged from the database. If this
occurs, the system notifies you.
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to
pause streaming.
3. Click the Offense icon beside the event you want to investigate.
4. View the associated offense.
This manual action is used to map unknown log source events to known QRadar
events so that they can be categorized and processed appropriately.
For normalization purposes, QRadar automatically maps events from log sources
to high- and low-level categories.
For more information about event categories, see the IBM Security QRadar SIEM
Administration Guide.
If events are received from log sources that the system is unable to categorize, then
the events are categorized as unknown. These events occur for several reasons,
including:
v User-defined Events - Some log sources, such as Snort, allows you to create
user-defined events.
v New Events or Older Events - Vendor log sources might update their software
with maintenance releases to support new events that QRadar might not
support.
Note: The Map Event icon is disabled for events when the high-level category is
SIM Audit or the log source type is Simple Object Access Protocol (SOAP).
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to
pause streaming.
3. Double-click the event that you want to map.
4. Click Map Event.
5. If you know the QID that you want to map to this event, type the QID in the
Enter QID field.
6. If you do not know the QID you want to map to this event, you can search for
a particular QID:
a. Choose one of the following options: To search for a QID by category,
select the high-level category from the High-Level Category list box.
To search for a QID by category, select the low-level category from
the Low-Level Category list box. To search for a QID by log source
type, select a log source type from the Log Source Type list box. To
search for a QID by name, type a name in the QID/Name field.
b. Click Search.
c. Select the QID you want to associate this event with.
7. Click OK.
You can tune false positive events from the event list or event details page.
You can tune false positive events from the event list or event details page.
For more information about roles, see the IBM Security QRadar SIEM Administration
Guide.
Procedure
1. Click the Log Activity tab.
2. Optional. If you are viewing events in streaming mode, click the Pause icon to
pause streaming.
3. Select the event that you want to tune.
4. Click False Positive.
5. In the Event/Flow Property pane on the False Positive window, select one of
the following options:
v Event/Flow(s) with a specific QID of <Event>
v Any Event/Flow(s) with a low-level category of <Event>
v Any Event/Flow(s) with a high-level category of <Event>
6. In the Traffic Direction pane, select one of the following options:
v <Source IP Address> to <Destination IP Address>
v <Source IP Address> to Any Destination
v Any Source to <Destination IP Address>
v Any Source to any Destination
7. Click Tune.
PCAP data
If your QRadar Console is configured to integrate with the Juniper JunOS Platform
DSM, then Packet Capture (PCAP) can be received, processed, data can be stored
from a Juniper SRX-Series Services Gateway log source.
For more information about the Juniper JunOS Platform DSM, see the IBM Security
QRadar DSM Configuration Guide.
Before you can display PCAP data on the Log Activity tab, the Juniper SRX-Series
Services Gateway log source must be configured with the PCAP Syslog
Combination protocol. For more information about configuring log source
protocols, see the Managing Log Sources Guide.
When you perform a search that includes the PCAP Data column, an icon is
displayed in the PCAP Data column of the search results if PCAP data is available
Procedure
1. Click the Log Activity tab.
2. From the Search list box, select New Search.
3. Optional. To search for events that have PCAP data, configure the following
search criteria:
a. From the first list box, select PCAP data.
b. From the second list box, select Equals.
c. From the third list box, select True.
d. Click Add Filter.
4. Configure your column definitions to include the PCAP Data column:
a. From the Available Columns list in the Column Definition pane, click
PCAP Data.
b. Click the Add Column icon on the bottom set of icons to move the PCAP
Data column to the Columns list.
c. Optional. Click the Add Column icon in the top set of icons to move the
PCAP Data column to the Group By list.
5. Click Filter.
6. Optional. If you are viewing events in streaming mode, click the Pause icon to
pause streaming.
7. Double-click the event that you want to investigate.
What to do next
For more information about viewing and downloading PCAP data, see the
following sections:
v Viewing PCAP information
v Downloading the PCAP file to your desktop system
Before you can view PCAP information, you must perform or select a search that
displays the PCAP Data column.
Before PCAP data can be displayed, the PCAP file must be retrieved for display on
the user interface. If the download process takes an extended period, the
Downloading PCAP Packet information window is displayed. In most cases, the
download process is quick and this window is not displayed.
After the file is retrieved, a pop-up window provides a readable version of the
PCAP file. You can read the information that is displayed on the window, or
download the information to your desktop system
Before you can view a PCAP information, you must perform or select a search that
displays the PCAP Data column. See Displaying the PCAP data column.
Procedure
1. For the event you want to investigate, choose one of the following options:
v Select the event and click the PCAP icon.
v Right-click the PCAP icon for the event and select More Options >
Download PCAP File .
v Double-click the event you want to investigate, and then select PCAP Data >
Download PCAP File from the event details toolbar.
2. Choose one of the following options:
v If you want to open the file for immediate viewing, select the Open with
option and select an application from the list box.
v If you want to save the list, select the Save File option.
3. Click OK.
Exporting events
You can export events in Extensible Markup Language (XML) or
Comma-Separated Values (CSV) format.
The length of time that is required to export your data depends on the number of
parameters specified.
Results
When the export is complete, you receive notification that the export is complete. If
you did not select the Notify When Done icon, the status window is displayed.
For more information about permissions and assigning roles, see the IBM Security
QRadar SIEM Administration Guide.
Select the Network Activity tab to visually monitor and investigate flow data in
real time, or conduct advanced searches to filter the displayed flows. A flow is a
communication session between two hosts. You can view flow information to
determine how the traffic is communicated, and what was communicated (if the
content capture option is enabled). Flow information can also include such details
as protocols, Autonomous System Number (ASN) values, or Interface Index
(IFIndex) values.
You can access the following options from the Network Activity tab toolbar::
Table 22. Network Activity tab toolbar options
Options Description
Search Click Search to complete advanced searches on
flows. Search options include:
v New Search - Select this option to create a new
flow search.
v Edit Search - Select this option to select and
edit a flow search.
v Manage Search Results - Select this option to
view and manage search results.
This is the number of results the Console successfully received from the Event
processors. If this number is greater than 40 results per second, only 40 results are
displayed. The remainder is accumulated in the result buffer. To view more status
information, move your mouse pointer over the status bar.
When flows are not streaming, the status bar displays the number of search results
that are currently displayed and the amount of time that is required to process the
search results.
OverFlow records
With administrative permissions, you can specify the maximum number of flows
you want to send from the QRadar QFlow Collector to the Event processors.
If you have administrative permissions, you can specify the maximum number of
flows you want to send from the QRadar QFlow Collector to the Event processors.
All data that is collected after the configured flow limit has been reached is
grouped into one flow record. This flow record is then displayed on the Network
Activity tab with a source IP address of 127.0.0.4 and a destination IP address of
127.0.0.5. This flow record specifies OverFlow on the Network Activity tab.
For more information about streaming mode, see Viewing streaming flows. You
can specify a different time range to filter flows using the View list box.
If you previously configured a saved search as the default, the results of that
search are automatically displayed when you access the Network Activity tab. For
more information about saving search criteria, see Saving event and flow search
criteria.
If you apply any filters on the Network Activity tab or in your search criteria
before enabling streaming mode, the filters are maintained in streaming mode.
However, streaming mode does not support searches that include grouped flows. If
you enable streaming mode on grouped flows or grouped search criteria, the
Network Activity tab displays the normalized flows. See Viewing normalized
flows.
Procedure
1. Click the Network Activity tab.
2. From the View list box, select Real Time (streaming).
For information about the toolbar options, see Table 5-1. For more information
about the parameters that are displayed in streaming mode, see Table 5-3.
3. Optional. Pause or play the streaming flows. Choose one of the following
options:
v To select an event record, click the Pause icon to pause streaming.
v To restart streaming mode, click the Play icon.
Note: If you select a time frame to display, a time series chart is displayed. For
more information about using the time series charts, see Time series chart
overview.
The Network Activity tab displays the following parameters when you view
normalized flows:
Table 24. Parameters for the Network Activity tab
Parameter Description
Current Filters The top of the table displays the details of
the filters that are applied to the search
results. To clear these filter values, click
Clear Filter.
Note: This parameter is only displayed after
you apply a filter.
View From the list box, you can select the time
range that you want to filter for.
Procedure
1. Click the Network Activity tab.
2. From the Display list box, select Default (Normalized).
3. From the View list box, select the time frame that you want to display.
4. Click the Pause icon to pause streaming.
5. Double-click the flow that you want to view in greater detail. See Flow details.
The Display list box is not displayed in streaming mode because streaming mode
does not support grouped flows. If you entered streaming mode using
non-grouped search criteria, this option is displayed.
After you select an option from the Display list box, the column layout of the data
depends on the chosen group option. Each row in the flows table represents a flow
group. The Network Activity tab provides the following information for each flow
group.
Table 26. Grouped flow parameters
Header Description
Grouping By Specifies the parameter that the search is
grouped on.
Current Filters The top of the table displays the details of
the filter that is applied to the search results.
To clear these filter values, click Clear Filter.
View From the list box, select the time range that
you want to filter for.
Procedure
1. Click the Network Activity tab.
2. From the View list box, select the time frame that you want to display.
3. From the Display list box, choose which parameter you want to group flows
on. See Table 2. The flow groups are listed. For more information about the
flow group details. See Table 1.
4. To view the List of Flows page for a group, double-click the flow group that
you want to investigate. The List of Flows page does not retain chart
configurations that you might have defined on the Network Activity tab. For
more information about the List of Flows parameters, see Table 2.
5. To view the details of a flow, double-click the flow that you want to investigate.
For more information about the flow details page, see Table 1.
Note: You can tune false positive flows from the summary or details page.
You must have appropriate permissions for creating customized rules to tune false
positives. For more information about false positives, see the Glossary.
Procedure
1. Click the Network Activity tab.
2. Optional. If you are viewing flows in streaming mode, click the Pause icon to
pause streaming.
3. Select the flow that you want to tune.
4. Click False Positive.
5. In the Event/Flow Property pane on the False Positive window, select one of
the following options:
v Event/Flow(s) with a specific QID of <Event>
v Any Event/Flow(s) with a low-level category of <Event>
v Any Event/Flow(s) with a high-level category of <Event>
6. In the Traffic Direction pane, select one of the following options:
v <Source IP Address> to <Destination IP Address>
v <Source IP Address> to any Destination
v Any Source to <Destination IP Address>
Exporting flows
You can export flows in Extensible Markup Language (XML) or Comma Separated
Values (CSV) format. The length of time that is required to export your data
depends on the number of parameters specified.
Procedure
1. Click the Network Activity tab.
2. Optional. If you are viewing flows in streaming mode, click the Pause icon to
pause streaming.
3. From the Actions list box, select one of the following options:
v Export to XML > Visible Columns - Select this option to export only the
columns that are visible on the Log Activity tab. This is the recommended
option.
v Export to XML > Full Export (All Columns) - Select this option to export all
flow parameters. A full export can take an extended period of time to
complete.
v Export to CSV > Visible Columns - Select this option to export only the
columns that are visible on the Log Activity tab. This is the recommended
option.
v Export to CSV > Full Export (All Columns) - Select this option to export all
flow parameters. A full export can take an extended period of time to
complete.
4. If you want to resume your activities, click Notify When Done.
Results
When the export is complete, you receive notification that the export is complete. If
you did not select the Notify When Done icon, the Status window is displayed.
Asset data
An asset is any network endpoint that sends or receives data across your network
infrastructure. For example, notebooks, servers, virtual machines, and handheld
devices are all assets. Every asset in the asset database is assigned a unique
identifier so that it can be distinguished from other asset records.
Asset profiles
An asset profile is a collection of all information that IBM Security QRadar SIEM
collected over time about a specific asset. The profile includes information about
the services that are running on the asset and any identity information that is
known.
QRadar SIEM automatically creates asset profiles from identity events and
bidirectional flow data or, if they are configured, vulnerability assessment scans.
The data is correlated through a process that is called asset reconciliation and the
profile is updated as new information comes into QRadar. The asset name is
derived from the information in the asset update in the following order of
precedence:
v Given name
v NETBios host name
v DNS host name
v IP address
Administrators use asset profiles to report on, search, audit, and create rules to
identify threats, vulnerabilities, and asset usage. The asset data is also used for
correlation purposes to help reduce false positives. For example, if an attacker
attempts to use a specific service that is running on an asset, QRadar can
determine whether the asset is vulnerable to this attack by correlating the attack to
the asset profile.
Asset data is written to the asset database incrementally, usually two or three
pieces of data at a time. With exception of updates from network vulnerability
scanners, each asset update contains information about only one asset at a time.
When an asset data source is configured with domain information, all asset data
that comes from that data source is automatically tagged with the same domain.
Because the data in the asset model is domain-aware, the domain information is
applied to all QRadar components, including identities, offenses, asset profiles, and
server discovery.
When you view the asset profile, some fields might be blank. Blank fields exist
when the system did not receive this information in an asset update, or the
information exceeded the asset retention period. The default retention period is 120
days. An IP address that appears as 0.0.0.0 indicates that the asset does not contain
IP address information.
Identity information
Every asset must contain at least one piece of identity data. Subsequent updates
that contain one or more pieces of that same identity data are reconciled with the
asset that owns that data. Updates that are based on IP addresses are handled
carefully to avoid false-positive asset matches. False-positive asset matches occur
when one physical asset is assigned ownership of an IP address that was
previously owned by another asset in the system.
When multiple pieces of identity data are provided, the asset profiler prioritizes
the information in the following order:
v MAC address (most deterministic)
v NetBIOS host name
v DNS host name
v IP address (least deterministic)
MAC addresses, NetBIOS host names, and DNS host names must be unique and
therefore are considered as definitive identity data. Incoming updates that match
an existing asset only by the IP address are handled differently than updates that
match more definitive identity data.
Asset merging occurs when an asset update contains identity data that matches
two different asset profiles. For example, a single update that contains a NetBIOS
host name that matches one asset profile and a MAC address that matches a
different asset profile might trigger an asset merge.
Some systems can cause high volumes of asset merging because they have asset
data sources that inadvertently combine identity information from two different
physical assets into a single asset update. Some examples of these systems include
the following environments:
v Central syslog servers that act as an event proxy
v Virtual machines
v Automated installation environments
v Non-unique host names, common with assets like iPads and iPhones.
v Virtual private networks that have shared MAC addresses
v Log source extensions where the identity field is OverrideAndAlwaysSend=true
Assets that have many IP addresses, MAC addresses, or host names show
deviations in asset growth and can trigger system notifications.
