Admin Tasks
Admin Tasks
oof:
Business
Sensitiv
Admin Interview Questions: e
Informa
1. What is Architecture of SIEM (Qradar/Splunk/Azure
tion Sentinel/Log Rhythm.)
2. What is latest version of tool you are working (, Splunk, CrowdStrike, Qualys ….etc)
3. What the EPS value of your customer.
4. How do you integrate Windows/Linux/AWS/Azure…
5. What is the Event retention and Data Retention periods in your client.
6. How many types of backups we have in a SIEM tool (Raw Data, Configuration data)
7. What is the purpose of indexing in SIEM.
8. How does the SIEM tool will differentiate Ip addresses whether it is local or outside of
organization. Qradar
9. What is reference set in a siem tool or purpose of Reference set in a rule logic.
10. What is difference among normalization (Parsing) , Aggregation (Coalescing), Correlation.
11. Port numbers of Syslog-514, Syslog-ng -1514 Win collet agent port- 8413
pg. 1
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
Admin tasks:
1. Understanding SIEM Architecture or Event Lifecycle
2. Log Source Integration/Trouble shooting.
3. Daily System Health Check.
4. Use case writing and fine-tuning use cases, integration with client.
5. Mapping events, writing custom parsers for unsupported Log sources.
6. Report creation (weekly 52, Monthly 12, Quarterly-4).
7. Dashboard creation, Monitoring.
8. Review L1 work and help in next level of investigation steps.
Admin Guide:
Purpose of SIEM:
A. MSSP:
Alert/offense/Incident/Alarm: If all the rule conditions matched against real time traffic then we
get alert/offense.
SLA:
SOP:
pg. 2
Cyberpr
oof:
Business
Sensitiv
SPOC: e
Informa
KPI: tion
MTD:
MTR:
Skills Required:
Networking:
Cloud: AWS/Azure/GCP
SOAR: Python/shell/bash
L1: 1 to 3 yrs
L2:3 to 6 yrs
L3/SME:6 to 10 or 12 yrs
Manager: 15 to 20 yrs
VP: 25 Yrs+
SVP: 30+
• Ensure that QMLA / System Availability Groups are allocated to all the relevant log sources.
pg. 3
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
• Log Sources that are in an error condition needs to be sent to the client and to be fixed.
• Participate in client meetings on a weekly basis – If there isn’t any – please speak with the
customer or TAM and schedule.
psql -U qradar -c "SELECT U.id, U.username, US.email, UR.name FROM users U LEFT JOIN
user_settings US ON U.id = US.id LEFT JOIN userrole UR ON U.role_id = UR.id ORDER BY UR.name,
U.username ASC;"
pg. 4
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Qradar Console:
pg. 5
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
pg. 6
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
pg. 7
Cyberpr
oof:
Business
Sensitiv
LogRhythm Console: e
Informa
tion
Linux OS Hierarchy:
pg. 8
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
In a typical Linux file system, various folders serve specific purposes and
organize different types of files and data. Here's an overview of the
purpose of each folder under the root hierarchy:
pg. 9
Cyberpr
oof:
Business
Sensitiv
10. /proc: A virtual file system
e that provides information about
running processes and system Informa
configuration as files and directories.
11. tion
/root: Home directory for the root user, the system
administrator. It is not the same as the root directory ( /).
12. /run: A temporary file system that stores runtime data that
should be available to processes during the system's runtime. Used
to replace the /var/run directory in modern systems.
13. /sbin: Contains essential system binaries and commands used
for system administration tasks. Typically requires superuser (root)
privileges to execute.
14. /srv: Used to store data for services provided by the system.
For example, web servers might store their website data in
subdirectories under /srv.
15. /sys: A virtual file system that provides information and
configuration options for the Linux kernel and devices.
16. /tmp: A temporary directory where applications and users can
store temporary files. Files here are generally cleared on reboot.
17. /usr: Contains user-related binaries, libraries, and data. It's
one of the largest directories in the file system and contains the
majority of user-level programs and tools.
18. /var: Contains variable data files, including logs, spool files,
and temporary data generated by various applications and services
https://www.tutorialspoint.com/linux_terminal_online.php
Logging levels, also known as log severity levels or log levels, are used to
categorize and prioritize the importance of log messages generated by
devices, applications, and systems. These levels help system
administrators and developers better understand and respond to events,
errors, and activities happening within a system. Different devices and
software use various log level naming conventions, but the basic
principles are often consistent. Here are the typical logging levels, ranked
from lowest to highest severity:
pg. 10
Cyberpr
oof:
Business
Sensitiv
successful operations, or system
e status updates. They are often
used for routine monitoring and auditing.
