Stuc1000 163
Stuc1000 163
pg. 3
Role Definition
This intermediate level certification is intended for professionals who wish to validate their
comprehensive knowledge of the planning, installation, configuration, performance optimization,
tuning, troubleshooting, and initial system administration tasks for IBM Security QRadar SIEM V7.5. This
includes the apps installed with the product: Use Case Manager, QRadar Assistant, Log Source
Management, and Pulse. This does not include the SaaS offering of QRadar on Cloud (QRoC). Questions
for this exam were developed based upon IBM Security QRadar SIEM V7.5.0 Update Package 5.
Note: The usage of specific apps, apart from those bundled with the product, is out of scope, but the
concept of extending the capability of using apps is in scope. A knowledge of the basic functions of these
key IBM-supported apps should be understood: User Behavior Analytics, QRadar Deployment
Intelligence, Reference Data Management, Threat Intelligence, and QRadar Advisor with Watson,
Network Threat Analytics.
Prerequisite Knowledge
Knowledge and foundational skills one must possess before acquiring skills measured on the
certification test. These foundational skills are NOT measured on the test.
• TCP/IP networking
• Unix command line knowledge
• Basic security technologies (including PKI concepts)
• Regular Expression (RegEx)
• Enterprise logging
• Network monitoring using flows
• Working knowledge of cloud environments
pg. 4
Purpose of Exam Objectives
When a certification exam is being developed, a team of Subject Matter Experts work
together to define the job role the certified individual will fill. They define all the tasks
and knowledge that an individual would need to have in order to successfully perform
that role. This creates the foundation for the objectives and measurement criteria,
the foundation of the certification exam. The Certification item writers used these
objectives write questions that appear on the exam.
It is recommended that you review these objectives carefully. Do you know how to
complete the tasks in the objective? Do you know why that task needs to be done? Do
you know what will happen if you do it incorrectly? If you are not familiar with a task,
then work through the objective and perform that task in your own environment. Read
more information about the task. If there is an objective on a task, it is almost certain
that you WILL see questions about it on the actual exam.
After you have reviewed the objectives and completed your own research, don’t
forget to review the free sample questions for this exam on the IBM Certification
website. These sample question come complete with an answer key and will give you
a feel for the type and style of question on the actual exam.
After that, take the assessment exam. The questions on the assessment exam were
developed at the same time and by the same people who wrote the question on the
actual exam. The assessment exam is weighted to be equally difficult to the actual
test so your results should be predictive of your expected results on the actual test.
While the assessment exam will not tell which questions are answered incorrectly, it
will tell you how you did on a section-by-section basis so you will know where to
focus your further studies.
pg. 5
Section 1: Deployment Objectives and Use Cases
In this initial task, the QRadar deployment specialist, together with the client, analyze and
document the business drivers and use cases that the deployment should address. Based on
detailed use cases, the deployment specialist can develop the appropriate deployment
architecture.
This section accounts for approximately 10% of the exam.
1.1 Review business needs
SUBTASKS:
REFERENCES:
App Host https://www.ibm.com/docs/en/qsip/7.5?topic=deployment-app-host
REFERENCES:
App Hosts https://www.ibm.com/docs/en/qsip/7.5?topic=tasks-app-hosts
pg. 6
QRadar Assistant app https://www.ibm.com/docs/en/qradar-common?topic=apps-qradar-assistant-app
1.3.1 Define outputs and reporting to support to demonstrate the ongoing value of the
deployment
REFERENCES:
Cryptomining https://www.ibm.com/docs/en/qsip/7.5?topic=extensions-cryptomining
Endpoint https://www.ibm.com/docs/en/qradar-common?topic=extensions-endpoint
pg. 7
Section 2: Architecture and Sizing
Defining and documenting the deployment architecture creates the underlying basis for
successfully installing QRadar. The architecture defines a clear scope of the project based on
the use cases. Here, the deployment specialist designs the solution and required components,
such as the individual QRadar appliances (physical or virtual). The architecture also addresses
topics such as high availability and disaster recovery, data retention, and licensing.