Related concepts:
Asset growth deviations
Sometimes asset data sources produce updates that cause asset growth deviations
in IBM Security QRadar.
Asset growth deviations occur when the number of asset updates for an asset
outpaces the retention threshold for a specific type of identity information. To
maintain the health of the QRadar asset database, manual intervention is required
to resolve the accumulation of asset data.
Asset profiles are expected to grow and become rich in data over time. For
example, the asset profile includes more IP addresses as it collects IP leases, and it
collects more user names as new users log in. Asset growth deviations indicate that
something is causing the asset profile to collect a large amount of data at an
unexpected pace.
The DHCP server log, which is configured as a QRadar log source, generates a
DHCP acknowledgment (DHCP ACK) event that associates the MAC address of
the VPN server with the IP address that it assigned to the VPN client. When asset
reconciliation occurs, the system reconciles this event by MAC address, which
results in a single existing asset that grows by one IP address for every DHCP
ACK event that is parsed.
Eventually, one asset profile contains every IP address that was allocated to the
VPN server. This asset growth deviation is caused by asset updates that contain
information about more than one asset.
Threshold settings
The Asset Profiler threshold settings specify the conditions under which an asset is
blocked from updates. The asset is updated normally up to the threshold value.
When the system collects enough data to exceed the threshold, the asset shows an
asset growth deviation. Future updates to the asset are blocked until the growth
deviation is rectified.
Asset growth deviations, which are unnatural growth of asset data, are specific to
an environment.
The following system messages indicate that QRadar identified potential asset
growth deviations:
v The system detected asset profiles that exceed the normal size threshold
v The asset blacklist rules have added new asset data to the asset
blacklists
The system notification messages include links to reports to help you identify the
assets that have growth deviations.
Related concepts:
Troubleshooting asset profiles that exceed the normal size threshold on page 116
IBM Security QRadar generates the following system notification when the
accumulation of data under a single asset exceeds the configured threshold limits
for identity data.
Explanation
The payload of the notification shows a list of the top five most frequently
deviating assets and why the system marked each asset as a growth deviation. As
shown in the following example, the payload also shows the number of times that
the asset attempted to grow beyond the asset size threshold.
Feb 13 20:13:23 127.0.0.1 [AssetProfilerLogTimer]
com.q1labs.assetprofile.updateresolution.UpdateResolutionManager:
[INFO] [NOT:0010006101][9.21.118.83/- -] [-/- -]
The top five most frequently deviating asset profiles between
Feb 13, 2015 8:10:23 PM AST and Feb 13, 2015 8:13:23 PM AST:
[ASSET ID:1003, REASON:Too Many IPs, COUNT:508],
[ASSET ID:1002, REASON:Too many DNS Names, COUNT:93],
[ASSET ID:1001, REASON:Too many MAC Addresses, COUNT:62]
When the asset data exceeds the configured threshold, QRadar blocks the asset
from future updates. This intervention prevents the system from receiving more
corrupted data and mitigates the performance impacts that might occur if the
system attempts to reconcile incoming updates against an abnormally large asset
profile.
Use the information in the notification payload to identify the assets that are
contributing to the asset growth deviation and determine what is causing the
abnormal growth. The notification provides a link to a report of all assets that
experienced deviating asset growth over the past 24 hours.
After you resolve the asset growth deviation in your environment, you can run the
report again.
1. Click the Log Activity tab and click Search > New Search.
2. Select the Deviating Asset Growth: Asset Report saved search.
3. Use the report to identify and repair inaccurate asset data that was created
during the deviation.
If the asset data is valid, QRadar administrators can increase the threshold limits
for IP addresses, MAC addresses, NetBIOS host names, and DNS host names in
the Asset Profiler Configuration on the QRadar Admin tab.
Related concepts:
System notifications for asset growth deviations on page 115
IBM Security QRadar generates system notifications to help you identify and
manage the asset growth deviations in your environment.
Explanation
Asset exclusion rules monitor asset data for consistency and integrity. The rules
track specific pieces of asset data over time to ensure that they are consistently
being observed with the same subset of data within a reasonable time.
For example, if an asset update includes both a MAC address and a DNS host
name, the MAC address is associated with that DNS host name for a sustained
period. Subsequent asset updates that contain that MAC address also contain that
same DNS host name when one is included in the asset update. If the MAC
address suddenly is associated with a different DNS host name for a short period,
the change is monitored. If the MAC address changes again within a short period,
the MAC address is flagged as contributing to an instance of deviating or
abnormal asset growth.
Use the information in the notification payload to identify the rules that are used
to monitor asset data. Click the Asset deviations by log source link in the
notification to see the asset deviations that occurred in the last 24 hours.
If the asset data is valid, QRadar administrators can configure QRadar to resolve
the problem.
v If your blacklists are populating too aggressively, you can tune the asset
reconciliation exclusion rules that populate them.
v If you want to add the data to the asset database, you can remove the asset data
from the blacklist and add it to the corresponding asset whitelist. Adding asset
data to the whitelist prevents it from inadvertently reappearing on the blacklist.
Related concepts:
Asset reconciliation exclusion rules on page 118
With each asset update that enters IBM Security QRadar, the asset reconciliation
exclusion rules apply tests to the MAC address, NetBIOS host name, DNS host
name, and IP address in the asset update.
Asset blacklists
An asset blacklist is a collection of data that IBM Security QRadar considers
untrustworthy based on the asset reconciliation exclusion rules. Data in the asset
blacklist is likely to contribute to asset growth deviations and QRadar prevents the
data from being added to the asset database.
Asset blacklists
An asset blacklist is a collection of data that IBM Security QRadar considers
untrustworthy based on the asset reconciliation exclusion rules. Data in the asset
blacklist is likely to contribute to asset growth deviations and QRadar prevents the
data from being added to the asset database.
Every asset update in QRadar is compared to the asset blacklists. Blacklisted asset
data is applied globally for all domains. If the asset update contains identity
The following table shows the reference collection name and type for each type of
identity asset data.
Table 29. Reference collection names for asset blacklist data
Type of identity
data Reference collection name Reference collection type
IP addresses (v4) Asset Reconciliation IPv4 Blacklist Reference Set [Set Type: IP]
DNS host names Asset Reconciliation DNS Blacklist Reference Set [Set Type: ALNIC*]
NetBIOS host Asset Reconciliation NetBIOS Reference Set [Set Type: ALNIC*]
names Blacklist
MAC Addresses Asset Reconciliation MAC Blacklist Reference Set [Set Type: ALNIC*]
* ALNIC is an alphanumeric type that can accommodate both host name and MAC
address values.
By default, each piece of asset data is tracked over a two-hour period. If any one
piece of identity data in the asset update exhibits suspicious behavior two or more
times within 2 hours, that piece of data is added to the asset blacklists. There is a
separate blacklist for each type of identity asset data that is tested.
You can view these rules on the Offenses tab by clicking Rules and then selecting
the asset reconciliation exclusion group in the drop-down list.
Related concepts:
Example: Asset exclusion rules that are tuned to exclude IP addresses from the
blacklist
You can exclude IP addresses from being blacklisted by tuning the asset exclusion
rules.
In the rest of your deployment, you have a carefully managed network that
consists only of inventoried, well-named company devices. IP address leases are
much longer in this part of the network, and IP addresses are accessed by
authentication only. On this network segment, you want to know immediately
when there are any asset growth deviations and you want to keep the default
settings for the asset reconciliation exclusion rules.
Your security team finds the asset-related notifications that are generated by the
wifi segment are a nuisance. You want to prevent the wifi from triggering any
more deviating asset growth notifications.
You review the Asset deviation by log source report in the last system notification.
You determine that the blacklisted data is coming from the DHCP server on your
wifi.
The values in the Event/Flow Count column and the Offenses column for the row
corresponding to the AssetExclusion: Exclude IP By MAC Address rule indicate
that your wifi DHCP server is triggering this rule.
You add a test to the existing asset reconciliation exclusion rules to stop rules from
adding wifi data to the blacklist.
Apply AssetExclusion:Exclude IP by MAC address on events which are detected by
the Local system and NOT when the event(s) were detected by one or more of
MicrosoftDHCP @ microsoft.dhcp.test.com
and NOT when any of Domain is the key and any of Identity IP is the value in
any of Asset Reconciliation Domain IPv4 Whitelist
- IP Asset Reconciliation Domain IPv4 Blacklist - IP
and when at least 3 events are seen with the same Identity IP and
different Identity MAC in 2 hours.
The updated rule tests only the events from the log sources that are not on your
wifi DHCP server. To prevent wifi DHCP events from undergoing more expensive
reference set and behavior analysis tests, you also moved this test to the top of the
test stack
Instead of QRadar receiving an update that has the host name of the asset that the
user logged in to, the log source generates many asset updates that all have the
same host name.
In this situation, the asset growth deviation is caused by one asset profile that
contains many IP addresses and user names.
Using the charts on the Log Activity and Network Activity tabs, you can view
your data using various chart configuration options.
Chart management
You can use various chart configuration options to view your data.
If you select a time frame or a grouping option to view your data, then the charts
display above the event or flow list.
You can configure a chart to select what data you want to plot. You can configure
charts independently of each other to display your search results from different
perspectives.
After you configure a chart, your chart configurations are retained when you:
v Change your view by using the Display list box.
v Apply a filter.
v Save your search criteria.
Note: If you use the Mozilla Firefox web browser and an ad blocker browser
extension is installed, charts do not display. To display charts, you must remove
the ad blocker browser extension. For more information, see your browser
documentation.
Using time series charts, you can access, navigate, and investigate log or network
activity from various views and perspectives.
Note: You must have the appropriate role permissions to manage and view time
series charts.
To display time series charts, you must create and save a search that includes time
series and grouping options. You can save up to 100 time series searches.
Default time series saved searches are accessible from the list of available searches
on the event or flow search page.
You can easily identify saved time series searches on the Quick Searches menu,
because the search name is appended with the time range specified in the search
criteria.
If your search parameters match a previously saved search for column definition
and grouping options, a time series chart might automatically display for your
search results. If a time series chart does not automatically display for your
unsaved search criteria, no previously saved search criteria exists to match your
search parameters. If this occurs, you must enable time series data capture and
save your search criteria.
You can magnify and scan a timeline on a time series chart to investigate activity.
The following table provides functions that you can use to view time series charts.
Table 31. Time series charts functions
Function Description
View data in greater detail Using the zoom feature, you can investigate
smaller time segments of event traffic.
v Move your mouse pointer over the chart,
and then use your mouse wheel to
magnify the chart (roll the mouse wheel
up).
v Highlight the area of the chart you want
to magnify. When you release your mouse
button, the chart displays a smaller time
segment. Now you can click and drag the
chart to scan the chart.
Chart legends
Each chart provides a legend, which is a visual reference to help you associate the
chart objects to the parameters they represent.
Using the legend feature, you can perform the following actions:
v Move your mouse pointer over a legend item or the legend color block to view
more information about the parameters it represents.
v Right-click the legend item to further investigate the item.
v Click a pie or bar chart legend item to hide the item in the chart. Click the
legend item again to show the hidden item. You can also click the corresponding
graph item to hide and show the item.
v Click Legend, or the arrow beside it, if you want to remove the legend from
your chart display.
Configuring charts
You can use configuration options to change the chart type, the object type you
want to chart, and the number of objects that are represented on the chart. For
time series charts, you can also select a time range and enable time series data
capture.
Charts are not displayed when you view events or flows in Real Time (streaming)
mode. To display charts, you must access the Log Activity or Network Activity
tab, and choose one of the following options:
v Select options from the View and Display list boxes, and then click Save
Criteria on the toolbar. See Saving event and flow search criteria.
v On the toolbar, select a saved search from the Quick Search list.
v Perform a grouped search, and then click Save Criteria on the toolbar.
If you plan to configure a time series chart, ensure that the saved search criteria is
grouped and specifies a time range.
Chapter 8. Viewing your data using various chart configuration options 123
About this task
Data can be accumulated so that when you perform a time series search, a cache of
data is available to display data for the previous time period. After you enable
time series data capture for a selected parameter, an asterisk (*) is displayed next
to the parameter in the Value to Graph list box.
Procedure
1. Click the Log Activity or Network Activity tab.
2. In the Charts pane, click the Configure icon.
3. Configure values the following parameters:
Option Description
Parameter Description
Value to Graph From the list box, select the object type that
you want to graph on the Y axis of the
chart.
4. If you selected the Time Series chart option and enabled the Capture Time
Series Data option, click Save Criteria on the toolbar.
5. To view the list of events or flows if your time range is greater than 1 hour,
click Update Details.
You can create a new search or load a previously saved set of search criteria. You
can select, organize, and group the columns of data to be displayed in search
results
After you perform a search, you can save the search criteria and the search results.
Since the entire database is searched, searches might take an extended time,
depending on the size of your database.
You can use the Quick Filter search parameter to search for items that match your
text string in the event payload.
The following table describes the search options that you can use to search event
and flow data:
Table 32. Search options
Options Description
Group Select an event search group or flow Search
Group to view in the Available Saved
Searches list.
Type Saved Search or Select from List Type the name of a saved search or a
keyword to filter the Available Saved
Searches list.
Available Saved Searches This list displays all available searches,
unless you use Group or Type Saved Search
or Select from List options to apply a filter
to the list. You can select a saved search on
this list to display or edit.
Search The Search icon is available in multiple
panes on the search page. You can click
Search when you are finished configuring
the search and want to view the results.
Include in my Quick Searches Select this check box to include this search
in your Quick Search menu.
Procedure
1. Choose one of the following options:
v To search events, click the Log Activity tab.
v To search flows, click the Network Activity tab.
2. From the Search list box, select New Search.
3. To select a previously saved search:
a. Choose one of the following options: From the Available Saved Searches
list, select the saved search you want to load. In the Type Saved
Search or Select from List field, type the name of the search you
want to load.
b. Click Load.
c. In the Edit Search pane, select the options that you want for this search. See
Table 1.
4. To create a search, in the Time Range pane, select the options for the time range
you want to capture for this search.
5. Optional. In the Data Accumulation pane, enable unique counts:
a. Click Enable Unique Counts.
b. On the Warning window, read the warning message and click Continue.
For more information about enabling unique counts, see Table 1.
6. In the Search Parameters pane, define your search criteria:
a. From the first list box, select a parameter that you want to search for. For
example, Device, Source Port, or Event Name.
b. From the second list box, select the modifier that you want to use for the
search.
