IBM QRadar

IBM QRadar

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only
  • 1.  Silent Device Log Sources

    Posted Fri November 16, 2018 08:38 AM
    I am looking for some assistance on how to configure a container for log sources that are not as chatty? For example, in my environment I have a handful of devices that will only send logs when an Admin logins via the webUI, and this type of activity is done only a few times a month.

    Currently, my team is running reports that show log source that have not logged in a week, and continuing to open tickets on devices that are not as chatty as others.

    ------------------------------
    Jason Granger
    ------------------------------


  • 2.  RE: Silent Device Log Sources

    Posted Fri November 16, 2018 08:47 AM
    I really hope someone responds with some good advice as we have a similar situation; trying to identify when log sources are having issues and the no events in given period of time doesn't work well for these.

    Thanks for posting the question.


    ------------------------------
    Regards,
    Scott Worden
    ------------------------------



  • 3.  RE: Silent Device Log Sources

    Posted Mon November 19, 2018 10:16 AM
    I based my alerts and you could do the same for reports, on the log source group. For non-chatty log sources put them into a separate group, e.g. Firewalls for the normal ones, and Firewalls-Not Responding for the infrequent ones.

    Then you can manually look at the Non-Responding folders as part of your regular maintenance to see if they come back now and then, and if not, decide what to do.

    We use alerting for critical log sources and employ the log source group as a way to include or exclude the log source from the alert.

    ------------------------------
    James Hewitt
    QRadar Log Content Manager
    Dish
    ------------------------------



  • 4.  RE: Silent Device Log Sources

    Posted Sat January 19, 2019 09:14 PM
    This is a big issue for everyone.... Being able to monitor the reception of logs for hundred types of equipment's. In our case, for compliancy reason, monitoring was required. So, we didn't have the choice to put a working solution in place. The hardest part was figuring out the trends to set the triggers. Depending on how much different source you have, this may take a few weeks to fine tune.

    There's no perfect solution for this. But James proposed a good one with the use of log source GROUP in the rules. We also use groups, but also types of log sources. The advantage of using types is that it works great with the autodetection mechanism.

    Let me explain. In Qradar, you can set autodetection of log source. So, as soon as a new source sends its log to Qradar, it's automatically detected and associated to a log source type. Therefore, if someone adds a new firewall in production, and forwards its logs to Qradar, the monitoring will work automatically since we already have a rule using this type of log source.

    Here are the triggers you may want to use.

    Triggers to monitor log reception

    As for groups, we've created about eight groups to cover our main thresholds. So, using types and groups will get you a nice coverage.

    Finally, for the default Qradar Syslog Event Timeout... forget about it. Having one setting for all your sources is irrelevant unless you only monitor one type equipment. My suggestion would to turn off these notifications and rules that triggers on them.

    I hope it help some of you. Some may have better ideas, so bring them up. For instance, you could extract, from the psql log source table, the name, group and last event time, and do your verification with a script. We ruled out that solution, because we try to avoid as possible custom solutions around Qradar, because they come with a support and maintenance cost. Engineers aren't cheap ;)

    Regards,
    Anthony



    ------------------------------
    Anthony Gayadeen
    ------------------------------