Showing executed and blocked malware and file hashes
You can configure QRadar® Advisor with Watson™ to show executed and blocked malware and file hashes on the knowledge graph.
Before you begin
You must have QRadar administrator privileges.
About this task
Configuring QRadar Advisor with Watson to show
executed and blocked malware and file hashes on the knowledge graph requires you to add a value to
one of the Watson Advisor reference sets that correspond to the custom event property value for each
device type on your system that supports malware execution status. Two reference sets are installed
on your QRadar system:
- Watson Advisor: File Action Allowed
- Watson Advisor: File Action Blocked
Note: Most of the common values are prepopulated but you should add new ones if these types do
not match your logs.
You must complete the following steps:
- Configure or modify custom event properties in QRadar.
- Add custom event property values to Watson Advisor reference sets.
- Configure QRadar Advisor with Watson Property Mapping.
Procedure
Results
Example
Note: The graph shows an example of executed malware on V2.4.1 of the app.