Results
While viewing partial search results, the search engine works in the background to
complete the search and refreshes the partial results to update your view.
When the search is complete, the Completed status is displayed in the upper right
corner.
If you specify a time range for your search, then your search name is appended
with the specified time range. For example, a saved search named Exploits by
Source with a time range of Last 5 minutes becomes Exploits by Source - Last 5
minutes.
If you change a column set in a previously saved search, and then save the search
criteria using the same name, previous accumulations for time series charts are
lost.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
Option Description
Parameter Description
Search Name Type the unique name that you want to
assign to this search criteria.
Assign Search to Group(s) Select the check box for the group you want
to assign this saved search. If you do not
select a group, this saved search is assigned
to the Other group by default. For more
information, see Managing search groups.
Manage Groups Click Manage Groups to manage search
groups. For more information, see Managing
search groups.
Timespan options: Choose one of the following options:
v Real Time (streaming) - Select this option
to filter your search results while in
streaming mode.
v Last Interval (auto refresh) - Select this
option to filter your search results while
in auto-refresh mode. The Log Activity
and Network Activity tabs refreshes at
one-minute intervals to display the most
recent information.
v Recent - Select this option and, from this
list box, select the time range that you
want to filter for.
v Specific Interval- Select this option and,
from the calendar, select the date and time
range you want to filter for.
Include in my Quick Searches Select this check box to include this search
in your Quick Search list box on the toolbar.
Include in my Dashboard Select this check box to include the data
from your saved search on the Dashboard
tab. For more information about the
Dashboard tab, see Dashboard management.
Note: This parameter is only displayed if
the search is grouped.
Set as Default Select this check box to set this search as
your default search.
Share with Everyone Select this check box to share these search
requirements with all users.
5. Click OK.
Scheduled search
Use the Scheduled search option to schedule a search and view the results.
You can schedule a search that runs at a specific time of day or night.
Example:
If you schedule a search to run in the night, you can investigate in the morning.
Chapter 9. Data searches 131
Unlike reports, you have the option of grouping the search results and
investigating further. You can search on number of failed logins in your network
group. If the result is typically 10 and the result of the search is 100, you can group
the search results for easier investigating. To see which user has the most failed
logins, you can group by user name. You can continue to investigate further.
You can schedule a search on events or flows from the Reports tab. You must
select a previously saved set of search criteria for scheduling.
1. Create a report
Specify the following information in the Report Wizard window:
v The chart type is Events/Logs or Flows.
v The report is based on a saved search.
v Generate an offense.
You can choose the create an individual offense option or the add result to
an existing offense option.
You can also generate a manual search.
2. View search results
You can view the results of your scheduled search from the Offenses tab.
v Scheduled search offenses are identified by the Offense Type column.
If you create an individual offense, an offense is generated each time that the
report is run. If you add the saved search result to an existing offense, an offense
is created the first time that the report runs. Subsequent report runs append to
this offense. If no results are returned, the system does not append or create an
offense.
v To view the most recent search result in the Offense Summary window,
double-click a scheduled search offense in the offense list. To view the list of all
scheduled search runs, click Search Results in the Last 5 Search Results pane.
The Advanced Search field has auto completion and syntax highlighting.
Use auto completion and syntax highlighting to help create queries. For
information about supported web browsers, see Supported web browsers on
page 3
Access the Advanced Search option from the Search toolbar that is on the
Network Activity and Log Activity tabs to type an AQL query.
Select Advanced Search from the list box on the Search toolbar.
You can right-click any value in the search result and filter on that value.
All searches, including AQL searches, are included in the audit log.
The following table provides examples of AQL search strings for X-Force.
Table 34. Examples of AQL search strings for X-Force
Description Example
Check an IP address against an X-Force select * from events where
category with a confidence value. XFORCE_IP_CONFIDENCE('Spam',sourceip)>3
Search for X-Force URL categories associated select url, XFORCE_URL_CATEGORY(url) as
with a URL. myCategories from events where
XFORCE_URL_CATEGORY(url) IS NOT NULL
Retrieve X-Force IP categories that are select sourceip,
associated with an IP. XFORCE_IP_CATEGORY(sourceip) as
IPcategories from events where
XFORCE_IP_CATEGORY(sourceip) IS NOT NULL
Different user communities can have different threat and usage indicators.
Use reference data to report on several user properties, for example, department,
location, or manager.
The following query returns metadata information about the user from their login
events.
SELECT
REFERENCETABLE(user_data,FullName,username) as Full Name,
REFERENCETABLE(user_data,Location,username) as Location,
REFERENCETABLE(user_data,Manager,username) as Manager,
UNIQUECOUNT(username) as Userid Count,
UNIQUECOUNT(sourceip) as 'Source IP Count,
COUNT(*) as 'Event Count'
FROM events
WHERE qidname(qid) ILIKE '%logon%'
GROUP BY Full Name, Location, Manager
LAST 1 days
In this example, individual users have multiple accounts across the network. The
organization requires a single view of a users activity.
The following query returns the user accounts that are used by a global ID on
events that are flagged as suspicious.
SELECT
REFERENCEMAP(GlobalID Mapping,username) as Global ID,
REFERENCETABLE(user_data,FullName, Global ID) as Full Name,
UNIQUECOUNT(username),
COUNT(*) as 'Event count'
FROM events
WHERE RULENAME(creEventlist) ILIKE '%suspicious%'
GROUP BY Global ID
LAST 1 days
The following query shows the activities that are completed by a global ID.
SELECT
QIDNAME(qid) as 'Event name,
starttime as Time,
sourceip as 'Source IP', destinationip as 'Destination IP',
username as 'Event Username',
REFERENCEMAP('GlobalID_Mapping', username)as 'Global User
FROM events
WHERE 'Global User = 'John Doe'
LAST 1 days
Many threats use command and control to communicate periodically over days,
weeks, and months.
Advanced searches can identify connection patterns over time. For example, you
can query consistent, short, low volume, number of connections per
day/week/month between IP addresses, or an IP address and geographical
location.
Use the IBM Security QRadar REST API to generate an offense or to populate a
reference set or reference table.
Tip: You can modify this query to work on proxy logs and other event types.
The following query detects daily beaconing between a source IP and a destination
IP. The beaconing times are not at the same time each day. The time lapse between
beacons is short.
SELECT
sourceip,
DATEFORMAT(starttime,hh) as hourofday,
(AVG( hourofday*hourofday) - (AVG(hourofday)^2))as variance,
COUNT(*) as total flows
FROM flows
GROUP BY sourceip, destinationip
HAVING variance < 01 and total flows' < 10
LAST 7 days
The following query detects daily beaconing to a domain by using proxy log
events. The beaconing times are not at the same time each day. The time lapse
between beacons is short.
SELECT
sourceip,
DATEFORMAT(starttime,'hh') as hourofday,
(AVG(hourofday*hourofday) - (AVG(hourofday)^2)) as variance,
COUNT(*) as 'total events'
FROM events
Usage and security data that is correlated with external threat intelligence data can
provide important threat indicators.
This query shows how you can profile external threat data over many days, weeks,
or months to identify and prioritize the risk level of assets and accounts.
Select
REFERENCETABLE(ip_threat_data,Category,destinationip) as Category,
REFERENCETABLE(ip_threat_data,Rating, destinationip) as Threat Rating,
UNIQUECOUNT(sourceip) as Source IP Count,
UNIQUECOUNT(destinationip) as Destination IP Count
FROM events
GROUP BY Category, Threat Rating
LAST 1 days
Threat and usage indicators vary by asset type, operating system, vulnerability
posture, server type, classification, and other parameters.
In this query, advanced searches and the asset model provide operational insight
into a location.
The Assetproperty function retrieves property values from assets, which enables
you to include asset data in the results.
SELECT
ASSETPROPERTY('Location',sourceip) as location,
COUNT(*) as 'event count'
FROM events
GROUP BY location
LAST 1 days
The following query shows how you can use advanced searches and user identity
tracking in the asset model.
The AssetUser function retrieves the user name from the asset database.
SELECT
APPLICATIONNAME(applicationid) as App,
ASSETUSER(sourceip, now()) as srcAssetUser,
COUNT(*) as 'Total Flows'
FROM flows
WHERE srcAssetUser IS NOT NULL
GROUP BY App, srcAssetUser
ORDER BY 'Total Flows' DESC
LAST 3 HOURS
You can use the Network LOOKUP function to retrieve the network name that is
associated with an IP address.
SELECT NETWORKNAME(sourceip) as srcnet,
NETWORKNAME(destinationip) as dstnet
FROM events
You can use the Rule LOOKUP function to retrieve the name of a rule by its ID.
SELECT RULENAME(123) FROM events
The following query returns events that triggered a specific rule name.
SELECT * FROM events
WHERE RULENAME(creEventList) ILIKE '%my rule name%'
You can use the TEXT SEARCH operator to do full text searches by using the
Advanced search option.
In this example, there are a number of events that contain the word "firewall" in
the payload. You can search for these events by using the Quick filter option and
the Advanced search option on the Log Activity tab.
v To use the Quick filter option, type the following text in the Quick filter box:
'firewall'
v To use the Advanced search option, type the following query in the Advanced
search box:
SELECT QIDNAME(qid) AS EventName, * from events where TEXT SEARCH firewall
Custom property
You can access custom properties for events and flows when you use the
Advanced search option.
The following query uses the custom property "MyWebsiteUrl" to sort events by a
particular web URL:
SELECT "MyWebsiteUrl", * FROM events ORDER BY "MyWebsiteUrl"
Related concepts:
Quick filter search options
Search event and flow payloads by typing a text search string that uses simple
words or phrases.
Related tasks:
Creating a regex-based custom property on page 158
You can create a regex-based custom property to match event or flow payloads to
a regular expression.
When you view flows in real-time (streaming) or last interval mode, you can type
only simple words or phrases in the Quick Filter field. When you view events or
flows in a time-range, follow these syntax guidelines:
Table 35. Quick filter syntax guidelines.
Description Example
Include any plain text that you expect to Firewall
find in the payload.
Search for exact phrases by including Firewall deny"
multiple terms in double quotation marks.
Include single and multiple character F?rewall or F??ew*
wildcards. The search term cannot start with
a wildcard.
Group terms with logical expressions, such (%PIX* AND ("Accessed URL" OR "Deny udp
as AND, OR, and NOT. To be recognized as src") AND 10.100.100.*)
logical expressions and not as search terms,
the syntax and operators must be uppercase.
When you create search criteria that includes (%PIX* AND ("Accessed URL" OR "Deny udp
the NOT logical expression, you must src") NOT 10.100.100.*)
include at least one other logical expression
type, otherwise, no results are returned.
Precede the following characters by a "%PIX\-5\-304001"
backslash to indicate that the character is
part of your search term: + - && || ! () {}
[] ^ " ~ * ? : \.
Search terms are matched in sequence from the first character in the payload word
or phrase. The search term user matches user_1 and user_2, but does not match
the following phrases: ruser, myuser, or anyuser.
Quick filter searches use the English locale. Locale is a setting that identifies
language or geography and determines formatting conventions such as collation,
case conversion, character classification, the language of messages, date and time
representation, and numeric representation.
The locale is set by your operating system. You can configure QRadar to override
the operating system locale setting. For example, you can set the locale to English
and the QRadar Console can be set to Italiano (Italian).
If you use Unicode characters in your Quick filter search query, unexpected search
results might be returned.
Offense searches
You can search offenses using specific criteria to display offenses that match the
search criteria in a results list.
You can create a new search or load a previously saved set of search criteria.
The following table describes the search options that you can use to search offense
data on the My Offenses and All Offenses pages.
For information about categories, see the IBM Security QRadar SIEM Administration
Guide.
Table 36. My Offenses and All Offenses page search options
Options Description
Group This list box allows you to select an offense
Search Group to view in the Available
Saved Searches list.
Type Saved Search or Select from List This field allows you to type the name of a
saved search or a keyword to filter the
Available Saved Searches list.
Available Saved Searches This list displays all available searches,
unless you apply a filter to the list using the
Group or Type Saved Search or Select from
List options. You can select a saved search
on this list to display or edit.
All Offenses This option allows you to search all offenses
regardless of time range.
The following table describes the options available in the Offense Type list box:
Table 37. Offense type options
Offense types Description
Any This option searches all offense sources.
Procedure
1. Click the Offenses tab.
2. From the Search list box, select New Search.
3. Choose one of the following options:
v To load a previously saved search, go to Step 4.
v To create a new search, go to Step 7.
4. Select a previously saved search using one of the following options:
v From the Available Saved Searches list, select the saved search that you
want to load.
v In the Type Saved Search or Select from List field, type the name of the
search you want to load.
What to do next
The following table describes the search options that you can use to search offense
data on the By Source IP page:
Table 38. By Source IP page search options
Options Description
All Offenses You can select this option to search all
source IP addresses regardless of time range.
Recent You can select this option and, from this list
box, select the time range that you want to
search for.
Procedure
1. Click the Offenses tab.
2. Click By Source IP.
What to do next
The following table describes the search options that you can use to search offenses
on the By Destination IP page:
Table 39. By Destination IP page search options
Options Description
All Offenses You can select this option to search all
destination IP addresses regardless of time
range.
Recent You can select this option and, From this list
box, select the time range that you want to
search for.
Specific Interval To specify a particular interval to search for,
you can select the Specific Interval option,
and then select one of the following options:
v To specify a particular interval to search
for, you can select the Specific Interval
option, and then select one of the
following options:
v Last Event/Flow between - Select this
check box to search destination IP
addresses associated with offenses for
which the last detected event occurred
within a certain time period. After you
select this check box, use the list boxes to
select the dates you want to search
Search The Search icon is available in multiple
panes on the search page. You can click
Search when you are finished configuring
the search and want to view the results.
Destination IP You can type the destination IP address or
CIDR range you want to search for.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click By Destination IP.
3. From the Search list box, select New Search.
4. On the Time Range pane, select an option for the time range you want to
capture for this search. See Table 1.
5. On the Search Parameters pane, define your specific search criteria. See Table 1.
6. On the Column Definition pane, define the order in which you want to sort the
results:
a. From the first list box, select the column by which you want to sort the
search results.
b. From the second list box, select the order in which you want to display the
search results. Options include Descending and Ascending.
7. Click Search.
What to do next
The following table describes the search options that you can use to search offense
data on the By Networks page:
Table 40. Search options for search offense data on the By Networks page
Option Description
Network From this list box, you can select the
network that you want to search for.