This section accounts for approximately 16% of the exam.
• Performance Problems
• Inability to satisfy compliance requirements
• Limited security posture and limited threat detection
• Failure to capture critical security data
• Appliance Disk Types: Mixing HDD and SDD Processors and Data Nodes causes
performance issues
• High Availability: Useful for Event Processors and Console. HA Data Nodes are useful if
expensive compared to a good backup solution
• Disaster Recovery: Requires additional hardware. QRadar configurations replicated
between Console environments
• Other deployment patterns to satisfy specific custom requirements
• Hardware appliances
• Virtual Machine
• Cloud platforms
pg. 8
REFERENCES:
QRadar components https://www.ibm.com/docs/en/qsip/7.5?topic=overview-qradar-components
2.2.1 Identify inter-component communications and how that is affected by network security
zoning restrictions
2.2.2 Ensure intercomponent communications requirements can be satisfied by the
deployment architecture
• Bandwidth
• Latency
• Local collection
• Store and forward
2.2.5 Identify onward routing requirements for connecting event and flow data to 3rd party
systems. (Routing Rules)
pg. 9
REFERENCES:
IBM QRadar Installation Guide (Page 29) https://www.ibm.com/docs/en/SS42VS_7.5/pdf/b_siem_inst.pdf
• Data Node
• Event processor
• Flow processor
• QRadar Console
• QRadar Event Collector
• QRadar Event Processor
• QRadar QFlow Collector
• QRadar Flow Processor
• QRadar Data Node
• QRadar App Host
pg. 10
2.4.2 Define the tasks performed by QRadar All-in-One appliance
• Collects event and network flow data, and then normalizes the data into a data format
that QRadar can use
• Analyzes and stores the data, and identifies security threats to the company
• Provides access to the QRadar web application.
• High EPS
• Long retention
• Fast search
• Processing only EP
• Archive Only DN
• Small
• Medium
• Large
REFERENCES:
QRadar components https://www.ibm.com/docs/en/qsip/7.5?topic=overview-qradar-components
2.5.1 Document the system non-functional requirements for availability and ensure the
deployment can fulfill them
2.5.2 Document the system non-functional requirements for deployment using the IBM Data
Sync app and ensure the deployment can fulfill them
2.5.3 Ensure inter-component communications paths support the needs for HA and DR
pg. 11
REFERENCES:
Appliance requirements https://www.ibm.com/docs/en/qsip/7.5?topic=planning-appliance-requirements
2.6.1 Understand the consequences of, and recovery from, periods of high event or flow traffic.
2.6.2 Determine how License Sizing needs to deal with periods of high event or flow traffic.
REFERENCES:
QRadar: How to view the number of events https://www.ibm.com/support/pages/node/286583
exceeding the Event Processor System (EPS)
licensed limit
2.7.2 Understand pros and cons of capabilities of managed WinCollect vs standalone WinCollect
2.7.4 Understand the hardware and software requirements for the WinCollect host
pg. 12
• Profiles
• RAM
• Cores
• Avg EPS
2.7.5 Understand what type of log sources can be configured for WinCollect agents
REFERENCES:
WinCollect User Guide V7.3.1 https://www.ibm.com/docs/en/SS42VS_SHR/pdf/b_wincollect.pdf
pg. 13
Section 3: Installation and Configuration
Based on the architecture documentation and scope, the deployment specialist installs and
configures the QRadar components.
This section accounts for approximately 16% of the exam.
