QRadar Network Insights Content Extension

The IBM® QRadar® Network Insights Content Extension provides more QRadar rules, reports, searches, and custom properties for administrators. This custom rule engine content focuses on providing analysis, alerts, and reports for QRadar Network Insights deployments.

QRadar Network Insights provides in-depth visibility into network communications on a real-time basis to extend the capabilities of your IBM QRadar SIEM deployment. Through the deep analysis of network activity and application content, QRadar Network Insights empowers QRadar Sense Analytics to detect threat activity that would otherwise go unnoticed.

Important: To avoid content errors in this content extension, keep the associated DSMs up to date. DSMs are updated as part of the automatic updates. If automatic updates are not enabled, download the most recent version of the associated DSMs from IBM Fix Central (https://www.ibm.com/support/fixcentral).

IBM QRadar Network Insights Content Extension 1.6.0

The following table shows the rules that are new in IBM QRadar Network Insights Content Extension 1.6.0.

Table 1. Rules in IBM QRadar Network Insights Content Extension 1.6.0
Name Description Minimum QRadar Version Required
QNI : Access to Improperly Secured Service - BitTorrent Handshake Verification Failure Triggers when a failed handshake verification is observed in BitTorrent network communications. 7.4.0
QNI : Access to Improperly Secured Service - Certificate Has Non-DNS Subject Alternative Name Triggers when an X509 certificate is observed with a subject alternative name that is not a DNS entry. This connection might be considered suspicious. 7.3.3
QNI : Access to Improperly Secured Service - Deprecated TLS Version in Use Triggers when IBM QRadar Network Insights detects a deprecated TLS session. According to NIST publication 800-52 and ACSC's advice on implementing TLS, TLS 1.0 and 1.1 are discouraged. 7.3.3
QNI : Access to Improperly Secured Service - Kerberos Deprecated or Unknown Cipher Suite in use Triggers when a deprecated or unknown cipher suite is being used for Kerberos communications. 7.4.3
QNI : Access to Improperly Secured Service - RDP Session Without Encryption Triggers when RDP sessions without encryption are used. For more information, see ACSC advice (https://www.cyber.gov.au/acsc/view-all-content/publications/using-remote-desktop-clients). 7.3.3
QNI : Access to Improperly Secured Service - RDP Session Without Enhanced RDP Security Triggers when any RDP encryption level is detected which can mean that enhanced RDP Security is not being used and the connection might be insecure. Enhanced RDP security results in other network protocols appear on your network rather than RDP. For example, TLS-encrypted RDP sessions will appear as TLS. 7.3.3
QNI : Access to Improperly Secured Service - Signature Algorithm Does Not Match To-Be-Signed Signature Algorithm Triggers when an X509 certificate is observed with a Signature Algorithm that does not match the To-Be-Signed Signature Algorithm. This connection might be considered suspicious. 7.3.3
QNI : Access to Improperly Secured Service - SSL in Use Triggers when IBM QRadar Network Insights detects an SSL session. According to NIST publication 800-52, all versions of SSL should not be used. Use recent versions of TLS instead. 7.3.3
QNI : Access to Improperly Secured Service - TLS Unrecommended Cipher Suite in Use Triggers when IBM QRadar Network Insights detects that either a TLS 1.3 or TLS 1.2 session is using a cipher suite not recommended by NIST publication 800-52r2.
Note: The QNI : TLS 1.3 Recommended Cipher Suites and QNI : TLS 1.2 Recommended Cipher Suites reference sets are prepopulated. Tune these reference sets with relevant cipher suites.
7.3.3
QNI : Embedded Script Detected Triggers when an embedded script is detected inside a file observed on the network. This might include macros in Office documents or JavaScript embedded in PDF files. 7.3.3

(Back to top)

IBM QRadar Network Insights Content Extension 1.5.2

IBM QRadar Network Insights Content Extension 1.5.2 supports QRadar Network Insights 7.3.3 and later.

The following table shows the custom functions that are new or updated in IBM QRadar Network Insights Content Extension 1.5.2.

Table 2. Custom Functions in IBM QRadar Network Insights Content Extension 1.5.2
Name Description
get_extension Extracts the file extension from an inputted file name.