Informa
3. tion
Notice: This level indicates noteworthy events that might require
attention but are not critical. Notices typically inform administrators
about events that could impact system behavior or performance.
4. Warning (Warn): Warnings indicate potential issues or situations
that might lead to errors or unexpected behavior in the future.
Administrators should investigate and address warnings to prevent
further problems.
5. Error (Err): Errors signify specific issues or failures that have
occurred but may not critically impact the overall system. Errors
require attention and resolution to ensure proper system
functioning.
6. Critical (Crit): Critical logs indicate severe issues that need
immediate attention, as they may lead to system instability or data
loss. These events demand rapid intervention.
7. Alert: Alerts denote critical conditions that require immediate
action. These events typically require manual intervention or
prompt notification to system administrators.
8. Emergency (Emerg): Emergencies are the highest level of
severity. They indicate catastrophic failures or situations where the
system is unusable or severely compromised. Immediate attention
is crucial to address these events.
Configuration data backup: Postgres database (What ever changes we do on console) - Console
Raw data (Event/Flow) Backup: Ariel Data base (This is called log sources data) – Event Processor
Event/Log/Flow/Offense
3 copies of data
Indexing: Fetching important parameters from database tables and showing it in log activity is called
indexing.
Network Hierarchy: Using which option in Qradar local and remote IP’s are differentiated.
pg. 11
Cyberpr
oof:
Business
Sensitiv
Command to Take Manual backup of Data e
Informa
/opt/qradar/support/manual_data_backup.sh -b
tion20231220 -manual backup.
Windows:
Linux:
N/w Devices
Switches:
Servers:
Databases:
Cloud:
AV:
IDPS :
Proxy :
WAF :
1.Wincollect
2.MSRPC (Microsoft Remote Procedure Call)- Maximum we can collect 100 EPS
3.Syslog
pg. 12
Cyberpr
oof:
Business
Sensitiv
e
Informa
Qradar Physical Device series: tion
1. QRadar Console (C) Series:
These are the management interfaces of the QRadar
deployment.
Responsible for user interface, administration, and
configuration.
Example: QRadar 3105, 3124, 3148 (numbers are examples
and may not be accurate for current models).
2. Event Processor (EP) Series:
Responsible for processing incoming event data, parsing it,
and storing it in the database.
Handles event correlation and analysis.
Example: QRadar 1501, 1605, 1707 (numbers are examples
and may not be accurate for current models).
3. Flow Processor (FP) Series:
Handles flow data (network traffic) analysis and processing.
Important for network visibility and monitoring.
Example: QRadar 1724, 1732, 1823 (numbers are examples
and may not be accurate for current models).
4. Data Node (DN) Series:
These are storage appliances responsible for storing event
and flow data.
Enable QRadar to retain historical data for compliance and
investigation purposes.
Example: QRadar 2100, 2214, 2222 (numbers are examples
and may not be accurate for current models).
5. Flow Collector (FC) Series:
Responsible for collecting flow data from network devices and
sending it to Flow Processors.
Can be used to increase flow processing capacity in larger
deployments.
Example: QRadar 1724-FC, 1823-FC (numbers are examples
and may not be accurate for current models).
6. All-in-One (AIO) Series:
Combines multiple QRadar components (Event Processor, Flow
Processor, and Console) into a single appliance.
Suitable for smaller deployments or remote sites.
Example: QRadar 3105-AIO, 3124-AIO (numbers are examples
and may not be accurate for current models).
>>>>>>>>>>>>>>>>>>>>>>>>
Qradar Architecture:
Same way Learn Architectures of Splunk, Azure Sentinel, ArcSight, LogRhythm .
pg. 13
Cyberpr
oof:
Business
Sensitiv
Event collector (parsing/Normalization, Aggregation/Coalescing)
e
Informa
tion
Coalescing Parameters:
Source IP
Destination IP
Destination port
Username
Uecase(Rule)
1,0= Bits
1Bytes=8 Bits
1KB=1024 bytes
1MB=1024 KB
1GB=1024 MB
1TB=1024 GB
1PB=1024 TB
pg. 14
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
https://www.ibm.com/docs/en/SS42VS_7.4/pdf/b_qradar_aql.pdf
Parsing/Normalization:-DSM(EC)
Coalescing/Aggregation:
Source ip
Destination IP
Destination port
pg. 15
Cyberpr
oof:
Business
Sensitiv
Username e
Informa
QID tion
Event Processor:
Correlation (EP)
Console:
Config data:
Raw data:
Offense Retention: How many days we need to keep offenses data visible in tool.
