Hi,
The simple answer to this question is, if it was a question?!: it depends ...
There are many dependencies and prerequisites to consider...degree of maturity of the siem, siem strategy, knowledge of critical assets, siem scope (related java log records in scope?), vulnerability management, network activity (correlation to log records)...
BSI listed some updated measures, how to deal with this situation:
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-549032-10F2.pdf?__blob=publicationFile&v=3
In addition to that you should then be able to tune searches or rules to monitor related patterns and movements.
This could increase the likelihood of recognizing traces of movement with qradar...
It provides a very sophisticated instrument kit to approach a suitable approach.
I'm not saying it's easy.. :)
Regards,
Ralph
#QRadar#Support#SupportMigration