1. Connect ethernet cable to the XCC dedicated port on the back panel
2. Access the system BIOS settings by pressing F1 when the splash screen is displayed
• Appliance installation
• Software installation
1. Install RHEL OS
2. Configure partitions
3. Select the appliance type
4. Enter network information
pg. 14
REFERENCES:
QRadar installations https://www.ibm.com/docs/en/qsip/7.5?topic=installations-qradar
pg. 15
REFERENCES:
License management https://www.ibm.com/docs/en/qsip/7.5?topic=administration-license-management
• Self-signed certificates
• Internal CA signed certificates
• Public CA / Intermediate CA signed
• /opt/qradar/support/all_servers.sh -p /etc/pki/ca-trust/source/anchors/ -r
/etc/pki/ca-trust/source/anchors
• /opt/qradar/support/all_servers.sh -C update-ca-trust
pg. 16
3.3.5 Install a new SSL Certificate
1. The newly signed SSLCertificateFile from either an internal CA, or a public one.
2. The qradar.key private key to generate the Certificate Signing Request (CSR) file.
3. An intermediate certificate, if used by your certificate provider.
• SSLCertificateFile
• SSLIntermediateCertificateFile (if using an intermediate certificate)
• SSLCertificateKeyFile
REFERENCES:
Installing a new SSL certificate https://www.ibm.com/docs/en/qsip/7.5?topic=certificates-installing-new-ssl-certificate
• By default, QRadar backs up the previous day's configuration and event/flow data
• For configurations only, an on-demand backup can be run outside the scheduled backup
pg. 17
• Navigate to System Configuration -> Backup and Recovery
• Click On Demand Backup
• Enter Name and Description (optional) and click Run Backup.
• The progress can be monitored in the Backup Archives section
3.4.5 Restore
REFERENCES:
Restoring data https://www.ibm.com/docs/en/qsip/7.5?topic=data-restoring
pg. 18
• Vulnerability Assessment data helps determine threat levels and remove false positives,
by correlating event data, network activity, and behavioral changes
• Depending on the scanner, QRadar imports scan data or initiates a remote scan.
• Scan results provide system version, open ports, and vulnerabilities on scanned systems.
• Download DSM and protocols from Fix Central and apply using YUM
3.5.4 Determine the services responsible for the application framework functionality and check
their status
3.5.5 Create Service tokens for use with REST-API and default apps including the Assistant apps
REFERENCES:
QRadar installations https://www.ibm.com/docs/en/qsip/7.5?topic=installations-qradar
• LDAP
• SAML
• System authentication
• RADIUS authentication
• TACACS
pg. 19
3.6.3 Separate access to functions based on User Roles
• Admin
• Delegated Administration
• Offenses
• Log Activity
• Network Activity
• Assets
• Reports
• Risk Manager/Vulnerability Manager/Forensics
• IP Right Click Menu Extensions
• Platform Configuration
• QRadar Log Source Management
• Default Apps (Pulse, QRadar Assistant, QRadar Use Case Manager)
REFERENCES:
User authentication https://www.ibm.com/docs/en/qsip/7.5?topic=management-user-authentication
pg. 20
Section 4: Event and Flow Integration
After all QRadar components have been successfully deployed, it is time to add and configure
the organization’s log and flow sources. This includes automatically discovered and manually
configured log sources as well as any custom properties or content extensions to satisfy the
client’s use cases.
This section accounts for approximately 13% of the exam.
• AutoUpdate
• FixCentral
• yum
REFERENCES:
IBM QRadar Administration Guide https://www.ibm.com/docs/en/SS42VS_7.5/pdf/b_qradar_admin_guide.pdf
pg. 21
DSM Editor overview https://www.ibm.com/docs/en/qsip/7.4?topic=qradar-dsm-editor-overview
• NetFlow
• J-Flow
• sFlow
• QFlow
• Packeteer
• IPFIX
• Napatech Interface
• Network Interface
pg. 22
REFERENCES:
sFlow https://www.ibm.com/docs/en/qsip/7.5?topic=sources-sflow
• AQL
• Calculated
• Extracted
• CEF
• LEEF
• Name Value Pair
• JSON
• Regular Expression (RegEx)
• XML
• Generic list
4.4.1 Determine the necessary logs and flows to collect to support the required apps
• Content types
o Apps
o Rules
o Properties
o Ref data
o Dashboards
o etc.