The following table shows the rules that are updated in IBM QRadar Network Insights Content Extension 1.5.2.

Table 3. Rules in IBM QRadar Network Insights Content Extension 1.5.2
Name Description
QNI : Access to Improperly Secured Service - Weak Public Key Length QRadar Network Insights has detected a SSL/TLS session that uses a certificate that, has a low public key bit count. A server that provides a weak Public Key Certificate (less than 1024 bits) may represent a security risk. According to NIST publication 800-57, the recommended minimum key length beginning in 2011 is 2048 bits for RSA and 256 bits for ECDSA.
QNI : File Extension / Content Type Verification Extracts the file extension from the file name, and compares it with the content type as determined by QRadar Network Insights.

These two values are then compared against the QNI-Extension-ContentType-Pairs reference set , which holds expected file extension/content type pairs.

This rule triggers on cases where a file extension is in disagreement with the usually accepted Content-Type for the extension, and the extension is not contained in the QNI : File Extension / Content Type Verification Exclusions reference set.

As an example, the file extension .txt is generally associated with text/plain and not application/x-dosexec.

By default this rule does not create offenses. To view the flows that triggered this rule, use the File Extension / Content Type Mismatches search.

The following table shows the reference map of sets that is updated in IBM QRadar Network Insights Content Extension 1.5.2.

Table 4. Reference Map of Sets in IBM QRadar Network Insights Content Extension 1.5.2
Name Description
QNI-Extension-ContentType-Pairs Maps a file extension to its expected content types. This reference map of sets comes populated with 1234 entries. For example, .html maps to text/html.

(Back to top)

IBM QRadar Network Insights Content Extension 1.5.1

IBM QRadar Network Insights Content Extension 1.5.1 supports QRadar Network Insights 7.3.2 and later.

The following table shows the rule that was updated in IBM QRadar Network InsightsContent Extension 1.5.1.

Table 5. Rules and Building Blocks in IBM QRadar Network Insights Content Extension 1.5.1
Name Description
QNI : File Extension / Content Type Verification Extracts the file extension from the file name, and compares it with the content type as determined by QRadar Network Insights. These two values are then compared against the QNI-Extension-ContentType-Pairs reference set that hold expected file extension/content type pairs.

Triggers on cases where a file extension is in disagreement with the usually accepted content type for the extension, and the extension is not contained in the QNI : File Extension / Content Type Verification Exclusions reference set.

For example, the file extension .txt is generally associated with text/plain and not application/x-dosexec.

By default this rule does not create offenses. To view the flows that triggered this rule, use the File Extension / Content Type Mismatches search.

The following table shows the reference data that is new or updated in IBM QRadar Network Insights Content Extension 1.5.1.

Table 6. Reference Data in IBM QRadar Network Insights Content Extension 1.5.1
Type Name Description
Reference Set QNI : File Extension / Content Type Verification Exclusions Contains file extensions to exclude from verification by the QNI : File Extension / Content Type Verification rule. This reference set is prepopulated with four entries.
Reference Map of Sets QNI-Extension-ContentType-Pairs Maps a file extension to its expected content types. This reference map of sets is prepopulated with 1227 entries. For example, .html maps to text/html.

The following table shows the saved searches that are new or updated in IBM QRadar Network Insights Content Extension 1.5.1.

Table 7. Saved Searches in IBM QRadar Network Insights Content Extension 1.5.1
Name Description
File Extension / Content Type Mismatches Shows the flows that triggered the QNI : File Extension / Content Type Verification rule.

(Back to top)

IBM QRadar Network Insights Content Extension 1.5.0

IBM QRadar Network Insights Content Extension 1.5.0 supports QRadar Network Insights 7.3.2 and later.

The following table shows the custom properties that are removed in IBM QRadar Network Insights Content Extension 1.5.0.

Table 8. Custom Properties removed in IBM QRadar Network Insights Content Extension 1.5.0
Name Optimized Capture Group Regex
Reject Code Yes 1 Reject=([0-9]+)
Recipient User Yes 1 <([A-Za-z0-9._+\-]+@[A-Za-z0-9.\-]+)>

The isReply custom AQL function is removed in IBM QRadar Network Insights Content Extension 1.5.0.