Procedure
1. Click the Offenses tab.
2. Click By Networks.
3. From the Search list box, select New Search.
4. On the Search Parameters pane, define your specific search criteria. See Table 1.
5. On the Column Definition pane, define the order in which you want to sort the
results:
a. From the first list box, select the column by which you want to sort the
search results.
b. From the second list box, select the order in which you want to display the
search results. Options include Descending and Ascending.
6. Click Search.
What to do next
Procedure
1. Procedure
2. Perform a search. See Offense searches.
3. Click Save Criteria.
4. Enter values for the following parameters:
Option Description
Parameter Description
Search Name Type a name you want to assign to this
search criteria.
Manage Groups Click Manage Groups to manage search
groups. See Managing search groups.
5. Click OK.
When you delete a saved search, then objects that are associated with the saved
search might not function. Reports and anomaly detection rules are QRadar objects
that use saved search criteria. After you delete a saved search, edit the associated
objects to ensure that they continue to function.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. From the Search list box, select New Search or Edit Search.
3. In the Saved Searches pane, select a saved search from the Available Saved
Searches list box.
4. Click Delete.
v If the saved search criteria is not associated with other QRadar objects, a
confirmation window is displayed.
v If the saved search criteria is associated with other objects, the Delete Saved
Search window is displayed. The window lists objects that are associated
with the saved search that you want to delete. Note the associated objects.
5. Click OK.
What to do next
If the saved search criteria was associated with other QRadar objects, access the
associated objects that you noted and edit the objects to remove or replace the
association with the deleted saved search.
When you define a search that you want to use as a base for subsearching, make
sure that Real Time (streaming) option is disabled and the search is not grouped.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. Perform a search.
3. When your search is complete, add another filter:
a. Click Add Filter.
b. From the first list box, select a parameter that you want to search for.
c. From the second list box, select the modifier that you want to use for the
search. The list of modifiers that are available depends on the attribute that
is selected in the first list.
d. In the entry field, type specific information that is related to your search.
e. Click Add Filter.
Results
The Original Filter pane specifies the original filters that are applied to the base
search. The Current Filter pane specifies the filters that are applied to the
subsearch. You can clear subsearch filters without restarting the base search. Click
the Clear Filter link next to the filter you want to clear. If you clear a filter from
the Original Filter pane, the base search is relaunched.
If you delete the base search criteria for saved subsearch criteria, you still have
access to saved subsearch criteria. If you add a filter, the subsearch searches the
entire database since the search function no longer bases the search on a previously
searched data set.
You can configure a search to send you an email notification when the search is
complete.
At any time while a search is in progress, you can return to the Log Activity or
Network Activity tabs to view partial or complete search results.
Canceling a search
While a search is queued or in progress, you can cancel the search on the Manage
Search Results page.
If the search is in progress when you cancel it, the results that were accumulated
until the cancellation are maintained.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. From the Search menu, select Manage Search Results.
3. Select the queued or in progress search result you want to cancel.
4. Click Cancel.
5. Click Yes.
Deleting a search
If a search result is no longer required, you can delete the search result from the
Manage Search Results page.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. From the Search menu, select Manage Search Results.
3. Select the search result that you want to delete.
4. Click Delete.
5. Click Yes.
You can view search groups on the Event Search Group, Flow Search Group, or
Offense Search Group windows.
All saved searches that are not assigned to a group are in the Other group.
The Event Search Group, Flow Search Group, and Offense Search Group windows
display the following parameters for each group.
Table 41. Search Group window parameters
Parameter Description
Name Specifies the name of the search group.
User Specifies the name of the user that created
the search group.
Description Specifies the description of the search group.
Date Modified Specifies the date the search group was
modified.
The Event Search Group, Flow Search Group, and Offense Search Group window
toolbars provide the following functions.
Table 42. Search Group window toolbar functions
Function Description
New Group To create a new search group, you can click
New Group. See Creating a new search
group.
Edit To edit an existing search group, you can
click Edit. See Editing a search group.
Copy To copy a saved search to another search
group, you can click Copy. See Copying a
saved search to another group.
Remove To remove a search group or a saved search
from a search group, select the item that you
want to remove, and then click Remove. See
Removing a group or a saved search from a
group.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. Select Search >Edit Search.
3. Click Manage Groups.
4. View the search groups.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. Select Search Edit Search.
3. Click Manage Groups.
4. Select the folder for the group under which you want to create the new group.
5. Click New Group.
6. In the Name field, type a unique name for the new group.
7. Optional. In the Description field, type a description.
8. Click OK.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. Select Search > Edit Search.
3. Click Manage Groups.
4. Select the group that you want edit.
5. Click Edit.
6. Edit the parameters:
v Type a new name in the Name field.
v Type a new description in the Description field.
7. Click OK.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. Select Search > Edit Search.
3. Click Manage Groups.
4. Select the saved search that you want to copy.
5. Click Copy.
6. On the Item Groups window, select the check box for the group you want to
copy the saved search to.
7. Click Assign Groups.
When you remove a saved search from a group, the saved search is not deleted
from your system. The saved search is removed from the group and automatically
moved to the Other group.
Procedure
1. Choose one of the following options:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. Select Search > Edit Search.
3. Click Manage Groups.
4. Choose one of the following options:
v Select the saved search that you want to remove from the group.
v Select the group that you want to remove.
5. Click Remove.
6. Click OK.
You can create custom event and flow properties from several locations on the Log
Activity or Network Activity tabs:
v From the Log Activity tab, double-click an event and click Extract Property.
v From the Network Activity tab, double-click a flow and click Extract Property.
v You can create or edit a custom event or flow property from the Search page.
When you create a custom property from the Search page, the property is not
derived from any particular event or flow; therefore, the Custom Event
Properties window does not prepopulate. You can copy and paste payload
information from another source.
Required permissions
To create custom properties if you have the correct permission.
You must have the User Defined Event Properties or the User Defined Flow
Properties permission.
If you have Administrative permissions, you can also create and modify custom
properties from the Admin tab.
Click Admin > Data Sources > Custom Event Properties > or Admin > Data
Sources > Custom Flow Properties.
Check with your administrator to ensure that you have the correct permissions.
For more information, see the IBM Security QRadar SIEM Administration Guide.
When you create a custom property, you can choose to create a Regex or a
calculated property type.
Using regular expression (Regex) statements, you can extract unnormalized data
from event or flow payloads.
For example, a report is created to report all users who make user permission
changes on an Oracle server. A list of users and the number of times they made a
change to the permission of another account is reported. However, typically the
actual user account or permission that was changed cannot display. You can create
a custom property to extract this information from the logs, and then use the
property in searches and reports. Use of this feature requires advanced knowledge
of regular expressions (regex).
For more information, you can refer to regex tutorials available on the web. A
custom property can be associated with multiple regular expressions.
When an event or flow is parsed, each regex pattern is tested on the event or flow
until a regex pattern matches the payload. The first regex pattern to match the
event or flow payload determines the data to be extracted.
For example, you can create a property that displays a percentage by dividing one
numeric property by another numeric property.
When you configure a regex-based custom property, the Custom Event Property or
Custom Flow Property windows provide parameters. The following table provides
reference information for some parameters.
Table 43. Custom Event Properties window parameters (regex)
Parameter Description
Test field
New Property The new property name cannot be the name
of a normalized property, such as username,
Source IP, or Destination IP.
Optimize parsing for rules, reports, and
searches Parses and stores the property the first time
that the event or flow is received. When you
select the check box, the property does not
require more parsing for reporting,
searching, or rule testing.
Procedure
1. Click the Log Activity tab.
2. If you are viewing events or flows in streaming mode, click the Pause icon to
pause streaming.
3. Double-click the event or flow that you want to base the custom property on.
4. Double-click the event that you want to base the custom property on
5. Click Extract Property.
6. In the Property Type Selection pane, select the Regex Based option.
7. Configure the custom property parameters.
8. Click Test to test the regular expression against the payload.
9. Click Save.
Results
Procedure
1. Choose one of the following: Click the Log Activity tab.
2. Optional. If you are viewing events or flows in streaming mode, click the Pause
icon to pause streaming.
3. Double-click the event or flow you want to base the custom property on.
4. Click Extract Property.
5. In the Property Type Selection pane, select the Calculation Based option.
6. Configure the custom property parameters.
7. Click Test to test the regular expression against the payload.
8. Click Save.
Results
The custom property is now displayed as an option in the list of available columns
on the search page. To include a custom property in an events or flows list, you
must select the custom property from the list of available columns when creating a
search.
You can use the Custom Event Properties or Custom Flow Properties window to
modify a custom property.
The Custom Event Property and Custom Flow Property toolbars provide the
following functions:
Table 46. Custom property toolbar options
Option Description
Add Click Add to add a new custom property.
Edit Click Edit to edit the selected custom
property.
Copy Click Copy to copy selected custom
properties.
Delete Click Delete to delete selected custom
properties.
Procedure
1. Choose one of the following:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. From the Search list box, select Edit Search.
3. Click Manage Custom Properties.
4. Select the custom property that you want to edit and click Edit.
5. Edit the necessary parameters.
6. Optional. If you edited the regular expression, click Test to test the regular
expression against the payload.
7. Click Save.
Procedure
1. Choose one of the following:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. From the Search list box, select Edit Search.
3. Click Manage Custom Properties.
4. Select the custom property that you want to copy and click Copy.
5. Edit the necessary parameters.
6. Optional. If you edited the regular expression, click Test to test the regular
expression against the payload.
7. Click Save.
Procedure
1. Choose one of the following:
v Click the Log Activity tab.
v Click the Network Activity tab.
2. Click the Log Activity tab.
3. From the Search list box, select Edit Search.
4. Click Manage Custom Properties.
This topic applies to users who have the View Custom Rules or Maintain Custom
Rules user role permissions.
To create anomaly detection rules, you must have the appropriate Maintain
Custom Rule permission for tab on which you want create the rule. For example,
to be able to create an anomaly detection rule on the Log Activity tab, you must
have the Log Activity > Maintain Custom Rule.
For more information about user role permissions, see the IBM Security QRadar
SIEM Administration Guide.
Rules overview
Rules perform tests on events, flows, or offenses, and if all the conditions of a test
are met, the rule generates a response.
The tests in each rule can also reference other building blocks and rules. You are
not required to create rules in any specific order because the system checks for
dependencies each time a new rule is added, edited, or deleted. If a rule that is
referenced by another rule is deleted or disabled, a warning is displayed and no
action is taken.
For a complete list of default rules, see the IBM Security QRadar SIEM
Administration Guide.
Rule categories
There are two categories for rules; custom rules and anomaly rules.
Custom rules perform tests on events, flows, and offenses to detect unusual
activity in your network.
Anomaly detection rules perform tests on the results of saved flow or event
searches as a means to detect when unusual traffic patterns occur in your network.
Anomaly detection rules perform tests on the results of saved flow or event
searches as a means to detect when unusual traffic patterns occur in your network.
This rule category includes the following rule types; anomaly, threshold, and
behavioral.
An anomaly rule tests event and flow traffic for abnormal activity such as the
existence of new or unknown traffic, which is traffic that suddenly ceases or a
percentage change in the amount of time an object is active. For example, you can
A threshold rule tests event and flow traffic for activity that is less than, equal to,
or greater than a configured threshold, or within a specified range. Thresholds can
be based on any data that is collected. For example, you can create a threshold rule
specifying that no more than 220 clients can log in to the server between 8 am and
5 pm. The threshold rule generates an alert when the 221st client attempts to log
in.
A behavioral rule tests event and flow traffic for volume changes in behavior that
occurs in regular seasonal patterns. For example, if a mail server typically
communicates with 100 hosts per second in the middle of the night and then
suddenly starts communicating with 1,000 hosts a second, a behavioral rule
generates an alert.
Rule types
There are four different types of rules; event, flow, common, and offense.
Event rule
An event rule performs tests on events as they are processed in real time by the
Event processor. You can create an event rule to detect a single event (within
certain properties) or event sequences. For example, if you want to monitor your
network for unsuccessful login attempts, access multiple hosts, or a reconnaissance
event followed by an exploit, you can create an event rule. It is common for event
rules to create offenses as a response.
Flow rule
A flow rule performs tests on flows as they are processed in real time by the
QFlow Collector. You can create a flow rule to detect a single flow (within certain
properties) or flow sequences. It is common for flow rules to create offenses as a
response.
Common rule
A common rule performs tests on fields that are common to both event and flow
records. For example, you can create a common rule to detect events and flows
that have a specific source IP address. It is common for common rules to create
offenses as a response.
Offense rule
An offense rule processes offenses only when changes are made to the offense,
such as, when new events are added or the system scheduled the offense for
reassessment. It is common for offense rules to email a notification as a response.
Rule conditions
Each rule might contain functions, building blocks, or tests.
With functions, you can use building blocks and other rules to create a multi-event,
multi-flow, or multi-offense function. You can connect rules using functions that
Note: Building blocks are not loaded by default. Define a rule to build building
blocks.
For a complete list of building blocks, see the IBM Security QRadar SIEM
Administration Guide.
You can run tests on the property of an event, flow, or offense, such as source IP
address, severity of event, or rate analysis.
Rule responses
When rule conditions are met, a rule can generate one or more responses.
Before you can configure a rule response to send data to a reference data
collection, you must create the reference data collection by using the command line
interface (CLI). QRadar supports the following data collection types:
Reference set
A set of elements, such as a list of IP addresses or user names, that are
derived from events and flows occurring on your network.
Reference map
Data is stored in records that map a key to a value. For example, to
correlate user activity on your network, you can create a reference map
that uses the Username parameter as a key and the users Global ID as a
value.
Reference map of sets
Data is stored in records that map a key to multiple values. For example,
to test for authorized access to a patent, use a custom event property for
Patent ID as the key and the Username parameter as the value. Use a map
of sets to populate a list of authorized users.
Note: For information about reference sets and reference data collections, see the
Administration Guide for your product.
Viewing rules
You can view the details of a rule, including the tests, building blocks, and
responses.
Depending on your user role permissions, you can access the rules page from the
Offenses, Log Activity, or Network Activity tab.
For more information about user role permissions, see the IBM Security QRadar
SIEM Administration Guide.
The Rules page displays a list of rules with their associated parameters. To locate
the rule you want to open and view the details of, you can use the Group list box
or Search Rules field on the toolbar.
Procedure
1. Choose one of the following options:
v Click the Offenses tab, and then click Rules on the navigation menu.
v Click the Log Activity tab, and then select Rulesfrom the Rules list box on
the toolbar.
v Click the Network Activity tab, and then select Rules from the Rules list
box on the toolbar.
2. From the Display list box, select Rules.
3. Double-click the rule that you want to view.
4. Review the rule details.
If you have the View Custom Rules permission, but do not have the Maintain
Custom Rules permission, the Rule Summary page is displayed and the rule
cannot be edited. If you have the Maintain Custom Rules permission, the Rule
Test Stack Editor page is displayed. You can review and edit the rule details.
To create a new rule, you must have the Offenses > Maintain Custom Rules
permission.
You can test rules locally or globally. A local test means that rule is tested on the
local Event processor and not shared with the system. A global test means that the
rule is shared and tested by any Event processor on the system. Global rules send
events and flows to the central Event processor, which might decrease performance
on the central Event processor.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Actions list, select one of the following options:
v New Event Rule
v New Flow Rule
v New Common Rule
v New Offense Rule
4. Read the introductory text on the Rule wizard. Click Next.
5. Click Next to view the Rule Test Stack Editor page.
6. In the enter rule name here field in the Rule pane, type a unique name that
you want to assign to this rule.
7. From the list box, select Local or Global.
8. Add one or more tests to a rule:
a. Optional. To filter the options in the Test Group list box, type the text that
you want to filter for in the Type to filter field.
b. From the Test Group list box, select the type of test you want to add to
this rule.
c. For each test you want to add to the rule, select the plus (+) sign beside
the test.
d. Optional. To identify a test as excluded test, click and at the beginning of
the test in the Rule pane. The and is displayed as and not.
e. Click the underlined configurable parameters to customize the variables of
the test.
f. From the dialog box, select values for the variable, and then click Submit.
9. To export the configured rule as a building block to use with other rules:
a. Click Export as Building Block.
b. Type a unique name for this building block.
The anomaly detection options display after you perform a grouped search and
save the search criteria.
You must have the appropriate role permission to be able to create an anomaly
detection rule.
To create anomaly detection rules on the Log Activity tab, you must have the Log
Activity Maintain Custom Rules role permission.
To create anomaly detection rules on the Network Activity tab, you must have the
Network Maintain Custom Rules role permission.
Anomaly detection rules use all grouping and filter criteria from the saved search
criteria the rule is based on, but do not use any time ranges from the search
criteria.
When you create an anomaly detection rule, the rule is populated with a default
test stack. You can edit the default tests or add tests to the test stack. At least one
Accumulated Property test must be included in the test stack.
By default, the Test the [Selected Accumulated Property] value of each [group]
separately option is selected on the Rule Test Stack Editor page.
This Test the [Selected Accumulated Property] value of each [group] separately
option is dynamic. The [Selected Accumulated Property] value depends on what
option you select for the this accumulated property test field of the default test
stack. The [group] value depends on the grouping options that are specified in the
saved search criteria. If multiple grouping options are included, the text might be
truncated. Move your mouse pointer over the text to view all groups.
Procedure
1. Click the Log Activity or Network Activity tab.
2. Perform a search.
3. From the Rules menu, select the rule type that you want to create. Options
include:
v Add Anomaly Rule
v Add Threshold Rule
v Add Behavioral Rule
4. Read the introductory text on the Rule wizard. Click Next. The rule that you
previously choose is selected.
5. Click Next to view the Rule Test Stack Editor page.
6. In the enter rule name here field, type a unique name that you want to assign
to this rule.
7. To add a test to a rule:
a. Optional. To filter the options in the Test Group list box, type the text that
you want to filter for in the Type to filter field.
b. From the Test Group list box, select the type of test you want to add to
this rule.
c. For each test you want to add to the rule, select the + sign beside the test.
d. Optional. To identify a test as excluded test, click and at the beginning of
the test in the Rule pane. The and is displayed as and not.
e. Click the underlined configurable parameters to customize the variables of
the test.
f. From the dialog box, select values for the variable, and then click Submit.
8. Optional. To test the total selected accumulated properties for each event or
flow group, clear the Test the [Selected Accumulated Property] value of each
[group] separately check box.
9. In the groups pane, select the check boxes of the groups you want to assign
this rule to. For more information, see Rule group management.
10. In the Notes field, type any notes that you want to include for this rule. Click
Next.
11. On the Rule Responses page, configure the responses that you want this rule
to generate. Rule Response page parameters on page 179
12. Click Next.
13. Review the configured rule. Click Finish.
You can enable and disable rules, as required. You can also edit, copy, or delete a
rule.
You can create anomaly detection rules only on the Log Activity and Network
Activity tabs.
To manage default and previously created anomaly detection rules, you must use
the Rules page on the Offenses tab.
You must have the Offenses > Maintain Custom Rules role permission to be able
to enable or disable a rule.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Display list box on the Rules page, select Rules.
4. Select the rule that you want to enable or disable.
5. From the Actions list box, select Enable/Disable.
Editing a rule
You can edit a rule to change the rule name, rule type, tests, or responses.
You must have the Offenses > Maintain Custom Rules role permission to be able
to enable or disable a rule.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Display list box on the Rules page, select Rules.
4. Double-click the rule that you want to edit.
5. From the Actions list box, select Open.
6. Optional. If you want to change the rule type, click Back and select a new
rule type.
7. On the Rule Test Stack Editor page, edit the parameters.
8. Click Next.
9. On the Rule Response page, edit the parameters.
10. Click Next.
11. Review the edited rule. Click Finish.
You must have the Offenses > Maintain Custom Rules role permission to be able
to enable or disable a rule.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Display list box, select Rules.
4. Select the rule that you want to duplicate.
5. From the Actions list box, select Duplicate.
6. In the Enter name for the copied rule field, type a name for the new rule. Click
OK.
Deleting a rule
You can delete a rule from your system.
You must have the Offenses > Maintain Custom Rules role permission to be able
to enable or disable a rule.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Display list box, select Rules.
4. Select the rule that you want to delete.
5. From the Actions list box, select Delete.
For example, you can view all rules that are related to compliance.
As you create new rules, you can assign the rule to an existing group. For
information about assigning a group using the rule wizard, see Creating a custom
rule or Creating an anomaly detection rule.
Creating a group
The Rules page provides default rule groups, however, you can create a new
group.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. Click Groups.
4. From the navigation tree, select the group under which you want to create a
new group.
5. Click New Group.
6. Enter values for the following parameters:
v Name - Type a unique name to assign to the new group. The name can be
up to 255 characters in length.
v Description - Type a description that you want to assign to this group. The
description can be up to 255 characters in length.
7. Click OK.
8. Optional. To change the location of the new group, click the new group and
drag the folder to the new location in your navigation tree.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. Select the rule or building block you want to assign to a group.
4. From the Actions list box, select Assign Groups.
5. Select the group that you want to assign the rule or building block to.
6. Click Assign Groups.
7. Close the Choose Groups window.
Editing a group
You can edit a group to change the name or description.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. Click Groups.
4. From the navigation tree, select the group that you want to edit.
5. Click Edit.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. Click Groups.
4. From the navigation tree, select the rule or building block you want to copy to
another group.
5. Click Copy.
6. Select the check box for the group you want to copy the rule or building block
to.
7. Click Copy.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. Click Groups.
4. Using the navigation tree, navigate to and select the item you want to delete.
5. Click Remove.
6. Click OK.
Deleting a group
You can delete a group. When you delete a group, the rules or building blocks of
that group remain available on the Rules page.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. Click Groups.
4. Using the navigation tree, navigate to and select the group that you want to
delete.
5. Click Remove.
6. Click OK.
A building block is a reusable rule test stack that you can include as a component
in other rules.
For example, you can edit the BB:HostDefinition: Mail Servers building block to
identify all mail servers in your deployment. Then, you can configure any rule to
exclude your mail servers from the rule tests.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Display list box, select Building Blocks.
4. Double-click the building block that you want to edit.
5. Update the building block, as necessary.
6. Click Next.
7. Continue through the wizard. For more information, see Creating a custom
rule.
8. Click Finish.
The list of deployed rules provides the following information for each rule:
Table 47. Rules page parameters
Parameter Description
Rule Name Displays the name of the rule.
Group Displays the group to which this rule is
assigned. For more information about
groups, see Rule group management.
Rule Category Displays the rule category for the rule.
Options include Custom Rule and Anomaly
Detection Rule.
When you select this check box, the following options are
displayed:
Index offense based on
From the list box, select the parameter on which
you want to index the offense. The default is
Source IPv6.
For event rules, options include destination IP,
destination IPv6, destination MAC address,
destination port, event name, host name, log
source, rule, source IP, source IPv6, source MAC
address, source port, or user name.
For flow rules, options include App ID,
destination ASN, destination IP, destination IP
Identity, destination port, event name, rule, source
ASN, source IP, source IP identity, or source Port.
For common rules, options include destination IP,
destination IP identity, destination port, rule,
source IP, source IP identity, and source port.
Annotate this offense
Select this check box to add an annotation to this
offense and type the annotation.
Include detected events by <index> from this point
forward, for second(s), in the offense
Select this check box and type the number of
seconds you want to include detected events by
<index> on the Offenses tab. This field specifies
the parameter on which the offense is indexed.
The default is Source IP.
Annotate event Select this check box if you want to add an annotation to
this event and type the annotation you want to add to the
event.
Drop the detected event Select this check box to force an event, which is normally
sent to the Magistrate component, to be sent to the Ariel
database for reporting or searching.
When you select this check box, the following options are
displayed:
Index offense based on
From the list box, select the parameter on which
you want to index the offense. The default is
Source IP.
For event rules, options include destination IP,
destination IPv6, destination MAC address,
destination port, event name, host name, log
source, rule, source IP, source IPv6, source MAC
address, source port, or user name.
For flow rules, options include App ID,
destination ASN, destination IP, destination IP
Identity, destination port, event name, rule, source
ASN, source IP, source IP identity, or source Port.
For common rules, options include destination IP,
destination IP identity, destination port, rule,
source IP, source IP identity, and source port.
Include detected events by <index> from this point
forward, for second(s), in the offense
Select this check box and type the number of
seconds you want to include detected events by
<index> on the Offenses tab. This field specifies
the parameter on which the offense is indexed.
The default is Source IP.
Offense Naming
Select one of the following options:
This information should contribute to the name
of the associated offense(s)
Select this option if you want the Event
Name information to contribute to the
name of the offense.
This information should set or replace the name
of the associated offense(s)
Select this option if you want the
configured Event Name to be the name of
the offense.
The SNMP trap output includes system time, the trap OID,
and the notification data, as defined by the MIB.
Send to Local SysLog Select this check box if you want to log the event or flow
locally.
Select this check box if you want events that are generated
as a result of this rule to add to a reference data collection.
After you select the check box, select one of the following
options:
Add to a Reference Map
Select this option to send data to a collection of
single key/multiple value pairs. You must select
the key and value for the data record, and then
select the reference map that you want to add the
data record to.
Add to a Reference Map Of Sets
Select this option to send data to a collection of
key/single value pairs. You must select the key
and the value for the data record, and then select
the reference map of sets you want to add the
data record to.
Add to a Reference Map Of Maps
Select this option to send data to a collection of
multiple key/single value pairs. You must select a
key for the first map, a key for the second map,
and then the value for the data record. You must
also select the reference map of maps you want to
add the data record to.
Add to a Reference Table
Select this option to send data to a collection of
multiple key/single value pairs, where a type was
assigned to the secondary keys. Select the
reference table that you want to add data to, and
then select a primary key. Select your inner keys
(secondary keys) and their values for the data
records.
Publish on the IF-MAP Server If the IF-MAP parameters are configured and deployed in
the system settings, select this option to publish the event
information about the IF-MAP server.
Response Limiter Select this check box and use the list boxes to configure the
frequency in which you want this rule to respond.
Enable Rule Select this check box to enable this rule.
The following table provides the Rule Response page parameters if the rule type is
Offense.
Table 50. Offense Rule Response page parameters
Parameter Description
Name/Annotate the detected Select this check box to display Name options.
offense
New Offense Name Type the name that you want to assign to the offense.
The following table provides the Rule Response page parameters if the rule type is
Anomaly.
Select this check box if you want events that are generated
as a result of this rule to add to a reference data collection.
After you select the check box, select one of the following
options:
Add to a Reference Map
Select this option to send data to a collection of
single key/multiple value pairs. You must select
the key and value for the data record, and then
select the reference map that you want to add the
data record to.
Add to a Reference Map Of Sets
Select this option to send data to a collection of
key/single value pairs. You must select the key
and the value for the data record, and then select
the reference map of sets you want to add the data
record to.
Add to a Reference Map Of Maps
Select this option to send data to a collection of
multiple key/single value pairs. You must select a
key for the first map, a key for the second map,
and then the value for the data record. You must
also select the reference map of maps you want to
add the data record to.
Add to a Reference Table
Select this option to send data to a collection of
multiple key/single value pairs, where a type was
assigned to the secondary keys. Select the
reference table that you want to add data to, and
then select a primary key. Select your inner keys
(secondary keys) and their values for the data
records.
Publish on the IF-MAP Server If the IF-MAP parameters are configured and deployed in
the system settings, select this option to publish the offense
information about the IF-MAP server.
Response Limiter Select this check box and use the list boxes to configure the
frequency with which you want this rule to respond
Enable Rule Select this check box to enable this rule. By default, the
check box is selected.
Rule handling
Historical correlation collects all events that are returned by the saved search and
then the QRadar console processes them. Because historical correlation processing
occurs in a single location, the rules that are included in the historical correlation
profile are treated as global rules. The processing does not change the rule from
local to global, but handles the rule as if it were global during the historical
correlation run.
Some rules, such as stateful rules, might not trigger the same response as they
would in a normal correlation that is run on a local event processor. For example, a
local stateful rule that tracks five failed logins in 5 minutes from the same user
name behaves differently under normal and historical correlation runs. Under
normal correlation, this local rule maintains a counter for the number of failed
logins that are received by each local event processor. In historical correlation, this
rule maintains a single counter for the entire QRadar system. In this situation,
offenses might be created differently compared to a normal correlation run.
When historical correlation is run, events that meet the rule's test criteria create one
or more offenses. Historical correlation does not contribute to a real-time offense,
nor does it contribute to an offense that was created from an earlier historical
correlation run, even when the same profile is used.
You can drill down on the offense to see more details about the offense and the
events and flows that triggered it. When you drill down to view information about
events, the Time column in the event list represents the start time of the event,
which is the time that QRadar received the event.