Event Retention: How many days we need to keep logs online (in log activity)
Backup Retention Period: How many days we keep logs /Ariel data backup offline.
https://www.ibm.com/support/pages/qradar-core-services-and-impact-restarting-services
Console:
Magistrate component
pg. 16
Cyberpr
oof:
Business
Sensitiv
e
Informa
AQL: Ariel Query Language(Qradar)/ArcSight Query
tion Language(ArcSight)/ Advanced Query
Language(Log rhythm)
KQL: Kusteo QL
EQL:Exabeam
>>>>>>>>>>>>>>>>>>
Index Management:
Purpose of High Availability: Because Availability is third principle of CIA. To make sure our services
are available to customers/clients at any point of time without any obstacles.
How Data synchronization happens between primary and secondary in real time :
Port number:7788
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Cloud
pg. 17
Cyberpr
oof:
Business
Sensitiv
Types of Log sources e
Informa
Windows Servers tion
Linux Servers
Security Devices (WAF, IDS, IPS, Email Gateways, EDR, Proxy, DLP, VPN, ..)
AD, DC, DHCP, Email Servers, Web servers, Application Servers, Exchange server.
pg. 18
Cyberpr
oof:
Business
Sensitiv
Dedicated Client e
Informa
Inhouse/Captive SOC tion
3. traceroute dstip
4. Tcpdump
Command Syntax:
If we are not receiving logs from multiple devices to our event collector, then this service needs to be
restarted
Syslog restart:
Windows:
Linux:
pg. 19
Cyberpr
oof:
Business
Sensitiv
net start KiwiSyslogService e
Informa
tion
DSM Guide:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Default
dashboa Items
rd
The Application Overview dashboard includes the following default items:
Applicatio
n
Inbound Traffic by Country (Total Bytes)
Overview
Outbound Traffic by Country (Total Bytes)
pg. 20
Cyberpr
oof:
Business
Sensitiv
Default e
dashboa Items Informa
rd tion
Top Applications (Total Bytes)
Top Applications Inbound from Internet (Total Bytes)
Top Applications Outbound to the Internet (Total Bytes)
Top Services Denied through Firewalls (Event Count)
DSCP - Precedence (Total Bytes)
The Threat and Security Monitoring dashboard includes the following def
pg. 21
Cyberpr
oof:
Business
Sensitiv
Default e
dashboa Items Informa
rd tion
Internet Threat Information Center
Flow Bias (Total Bytes)
Top Category Types
Top Sources
Top Local Destinations
https://www.ibm.com/docs/en/qradar-on-cloud?topic=management-default-dashboards
How
pg. 22
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
1.Emergency. Emergency logs are given the numerical value "0". ...
2.Alert. ...
3. Critical. ...
Error. ...
Warning. ...
pg. 23
Cyberpr
oof:
Business
Sensitiv
Notice. ... e
Informa
Informational. ... tion
Debug
We will inform the device owner (firewall/Server/DB) to select the first 3 logging levels, because upto
Error level device function normally. Only from critical and above the device function stops.
Inactive offenses:
An offense becomes inactive after 5 days in a dormant state. In the inactive state, new events that
trigger the offense rule test do not contribute to the inactive offense. They are added to a new
offense.
Inactive offenses are removed after the offense retention period elapses.
If we don’t receive events from a logsource to SIEM tool for more than 720 Minutes (12 hours)
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Purged means after retention period is over the data will be removed from disk.
Reference set: Collection of same set of data (like ip’s, domains, File hashes, URls’, usernames,
hostanmes,,,,,etc)
Local System Rule: This rule applies to traffic which is specific to that managed host
(EC/Ep/FC/FP/Console)
Global System Rule: This Rules applicable to traffic on all managed hosts (EC/Ep/FC/FP/Console).
pg. 24
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
Building Block (set of conditions/logic): It can’t create alert/offense, we are building blocks in our
Rule conditions.
