Hi guys
I can tell you already, 2023 is going to be a busy year, and it already started with the release of new integrations for Reaqta and Randori!
This post describes everything about the parsing of these two sources as well as the detection content that has been released for them.
Normalization
Reaqta
DSM
The DSM for Reaqta gets installed with auto-updates. If auto-updates are not enabled, you can download the most recent version of the RPMs from the IBM support website (https://www.ibm.com/support).
-
- PROTOCOL IBMSecurityReaQtaRESTAPI RPM
- DSM - IBMSecurityReaQta DSM RPM
DSM documentation can be found here.
Custom Properties
As for the Custom Properties, you can find the IBM Security QRadar Custom Properties for IBM Security ReaQta here on the App Exchange.
You can find all the necessary information parsed to create content such as Alert information (severity, impact, relevance, threat category, privilege level, etc), File info (name, directory, hash, size, etc). Details can be found in the documentation.
Randori
DSM
The DSM for Randori gets installed with auto-updates. Here again, if auto-updates are not enabled, you can download the most recent version of the RPMs from the IBM support website (https://www.ibm.com/support).
-
- PROTOCOL IBMSecurityRandoriRESTAPI RPM
- DSM IBMSecurityRandoriRESTAPI DSM RPM
DSM documentation can be found here.
Custom Properties
Just recently we also released the IBM Security QRadar Custom Properties for Randori here on the App Exchange. Once again you can find all the necessary information to create your own content, such as the criticality, the temptation, the priority and other characteristics (certificates, expired SSL, login pages, etc). All the details can be found in the documentation page.
Detection content
Today I am talking about ReaQta and Randori in the same blog post because they both have related content added to the IBM QRadar Security Threat Monitoring Content Extension.
ReaQta
Collecting ReaQta logs on top of the SIEM logs can help to:
A simple rule example to accomplish this could be:
It just needs the appropriate response to fit in your process.
On our side we included the IBM Security ReaQta log source type to the BB:DeviceDefinition: Endpoint Protection Devices in the Threat content extension, which means that all the rules using that Building Block will now trigger offenses when the conditions are met.
Here is the list of default rules: