3 Using The Qradar Siem Dashboard
3 Using The Qradar Siem Dashboard
3 Using The Qradar Siem Dashboard
• Preferences
• Help
• Logout
Relevance: Severity:
How important is the How high is the potential
destination? damage to the destination?
50% of magnitude 30% of magnitude
© Copyright IBM Corporation 2013 27
Offense parameters (2 of 4)
Offense Type:
General root cause of the offense. The offense
type determines which information is displayed
in the next section of the Offense Summary.
Magnitude: Vulnerabilities:
Indication about the level of A known vulnerability of a local
risk an IP address poses host can have been exploited
relative to other IP addresses. and turned it into an attacker.
© Copyright IBM Corporation 2013 31
Offense Source Summary (2 of 4)
When you right-click the IP, you see navigation options for
further investigation.
Weight:
Relevance of
the source IP
address.
Offenses: Events/Flows:
Number of offenses Number of events and flows
associated with this associated with this offense.
source IP address.
© Copyright IBM Corporation 2013 34
Lesson 3. Investigating offense details
Destinations: Offenses:
List all destination IP List all offenses for
addresses targeted by which the source IP
the source IP address. address is source or
destination IP address.
Destination IP:
Hover the mouse over the
asset name or IP address to
display further information.
Events: Flows:
List all events that List all flows that
contribute to the viewed contribute to the viewed
offense in the category offense in the category
under the mouse pointer. under the mouse pointer.
Summary:
Flows:
View the
View all flows
Offense
contributing to
Summary.
the offense.
Display:
View offense
information
introduced on
previous slides.
Protect Offense:
Prevent QRadar
SIEM from deleting
the offenses.
Close:
When you have resolved
the offense, close it.
© Copyright IBM Corporation 2013 49
Offense status and flags
Status: Icons indicates: The actions available depend
- Protected - Follow up on the status of the offense.
- Inactive - Notes
- Closed - Assigned
Unprotect Offense:
Allow QRadar SIEM
to delete this
protected offense.
Event
information:
Similar offense
parameters
Source and
Destination
information:
Most fields do not
matter for this
particular event
because NAT and
IPv6 were not used.
Clear Filter:
Click to view the Firewall
Deny events again.
Quick Filter:
Filter for events that do not contain
profile: Atlantis in the payload.
Clear Filter:
Click to view all events
of the offense again.
Default (Normalized):
By default, QRadar SIEM
shows normalized events
without grouping.
Raw Events:
Instead of grouping, QRadar
SIEM shows the raw events
stored in the payload of
each normalized event.
Protocol:
All events are
Some events recorded an additional
aggregated by their
protocol. Click Multiple (2).
low-level category.
© Copyright IBM Corporation 2013 70
Grouping events by protocol
In the Protocol column, click Multiple (2) to open a window with
events grouped by protocol. You learn that the firewall denied
udp_ip in addition to icmp_ip.
Grouping By: Current Filters:
Now QRadar SIEM The previous grouping, Log
groups by Protocol. Level Category, became a filter.
Pause/Play Refresh
Filter:
Right-click the Source IP to filter.
View: Display:
List events of the Group by High
last 24 hours. Level Category.
Assign to group.
Set as default
search for the
Log Activity tab.
Show All:
Clear all filters. Export:
You can resend
exported events
as raw events to
Delete: QRadar SIEM.
Delete the result
of the currently
displayed search. Notify:
Send an email
when the search in
progress finishes.
Last Minute:
Unless time series data is captured,
the dashboard item shows only the
result of the last 1-minute interval.
Value to Graph:
The asterisk (*) indicates
that QRadar SIEM
accumulates time series
data for this value.
Time Range:
Select Last 24 Hours.
Accumulation began:
QRadar SIEM started
accumulating time series
data on this date at this time.
Potential Exploit:
This third high-level category
does not have enough events
to display in a bar chart.
Potential Exploit:
Two events of high-level
category Potential Exploit.