IBM® Security Threat Intelligence Insights
integrates extra threat intelligence feeds from external sources. Configuring threat intelligence
feeds from external sources requires a premium license key from the vendor.
About this task
Only an administrator can configure external data sources for Threat Intelligence Insights.
Feeds from the following vendors are supported:
- AbuseIPDB
- AlienVault OTX
- APIVoid
- Cisco Threatgrid
- Intezer
- Mandiant Threat Intelligence
- MaxMind Geolocation
- Recorded Future,
- ReversingLabs
- SANS Internet StormCenter
- ThreatQ
- VirusTotal
Important: To get enrichments for IP, URL, Domain, and Hash from a Reversing Labs
source, your API key must have access to the following three endpoints:
- TCA-0101 File Reputation
- TCA-0402 URI Statistics
- TCA-0403 URL Threat Intelligence
Procedure
- Log in to IBM Security QRadar® Suite Software.
- From the menu, click
.
- On the Integration data sources page, select the data source tile,
and then click Set up a connection.
- On the Connection services page, select the service tile, and then
click Enable.
- Click Next.
- On the Connection details page, configure the connection to the
data source.
Table 1. Connection parameters
Parameter |
Description |
Data source name |
Enter a unique name to identify the data source connection. You can create multiple
connections to a data source, so it is useful to clearly set them apart by name. Only
alphanumeric characters and the following special characters are allowed: - .
_
|
Data source description |
Enter a description to indicate the purpose of the data source connection. You can create
multiple connections to a data source, so it is useful to clearly indicate the purpose of each
connection by description. Only alphanumeric characters and the following special characters are
allowed: - . _
|
Edge Gateway |
If you have a firewall between your cluster and the data source target, use the Edge Gateway to host the containers. In the
Edge gateway field, specify an Edge Gateway to host the connector. It can take up to
five minutes for the status of newly deployed data source connections on the Edge Gateway to show as being connected.
|
Concurrent Search Limit |
Enter the number of simultaneous connections that can be made to the data source. The default
limit for the number of connections is 4. The value must not be less than 1 and must not be greater
than 100. |
Custom Mapping (Optional) |
If you need to customize the STIX attributes mapping, upload a JSON file in the
Custom mapping field and edit the JSON blob to map new or existing properties
to their associated data source fields. |
- Click Next.
- On the Connection configurations page, configure identity and
access.
- Click Add a configuration.
- In the Configuration details window,
configure the following parameters.
Table 2. Configuration parameters
Parameter |
Description |
Configuration Name |
Enter a unique name to describe the access configuration and distinguish it from the other
access configurations for this data source connection that you might set up. Only alphanumeric
characters and the following special characters are allowed: - . _ |
Configuration Description |
Enter a unique description to describe the access configuration and distinguish it from the
other access configurations for this data source connection that you might set up. Only alphanumeric
characters and the following special characters are allowed: - . _ |
Key |
Enter your vendor's API key. |
- Select the types of reports that you want to receive.
Each vendor supports
different report types, for example Domain, hash, IP, URL.
- To save your configuration and establish the connection, click
Save, and then click Next.
- Click Finish.
- To manage your active connections, complete the following steps:
- On the Integration data sources page, on the tile of the relevant data source, click
Manage <x> of <x> active connections.
- On the Connection status page, on the tile of the relevant data source,
you can edit, refresh, or delete your data source connection.
Results
When an indicator is scanned and found, Threat Intelligence Insights displays any evidence that
is received from the vendor.
- In Threat Intelligence Insights, click an indicator in a threat to see a summary of the
third-party threat source information under Other sources in the side pane.
- Click View Report and select the Other Sources
tab.
- Each configured threat source that is listed on the tab can be expanded to show the actual
threat source report.
- Trigger a response workflow in Case Management.
- In Case Management, to display third-party intelligence, choose one of the following methods:
- Hover over the red triangle that indicates one or more threat sources that are matched and see
the number of hits.
- Click the indicator row to see Case Artifact Details and each threat source hit summary.
- Clicking a threat source summary opens a side pane with more artifact hit details.
- From the Case artifact, you can investigate further with Data Explorer by selecting the action
Run a query in Data Explorer.
- After a Data Explorer scan, click an indicator to display a side pane with threat source
details.
Tip: If the Threat Intelligence Insights app is not enabled, the third-party threat
intelligence sources are displayed in the side pane and enriching Case artifacts only.