• Assistant app
• Extension Management interface
• REST-API
• CLI
REFERENCES:
QRadar content extensions https://www.ibm.com/docs/en/qsip/7.5?topic=qradar-content-extensions
pg. 24
4.5.1 Identify supported and unsupported log source types
4.5.4 Identifying log source events that are not parsing and need to be custom
• stored
• unknown
4.5.5 Define DSM/event mappings log source types, event ID, event category to QID
REFERENCES:
DSM Editor overview https://www.ibm.com/docs/en/qsip/7.5?topic=qradar-dsm-editor-overview
pg. 25
Section 5: Environment and X-Force Integration
The deployment specialist configures the included QRadar apps to function properly within the
organization’s environment as well as setting up the IBM X-Force Threat Intelligence Feeds. The
deployment specialist also leads the client to properly populate and use the asset database (to
the extent that has been identified in the use cases and scope of the project).
This section accounts for approximately 6% of the exam.
5.1.1 Obtain an X-Force Exchange API token (including knowing when to do this)
• App installation
• Installing extensions using an admin level authorized service token
REFERENCES:
QRadar Assistant app https://www.ibm.com/docs/en/qradar-common?topic=apps-qradar-assistant-app
• Internet access:
• URLS
• IP
• Ports to support X-Force integration
pg. 26
• SDK
• TI app
• ATPF
• Ransomware
• Cryptomining
• Data Exfiltration
• Endpoint protection
REFERENCES:
QRadar: X-Force IP category shows blank for https://www.ibm.com/support/pages/node/6955775
rule condition
5.3.2 Configure the Use Case Explorer in QRadar Use Case Manager
pg. 27
REFERENCES:
Configuring QRadar Use Case Manager https://www.ibm.com/docs/en/qsip/7.5?topic=manager-configuring-qradar-use-case
REFERENCES:
Asset profiles https://www.ibm.com/docs/en/qsip/7.5?topic=management-asset-profiles
pg. 28
Section 6: System Performance and Troubleshooting
The deployment specialist performs initial system performance and troubleshooting,
demonstrating the use of appropriate tools to perform these tasks. This does not entail ongoing
support but is focused on the scope defined in the project objectives and architecture.
This section accounts for approximately 13% of the exam.
REFERENCES:
Reviewing your network hierarchy https://www.ibm.com/docs/en/qradar-common?topic=tuning-reviewing-your-network-hierarchy
REFERENCES:
Disk usage system notifications https://www.ibm.com/docs/en/qsip/7.5?topic=notifications-disk-usage-system
pg. 29
QRadar: Apps and memory resource https://www.ibm.com/support/pages/qradar-apps-and-memory-resource-limitation
limitation
• /var/log/audit
• /var/log/qradar.log
• /var/log/qradar.error
• /var/log/qradar-sql.log
6.3.3 Check audit and logs are free from indications of common deployment issues.
• Fail/Complete back up
• System Notifications
• Unknown events
• SIM Audit-2 Events
• General Information events
REFERENCES:
Audit logs https://www.ibm.com/docs/en/qsip/7.5?topic=files-audit-logs
pg. 30
Getting Help: What information should be https://www.ibm.com/support/pages/getting-help-what-information-should-be-submitted-qradar-service-
submitted with a QRadar service request? request
• qappmanager
• recon
• Interactive API for developer
REFERENCES:
QRadar: App troubleshooting before opening https://www.ibm.com/support/pages/node/716891
a support case
6.5 Identify event drops, events going to storage and unknown events
SUBTASKS:
pg. 31
6.5.2 Describe the limitations of the autodetect process
• Misidentification
• Failure to identify
• Not all log source types are supported for autodetection
6.5.4 Determine why some events are being routed directly to storage
REFERENCES:
Troubleshooting DSMs https://www.ibm.com/docs/en/qsip/7.5?topic=problems-troubleshooting-dsms
pg. 32
Section 7: Initial Offense Tuning
As defined in the scope, project objectives and architecture, the deployment specialist
performs initial tuning of offenses and guides the client on how to best approach this task going
forward.
This section accounts for approximately 10% of the exam.
