Introduction
This blog is in line with the series of blogs that have been published around QRadar EDR (Endpoint Detection and Response) integration with QRadar SIEM (Security Information and Event Management). In the previous blogs, we have dealt with how different security use cases like data exfiltration, vulnerability exploits, potential phishing etc. are implemented. The links of previous blogs are pasted at end for reference.
To provide a brief introduction for the products:
QRadar SIEM
In cybersecurity, Security Information and Event Management (SIEM) consists of technologies that provide analysis, threat mitigation and logging of security events and packets of data flowing in the wire within a network. SIEM provides a general view of all technical infrastructure, with specific data of security events and flows and the mitigation of any security threat vectors that are found in the environment. A SIEM solution responds to advanced threats which cannot be analysed with general monitoring tools.
IBM QRadar SIEM is one of the most popular SIEM solutions in the market today. It has been the Leader in the Gartner’s Magic Quadrant for more than a decade now. It helps you to quickly uncover existing and potential threats by using its advanced analytics capabilities. It also provides many useful features such as centralized visibility, flexible deployment, automated intelligence, machine learning, and pro-active threat hunting.
QRadar EDR
QRadar EDR is an Endpoint Threat Detection and Response solution that uses Artificial Intelligence driven behavioural analysis to detect and respond to various advanced threats and protect the organisation from any security breach. QRadar EDR uses its proprietary Nano OS Technology to remain invisible to attackers as well as to provide visibility into the system at the hypervisor level. Traditional endpoint management solutions are mostly signature based and are incapable of zero-day attacks. QRadar EDR on the other hand uses behavioural detection approach, which monitors events generated by every process and in case of any suspicious behaviour, it triggers an alert. When an alert is triggered, the agent switches to deep monitoring mode to collect more data to enrich the alert. Thus, it achieves low storage and bandwidth consumption and logs only the information that matters. Apart from detecting the threats, QRadar EDR also provides robust solution for quick and automated response where it can isolate and de-isolate the endpoints and interact with endpoints in real time leveraging its Live-Response feature.
The idea behind this blog
QRadar EDR consists of different agents which are installed on endpoints and these agents report to the QRadar EDR hive. It is responsible for storing events from the endpoints, running correlation and behavioral analysis, and triggering alerts and corresponding response. QRadar EDR also consists of a dashboard which is used to view policies, events, alerts, status of agents and different responses etc. Overall, the architecture of QRadar EDR would consist of multiple agents, the hive, and the dashboard.
Figure 2: Sample Pulse dashboard
Apart from the Pulse dashboard, QRadar SIEM now has data from all the endpoints reporting to different hive servers. This helps in implementing different security use cases which not just restricted to a limited number of endpoints. This integration helps QRadar EDR to extend its capabilities like correlation across the complete environment which was not possible with single QRadar EDR.