Tuning Guide: Ibm Security Qradar
Tuning Guide: Ibm Security Qradar
Tuning Guide: Ibm Security Qradar
Version 7.2.4
Tuning Guide
Note: Before using this information and the product that it supports, read the information in Notices and
Trademarks on page 35.
© Copyright IBM Corp. 2012, 2013 All Rights Reserved US Government Restricted Rights - Use, duplication or
disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
CONTENTS
1 OVERVIEW
B GLOSSARY
INDEX
INTRODUCTION TO IBM SECURITY
QRADAR TUNING
This information is intended for use with IBM® Security QRadar® and provides
information on how to tune your QRadar deployment.
Intended audience System administrators responsible for tuning must have administrative access to
IBM Security QRadar and your network devices and firewalls. The system
administrator must have knowledge of your corporate network and networking
technologies.
Technical For information on how to access more technical documentation, technical notes,
documentation and release notes, see the Accessing IBM Security QRadar Documentation
Technical Note.
(http://www.ibm.com/support/docview.wss?rs=0&uid=swg21612861)
Contacting For information on contacting customer support, see the Support and Download
customer support Technical Note.
(http://www.ibm.com/support/docview.wss?rs=0&uid=swg21612861)
Statement of good IT system security involves protecting systems and information through
security practices prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered,
destroyed, misappropriated or misused or can result in damage to or misuse of
your systems, including for use in attacks on others. No IT system or product
should be considered completely secure and no single product, service or security
measure can be completely effective in preventing improper use or access. IBM
systems, products and services are designed to be part of a comprehensive
security approach, which will necessarily involve additional operational
procedures, and may require other systems, products or services to be most
effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR
SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
This document provides an overview of the steps to setup and tune IBM Security
QRadar SIEM software.
It assumes that your QRadar SIEM system is installed and functional. For more
information on installing QRadar SIEM, see the IBM Security QRadar SIEM
Installation Guide.
Tuning your QRadar SIEM system is completed in two phases; deployment and
tuning. Table 1-1 describes the tasks required to complete each phase.
Table 1-1 Tuning Checklist
For assistance with tuning your QRadar SIEM system, contact Customer Support.
In the deployment phase you configure essential network, scanner, log source,
and asset configurations that are required to effectively tune QRadar SIEM.
The network hierarchy is used to determine which hosts are local or remote and
monitor specific logical groups or services in your network, such as marketing,
Demilitarized Zones (DMZs), or Voice Over IP (VOIP).
You must ensure that all internal address spaces, both routable and non-routable,
are defined within your network hierarchy. Failure to do so can result in QRadar
SIEM generating an excessive number of false positives.
VA scanners QRadar SIEM user vulnerability assessment (VA) information to determine offense
threat levels and remove false positives, by correlating event data, network activity,
and behavioral changes.
To schedule scans and maintain your VA data, you can integrate QRadar SIEM
with VA tools such as third-party scanners. Depending on the scanner type,
QRadar SIEM imports scan results from the scanner server or remotely initiates a
scan.
The results of a scan provide the system and version of each Classless
Inter-Domain Routing (CIDR), server, and port. Scan information describes the
ports that are open and the vulnerabilities on the system.
Ensure that you download and apply the latest scanner plug-ins from the following
location: http://www.ibm.com/support
DSM updates QRadar SIEM uses Device Support Modules (DSMs) to log and correlate the data
that is collected from external log sources, such as firewalls, switches, or routers.
DSMs are regularly updated to ensure QRadar SIEM can correctly interpret and
parse security event information that is provided by external devices. DSMs can be
updated both automatically and manually. For more information see, Updating
DSMs automatically and Updating DSMs manually.
Although most QRadar SIEM automatically detects most devices, some devices
require manual or additional configuration. For a list of supported devices and their
specification configuration, see the Configuring DSMs Guide.
Updating DSMs You can automatically download and install DSM updates to QRadar SIEM.
automatically
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click System Configuration.
Step 3 Click the Auto Update icon.
Step 4 On the navigation menu, click Change Settings.
Step 5 From the Auto Update Schedule pane, select the DSM update frequency:
a Frequency - Select the frequency that you want to receive updates.
b Hour - Select the time of day that you want to receive updates.
c Week Day - Select this option if you select Weekly as the update frequency.
d Day of the Month- Select this option if you select Monthly as the update
frequency.
