Cisco Stealthwatch
The IBM QRadar DSM for Cisco Stealthwatch receives events from a Cisco Stealthwatch device.
The following table identifies the specifications for the Cisco Stealthwatch DSM:
| Specification | Value |
|---|---|
| Manufacturer | Cisco |
| DSM name | Cisco Stealthwatch |
| RPM file name | DSM-CiscoStealthwatch-QRadar_version-build_number.noarch.rpm |
| Supported versions | 6.8 |
| Protocol | Syslog |
| Event format | LEEF |
| Recorded event types | Anomaly, Data Hoarding, Exploitation, High Concern Index, High DDoS Source Index, High Target Index, Policy Violation, Recon, High DDoS Target Index, Data Exfiltration, C&C |
| Automatically discovered? | Yes |
| Includes identity? | No |
| Includes Custom properties? | No |
| More information | Cisco Stealthwatch website (http://www.cisco.com) |
To integrate Cisco Stealthwatch with QRadar, complete the following steps:
- If automatic updates are not configured, download the most recent version of the following RPMs
from the IBM® Support Website onto your QRadar
Console:
- DSMCommon RPM
- Cisco Stealthwatch DSM RPM
- Configure your Cisco Stealthwatch device to send syslog events to QRadar.
- If QRadar does not
automatically detect the log source, add a Cisco Stealthwatch log source on the QRadar
Console. The following table describes
the parameters that require specific values for Cisco Stealthwatch event collection:
Table 2. Cisco Stealthwatch Syslog log source parameters Parameter Value Log Source type Cisco Stealthwatch Protocol Configuration Syslog Log Source A unique identifier for the log source.