The following table shows the rules and building blocks in IBM QRadar Network Insights Content Extension 1.5.0.

Table 9. Rules and Building Blocks in IBM QRadar Network Insights Content Extension 1.5.0
Type Name Description
Rule QNI : Access to Improperly Secured Service - Certificate Expired Removed UBA elements from rule response, changed response limiter, and updated the low level category of the dispatched event.
Rule QNI : Access to Improperly Secured Service - Certificate Invalid Removed UBA elements from rule response, changed response limiter, and updated the low level category of the dispatched event.
Rule QNI : Access to Improperly Secured Service - Self Signed Certificate Removed UBA elements from rule response, changed response limiter, and updated the low level category of the dispatched event.
Rule QNI : Access to Improperly Secured Service - Weak Public Key Length Removed UBA elements from rule response, changed response limiter, and updated the low level category of the dispatched event.
Rule QNI : Confidential Content Being Transferred to Foreign Geography Removed UBA elements from rule response and changed response limiter.
Rule QNI : File Extension / Content Type Verification This rule triggers on cases where a file extension is in disagreement with the usually accepted Content-Type for the extension.
Rule QNI : Observed File Hash Associated with Malware Threat Removed UBA elements from rule response and changed response limiter.
Rule QNI : Same Threat Detected on Multiple Hosts Renamed from QNI : Observed File Hash Seen Across Multiple Hosts, removed UBA elements from rule response and changed response limiter.
Rule QNI : Suspicious Website Access This rule triggers when a website categorized as suspicious by X-Force® is accessed.

The following table shows the rules and building blocks that are removed in IBM QRadar Network Insights Content Extension 1.5.0.

Table 10. Rules and Building Blocks removed in IBM QRadar Network Insights Content Extension 1.5.0
Type Name
Building Block BB:CategoryDefinition: Rejected Email Recipient
Building Block BB:HostDefinition: Mail Servers
Building Block BB:HostReference: Mail Servers
Building Block BB:PortDefinition: Mail Ports
Rule UBA : QNI - Confidential Content Being Transferred to Foreign Geography
Rule UBA : QNI - Potential Spam/Phishing Subject Detected from Multiple Sending Servers
Rule UBA : QNI - Potential Spam/Phishing Attempt Detected on Rejected Email Recipient
Rule UBA : QNI - Observed File Hash Associated with Malware Threat
Rule UBA : QNI - Observed File Hash Seen Across Multiple Hosts
Rule UBA : QNI - Access to Improperly Secured Service - Weak Public Key Length
Rule UBA : QNI - Access to Improperly Secured Service - Certificate Invalid
Rule UBA : QNI - Access to Improperly Secured Service - Certificate Expired
Rule UBA : QNI - Access to Improperly Secured Service - Self Signed Certificate
Rule QNI : Potential Spam/Phishing Subject Detected from Multiple Sending Servers
Rule QNI : Potential Spam/Phishing Attempt Detected on Rejected Email Recipient

The following table shows the reports in IBM QRadar Network Insights Content Extension 1.5.0.

Table 11. Reports in IBM QRadar Network Insights Content Extension 1.5.0
Report Name Search Name and Dependencies
User File Transfer by Content Type (QNI) Updated container size limits.
Top Phishing Subjects by Recipient User (QNI) Added description.
Top Malware by Asset (QNI) Added description and unchecked run report now in wizard.
Malware Distribution by File (QNI) Added description and unchecked run report now in wizard.

The following table shows the reference data in IBM QRadar Network Insights Content Extension 1.5.0.

Table 12. Reference Data in IBM QRadar Network Insights Content Extension 1.5.0
Type Name Description
Reference Map of Sets QNI-Extension-ContentType-Pairs Maps a file extension to its expected content types. This reference map of sets comes pre-populated with 1218 entries. (ex. .html maps to text/html.)

The following table shows the saved searches in IBM QRadar Network Insights Content Extension 1.5.0.

Table 13. Saved Searches in IBM QRadar Network Insights Content Extension 1.5.0
Name Description
File Transfer by Originating User and Content Type Updated search parameters (removed HTTP Response Code check), shared by default.
File Transfer by Source IP and Content Type Updated search parameters (removed HTTP Response Code check and Originating User check), shared by default.
Malware by Hash and Source Asset Updated result limit number.
Malware Traffic Summary Updated rule name referenced in AQL query,
Phishing Subjects by Recipient User Search now shared by default.

