To check events that arrive in QRadar by way of Feed Service, you must configure QRadar to forward the events to Feed Service.
To forward events from QRadar to Feed Service:
"KL_Threat_Feed_Service_v2"
).Payload
as the events format and TCP
as the protocol.The Payload
format can contain less information than JSON
format. For example, if event source names are used, QRadar may remove them from the event. You can specify the JSON
format instead, but make sure to configure events in this format properly. For instructions on configuring events in JSON
format to forward to Kaspersky CyberTrace, see section "Recommendations on configuring events in JSON format" below.
Adding a forwarding destination
KL_Threat_Feed_Service_v2_Rule
).Online
as the mode.Events
as the data source.Choose the log sources together with KL_Verification_Tool
, and use the Equals any of
operator in the filter.
Clear the Match all incoming events check box or leave it cleared so that the detection events received from Feed Service will not be sent back to Feed Service.
KL_Threat_Feed_Service_v2
).
Adding a routing rule
Recommendations on configuring events in JSON format
A number of QRadar versions (for example, 7.3.2 Patch 6 and 7.4.0) may drop some forwarded events in JSON
format, which may lead to incorrect results.
To prevent this, we recommend that you exclude some fields from the JSON-formatted event (for an exact list of such fields contact the IBM's QRadar Support team or try to determine this list manually). You must specify additional normalizing rules in Kaspersky CyberTrace Web (see below).
Therefore, use the JSON
format instead of the Payload
format if the event in the Payload
format does not contain the necessary fields. In this case, make sure that the following conditions are met:
To create a new profile that contain the fields to be forwarded within an event, click Create New Profile in the list to the right of the Profile field.
Configuring events in JSON format
usrName
field in terms of LEEF format) in JSON format, the regular expression may look like this: usrName\=(.*?)(?:$|\s|\")
. We recommend that you specify similar regular expressions for each chosen field and check if these regular expressions are correctly applied to real detection events that are sent to QRadar, by using the RegExps Editor section of the Setting > Matching tab of Kaspersky CyberTrace Web.\\t
in the Regexp to replace field and \t
in the Replace with field\\n
in the Regexp to replace field and an empty value in the Replace with fieldConfiguring additional normalizing rules