Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

IBM QRadar Security Threat Monitoring Content Extension

date_range 02-Aug-21

The IBM QRadar Security Threat Monitoring Content Extension on the IBM Security App Exchange contains rules, building blocks, and custom properties that are intended for use with X-Force feed data.

The X-Force data includes a list of potentially malicious IP addresses and URLs with a corresponding threat score. You use the X-Force rules to automatically flag any security event or network activity data that involves the addresses, and to prioritize the incidents before you begin to investigate them.

The following list shows examples of the types of incidents that you can identify using the X-Force rules:

  • when the [source IP|destinationIP|anyIP] is part of any of the following [remote network locations]

  • when [this host property] is categorized by X-Force as [Anonymization Servers|Botnet C&C|DynamicIPs|Malware|ScanningIPs|Spam] with confidence value [equal to] [this amount]

  • when [this URL property] is categorized by X-Force as [Gambling|Auctions|Job Search|Alcohol|Social Networking|Dating]

JSA downloads approximately 30 MB of IP reputation data per day when you enable the X-Force Threat Intelligence feed for use with the IBM QRadar Security Threat Monitoring Content Extension.

Installing the IBM QRadar Security Threat Monitoring Content Extension Application

The IBM QRadar Security Threat Monitoring Content Extension application contains JSA content, such as rules, building blocks, and custom properties, that are designed specifically for use with X-Force data. The enhanced content can help you to identify and to remediate undesirable activity in your environment before it threatens the stability of your network.

Download the IBM QRadar Security Threat Monitoring Content Extension application from the IBM Security App Exchange.

To use X-Force data in JSA rules, offenses, and events, you must configure JSA to automatically load data from the X-Force servers to your JSA appliance.

To load X-Force data locally, enable the X-Force Threat Intelligence feed in the system settings. If new information is available when X-Force starts, the IP address reputation or URL database is updated. These updates are merged into their own databases and the content is replicated from the JSA console to all managed hosts in the deployment.

The X-Force rules are visible in the product even if the application is later uninstalled.

  1. On the navigation menu (), click Admin

  2. In the System Configuration section, click Extensions Management.

  3. Upload the application to the JSA console by following these steps:

    1. Click Add.

    2. Click Browse and browse to find the extension.

    3. Click Install immediately to install the extension without viewing the contents.

    4. Click Add.

  4. To view the contents of the extension, select it from the extensions list and click More Details.

  5. To install the extension, follow these steps:

    1. Select the extension from the list and click Install.

    2. If the extension does not include a digital signature, or it is signed but the signature is not associated with the JSA Security certificate authority (CA), you must confirm that you still want to install it. Click Install to proceed with the installation.

    3. Review the changes that the installation makes to the system.

    4. Select Overwrite or Keep existing data to specify how to handle existing content items.

    5. Click Install.

    6. Review the installation summary and click OK.

      The rules appear under the Threats group in the Rules List window. They must be enabled before they are used.

Enable the X-Force Threat Intelligence feed so that you can use the X-Force rules or add X-Force functions to AQL searches. For more information, see Enabling the X-Force Threat Intelligence Feed.

footer-navigation