(Back to top)

IBM QRadar Network Insights Content Extension 1.4.0

IBM QRadar Network Insights Content Extension 1.4.0 supports QRadar Network Insights 7.3.0 and later.

The following table shows the custom AQL functions in IBM QRadar Network Insights Content Extension 1.4.0.

Table 14. Custom AQL functions in IBM QRadar Network Insights Content Extension 1.4.0
Name Description
isReply Returns true or false if a string is the typical subject line of a response email.

The following table shows the rules and building blocks in IBM QRadar Network Insights Content Extension 1.4.0.

Table 15. Rules and Building Blocks inIBM QRadar Network Insights Content Extension 1.4.0
Type Name Description
Building Block BB: Category Definition: Countries/Regions with Restricted Access Edit this building block to include any geographic location that typically would not be allowed to access the enterprise. After it is configured, you can enable the Confidential Content Being Transferred to Foreign Geography rule.
Rule QNI: Confidential Content Being Transferred to Foreign Geography Detects confidential content that is being transferred to countries/regions with restricted access.
Rule UBA : QNI - Confidential Content Being Transferred to Foreign Geography Sends events to the User Behavior Analytics app based on the QNI: Confidential Content Being Transferred to Foreign Geography rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Potential Spam/Phishing Subject Detected from Multiple Sending Servers Sends events to the User Behavior Analytics app based on the QNI: Potential Spam/Phishing Subject Detected from Multiple Sending Servers rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Potential Spam/Phishing Attempt Detected on Rejected Email Recipient Sends events to User Behavior Analytics app based on the QNI: Potential Spam/Phishing Attempt Detected on Rejected Email Recipient rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Observed File Hash Associated with Malware Threat Sends events to the User Behavior Analytics app based on the QNI: Observed File Hash Associated with Malware Threat rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Observed File Hash Seen Across Multiple Hosts Sends events to the User Behavior Analytics app based on the QNI: Observed File Hash Seen Across Multiple Hosts rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Access to Improperly Secured Service - Weak Public Key Length Sends events to the User Behavior Analytics app based on the QNI: Access to Improperly Secured Service - Weak Public Key Length rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Access to Improperly Secured Service - Certificate Invalid Sends events to the User Behavior Analytics app based on the QNI: Access to Improperly Secured Service - Certificate Invalid rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Access to Improperly Secured Service - Certificate Expired Sends events to the User Behavior Analytics app based on the QNI: Access to Improperly Secured Service - Certificate Expired rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.
Rule UBA : QNI - Access to Improperly Secured Service - Self Signed Certificate Sends events to the User Behavior Analytics app based on the QNI: Access to Improperly Secured Service - Self Signed Certificate rule, with a senseValue assigned to it. This senseValue is used when the User Behavior Analytics app calculates a risk score for a user.

The following table shows the report in IBM QRadar Network Insights Content Extension 1.4.0.

Table 16. Report in IBM QRadar Network Insights Content Extension 1.4.0
Report Name Search Name and Dependencies
User File Transfer by Content Type Saved Searches: File Transfer by Originating User and Content Type And File Transfer by Source IP and Content Type

The following table shows the saved searches in IBM QRadar Network Insights Content Extension 1.4.0.

Table 17. Saved Searches in IBM QRadar Network Insights Content Extension 1.4.0
Name Description
File Transfer by Originating User and Content Type This log and network activity search matches file transfers by their originating users and content types.
File Transfer by Source IP and Content Type This log and network activity search matches file transfers by their source IP addresses and content types.

(Back to top)

IBM QRadar Network Insights Content Extension 1.3.0

The IBM QRadar Network Insights Content Extension 1.3.0 adds support for QRadar versions 7.3.0 and later. Custom properties from previous versions of the QRadar Network Insights Content Extension are now type-length-value (TLV) fields. Changes to these TLV fields come from QRadar updates, not from updating this content extension.

