QRadar Incident Forensics
Use the IBM® QRadar® Incident Forensics appliance (MTM 4412-F1A) to retrace the step-by-step actions of a potential attacker, and quickly and easily conduct an in-depth forensics investigation of suspected malicious network security incidents.
View hardware information and requirements for the QRadar Incident Forensics appliance in the following table:
Description | Value |
---|---|
CPU | 2 x E5-2650 v4 12C 2.2 GHz 30 MB 2400 MHz 105W |
Network management transceiver |
2 x 10 GbE Short Range SFP+ The transceivers might have one of the following part numbers:
Use these transceivers with the 2 x 10 GbE SFP+ ports, labeled as [3] in the appliance diagram. |
Ports |
3 x 10/100/1000 Base-T network ports 1 x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port 1 x 10/100/1000 Base-T integrated remote system management port 2 x 10 GbE SFP+ ports |
Memory | 128 GB, 8 x16 GB truDDR4 2400 MHz LP RDIMM |
Storage | 12 x 3.5 inches 6 TB SAS 7.2 K rpm, 60 TB total (RAID6) |
Power® supply | System x 900W High Efficiency Platinum AC Power Supply |
Dimensions | 31.5 inches deep x 17.5 inches wide x 3.4 inches high |

Label | Description |
---|---|
1 | Event data storage |
2 |
1 x RJ-45 10/100/1000 Mb Ethernet systems management (IMM) port |
3 | 10 GbE SFP+ management ports |
4 | Management ports (1 GbE TX) |
For more information about the front panel, see Front view (http://publib.boulder.ibm.com/infocenter/systemx/documentation/index.jsp?topic=/com.lenovo.sysx.8871.doc/c_front_view.html).
For more information about the back panel, see Rear view (http://publib.boulder.ibm.com/infocenter/systemx/documentation/index.jsp?topic=/com.lenovo.sysx.8871.doc/c_rear_view.html).
For more information, you can also see System x3650 M5 (https://lenovopress.com/lp0068-lenovo-system-x3650-m5-machine-type-8871.html).