Troubleshooting
Problem
I would like to know how to create a rule for QRadar to generate offenses when my internal log sources stop sending events, such as SIM-Audit.
Symptom
This rule is intended to fire offenses every 30 minutes when QRadar does not detect an event from an internal log source for 1 hour. Internal log sources, especially SIM Audit is critical to QRadar as many administrators use SIM Audit data for reporting on QRadar user activity and meeting compliance requirements in corporate environments.
[{"Type":"SW","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSBQAC","label":"IBM Security QRadar SIEM"},"ARM Category":[{"code":"a8m0z000000cwtEAAQ","label":"Log Activity"},{"code":"a8m0z000000cwt0AAA","label":"Log Source"}],"ARM Case Number":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"7.3.3;7.4.2"}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
Modified date:
02 June 2021
UID
swg21993556