(Back to top)

IBM QRadar Network Insights Content Extension 1.2.2

The IBM QRadar Network Insights Content Extension 1.2.2 provides performance improvements by setting the default categories for the existing custom flow properties. You can change the categories for the custom properties to suit your needs.

The following table shows the custom properties in IBM QRadar Network Insights Content Extension 1.2.2.

Table 18. Default categories for custom properties
Custom property Default categories
Content Subject
  • HTTP In Progress
  • Mail
File Hash
  • Chat
  • Data Transfer
  • HTTP In Progress
  • Mail
  • Web
File Name
  • Chat
  • Data Transfer
  • HTTP In Progress
  • Mail
  • Web
Recipient Users
  • Chat
  • HTTP In Progress
  • Mail
  • Remote Access
  • VoIP
Action
  • HTTP In Progress
  • Unknown
Content_Type
  • Chat
  • Data Transfer
  • HTTP In Progress
  • Mail
  • Web
DNS_Query_String
  • Data Transfer
  • Misc
DNS_Response_String
  • Data Transfer
  • Misc
File_Size
  • Chat
  • Data Transfer
  • HTTP In Progress
  • Mail
  • Web
HTTP Host
  • HTTP In Progress
  • Web
HTTP Referer
  • HTTP In Progress
  • Web
HTTP Response Code
  • HTTP In Progress
  • Web
HTTP Server
  • HTTP In Progress
  • Web
HTTP User-Agent
  • HTTP In Progress
  • Web
HTTP Version
  • HTTP In Progress
  • Web
IP_Dest_Reputation
  • HTTP In Progress
  • Misc
  • Web
Originating_User
  • Chat
  • HTTP In Progress
  • Mail
  • Remote Access
  • VoIP
Password
  • Data Transfer
  • Mail
Request_URL
  • HTTP In Progress
  • Web
SMTP HELO Mail
Search_Arguments
  • HTTP In Progress
  • Web
Suspect_Content
  • HTTP In Progress
  • Inner System
  • Mail
  • Misc
  • VoIP
  • Web
Web_Categories
  • HTTP In Progress
  • Web

(Back to top)

IBM QRadar Network Insights Content Extension 1.2.0

The following table shows the custom properties in IBM QRadar Network Insights Content Extension 1.2.0.

Table 19. Custom Properties in IBM QRadar Network Insights Content Extension 1.2.0
Name Regex
File_Size Updated the File_Size custom property to change the field type from alphanumeric to numeric. This update also optimizes the custom property for both Source Payloads and Destination Payloads.

The following table shows the rules in IBM QRadar Network Insights Content Extension 1.2.0.

Table 20. Rules in IBM QRadar Network Insights Content Extension 1.2.0
Type Name Description
Rule Potential Spam/Phishing Attempt Detected on Rejected Email Recipient Updated the rule action to select "Ensure the detected event is part of an offense". In 1.1.0, this check box was not selected and 1.2.0 corrects this to ensure that offenses are created.
Rule Access to Improperly Secured Service - Certificate Invalid Detects a SSL/TLS session that uses invalid certificates.
Rule Access to Improperly Secured Service - Weak Public Key Length Detects a SSL/TLS session that uses weak public key lengths.
Rule Access to Improperly Secured Service - Certificate Expired Detects a SSL/TLS session that uses expired certificates.
Rule Access to Improperly Secured Service - Self Signed Certificate Detects a SSL/TLS session that uses a self-signed certificate.

(Back to top)

IBM QRadar Network Insights Content Extension 1.1.0

The following table shows the custom properties in IBM QRadar Network Insights Content Extension 1.1.0.