Step 6 From the Update Types pane, select Auto Install from the DSM, Scanner,
Protocol Updates list box.
Step 7 Click Save.
For more information about configuring DSM updates, see the IBM Security
QRadar SIEM Administration Guide.
Updating DSMs You can manually install DSM updates at any time irrespective of the automatic
manually update schedule.
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click System Configuration.
Step 3 Click the Auto Update icon.
Step 4 On the navigation menu, click Check for Updates.
Step 5 From the toolbar, select Install > DSM, Scanner, Protocol Updates.
Step 6 Click OK.
Log source QRadar SIEM attempts to automatically detect log sources that send syslog
detection messages to an Event Collector.
For more information about which devices support automatic detection, see the
DSM Configuration Guide.
Log sources are detected when QRadar SIEM receives a specific number of
identifiable syslog messages. A Traffic Analysis function processes syslog
messages. The Traffic Analysis function identifies the DSMs installed on the
system and assigns the appropriate DSM to the log source. Automatically
discovered log sources are displayed in the Log Sources window. For more
information, see Displaying log sources.
QRadar SIEM might not automatically detect log sources with low activity levels.
These devices must be added manually. For more information, see Adding log
sources manually.
Note: DSMs are used to interpret log source data. To receive log source data, you
must ensure that the correct DSMs are installed in QRadar SIEM. For more
information, see DSM updates.
For more information about automatically detecting log sources, see the DSM
Configuration Guide.
Displaying log You can display the log sources that are automatically discovered.
sources
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click Data Sources.
Step 3 Click the Log Sources icon.
Adding log sources You can manually add log sources that QRadar SIEM does not detect
manually automatically.
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click Data Sources.
Step 3 Click the Log Sources icon.
Step 4 On the toolbar, click Add.
Step 5 Configure the parameters. For more information about the Log Source parameters,
see the DSM Configuration Guide.
Step 6 Click Save.
Step 7 On the Admin tab, click Deploy Changes.
Establish and Flow information is used to detect threats and activity that would otherwise be
configure flow missed by relying only on event information.
sources Flows provide network traffic information and can be sent simultaneously to
QRadar SIEM in various formats, including flowlog files, NetFlow, J-Flow, sFlow,
and Packeteer.
NetFlow, J-Flow, and sFlow are protocols that collect flow data from network
devices, such as routers, and send this data to QRadar SIEM. NetFlow, J-Flow,
and sFlow are configured in a similar way, but each is deployed according to the
protocol that each network device supports.
Note: If you are collecting NetFlow, J-Flow, or sFlow data, verify that QRadar
SIEM is collecting complete flow sets. Incomplete or missing flows can make it
difficult to analyze network activity.
QFlow Collectors QRadar SIEM captures traffic from mirror, span, or tap ports within your network by
using an IBM Security QRadar QFlow Collector.
The QFlow Collector is enabled by default, while the mirror, span, or tap port is
connected to a monitoring interface on your QRadar SIEM appliance. Common
mirror port locations include core, DMZ, server, and application switches.
NetFlow data Netflow must be configured to send data to the nearest QFlow Collector or Flow
collection Processor appliance.
You must configure NetFlow to send data as quickly as possible by configuring the
external network device’s ip-cache flow timeout value to one. Ensure that ingress
and egress traffic is forwarded from the router (not all routers can do this). If you
are configuring a router that only provides a sample of data, and then configure the
router to use the lowest possible sampling rate, without increasing the load on the
switch. When sampling is used, the whole conversation is not tracked. Use
sampling only for initial testing.
Verifying QFlow You can verify that your QFlow Collector is receiving network flow data.
Collector data
collection Procedure
Step 1 Click the Network Activity tab.
Step 2 From the Network Activity toolbar, select Search > New Search.
Step 3 In the Search Parameters pane, add a flow source search filter:
a From the first list down, select Flow Source.
b From the third list box, select your QFlow interface name.
Step 4 Click Add Filter.
Step 5 In the Search Parameters pane, add a protocol search filter.
a From the first list box, select Protocol.
b From the third list box, select TCP.
Step 6 Click Add Filter.