7.1.2 Understand the Offense index and use that to minimize relevant Offenses
• /opt/qradar/support/findExpensiveCustomRules.sh
• /opt/qradar/support/findExpensiveCustomProperties.sh
pg. 33
7.2.4 Identify poorly written RegEx
7.2.6 Show when Global correlation is required and the drawbacks when in use
REFERENCES:
Rule performance visualization https://www.ibm.com/docs/en/qsip/7.5?topic=rules-rule-performance-visualization
• Flows required
• or VA Scanner data
7.3.2 Show how Server discovery updates the default Building Blocks from the contents of the
Asset Database
7.3.3 Demonstrate how to execute Server Discovery
REFERENCES:
Server discovery https://www.ibm.com/docs/en/qsip/7.5?topic=phase-server-discovery
pg. 34
7.4 Update building blocks
SUBTASKS:
7.4.4 Identify and describe the special "False Positive" building block
REFERENCES:
Tuning building blocks https://www.ibm.com/docs/en/qsip/7.5?topic=blocks-tuning-building
• Custom Rules
• Searches
• AQL queries
• Rule Responses
• REST-API
• Reference Data Management app
• GUI
REFERENCES:
Reference data in QRadar https://www.ibm.com/docs/en/qsip/7.5?topic=administration-reference-data-in-qradar
pg. 36
Section 8: Migration and Upgrades
In case the project objectives and scope contain QRadar migration and/or upgrades, the
deployment specialist has to investigate several migrations or upgrade related topics, such as
data and content migration, app framework use cases, and other upgrade prerequisites.
This section accounts for approximately 10% of the exam.
• Using sycnAriel.sh
• Manually using rsync or scp
8.1.2 Ensure that the destination appliance has enough space to move the data located under
/store/ariel
• df -h /store/ariel
• sh syncAriel.sh -i IP address
pg. 37
• Appliances can use cross-over cables if the appliances are located in the same data
center to expedite the transfer of events and flows information.
• Appliances on a slower network connection can expand on the rsync examples to limit
the transfer rate between appliances.
REFERENCES:
QRadar: Replacing a QRadar Managed Host https://www.ibm.com/support/pages/node/279273
(16xx, 17xx, 18xx appliance) in your
deployment
8.2.1 Understand how to verify interim fix and patch levels for all systems in a deployment
• Product documentation
• Release Notes
REFERENCES:
Release of QRadar 7.5.0 SFS (7.5.0-QRADAR- https://www.ibm.com/support/pages/node/6524688
QRSIEM-20211220195207)
• Config backup/restore
• Content Management Tool (CMT)
REFERENCES:
Searching for specific content items to export https://www.ibm.com/docs/en/SS42VS_7.5/pdf/b_qradar_admin_guide.pdf
8.4.2 Ensure there is enough disk space on the console's /store partition for the App Host’s app
data.
8.4.5 Understand how to update Root CA and intermediate files for apps
pg. 39
REFERENCES:
QRadar: Migrating an App Host from one https://www.ibm.com/support/pages/node/6414807
deployment to another
8.5.3 Restore the config backup from the old appliance to the new appliance when performing
Console Migration
8.5.4 Stop QRadar services on old appliance after restoring a config backup on a new console
8.5.5 Restart hostcontext service on all managed hosts after restoring a config backup on a new
console
pg. 40
8.6 Performing QRadar SIEM hardware migration
SUBTASKS:
REFERENCES:
Restoring a backup archive https://www.ibm.com/docs/en/qsip/7.5?topic=data-restoring-backup-archive
pg. 41
Section 9: Multi-Tenancy Considerations
The deployment specialist needs to be skilled to support an organization that needs to
implement a QRadar multi-tenant deployment.
This section accounts for approximately 6% of the exam.
REFERENCES:
Domains and log sources in multitenant https://www.ibm.com/docs/en/qsip/7.5?topic=management-domains-log-sources
environments
REFERENCES:
User roles in a multitenant environment https://www.ibm.com/docs/en/qsip/7.5?topic=mm-user-roles
pg. 43