Table 21. Custom Properties in IBM QRadar Network Insights Content Extension 1.2.0
Name Regex
Content Subject IBM\(SUBJECT\)=([^;]+);
File Hash IBM\(HTTP_FILES_CKSUM\)=0x([^;]+);
File Name IBM\(CONTENT_FILE_NAME\)=([^;]+);
Reject_Code Multiple Regex expressions for Microsoft Exchange, Linux® OS, Solaris OS, and Barracuda Spam and Virus Firewall.
Recipient_User Multiple Regex expressions for Microsoft Exchange, Linux OS, Solaris OS, and Barracuda Spam and Virus Firewall.
Recipient Users IBM\(DEST_USER_LIST\)=\(([^)]+)\);
Action IBM\(APP_ACTION\)=([^;]+);
Content_Type IBM\(HTTP_CONT_TYPE\)=([^;]+);
DNS_Query_String IBM\(DNS_QUERY_SDATA\)=\(([^)]+)\);
DNS_Response_String IBM\(DNS_RESP_SDATA\)=\(([^)]+)\);
File_Size IBM\(HTTP_FILES_SIZE\)=([^;]+);
HTTP Host IBM\(HTTP_HOST\)=([^;]+);
HTTP Referer IBM\(HTTP_REFER\)=([^;]+);
HTTP Response Code IBM\(HTTP_RETURN_CODE\)=([^;]+);
HTTP Server IBM\(HTTP_SRV\)=([^;]+);
HTTP User-Agent IBM\(HTTP_UA\)=([A-Za-z0-9\s\-_.,:;()/\\]+);
HTTP Version IBM\(HTTP_VRS\)=HTTP/([^;]+);
IP_Dest_Reputation IBM\(IP_DST_REP\)=([^;]+);
Originating_User IBM\(ORIG_USER\)=([^;]+);
Password IBM\(ACTPASSWD\)=([^;]+);
Request_URL IBM\(REQ_URL\)=([^;]+);
SMTP HELO IBM\(SMTPHELO\)=([^;]+);
Search_Arguments IBM\(HTTP_SEARCH_ARGS\)=([^;]+);
Suspect_Content IBM\(SUSPECT_CONT_LIST\)=\(([^)]+)\);
Web_Categories IBM\(HTTP_CONT_CATEGORY_LIST\)=\(([^)]+)\);

The following table shows the rules and building blocks in IBM QRadar Network Insights Content Extension 1.1.0.

Table 22. Building Blocks and Rules in IBM QRadar Network Insights Content Extension 1.1.0
Type Name Description
Building Block BB:HostDefinition: Mail Servers   
Building Block BB:HostReference: Mail Servers  
Building Block BB:PortDefinition: Mail Ports  
Building Block BB:CategoryDefinition: Rejected Email Recipient  
Rule Observed File Hash Associated with Malware Threat Detects when flow content includes a file hash that matches known bad file hashes included in a Threat Intelligence data feed. Indicates that someone transferred malware over the network.
Rule Observed File Hash Seen Across Multiple Hosts Detects when the same file hash that is associated with malware is seen being transferred to multiple destinations.
Rule Potential Spam/Phishing Attempt Detected on Rejected Email Recipient Detects when rejected email events that are sent to a nonexisting recipient address are seen in the system, which may indicate a spam or phishing attempt. Configure the BB:CategoryDefinition: Rejected Email Recipient building block to include QIDs relevant to your organization. It is populated with QIDs for monitoring: Microsoft Exchange; Linux OS (running sendmail); Solaris Operating System Sendmail Logs and Barracuda Spam &amp; Virus Firewall.
Rule Potential Spam/Phishing Subject Detected from Multiple Sending Servers Detects when multiple sending servers send the same email subject in a time frame, which may indicate spam or phishing.

The following table shows the saved searches in IBM QRadar Network Insights Content Extension 1.1.0.

Table 23. Saved Searches in IBM QRadar Network Insights Content Extension 1.1.0
Name Description
Malware Distribution by File and Hash  
Malware by Hash and Source Asset  
Malware Traffic Summary  
Phishing Subjects by Recipient User  

The following table shows the reports in IBM QRadar Network Insights Content Extension 1.1.0.

Table 24. Reports in IBM QRadar Network Insights Content Extension 1.1.0
Report Name Search Name and Dependencies
Top Phishing Subjects by Recipient User (QNI) - Weekly  
Top Malware by Asset (QNI) - Daily  
Malware Distribution by File (QNI) - Daily  

The following table shows the reference data in IBM QRadar Network Insights Content Extension 1.1.0.

Table 25. Reference Data in IBM QRadar Network Insights Content Extension 1.1.0
Type Name Description
Reference Set Malware Hashes SHA  
Reference Set Malware Hashes MD5  
Reference Set Phishing Subjects  
Reference Set Mail Servers  

(Back to top)