Step 7 Click Filter.
What to do next
If the Source Bytes or Destination Bytes column displays a large volume of
results with zero bytes, your network tap or span port might not be correctly
configured. You must verify your QFlow configuration. For more information, see
Configuring QFlow Collector devices.
Configuring QFlow You can verify that your QFlow Collector is operational.
Collector devices
About this task
If you are running dynamic routing protocols, traffic might follow different paths to
and from a host. If you have more than one traffic path or route at the locations
where you are collecting flow data, check with your network administrator to
ensure that you are collecting flows from all routers that the traffic can traverse.
Procedure
1 Ensure that span or tap ports are configured correctly to process both received and
transmitted packets.
2 To ensure visibility into both sides of any asymmetric routes, select the Enable
Asymmetric Flows check box on the flow source configuration.
Verifying NetFlow To ensure your NetFlow configuration is functioning correctly, you must validate
data collection your QRadar SIEM NetFlow Data. Netflow should be configured to send data to
the nearest QFlow Collector or Flow Processor appliance.
Procedure
Step 1 Click the Network Activity tab.
Step 2 From the Network Activity toolbar, select Search > New Search.
Step 3 In the Search Parameters pane, add a flow source search filter.
a From the first list box, select Flow Source.
b From the third list box, select your NetFlow router’s name or IP address.
Note: If your NetFlow router is not displayed in the third list box, QRadar SIEM
might not detect traffic from the router. For further assistance, contact Customer
Support.
Step 4 Click Add Filter.
Step 5 In the Search Parameters pane, add a protocol search filter.
a From the first list box, select Protocol.
b From the third list box, select TCP.
Step 6 Click Add Filter.
Step 7 Click Filter.
What to do next
Locate the Source Bytes and Destination Bytes columns. If either column
displays a large volume of results with zero bytes, your NetFlow configuration
might be incomplete. You must verify your NetFlow configuration.
Disabling NetFlow You can disable NetFlow log messages to prevent them from consuming log file
log messages space.
number on the packet was missed. If the number of missed flows is consistent with
your sampling rate then, you can ignore this message.
Procedure
Step 1 Click the Admin tab.
Step 2 On the Admin toolbar, click Deployment Editor.
Step 3 Right-click the component that is specified in the error message and select
Configure.
Step 4 On the toolbar, click Advanced.
Step 5 From the General Settings expansion list, identify the Verify NetFlow Sequence
Numbers field, and select No from the list box.
Step 6 Click Save.
Step 7 Click the Saves recent changes and closes editor icon to close the Deployment
Editor.
Step 8 Click Deploy Changes.
Asset profile QRadar SIEM automatically discovers the assets on your network, which are
configuration based on passive QFlow data and vulnerability data. QRadar SIEM then builds an
asset profile that displays the services running on each asset.
Asset profile data is used for correlation purposes to help reduce false positives.
For example, if an attack attempts to exploit a specific service running on a specific
asset, QRadar SIEM determines if the asset is vulnerable to this attack by
correlating the attack against the asset profile.
Note: Log sources, flow data or VA scanners must be configured for asset profiles
to be displayed in the user interface.
For more information about managing assets, see the IBM Security QRadar SIEM
Administration Guide.
Import assets in CSV You can import asset profile data in CSV format.
format
When you import asset profile data in CSV format, the file must be in the following
format:
ip,name,weight,description
The following table describes the parameters that you must configure:
Table 2-2 Asset profile import CSV format parameters
Parameter Description
IP Specifies any valid IP address in the dot decimal format, for
example, 192.168.5.34.
Name Specifies the name of the asset up to 255 characters in length.
Commas are not valid in this field and invalidate the import process,
for example, WebServer01.
Weight Specifies a number from 0 to 10, which indicates the importance of
the asset on your network. A value of 0 denotes low importance,
while 10 denotes a very high importance.
Description Specifies a textual description for this asset up to 255 characters in
length. This value is optional.
For more information about configuring assets, see the IBM Security QRadar
SIEM Administration Guide.
In the tuning phase, you discover servers, investigate offenses, modify building
blocks, tune false positives, optimize custom rules, and improve search
performance. Before you tune QRadar SIEM, you must wait 24 hours to enable
QRadar SIEM to detect the servers on the network, store events and flows, and
create offenses based on existing rules.
