Configuring audit log forwarding for QRadar
You can configure audit log forwarding from IBM® Security QRadar Suite to IBM QRadar on Cloud and IBM QRadar 7.5.0 or later.
Before you begin
Verify that the following requirements are met:
- Access to QRadar on Cloud or IBM QRadar 7.5.0 or later Console GUI.
- Access to QRadar on Cloud or IBM QRadar 7.5.0 or later backend (SSH).
- Access to IBM Security QRadar Suite cluster backend (oc login)
- A TLS Certificate
- For QRadar on Cloud, the TLS certificate (PKCS12 Certificate Chain and Password) is provided and deployed by QRadar on Cloud support. For more information, see Sending TLS syslog data to the QRadar Console.
- For IBM QRadar 7.5.0 or later, you need to provide your own TLS certificate.
Configuring a new log source on the IBM QRadar Console or IBM QRadar on Cloud console
To correctly receive the logs from IBM Security QRadar Suite, create a new TLS syslog log source on the IBM QRadar console.
IBM QRadar on Cloud
Procedure
IBM QRadar 7.5.0 or later
Procedure
Adding a CA Certificate to IBM Security QRadar Suite
If your TLS certificate is not signed by a well-known certificate authority (CA), create a new secret on IBM Security QRadar Suite.
Procedure
Enabling audit log forwarding
Procedure
What to do next
You can verify that the process works by completing the following steps:
- Log in to the IBM QRadar Console.
- Go to the Log Activity Tab.
- You can see the IBM Security QRadar Suite logs in the
list.
The Log Source column displays the name of the new log source.
Disabling audit log forwarding
You can disable audit log forwarding globally for all services or individually only for specific services.
Disabling globally
Procedure
oc delete CP4SConfiguration enable-audit
Disabling for single applications
When audit log forwarding is enabled globally in the cluster, it is enabled for all services by default. You can individually disable audit log forwarding for specific services.
About this task
aitk.audit=false
audit.cases.enabled=false
authsvc.audit=false
car.audit=false
clx.audit=false
de.audit=false
drc.audit=false
drcapi.audit=false
edgegateway.audit=false
entitlements.audit=false
iscauth.audit=false
pulse.audit=false
qproxy.audit=false
riskmanager.audit=false
threatinv.audit=false
tii.tiiapp.audit=false
tii.tiireports.audit=false
tii.tiisearch.audit=false
tii.tiisettings.audit=false
tii.tiithreats.audit=false
tisvars.audit=false
udi.audit=false
Procedure
apiVersion: isc.ibm.com/v1
kind: CP4SConfiguration
metadata:
name: tune-audit
spec:
values:
- authsvc.audit=false
- clx.audit=false
- The new CR must have a different name. In this example, the new CR is named tune-audit.
- To rollback the changes, the created tune-audit CR must be edited or deleted.
Converting PEM certificates to PKCS12 format
PEM certificates need to be converted to the PKCS12 format to be used in a new log source.
Procedure
Configuring DNS overwrite
The hostname that is specified in the CP4SConfiguration CR must match the remote TLS certificate that is associated with the connection. The hostname is not always associated with correct DNS record.
Procedure
- audit.hostAliases.syslog.ip=<qradar_ip>
- audit.hostAliases.syslog.hostnames.main=<qradar_hostname>
Parsing cluster audit logs on IBM QRadar
You can use the Device Support Module (DSM) editor to map your product audit events to IBM QRadar.