- play_arrow QRadar Use Case Manager
- play_arrow What's New in QRadar Use Case Manager
- play_arrow Known Issues
- play_arrow Video Demonstrations
- play_arrow Supported Environments for QRadar Use Case Manager
- play_arrow Installation and Configuration Checklist
- Installation and Configuration Checklist
- Installing QRadar Use Case Manager
- Creating an Authorized Service Token
- Configuring the Use Case Explorer in QRadar Use Case Manager
- Assigning User Permissions for QRadar Use Case Manager
- Customizing User Preferences
- Predefined Report Content Templates
- Customizing Report Content Templates
- Custom Rule Attributes
- Creating Custom Rule Attributes
- Exporting and Importing Custom Rule Attributes
- Upgrading QRadar Use Case Manager
- Uninstalling QRadar Use Case Manager
- play_arrow MITRE ATT&CK Mapping and Visualization
- MITRE ATT&CK Mapping and Visualization
- Editing MITRE Mappings in a Rule or Building Block
- Editing MITRE Mappings in Multiple Rules or Building Blocks
- Sharing MITRE-mapping Files
- Visualizing MITRE Tactic and Technique Coverage in Your Environment
- Visualizing MITRE Coverage Summary and Trends
- Visualizing MITRE Tactics and Techniques that are Detected in a Specific Timeframe
- MITRE Heat Map Calculations
- play_arrow Investigating QRadar Rules and Building Blocks
- Investigating QRadar Rules and Building Blocks
- Filtering Rules and Building Blocks by their Properties
- Identifying Gaps in QRadar Rule Coverage from Content Extensions
- Investigating User Behavior Analytics Rules
- Duplicating Rules for Further Customization
- Exporting Rules
- Deleting Rules
- Rule Report Presentation
- Visualizing Rules and Building Blocks
- Visualizing Log Source Type Coverage per Rule
- play_arrow Accessing Report Data by using QRadar Use Case Manager APIs
Tuning the Active Rules That Generate CRE Events
The Custom Rules Engine (CRE) event report shows which active rules generate CRE events. In many cases, a rule response is configured to generate CRE events, along with the offense or without it. The report shows which CRE events were generated most by which rule. In general, if the event is generated many times per day, the rule is firing too often. Consider tuning the rule. For example, 1 or 2 Source IPs in the report are related to all the CRE events generated by the rule. The Source IP might need to be added to one of Host Definition BBs that are referenced by the rule. Select the rule and click Investigate to see which Host Definition to update.
You can also use this report to test the rules. In this case, the rule response does not include the offense creation, only the CRE event dispatch. If the report shows that the rule is firing too often, consider tuning it. If you're using CRE events to test the rule, and the number of generated CRE events is only a few per week, change the rule response to generate an offense.
Unapplied filter tags appear in the filters row with a lighter colored background. After you apply the filters, the tags change to a darker colored background.