Server discovery QRadar SIEM automatically discovers and classifies servers in your network,
providing a faster initial deployment and easier tuning when network changes
occur.
The Server Discovery function uses the asset profile database to discover many
types of servers on your network. This function lists automatically discovered
servers and enables you to select which servers you want to include in building
blocks. For more information, see QRadar building blocks.
For more information on server discovery, see the IBM Security QRadar SIEM
Administration Guide.
QRadar SIEM uses building blocks to tune the system and allow additional
correlation rules to be enabled. This reduces the number of false positives
detected by QRadar SIEM, and helps you to identify business critical assets. For
more information on false positives, see Tuning false positives.
Authorized servers
You can enable the Server Discovery function to add authorized infrastructure
servers to a selected building block. The Server Discovery function selects the
correct building block or rule for discovered servers and enables QRadar SIEM to
monitor these servers while suppressing false positives that are specific to the
server category.
Categorize servers
You can enable QRadar SIEM to categorize unauthorized servers or servers
running unauthorized services into a related building block. For more information,
see Table 3-1. If categorizing servers generates an excessive number of offenses,
then use the Server Discovery function to place the servers in a building block.
Discovering servers The server discovery function uses the QRadar SIEM Asset Profile database to
discover different server types based on port definitions.
Procedure
Step 1 Click the Assets tab.
Step 2 On the navigation menu click Server Discovery.
Step 3 From the Server Type drop-down list box, select the server type you want to
discover. The default is Database Servers.
Step 4 Select the option to determine the servers you want to discover:
• All - Search all servers in your deployment with the currently selected server
type.
• Assigned - Search servers in your deployment that have been previously
assigned to the currently selected server type.
• Unassigned - Search servers in your deployment that have not been
previously assigned.
Step 5 From the Network list box, select the network you want to search.
Step 6 Click Discover Servers.
Step 7 Click Approve Selected Servers.
Step 8 In the Matching Servers table, select the check box or boxes of all the servers you
want to assign to the server role.
What to do next
If you want to modify the search criteria, click either Edit Ports or Edit Definition.
For more information on discovering servers, see the IBM Security QRadar SIEM
Administration Guide.
QRadar rules and The configuration rule that is defined in the Custom Rules Engine (CRE) is used to
offenses generate offenses.
CRE The CRE displays the rules and building blocks that are used by QRadar SIEM.
Rules and building blocks are stored in two separate lists, because they function
differently. The CRE provides information about how the rules are grouped, the
types of tests the rule performs, and the responses each rule generates. For more
information on viewing your CRE configuration, see Viewing the current CRE
configuration
For more information on Rules and Offenses, see the IBM Security QRadar SIEM
Users Guide.
Rules A rule is a collection of tests that perform an action when certain conditions are
met.
Each rule can be configured to capture and respond to a specific event, sequence
of events, flow sequence, or offense. The actions that can be triggered can include
sending an email or generating a syslog message. A rule can reference multiple
building blocks by using the tests found in the function sections of the test groups
within the Rule Editor. For more information on building blocks, see QRadar
building blocks.
Offenses As event and flow data passes through the CRE, it is correlated against the rules
that are configured and an offense is generated based on this correlation.
Offenses are displayed using the Offenses tab. For more information on offenses,
see Investigating offenses.
Viewing the current You can view the rules that are deployed in your QRadar SIEM.
CRE configuration
About this task
Double-click any rule to display the Rule Wizard. This displays the tests associated
with each rule and enables you to configure the response to each rule.
Procedure
Step 1 Click the Offenses tab.
Step 2 On the navigation menu click Rules.
For more information on your CRE configuration, see the IBM Security QRadar
SIEM Users Guide.
What to do next
To determine which rules are most active in generating offenses, from the rules
page click Offense Count to reorder the column. This displays the rules which are
generating offenses in descending order.
Investigating QRadar SIEM generates offenses by testing event and flow conditions. To
offenses investigate QRadar SIEM offenses you must view the rules that created the
offense.
Procedure
Step 1 Click the Offenses tab.
Step 2 On the navigation menu click All Offenses.
Step 3 Double-click the offense you are interested in.