Historical correlation offenses include event and flow data sets that match the
correlation criteria. They are preserved and presented as a search result within the
offense viewer. These search results of historically correlated data cannot be
searched using the Advanced search or Quick filter functionality.
Each historical correlation that you run creates a compressed database file on the
QRadar console. The database files are automatically removed after 15 days. If the
database file is removed before you are finished with it, you can rerun the
historical correlation with the same profile.
You can configure the profile to limit the time period for data that is being
analyzed. You can also identify specific rules to test for and define a schedule for
the historical correlation run.
Procedure
1. Open the Historical Correlation dialog box.
v On the Log Activity tab, click Actions > Historical Correlation.
v On the Network Activity tab, click Actions > Historical Correlation.
v On the Offenses tab, click Rules > Actions > Historical Correlation.
2. Click Add to configure a historical correlation profile.
3. Configure the profile settings.
The profile is put into a queue to be processed. Queued profiles based on a set
schedule take priority over manual runs.
4. Click Save.
5. After the historical correlation runs, click the Offenses tab to check for
historical correlation offenses, which are identified in the offense viewer by the
clock icon in the flag column.
You must have a QRadar license extension to use X-Force Threat Intelligence feed
with QRadar.
The content in the X-Force feed is given a relative threat score. QRadar users can
use this threat score to prioritize incidents and offenses that are generated through
this content. The data from these intelligence sources is automatically incorporated
into the QRadar correlation and analysis functions and enriches its threat detection
capabilities with up-to-the-minute Internet threat data. Any security event or
network activity data that involves these addresses is automatically flagged, and
therefore adds valuable context to security incident analyses and investigations
To prioritize the threat and identify security incidents that require more
examination, you can choose which X-Force feeds to incorporate into QRadar rules,
offenses, and events. For example, you can use the feeds to identify these types of
incidents:
v A series of attempted logins for a dynamic range of IP addresses
v An anonymous proxy connection to a business partner portal
v A connection between an internal endpoint and a known botnet command and
control
v Communication between an endpoint and a known malware distribution site
The X-Force Threat Intelligence feed categorizes IP addresses and then creates a
confidence ranking that is used to assess the threat. The IP addresses are grouped
into the following categories:
v Malware hosts
v SPAM sources
v Dynamic IP addresses
v Anonymous proxies
v Botnet Command and Control
v Scanning IP addresses
The X-Force Threat Intelligence feed also categorizes URL addresses. For example,
URL addresses might be categorized as dating, gambling, or pornography sites. To
see the complete list of categories for URL classification, see the X-Force web site
(www.xforce-security.com).
Before you can use URL-based rules, you must create a custom event property to
extract the URL from the payload. The URL custom property is already defined for
events from a number of sources such as Blue Coat SG and Juniper Networks
Secure Access log sources.
For more information about creating custom event properties, see Custom event
and flow properties.
The following rules are part of the Enhanced X-Force Rules group. They can be
used as is or you can customize them.
Because the URL is a more specific indicator of the data that is transferred,
URL-based rules can be more accurate than IP-based rules.
To use URL categorization rules, you must have a subscription to the X-Force
Threat Intelligence feed.
To create a new rule, you must have the Offenses > Maintain Custom Rules
permission.
Procedure
1. Click the Offenses tab.
2. On the navigation menu, click Rules.
3. From the Actions list, select New Event Rule.
4. Read the introductory text on the Rule wizard and click Next.
5. Click Events and click Next.
6. From the Test Group list box, select X-Force Tests.
7. Click the plus (+) sign beside the when this URL property is categorized by
X-Force as one of the following categories test.
8. In the enter rule name here field in the Rule pane, type a unique name that
you want to assign to this rule.
9. From the list box, select Local or Global.
10. Click the underlined configurable parameters to customize the variables of the
test.
a. Click URL (custom).
b. Select the URL property that contains the URL that was extracted from the
payload and click Submit.
c. Click one of the following categories.
d. Select Gambling / Lottery from the X-Force URL categories, click Add +
and click Submit.
11. To export the configured rule as a building block to use with other rules:
a. Click Export as Building Block.
b. Type a unique name for this building block.
c. Click Save.
12. On the Groups pane, select the check boxes of the groups to which you want
to assign this rule.
13. In the Notes field, type a note that you want to include for this rule, and click
Next.
14. On the Rule Responses page, click Email and type the email addresses that
receive the notification. For information about other response parameters for
an event rule, see Event, Flow and Common Rule Response page parameters.
15. Click Next.
16. If the rule is accurate, click Finish.
You can contribute either public or private information to track data in collections
when you research security issues.
A collection is a repository where you store the information that is found during an
investigation. You can use a collection to save X-Force Exchange reports,
comments, or any other content. An X-Force Exchange report contains both a
version of the report from the time when it was saved, and a link to the current
version of the report. The collection also contains a section (timeline) that has a
wiki-style notepad where you can add comments that are relevant to the collection.
Procedure
1. To look up an IP address in X-Force Exchange from QRadar, follow these steps:
a. Select the Log Activity or the Network Activity tab.
b. Right-click the IP address that you want to view in X-Force Exchange and
select More Options > Plugin Options > X-Force Exchange Lookup to
open the X-Force Exchange interface.
2. To look up a URL in X-Force Exchange from QRadar, follow these steps:
a. Select either the Offenses tab, or the event details windows available on the
Offenses.
b. Right-click the URL you want to look up in X-Force Exchange and select
Plugin Options > X-Force Exchange Lookup to open the X-Force Exchange
interface.
This reference includes tables that describe the parameters that are displayed in
each pane of the Asset Profile tab.
Asset profiles
Asset profiles provide information about each known asset in your network,
including what services are running on each asset.
Asset profile information is used for correlation purposes to help reduce false
positives. For example, if a source attempts to exploit a specific service running on
an asset, then QRadar determines if the asset is vulnerable to this attack by
correlating the attack to the asset profile.
Asset profiles are automatically discovered if you have flow data or vulnerability
assessment (VA) scans configured. For flow data to populate asset profiles,
bidirectional flows are required. Asset profiles can also be automatically created
from identity events. For more information about VA, see the IBM Security QRadar
Vulnerability Assessment Guide.
For more information about flow sources, see the IBM Security QRadar SIEM
Administration Guide.
Vulnerabilities
You can use QRadar Vulnerability Manager and third-party scanners to identify
vulnerabilities.
For information about the Server Discovery option in the navigation pane, see the
IBM Security QRadar SIEM Administration Guide
For more information about the VA Scan option in the navigation pane, see the
IBM Security QRadar Risk Manager User Guide.
The Asset Profiles page provides the following information about each asset:
Table 52. Asset Profile page parameters
Parameter Description
ID Displays the Asset ID number of the asset.
The Asset ID number is automatically
generated when you add an asset profile
manually or when assets are discovered
through flows, events, or vulnerability scans.
IP Address Displays the last known IP address of the
asset.
On the Assets tab, you can right-click an asset to access more event filter
information.
Table 53. Right-click menu options
Option Description
Navigate
The Navigate menu provides the following
options:
v View by Network - Displays the List of
Networks window, which displays all
networks that are associated with the
selected IP address.
v View Source Summary - Displays the
List of Offenses window, which displays
all offenses that are associated with the
selected source IP address.
v View Destination Summary - Displays
the List of Offenses window, which
displays all offenses that are associated to
the selected destination IP address.
The Asset Profile page provides the information about the asset that is organized
into several panes. To view a pane, you can click the arrow (>) on the pane to
view more detail or select the pane from the Display list box on the toolbar.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles
3. Double-click the asset that you want to view.
4. Use the options on the toolbar to display the various panes of asset profile
information. See Editing an asset profile.
5. To research the associated vulnerabilities, click each vulnerability in the
Vulnerabilities pane. See Table 10-10
6. If required, edit the asset profile. See Editing an asset profile.
7. Click Return to Assets List to select and view another asset, if required.
When assets are discovered using the Server Discovery option, some asset profile
details are automatically populated. You can manually add information to the asset
profile and you can edit certain parameters.
You can only edit the parameters that were manually entered. Parameters that
were system generated are displayed in italics and are not editable. You can delete
system generated parameters, if required.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Choose one of the following options:
v To add an asset, click Add Asset and type the IP address or CIDR range of
the asset in the New IP Address field.
v To edit an asset, double-click the asset that you want to view and click Edit
Asset .
Parameter Description
DNS
Choose one of the following options:
v Type a DNS name and click Add.
v Select a DNS name from the list and click
Edit.
v Select a DNS name from the list and click
Remove.
NetBIOS
Choose one of the following options:
v Type a NetBIOS name and click Add.
v Select a NetBIOS name from the list and
click Edit.
v Select a NetBIOS name from the list and
click Remove.
Given Name Type a name for this asset profile.
Location Type a location for this asset profile.
Description Type a description for the asset profile.
Wireless AP Type the wireless Access Point (AP) for this
asset profile.
Wireless SSID Type the wireless Service Set Identifier
(SSID) for this asset profile.
Switch ID Type the switch ID for this asset profile.
Switch Port ID Type the switch port ID for this asset profile.
Parameter Description
Collateral Damage Potential
Configure this parameter to indicate the
potential for loss of life or physical assets
through damage or theft of this asset. You
can also use this parameter to indicate
potential for economic loss of productivity
or revenue. Increased collateral damage
potential increases the calculated value in
the CVSS Score parameter.
8. Configure the parameters in the Owner pane. Choose one or more of the
following options:
Parameter Description
Business Owner Type the name of the business owner of the
asset. An example of a business owner is a
department manager. The maximum length
is 255 characters.
Business Owner Contact Type the contact information for the
business owner. The maximum length is 255
characters.
Technical Owner Type the technical owner of the asset. An
example of a business owner is the IT
manager or director. The maximum length is
255 characters.
9. Click Save.
When you access the Assets tab, the Asset page is displayed populated with all
discovered assets in your network. To refine this list, you can configure search
parameters to display only the asset profiles you want to investigate.
From the Asset Search page, you can manage Asset Search Groups. For more
information about Asset Search Groups. See Asset search groups.
The search feature will allow you to search host profiles, assets, and identity
information. Identity information provides more detail about log sources on your
network, including DNS information, user logins, and MAC addresses.
Using the asset search feature, you can search for assets by external data references
to determine whether known vulnerabilities exist in your deployment.
For example:
You receive a notification that CVE ID: CVE-2010-000 is being actively used in the
field. To verify whether any hosts in your deployment are vulnerable to this
exploit, you can select Vulnerability External Reference from the list of search
parameters, select CVE, and then type the
2010-000
To view a list of all hosts that are vulnerable to that specific CVE ID.
Note: For more information about OSVDB, see http://osvdb.org/ . For more
information about NVDB, see http://nvd.nist.gov/ .
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. On the toolbar, click Search > New Search.
Results
You can save your asset search criteria. See Saving asset search criteria.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Perform a search. See Searching asset profiles.
4. Click Save Criteria .
5. Enter values for the parameters:
Parameter Description
Enter the name of this search Type the unique name that you want to
assign to this search criteria.
Manage Groups Click Manage Groups to manage search
groups. For more information, see Asset
search groups. This option is only displayed
if you have administrative permissions.
These groups allow you to easily locate saved search criteria on the Assets tab.
From the Asset Search Groups window, you can view details about each group,
including a description and the date the group was last modified.
All saved searches that are not assigned to a group are in the Other group.
The Asset Search Groups window displays the following parameters for each
group:
Table 55. Asset Search Groups window toolbar functions
Function Description
New Group To create a new search group, you can click
New Group. See Creating a new search
group.
Edit To edit an existing search group, you can
click Edit. See Editing a search group.
Copy To copy a saved search to another search
group, you can click Copy. See Copying a
saved search to another group.
Remove To remove a search group or a saved search
from a search group, select the item that you
want to remove, and then click Remove. See
Removing a group or a saved search from a
group.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search.
4. Click Manage Groups.
5. Select the folder for the group under which you want to create the new group.
6. Click New Group.
7. In the Name field, type a unique name for the new group.
8. Optional. In the Description field, type a description.
9. Click OK.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search.
4. Click Manage Groups.
5. Select the group that you want to edit.
6. Click Edit.
7. Type a new name in the Name field.
8. Type a new description in the Description field.
9. Click OK.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search.
4. Click Manage Groups.
5. Select the saved search that you want to copy.
6. Click Copy.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select Search > New Search .
4. Click Manage Groups.
5. Select the saved search that you want to remove from the group:
v Select the saved search that you want to remove from the group.
v Select the group that you want to remove.
Using the Assets tab, you can delete, import, and export asset profiles.
Deleting assets
You can delete specific assets or all listed asset profiles.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. Select the asset that you want to delete, and then select Delete Asset from the
Actions list box.
4. Click OK.
Where:
v IP - Specifies any valid IP address in the dotted decimal format. For example:
192.168.5.34.
v Name - Specifies the name of this asset up to 255 characters in length. Commas
are not valid in this field and invalidate the import process. For example:
WebServer01 is correct.
v Weight - Specifies a number from 0 to 10, which indicates the importance of
this asset on your network. A value of 0 denotes low importance and 10 is very
high.
v Description - Specifies a textual description for this asset up to 255 characters
in length. This value is optional.
The import process merges the imported asset profiles with the asset profile
information you have currently stored in the system.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. From the Actions list box, select Import Assets.
4. Click Browse to locate and select the CSV file that you want to import.
5. Click Import Assets to begin the import process.
Exporting assets
You can export listed asset profiles to an Extended Markup Language (XML) or
Comma-Separated Value (CSV) file.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles.
3. From the Actions list box, select one of the following options:
v Export to XML
v Export to CSV
4. View the status window for the status of the export process.
5. Optional: If you want to use other tabs and pages while the export is in
progress, click the Notify When Done link.
When the export is complete, the File Download window is displayed.
6. On the File Download window, choose one of the following options:
v Open - Select this option to open the export results in your choice of
browser.
Parameter Description
Vulnerability ID Specifies the ID of the vulnerability. The
Vuln ID is a unique identifier that is
generated by Vulnerability Information
System (VIS).
Published Date Specifies the date on which the vulnerability
details were published on the OSVDB.
Name Specifies the name of the vulnerability.
Assets Specifies the number of assets in your
network that have this vulnerability. Click
the link to view the list of assets.
Assets, including exceptions Specifies the number of assets in your
network that have vulnerability exceptions.
Click the link to view the list of assets.
