Question & Answer
Question
In this video, we explain several tuning approaches for QRadar User Behavior Analytics deployments, such as importing users, indexing, what log sources to use, utilizing asset information, configuring risk threshold and other app settings, and enabling and tuning rules,
Duration: 20 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy
[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSBQAC","label":"IBM Security QRadar SIEM"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" ","Line of Business":{"code":"LOB77","label":"Automation Platform"}}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
Modified date:
15 October 2021
UID
ibm16327427