Step 4 From the All Offenses Summary toolbar, select Display > Rules.
Step 5 From the List of Rules Contributing to Offense pane, double-click the Rule
Name you are interested in.
Note: The All Offenses Rules pane can display multiple Rule Names, since the
offense generated by QRadar SIEM might have been triggered by a series of
different tests.
For more information on investigating offenses, see the IBM Security QRadar
SIEM Users Guide.
QRadar building Building blocks group commonly used tests, to build complex logic, so they can be
blocks used in rules.
Building blocks use the same tests as rules, but have no actions associated with
them and are often configured to test groups of IP addresses, privileged
usernames, or collections of event names. For example, you might create a
building block that includes the IP addresses of all mail servers in your network,
then use that building block in another rule, to exclude those hosts. The building
block defaults are provided as guidelines, which should be reviewed and edited
based on the needs of your network.
You can configure the host definition building blocks (BB:HostDefinition) to enable
QRadar SIEM to discover and classify additional servers on your network. If a
particular server is not automatically detected, you can manually add the server to
its corresponding host definition building block. This ensures that the appropriate
rules are applied to the particular server type. You can also manually add entire
address ranges as opposed to individual devices.
Commonly edited You can reduce the number of offenses generated by high volume traffic servers,
building blocks such as proxy servers and virus servers. For more information, see Building block
tuning.
To reduce the number of offenses, administrators must edit the following building
blocks:
• BB:HostDefinition: VA Scanner Source IP
• BB:HostDefinition: Network Management Servers
• BB:HostDefinition: Virus Definition and Other Update Servers
• BB:HostDefinition: Proxy Servers
• BB:NetworkDefinition: NAT Address Range
• BB:NetworkDefinition: TrustedNetwork
Building block tuning You can edit building blocks to reduce the number of false positives generated by
QRadar SIEM. For more information on false positives, see Tuning false
positives.
You can edit building blocks if you have certain server types present on the
networks that you want to monitor. If you do not have these server types on the
networks, then you can choose to skip this step. For more information, see Editing
a Building Block.
To edit building blocks, you must add the IP address or IP addresses of the server
or servers into the appropriate building blocks.
For more information, see the IBM Security QRadar SIEM Administration Guide.
Also, see Identifying Network Assets.
Table 3-1 provides the list of building blocks that you can edit.
Table 3-1 List of recommended building blocks to edit.
Note: You can include a CIDR range or subnet in any of the building blocks instead
of listing the IP addresses. For example:192.168.1/24 includes addresses
192.168.1.0 to 192.168.1.255. You can also include CIDR ranges in any of the
BB:HostDefinition building blocks.
Tuning How you tune QRadar SIEM depends on different scenarios and whether you have
Methodology one target or many targets within your network.
To ensure reliable system performance, administrators must consider the following
best practice guidelines:
• Disable rules that produce numerous unwanted offenses.
• To tune CRE rules, increase the rule threshold by doubling the numeric
parameters and time interval.
• Consider modifying rules to consider local rather than remote network context.
• When you edit a rule with the attach events for the next 300 seconds option
enabled, wait 300 seconds before closing the related offenses.
For more information, see the IBM Security QRadar SIEM Users Guide.
The following table provides information on how to tune false positives according
to these differing scenarios:
Tuning false You can tune false positive events and flows to prevent them from creating
positives offenses.
Procedure
Step 1 Click the Log Activity tab, or alternatively click the Network Activity tab.
Step 2 Select the event or flow you want to tune.
Step 3 Click False Positive.
Note: If you are viewing events or flows in streaming mode, you must pause
streaming before you click False Positive.
False positive rule The rule FalsePositive: False Positive Rules and Building Blocks is the first
chains rule to execute in the CRE. When it loads, all of its dependencies are loaded and
tested.
If the rule is successfully matched in QRadar SIEM, the rule drops the detected
event or flow. This stops the event or flow from progressing through the CRE and
prevents the flow or event from creating an offense.
When creating false positive building blocks within QRadar SIEM, administrators
must review the following information.
Naming conventions
Use a methodology similar to the default rule set, by creating new building blocks
with the following naming convention:
Where: <CustomerName> is a name that you assign to the false positive building
block.