CVE Specifies the CVE identifier for the
vulnerability. CVE identifiers are provided
by the NVDB.
Procedure
1. Click the Assets tab.
2. On the navigation menu, click Asset Profiles .
3. Select an asset profile.
4. In the Vulnerabilities pane, click the ID or Vulnerability parameter value for
the vulnerability you want to investigate.
This reference includes tables that describe the parameters that are displayed in
each pane of the Asset Profile tab.
The Asset Summary pane on the Asset Profile page provides the following
information:
Parameter Description
Asset ID Displays the ID number that is assigned to
the asset profile.
IP Address Displays the last reported IP address of the
asset.
MAC Address Displays the last known MAC address of the
asset.
Network Displays the last reported network that is
associated with the asset.
NetBIOS Name Displays the NetBIOS name of the asset, if
known. If the asset has more than one
NetBIOS name, this field indicates the
number of NetBIOS names. Move your
mouse pointer over the value to view a list
of associated NetBIOS names.
DNS Name Displays the IP address or DNS name of the
asset, if known. If the asset has more than
one DNS name, this field indicates the
number of DNS names. Move your mouse
pointer over the value to view a list of
associated DNS names.
Given Name Displays the name of the asset. By default,
this field is empty. To provide a given name
for the asset, edit the asset profile.
Group Name Displays the last known user group of the
asset, if known.
Last User Displays the last known user of the asset.
User information is derived from identity
events. If more than one user is associated
with this asset, you can click the link to
display all users.
Operating System
Displays the operating system that is
running on the asset. If the asset has more
than one operating system, this field
indicates the number of operating systems.
Move your mouse pointer over the value to
view a list of associated operating systems.
The Network Interface Summary pane on the Asset Profile page provides the
following information:
Parameter Description
MAC Address Displays the MAC address of this asset, if
known.
IP Address Displays the IP address that is detected for
this MAC address.
Network Displays the network the IP address is
associated with, if known.
Last Seen Displays the date and time the IP address
was last detected on this MAC address.
Vulnerability pane
You can find Parameter descriptions for the Vulnerability pane that you access
from the Asset Profile page.
The Vulnerability pane on the Asset Profile page provides the following
information:
Services pane
You can find Parameter descriptions for the Services pane that you access from the
Asset Profile page.
The Services pane on the Asset Profile page provides the following information:
Table 57. Services pane parameters
Parameter Description
Service Displays the name of the open service.
Product Displays the product that runs on this
service, if known.
Port Displays the port the Layer 7 application
was discovered on. If this service has more
than one port, this field indicates the
number of ports. Move your mouse pointer
over the value to view a list of port
numbers.
Protocol Displays a comma-separated list of protocols
that are discovered on the port that runs the
open service.
Last Seen Passive Displays the date and time that the open
service was last passively seen.
Last Seen Active Displays the date and time that the open
service was last actively seen.
Service Default Ports Displays a comma-separated list of known
ports the Layer 7 application is known to
run on.
Vulnerabilities Displays the number of vulnerabilities that
are associated with this open service.
The Windows Services pane on the Asset Profile page provides the following
information:
Table 58. Windows Services pane parameters
Parameter Description
Name Displays the name of the Windows service
that was actively seen on the asset.
Packages pane
You can find Parameter descriptions for the Packages pane that you access from
the Asset Profile page.
The Windows Patches pane is displayed only when QRadar Vulnerability Manager
is installed on your system. The Windows Patches pane on the Asset Profile page
provides the following information:
Table 60. Windows Patches pane parameters
Parameter Description
Microsoft KB Number Displays the Microsoft Knowledge Base (KB)
number of the Windows patch that runs on
the asset.
Description Displays the description of the Windows
patch.
Bulletin ID Displays the bulletin ID number of the
Windows patch.
Vulnerability ID Displays the vulnerability ID of the
Windows patch.
Properties pane
You can find Parameter descriptions for the Properties pane that you access from
the Asset Profile page. The Properties pane is displayed only when QRadar
Vulnerability Manager is installed on your system.
The Properties pane on the Asset Profile page provides the following information:
Table 61. Properties pane parameters
Parameter Description
Name Displays the name of the configuration
property that was actively seen on the asset.
Value Displays the value for the configuration
property.
The Risk Policies pane on the Asset Profile page provides the following
information:
Table 62. Risk Policies pane parameters
Parameter Description
Policy Displays the name of the policy that is
associated with this asset.
Pass/Fail Indicates whether the policy has a status of
Pass or Fail.
Last Evaluated Displays the date that this policy was last
evaluated.
Products pane
You can find Parameter descriptions for the Products pane that you access from
the Asset Profile page.
The Products pane on the Asset Profile page provides the following information:
Detailed, flexible reporting options satisfy your various regulatory standards, such
as PCI compliance.
You can create your own custom reports or use a default reports. You can
customize and rebrand default reports and distribute these to other users.
The Reports tab might require an extended period of time to refresh if your system
includes many reports.
Note: If you are running Microsoft Exchange Server 5.5, unavailable font
characters might be displayed in the subject line of emailed reports. To resolve this,
download and install Service Pack 4 of Microsoft Exchange Server 5.5. For more
information, contact Microsoft support.
Timezone considerations
To ensure that the Reports feature uses the correct date and time for reporting
data, your session must be synchronized with your timezone.
During the installation and setup of QRadar products, the time zone is configured.
Check with your administrator to ensure your QRadar session is synchronized
with your timezone.
Administrative users can view all reports that are created by other users.
Non-administrative users can view reports that they created only or reports that
are shared by other users.
From the Reports tab, you can view statistical information about the reports
template, perform actions on the report templates, view the generated reports,
delete generated content.
If a report does not specify an interval schedule, you must manually generate the
report.
You can point your mouse over any report to preview a report summary in a
tooltip. The summary specifies the report configuration and the type of content the
report generates.
Report layout
A report can consist of several data elements and can represent network and
security data in various styles, such as tables, line charts, pie charts, and bar charts.
Chart types
When you create a report, you must choose a chart type for each chart you want to
include in your report.
The chart type determines how the generated report presents data and network
objects. You can chart data with several characteristics and create the charts in a
single generated report.
The following table identifies and describes the Reports toolbar options.
Table 64. Report toolbar options
Option Description
Group
Manage Groups Click Manage Groups to manage report
groups. Using the Manage Groups feature,
you can organize your reports into
functional groups. You can share report
groups with other users.
Graph types
Each chart type supports various graph types you can use to display data.
The network configuration files determine the colors that the charts use to depict
network traffic. Each IP address is depicted using a unique color. The following
table provides examples of how network and security data is used in charts. The
table describes the chart types that are available for each type of graph.
Table 65. Graph types
Graph type Available chart types
Line v Events/Logs
v Flows
v Connections
v Vulnerabilities
Stacked Line v Events/Logs
v Flows
v Connections
v Vulnerabilities
Bar v Events/Logs
v Flows
v Asset Vulnerabilities Connections
v Connections
v Vulnerabilities
Horizontal Bar v Top Source IPs
v Top Offenses
v Top Destination IPs
Stacked Bar v Events/Logs
v Flows
v Connections
The following graph types are available for QRadar Log Manager reports:
v Line Graph
v Stacked Line Graph
v Bar Graph
v Stacked Bar Graph
v Pie Graph
v Table Graph
You must have appropriate network permissions to share a generated report with
other users.
For more information about permissions, see the IBM Security QRadar SIEM
Administration Guide.
The Report wizard provides a step-by-step guide on how to design, schedule, and
generate reports.
The wizard uses the following key elements to help you create a report:
v Layout - Position and size of each container
v Container - Placeholder for the featured content
After you create a report that generates weekly or monthly, the scheduled time
must elapse before the generated report returns results. For a scheduled report,
you must wait the scheduled time period for the results to build. For example, a
weekly search requires seven days to build the data. This search will return results
after 7 days.
When you specify the output format for the report, consider that the file size of
generated reports can be one to 2 megabytes, depending on the selected output
format. PDF format is smaller in size and does not use a large quantity of disk
storage space.
Procedure
1. Click the Reports tab.
2. From the Actions list box, select Create.
3. On the Welcome to the Report wizard! window, click Next.
4. Select one of the following options:
Option Description
Manually By default, the report generates 1 time. You
can generate the report as often as you
want.
Hourly Schedules the report to generate at the end
of each hour. The data from the previous
hour is used.
Parameter Values
Report Title The title can be up to 100 characters in
length. Do not use special characters.
Logo From the list box, select a logo.
Pagination Options From the list box, select a location for page
numbers to display on the report. You can
choose not to have page numbers display.
Report Classification Type a classification for this report. You can
type up to 75 characters in length. You can
use leading spaces, special characters, and
double byte characters. The report
classification displays in the header and
footer of the report. You might want to
classify your report as confidential, highly
confidential, sensitive, or internal.
Note: You can also create asset saved searches. From the Search to use list
box, select your saved search.
c. Click Save Container Details.
d. If you selected more than one container, repeat steps a to c.
e. Click Next .
9. Preview the Layout Preview page, and then click Next.
10. Select the check boxes for the report formats you want to generate, and then
click Next.
Option Description
Report Console Select this check box to send the generated
report to the Reports tab. Report Console is
the default distribution channel.
Select the users that should be able to view This option displays after you select the
the generated report. Report Console check box.
12. On the Finishing Up page, enter values for the following parameters.
Option Description
Report Description Type a description for this report. The
description is displayed on the Report
Summary page and in the generated report
distribution email.
Please select any groups you would like Select the groups to which you want to
this report to be a member of assign this report. For more information
about groups, see Report groups.
Would you like to run the report now? Select this check box if you want to generate
the report when the wizard is complete. By
default, the check box is selected.
Results
The report immediately generates. If you cleared the Would you like to run the
report now check box on the final page of the wizard, the report is saved and
generates at the scheduled time. The report title is the default title for the
generated report. If you reconfigure a report to enter a new report title, the report
is saved as a new report with the new name; however, the original report remains
the same.
You can use or customize a significant number of default reports. The default
Reports tab displays the list of reports. Each report captures and displays the
existing data.
Note: When you customize a scheduled report to generate manually, select the
time span End Date before you select the Start Date.
Procedure
1. Click the Reports tab.
2. Double-click the report that you want to customize.
3. On the Report wizard, change the parameters to customize the report to
generate the content you require.
Results
If you reconfigure a report to enter a new report title, the report is saved as a new
report with the new name; however, the original report remains the same.
When a report has generated content, the Generated Reports column displays a
list box. The list box displays all generated content, which is organized by the
time-stamp of the report. The most recent reports are displayed at the top of the
list. If a report has no generated content, the None value is displayed in the
Generated Reports column.
Icons representing the report format of the generated report are displayed in the
Formats column.
Reports can be generated in PDF, HTML, RTF, XML, and XLS formats.
Note: The XML and XLS formats are available only for reports that use a single
chart table format (portrait or landscape).
You can view only the reports to which you have been given access from the
administrator. Administrative users can access all reports.
If you use the Mozilla Firefox web browser and you select the RTF report format,
the Mozilla Firefox web browser starts a new browser window. This new window
launch is the result of the Mozilla Firefox web browser configuration and does not
affect QRadar. You can close the window and continue with your QRadar session.
Procedure
1. Click the Reports tab.
Procedure
1. Click the Reports tab.
2. Select the reports for which you want to delete the generated content.
3. From the Actions list box, click Delete Generated Content.
While a report generates, the Next Run Time column displays one of the three
following messages:
v Generating - The report is generating.
v Queued (position in the queue) - The report is queued for generation. The
message indicates the position that the report is in the queue. For example, 1 of
3.
v (x hour(s) x min(s) y sec(s)) - The report is scheduled to run. The message is a
count-down timer that specifies when the report will run next.
You can select the Refresh icon to refresh the view, including the information in
the Next Run Time column.
Procedure
1. Click the Reports tab.
2. Select the report that you want to generate.
3. Click Run Report.
What to do next
After the report generates, you can view the generated report from the Generated
Reports column.
Duplicating a report
To create a report that closely resembles an existing report, you can duplicate the
report that you want to model, and then customize it.
Procedure
1. Click the Reports tab.
2. Select the report that you want to duplicate.
3. From the Actions list box, click Duplicate.
4. Type a new name, without spaces, for the report.
Sharing a report
You can share reports with other users. When you share a report, you provide a
copy of the selected report to another user to edit or schedule.
Any updates that the user makes to a shared report does not affect the original
version of the report.
You must have administrative privileges to share reports. Also, for a new user to
view and access reports, an administrative user must share all the necessary
reports with the new user.
You can only share the report with users that have the appropriate access.
Procedure
1. Click the Reports tab.
2. Select the reports that you want to share.
3. From the Actions list box, click Share.
4. From the list of users, select the users with whom you want to share this
report.
Branding reports
To brand reports, you can import logos and specific images. To brand reports with
custom logos, you must upload and configure the logos before you begin using the
Report wizard.
Ensure that the graphic you want to use is 144 x 50 pixels with a white
background.
To make sure that your browser displays the new logo, clear your browser cache.
Report branding is beneficial for your enterprise if you support more than one
logo. When you upload an image, the image is automatically saved as a Portable
Network Graphic (PNG).
When you upload a new image and set the image as your default, the new default
image is not applied to reports that have been previously generated. Updating the
logo on previously generated reports requires you to manually generate new
content from the report.
If you upload an image that is larger in length than the report header can support,
the image automatically resizes to fit the header; this is approximately 50 pixels in
height.
Report groups
You can sort reports into functional groups. If you categorize reports into groups,
you can efficiently organize and find reports.
For example, you can view all reports that are related to Payment Card Industry
Data Security Standard (PCIDSS) compliance.
By default, the Reports tab displays the list of all reports, however, you can
categorize reports into groups such as:
v Compliance
v Executive
v Log Sources
v Network Management
v Security
v VoIP
v Other
When you create a new report, you can assign the report to an existing group or
create a new group. You must have administrative access to create, edit, or delete
groups.
For more information about user roles, see the IBM Security QRadar SIEM
Administration Guide.
Procedure
1. Click the Reports tab.
2. Click Manage Groups.
3. Using the navigation tree, select the group under which you want to create a
new group.
4. Click New Group.
5. Enter values for the following parameters:
v Name - Type the name for the new group. The name can be up to 255
characters in length.
v Description - Optional. Type a description for this group. The description
can be up to 255 characters in length.
6. Click OK.
7. To change the location of the new group, click the new group and drag the
folder to the new location on the navigation tree.
