Domain privileges that are derived from security profiles
Users can see only data within the domain boundaries that are set up for the security profiles that are assigned to them. Security profiles include domains as one of the first criteria that is evaluated to restrict access to the system. When a domain is assigned to a security profile, it takes priority over other security permissions. After domain restrictions are evaluated, individual security profiles are assessed to determine network and log permissions for that particular profile.
For example, a user is given privileges to Domain_2 and access to network 10.0.0.0/8. That user can see only events, offenses, assets, and flows that come from Domain_2 and contain an address from the 10.0.0.0/8 network.
As a QRadar administrator, you can see all domains and you can assign domains to non-administrative users. Do not assign administrative privileges to users whom you want to limit to a particular domain.
Security profiles must be updated with an associated domain. Domain-level restrictions are not applied until the security profiles are updated, and the changes are deployed.
When you assign domains to a security profile, you can grant access to the following types of domains:
- User-defined domains
- You can create domains that are based on input sources by using the Domain Management tool. For more information, see Creating domains.
- Default domain
- Everything that is not assigned to a user-defined domain is automatically assigned to the
default domain. The default domain contains system-wide events. Note: Users who have access to the default domain can see system-wide events without restriction. Ensure that this access is acceptable before you assign default domain access to users. All administrators have access to the default domain.
Any log source that gets auto-discovered on a shared event collector (one that is not explicitly assigned to a domain), is auto-discovered on the default domain. These log sources require manual intervention. To identify these log sources, you must periodically run a search in the default domain that is grouped by log source.
- All domains
- Users who are assigned to a security profile that has access to All Domains can see all active domains within the system, the default domain, and any domains that were previously deleted across the entire system. They can also see all domains that are created in the future.
If you delete a domain, it cannot be assigned to a security profile. If the user has the All domains assignment, or if the domain was assigned to the user before it was deleted, the deleted domain is returned in historical search results for events, flows, assets, and offenses. You can't filter by deleted domains when you run a search.
Administrative users can see which domains are assigned to the security profiles on the Summary tab in the Domain Management window.
Rule modifications in domain-aware environments
Rules can be viewed, modified, or disabled by any user who has both the Maintain Custom Rules and View Custom Rules permissions, regardless of which domain that user belongs to.
Domain-aware searches
You can use domains as search criteria in custom searches. Your security profile controls which domains you can search against.
System-wide events and events that are not assigned to a user-defined domain are automatically assigned to the default domain. Administrators, or users who have a security profile that provides access to the default domain, can create a custom search to see all events that are not assigned to a user-defined domain.
The default domain administrator can share a saved search with other domain users. When the domain user runs that saved search, the results are limited to their domain.