When the new false positive building block is created, you can create new building
blocks to match the traffic that you want to prevent from creating offenses. Add
these building blocks to the <CustomerName>-BB:False Positive: All False
Positive Building block.
Note: To prevent events from creating offenses, you must create a new building
block that matches the traffic that you are interested in. Save this as a building
block <CustomerName>-BB:False Positive: <name of rule>, then edit
<CustomerName>-BB:False Positive: All False Positive building blocks, to
include the rule that you created.
CAUTION: If you add a rule or building block that includes a rule to the
FalsePositive: False Positive Rules and Building Blocks rule, the rule you have
added will execute before the event is dropped by the CRE and could create
offenses by overriding the false positive test.
Optimize custom When building custom rules, you must optimize the order of the testing to ensure
rules that the rules do not impact CRE performance.
The tests in a rule are executed in the order in which they are displayed in the user
interface. The most memory intensive tests for the CRE are the payload and
regular expression searches. To ensure that these tests run against a smaller
subset of data and execute faster, you must first include one of the following tests:
• when the event(s) were detected by one or more of these log source types
• when the event QID is one of the following QIDs
• when the source IP is one of the following IP addresses
• when the destination IP is one of the following IP addresses
• when the local IP is one of the following IP addresses
• when the remote IP is one of the following IP addresses
• when either the source or destination IP is one of the following IP
addresses
• when the event(s) were detected by one of more of these log sources
Note: You can further optimize QRadar SIEM by exporting common tests to
building blocks. Building Blocks execute per event as opposed to multiple times if
tests are individually included in a rule.
For more information on optimizing custom rules, see the IBM Security QRadar
SIEM Users Guide.
Procedure
Step 1 Click the Offenses tab.
Step 2 On the navigation menu, click Rules.
Step 3 From the Actions list box, select one of the following options:
• New Event Rule - Select this option to configure a rule for events.
• New Flow Rule - Select this option to configure a rule for flows.
• New Common Rule - Select this option to configure a rule for events and flows.
• New Offense Rule - Select this option to configure a rule for offenses.
Step 4 Read the introductory text. Click Next.
You are prompted to choose the source from which you want this rule to apply. The
default is the rule type you selected on the Offenses tab.
Step 5 If required, select the rule type you want to apply to the rule. Click Next.
Step 6 Locate the when an event matches any/all of the following rules test and click
the + icon beside the test.
Step 7 On the and when an event matches any of the following rules test, click rules.
Step 8 From the Select the rule(s) to match and click ‘Add’ field, select multiple
building blocks by holding down the Ctrl key and click Add +.
Step 9 Click Submit.
Improving search When you are searching Event or Flow information, you can improve performance
performance by adding filters to search indexed fields.
Table 3-3 provides information about the fields that are indexed:
Table 3-3 Log Viewer and Flow Viewer Indexed Fields
Note: You can monitor the performance of your search by expanding the Current
Statistics option on the Search page. This displays the volume of data loading
from data files and indexes. If your search does not display a count in the index file
count then add an indexed filter to the search. For more information, see Adding
Indexed Filters.
Adding Indexed Indexed filters can be added to both log activity and network activity data.
Filters
Procedure
Step 1 Click the Log Activity tab, or alternatively click the Network Activity tab.
Step 2 On the toolbar, click Add Filter.
Step 3 From the first list box, select an index filter. See Table 3-3.
Step 4 From the second list box, select the modifier that you want to use.
Step 5 Type or select the information for your filter. The controls that are displayed
depend on the index filter you selected in Step 3.
Step 6 Click Add Filter.
Enabling quick You can enable the Quick Filter property to optimize event and flow search times.
filtering
About this task
For QRadar SIEM 7.0 MR3 installations and above, you can enable Quick Filters.
This option must be enabled in the System Settings page. You can use the Quick
Filter option to search event and flow payloads by typing your exact free text
search criteria.
Procedure
Step 1 Log in to QRadar.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click System Configuration.
Step 4 Click the Index Management icon.
Step 5 In the Quick Search field, type Quick Filter.
Step 6 Select the Quick Filter property you want to index.
You can identify the event and flow Quick Filter properties using the value in the
Database column.
Step 7 On the toolbar, click Enable Index.
A green dot indicates that the payload index is enabled.
Step 8 Click Save.