Editing a group
You can edit a report group to change the name or description.
Procedure
1. Click the Reports tab.
2. Click Manage Groups.
3. From the navigation tree, select the group that you want to edit.
4. Click Edit.
5. Update values for the parameters, as necessary:
v Name - Type the name for the new group. The name can be up to 255
characters in length.
v Description - Optional. Type a description for this group. The description
can be up to 255 characters in length. This field is optional.
6. Click OK.
7. Close the Report Groups window.
You must have administrative permissions to share a report group with other
users.
For more information about permissions, see the IBM Security QRadar SIEM
Administration Guide.
You cannot use the Content Management Tool (CMT) to share report groups.
For more information about the CMT, see the IBM Security QRadar SIEM
Administration Guide
On the Report Groups window, shared users can see the report group in the report
list.
Any updates that the user makes to a shared report group does not affect the
original version of the report. Only the owner can delete or modify.
A copy of the report is created when a user duplicates or runs the shared report.
The user can edit or schedule reports within the copied report group.
The group sharing option overrides previous report sharing options that were
configured for reports in the group.
Procedure
1. Click the Reports tab.
2. On the Reports window, click Manage Groups.
Option Description
Default (inherit from parent)
The report group is not shared.
5. Click Save.
Results
On the Report Groups window, shared users see the report group in the report list.
Generated reports display content based on security profile setting.
Procedure
1. Click the Reports tab.
2. Select the report that you want to assign to a group.
3. From the Actions list box, select Assign Groups.
4. From the Item Groups list, select the check box of the group you want to
assign to this report.
5. Click Assign Groups.
Procedure
1. Click the Reports tab.
2. Click Manage Groups.
3. From the navigation tree, select the report that you want to copy.
4. Click Copy.
5. Select the group or groups to which you want to copy the report.
6. Click Assign Groups.
Removing a report
Use the Remove icon to remove a report from a group.
When you remove a report from a group, the report still exists on the Reports tab.
The report is not removed from your system.
Procedure
1. Click the Reports tab.
2. Click Manage Groups.
3. From the navigation tree, navigate to the folder that contains the report you
want to remove.
4. From the list of groups, select the report that you want to remove.
5. Click Remove.
6. Click OK.
7. Close the Report Groups window.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
170 Tracer Lane,
Waltham MA 02451, USA
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries,
or both. If these and other IBM trademarked terms are marked on their first
occurrence in this information with a trademark symbol ( or ), these symbols
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
Other company, product, and service names may be trademarks or service marks
of others.
Depending upon the configurations deployed, this Software Offering may use
session cookies that collect each users session id for purposes of session
management and authentication. These cookies can be disabled, but disabling them
will also eliminate the functionality they enable.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, See IBMs Privacy Policy at http://www.ibm.com/privacy and
IBMs Online Privacy Statement at http://www.ibm.com/privacy/details the
section entitled Cookies, Web Beacons and Other Technologies and the IBM
Software Products and Software-as-a-Service Privacy Statement at
http://www.ibm.com/software/info/product-privacy.
Notices 245
246 QRadar Users Guide
Glossary
This glossary provides terms and definitions for derived by the examination of packet
the [product name] software and products. payload and then used to identify a
specific application.
The following cross-references are used in this
ARP See Address Resolution Protocol.
glossary:
v See refers you from a nonpreferred term to the ARP Redirect
preferred term or from an abbreviation to the An ARP method for notifying the host if a
spelled-out form. problem exists on a network.
v See also refers you to a related or contrasting ASN See autonomous system number.
term.
asset A manageable object that is either
deployed or intended to be deployed in
For other terms and definitions, see the IBM
an operational environment.
Terminology website (opens in new window).
autonomous system number (ASN)
A B C D on page 248 E on page 248 In TCP/IP, a number that is assigned to
F on page 248 G on page 249 H on page an autonomous system by the same
249 I on page 249 K on page 250 L on page central authority that assigns IP
250 M on page 250 N on page 250 O on addresses. The autonomous system
page 251 P on page 251 Q on page 251 R number makes it possible for automated
on page 251 S on page 252 T on page 252 routing algorithms to distinguish
V on page 253 W on page 253 autonomous systems.
A B
accumulator behavior
A register in which one operand of an The observable effects of an operation or
operation can be stored and subsequently event, including its results.
replaced by the result of that operation.
bonded interface
active system See link aggregation.
In a high-availability (HA) cluster, the
burst A sudden sharp increase in the rate of
system that has all of its services running.
incoming events or flows such that the
Address Resolution Protocol (ARP) licensed flow or event rate limit is
A protocol that dynamically maps an IP exceeded.
address to a network adapter address in a
local area network.
C
administrative share
A network resource that is hidden from CIDR See Classless Inter-Domain Routing.
users without administrative privileges. Classless Inter-Domain Routing (CIDR)
Administrative shares provide A method for adding class C Internet
administrators with access to all resources Protocol (IP) addresses. The addresses are
on a network system. given to Internet Service Providers (ISPs)
anomaly for use by their customers. CIDR
A deviation from the expected behavior of addresses reduce the size of routing tables
the network. and make more IP addresses available
within organizations.
application signature
A unique set of characteristics that are client A software program or computer that
requests services from a server.
Glossary 249
log source
K Either the security equipment or the
key file network equipment from which an event
In computer security, a file that contains log originates.
public keys, private keys, trusted roots, log source extension
and certificates. An XML file that includes all of the
regular expression patterns required to
L identify and categorize events from the
event payload.
L2L See Local To Local.
L2R See Local To Remote. M
LAN See local area network. magistrate
LDAP See Lightweight Directory Access An internal component that analyzes
Protocol. network traffic and security events
against defined custom rules.
leaf In a tree, an entry or node that has no
children. magnitude
A measure of the relative importance of a
Lightweight Directory Access Protocol (LDAP) particular offense. Magnitude is a
An open protocol that uses TCP/IP to weighted value calculated from relevance,
provide access to directories that support severity, and credibility.
an X.500 model and that does not incur
the resource requirements of the more
complex X.500 Directory Access Protocol N
(DAP). For example, LDAP can be used to
NAT See network address translation.
locate people, organizations, and other
resources in an Internet or intranet NetFlow
directory. A Cisco network protocol that monitors
network traffic flow data. NetFlow data
link aggregation
includes the client and server information,
The grouping of physical network
which ports are used, and the number of
interface cards, such as cables or ports,
bytes and packets that flow through the
into a single logical network interface.
switches and routers connected to a
Link aggregation is used to increase
network. The data is sent to NetFlow
bandwidth and network availability.
collectors where data analysis takes place.
live scan
network address translation (NAT)
A vulnerability scan that generates report
In a firewall, the conversion of secure
data from the scan results based on the
Internet Protocol (IP) addresses to
session name.
external registered addresses. This enables
local area network (LAN) communications with external networks
A network that connects several devices but masks the IP addresses that are used
in a limited area (such as a single inside the firewall.
building or campus) and that can be
network hierarchy
connected to a larger network.
A type of container that is a hierarchical
Local To Local (L2L) collection of network objects.
Pertaining to the internal traffic from one
network layer
local network to another local network.
In OSI architecture, the layer that
Local To Remote (L2R) provides services to establish a path
Pertaining to the internal traffic from one between open systems with a predictable
local network to another remote network. quality of service.
network object
A component of a network hierarchy.
O Q
offense QID Map
A message sent or an event generated in A taxonomy that identifies each unique
response to a monitored condition. For event and maps the events to low-level
example, an offense will provide and high-level categories to determine
information on whether a policy has been how an event should be correlated and
breached or the network is under attack. organized.
offsite source
A device that is away from the primary R
site that forwards normalized data to an
event collector. R2L See Remote To Local.
Glossary 251
manually or automatically at timed SNMP
intervals that updates the current network See Simple Network Management
activity data. Protocol.
relevance SOAP A lightweight, XML-based protocol for
A measure of relative impact of an event, exchanging information in a
category, or offense on the network. decentralized, distributed environment.
SOAP can be used to query and return
Remote To Local (R2L)
information and invoke services across
The external traffic from a remote
the Internet.
network to a local network.
standby system
Remote To Remote (R2R)
A system that automatically becomes
The external traffic from a remote
active when the active system fails. If disk
network to another remote network.
replication is enabled, replicates data from
report In query management, the formatted data the active system.
that results from running a query and
subnet
applying a form to it.
See subnetwork.
report interval
subnet mask
A configurable time interval at the end of
For internet subnetworking, a 32-bit mask
which the event processor must send all
used to identify the subnetwork address
captured event and flow data to the
bits in the host portion of an IP address.
console.
subnetwork (subnet)
routing rule
A network that is divided into smaller
A condition that when its criteria are
independent subgroups, which still are
satisfied by event data, a collection of
interconnected.
conditions and consequent routing are
performed. sub-search
A function that allows a search query to
rule A set of conditional statements that
be performed within a set of completed
enable computer systems to identify
search results.
relationships and run automated
responses accordingly. superflow
A single flow that is comprised of
multiple flows with similar properties in
S order to increase processing capacity by
scanner reducing storage constraints.
An automated security program that system view
searches for software vulnerabilities A visual representation of both primary
within web applications. and managed hosts that compose a
secondary HA host system.
The standby computer that is connected
to the HA cluster. The secondary HA host T
assumes responsibility of the primary HA
host if the primary HA host fails. TCP See Transmission Control Protocol.
severity Transmission Control Protocol (TCP)
A measure of the relative threat that a A communication protocol used in the
source poses on a destination. Internet and in any network that follows
the Internet Engineering Task Force (IETF)
Simple Network Management Protocol (SNMP)
standards for internetwork protocol. TCP
A set of protocols for monitoring systems
provides a reliable host-to-host protocol in
and devices in complex networks.
packet-switched communication networks
Information about managed devices is
and in interconnected systems of such
defined and stored in a Management
networks. See also Internet Protocol.
Information Base (MIB).
V
violation
An act that bypasses or contravenes
corporate policy.
vulnerability
A security exposure in an operating
system, system software, or application
software component.
W
whois server
A server that is used to retrieve
information about a registered Internet
resources, such as domain names and IP
address allocations.
Glossary 253
254 QRadar Users Guide
Index
A closing offenses 35
common rule 166
distribute reports 7
document mode
actions 34 compliance 15 Internet Explorer web browser 4
actions on an offense 33 configuration data 7 download PCAP data file 90
add a dashboard item 15 configure and manage networks, plug-ins download PCAP file 91
add asset 200, 205 and components 7 Duplicate a report 237
add filter 151 configure and manage systems 7
add item 16 configure and manage users 7
add items 28
add note 34
configure page size 15
configuring charts 123
E
adding event items 28 edit a group 174
configuring connections 25
adding flow search items 28 Edit a group 240
configuring dashboard items 25
Admin tab 7, 30 edit a search group 154
configuring log activity 25
Aggregate CVSS score 200 edit asset 205
configuring network activity 25
All Offenses page 31 edit building blocks 176
Connection search items 19
all offenses tab 139 edit search group 212
console time 13
anomaly detection rule 170 email notification 38
controls 8
Anomaly Detection Rule wizard 170 enable rules 172
copy a rule 173
anomaly detection rules 165 event and flow searches 125
copy an item to a group 175
appliance 7 event description 83
copy saved search 154, 212
application 15 event details 86
create a rule group 174
Asset name 200 event details page 83
create new search group 212
asset profile 203, 205 event details toolbar 86
create reports 7
Asset Profile page 215, 217, 220, 222, event details toolbar functions 86
creating a new search group 154
223, 224 event filter information 202
creating custom rules 169
Asset profile page parameters 199, 217 Event processor 97
creating search groups 153
asset profiles 199, 210, 211, 214 event processor results 73
current threat level 23
Asset profiles 213 event processors 97
custom dashboard 15, 19, 24
Asset Profiles 212 event rule 166
custom dashboard item 16
Asset profiles page 200 event search group 153, 154
custom event and flow properties 157
asset search groups 211 events 19, 87, 123, 125
custom property 163
asset search page 209 excludes option 36
custom reports 232
Asset Summary pane parameters 217 export asset profile 213
custom rules 165
Asset tab 199, 200, 202, 211 export offenses 37
custom rules wizard 8
asset vulnerabilities 215 export to CSV 109
Custom Rules Wizard 22
assets 7, 14, 15 export to XML 109
customize dashboards 16
assets tab 205, 211, 214 exporting assets 214
Assets tab 7, 200, 203, 212, 213 exporting events 91
assign items to a group 174 Exporting flows 109
D
dashboard 28
B dashboard item 27
dashboard management 15
F
browser mode false positive 88, 108
dashboard tab 6, 8, 15, 16, 24, 26, 27
Internet Explorer web browser 4 false positives 199
Dashboard tab 6, 17, 19
building blocks 166 Flag 22
Dashboard tag 16
editing 176 flow details 98, 105
data searches 125
bulk load Flow details toolbar 107
default log in information 4
analyzing events and flows 191 flow filter criteria 96
default tab 6
By Destination IP page 147 flow groups 105
delete a rule 173
By Network page 148 flow rule 166
delete asset profile 213
flow search group 153, 154
delete dashboard 27
flow searches 16
deleting a search 152
C deleting assets 213
flows 19, 93, 123, 125, 131
functions 166
calculated property type 157 destination IP addresses 29
calculation property 160 detach a dashboard item 26
cancel a search 152 device level permission 29
chart legends 123 disable rules 172 G
chart management 121 display in new window 26 generate a report manually 237
chart objects 123 display items 22 glossary 247
chart types 228 display list box 78 graph types 231
charts overview 121 Display list box 101
L
number of search results 97 R
raw event data 77
last minute (auto refresh) 10
real time (streaming) 10
license key 3
list of events 83
O real-time 74
offense 29, 87 refresh data 10
list of flows in various modes 105
Offense dashboard items 16 regex property 158
log activity 10, 14, 15, 24, 28, 69, 87, 88,
Offense items 16 regex property type 157
121, 122, 123, 125, 151, 152, 153, 154,
offense management 29 remove group 155, 213
157, 165
offense parameters 43 Remove icon 213
overview 69
offense permission 29 remove item from dashboard 26
search criteria 130
offense retention 36 remove saved search 213
Log Activity dashboard items 17
offense rule 166 remove saved search from a group 155
log activity tab 10, 73, 74, 77, 78, 87, 89,
offense search group 154 rename dashboard 27
91, 125
offense searches 139 report
Log Activity tab 6, 69
offense summary 38 editing 236
Index 257