Step 9 Click OK.
Results
The selected Quick Filter properties are indexed. If a list includes event or flow
properties, indexed property names are appended with the following text:
[Indexed].
Custom extracted The Custom Extracted Properties function in QRadar SIEM is used to expand
properties normalized fields by adding numerous custom fields for reports, searches, and the
CRE, for example, to extract proxy URLs, virus names, or secondary usernames.
• If your extracted property is only applicable to certain events, you can reduce
the workload on QRadar SIEM by limiting the extracted property to that event
type.
• The extracted property field is not indexed, but if an event matches the prop-
erty, it stores an index to the offset and length of the property which reduces
the amount of data that must be searched.
Cleaning the SIM When the tuning process is complete then clean the SIM model to ensure that
model QRadar SIEM only displays recent offenses.
Procedure
Step 1 Click the Admin tab.
Step 2 From the Admin toolbar, select Advanced > Clean SIM Model.
Step 3 Select the Hard Clean option.
Step 4 Select the Are you sure you want to reset the data model? check box.
Step 5 Click Proceed.
Note: This process may take several minutes, depending on the volume of data in
your system.
Step 6 When the SIM reset process is complete, refresh your browser.
Note: If you attempt to navigate to other areas of the user interface during the SIM
reset process, an error message is displayed.
Use this reference to identify network assets that you might want to include in
building blocks.
Notices This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte character set (DBCS) information,
contact the IBM Intellectual Property Department in your country or send inquiries,
in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan Ltd.
19-21, Nihonbashi-Hakozakicho, Chuo-ku
Tokyo 103-8510, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM
has not tested those products and cannot confirm the accuracy of performance,
compatibility or any other claims related to non-IBM products. Questions on the
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual
business enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color illustrations
may not appear.
Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at “Copyright and
trademark information” at www.ibm.com/legal/copytrade.shtml.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
Privacy policy IBM Software products, including software as a service solutions, (“Software
considerations Offerings”) may use cookies or other technologies to collect product usage
information, to help improve the end user experience, to tailor interactions with the
end user or for other purposes. In many cases no personally identifiable
information is collected by the Software Offerings. Some of our Software Offerings
can help enable you to collect personally identifiable information. If this Software
Offering uses cookies to collect personally identifiable information, specific
information about this offering’s use of cookies is set forth below.
Depending upon the configurations deployed, this Software Offering may use
session cookies that collect each user’s session id for purposes of session
management and authentication. These cookies can be disabled, but disabling
them will also eliminate the functionality they enable.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, See IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details the section
entitled “Cookies, Web Beacons and Other Technologies” and the “IBM Software
Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
flow sources 8
A
adding
indexed filters 25
asset profile
F
false positives
configuring 11
rule chains 22
assets
tuning 21
identifying 29
flow sources
importing in CSV format 11
configuring 8
B G
best practices
glossary 31
tuning 13
building blocks
commonly edited 17
editing 20 I
tuning 17 importing
assets 11
indexed filters
C adding 25
investigating
configuring
offenses 16
asset profile 11
flow sources 8
qflow devices 9
vulnerability assessment scanners 5 L
custom event properties 26 log messages
custom extracted properties 26 netflow 10
custom flow properties 26 log source
custom rules adding manually 7
optimizing 23 detection 7
custom rules engine (CRE)
creating OR conditions 24
viewing configuration 15 M
manually
adding a log source 7
D installing DSMs 6
detecting
log sources 7
device support modules (DSMs) 6 N
automatic download 6 netflow
manually installing 6 data validation 10
updating 6 log messages 10
discovering network assets
network assets 29 identifying 29
downloading
DSM updates 6
O
offenses
E investigating 16
editing optimizing
building blocks 20 custom rules 23
establishing reports 26
Q
qflow
validating data 9
qflow data collection
validating 9
qflow devices
configuring 9
R
report
optimization 26
rule chains
false positives 22
S
scanners
configuring 5
searches
improving performance 25
SIM model
cleaning 27
T
tuning
best practices 13
building blocks 17
false positives 21
methodology 20
U
updating
device support modules (DSMs) 6
V
validating
netflow data 10
qflow data collection 9
viewing
custom rules engine (CRE) configuration 15
vulnerability assessment scanners
configuring 5