Rule creation:
System rules: These rules are already in the tool when we purchase the products.
Modified Rules: These also part of tool when we purchased the tool license after that we modified
those rules according to our client traffic/ requirement.
ADMIN Tab:
Extension Management:
Index management:
Tenant Management:
pg. 25
Cyberpr
oof:
Business
Sensitiv
Domain Management: e
Informa
Data Obfuscation Management: tion
IP address: On Firewall
URL: Proxy
Authentication:
Security Profile:
Domain Management: ust.com, sbimf.com two companies are sending logs to same console (IP), to
differentiate those 2 companies logs we use domain management.
MSSP Environment:
Tenant Management:
pg. 26
Cyberpr
oof:
Business
Sensitiv
>DSM
>UDSM
>DSM Editor.
https://www.ibm.com/docs/en/qsip/7.4?topic=upgrading-preparation-checklist-qradar-upgrades
Rule: is nothing but set of conditions written to identify the suspicious behavior in a
device/code/network.
https://www.ibm.com/community/qradar/home/software/
Parsed: DSM
Unknown:
Stored:
pg. 27
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
Parsed events:
QRadar collects, parses, and categorizes the event to the proper log source.
Unknown events:
The event is collected and parsed, but cannot be mapped or categorized to a specific log source. The
Event Name and the Low-Level Category are set as Unknown. Log sources that aren't automatically
discovered are typically identified as Unknown Event Log until a log source is manually created in the
system. When an event cannot be associated to a log source, the event is assigned to a generic log
source. You can identify these events by searching for events that are associated with the SIM
Generic log source or by using the Event is Unparsed filter.
Stored events:
The event cannot be understood or parsed by QRadar. When QRadar cannot parse an event, it writes
the event to disk and categorize the event as Stored in Ariel Database.
pg. 28
Cyberpr
oof:
Business
Sensitiv
hostname="dev.azure.com" incidentserialno=226666751
e url="/" msg="Cloud.IT:
Informa scertcname="dev.azure.com"
Microsoft.Azure.DevOps.Services" apprisk="medium"
tion
Jose Bravo: (DSM Editor videos)
For assigning high and low level categories we need to check the payload for below keyloads and
assign them manually.
pg. 29
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
Normalization/Parsing (converting unstructured data to structed data)- EC (DSM-Device support
module)
Upgrade Process:
1.Prechecks
2.Upgrade
3.Post checks
What is the latest version Siem/EDR/Email gateway/AV/DLP/Proxy you are using right now.
What is the latest version of that tool you have mentioned in your CV. Always get to know.
pg. 30
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
pg. 31
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
6Look for data backup, config backup whether they are working or not.
7. System and license management. Make sure all primary devices in HA are “Active” and
secondary devices should be in “standby”
Incase if secondary is active , primary device is in standby mode we should fix this issue then
we should go for upgrade.
Steps for Switching a primary HA host to active:
https://www.ibm.com/docs/en/qsip/7.4?topic=management-switching-primary-ha-host-
active
8. We need to take screenshot of all users before upgrade and compare the data after upgrade
whether both data is same or not.
pg. 32
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
9. We should take OnDemand backup for Config data before upgrade just in case if any failure
happens we should not lose configuration changes made on console.
pg. 33
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
12. Send an email to analyst team, client about upgrade time and date and mention in the email
that don’t login to console until we send confirmation email.
/var/log/qradar.error
pg. 34
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
13. Make sure all Managed hosts are in same version. Run this command to check version
details. /opt/qradar/support/all_servers.sh -C -k
Process to upgrade:
https://www.ibm.com/docs/en/qsip/7.4?topic=upgrading-qradar-siem
pg. 35
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
[root@localhost log]# df -h
pg. 36
Cyberpr
oof:
Business
Sensitiv
Red with black background: Broken link e
Informa
tion
https://www.ibm.com/support/pages/qradar-troubleshooting-disk-space-usage-problems
pg. 37
Cyberpr
oof:
Business
Sensitiv
What is the latest version currently Available: e
Informa
https://www.ibm.com/community/qradar/home/software/
tion
Services which runs in backend to run qradar SIEM properly
https://www.ibm.com/support/pages/qradar-core-services-and-impact-restarting-services
Index management:
Index management allows you to control database indexing, which can optimize search performance
for frequently used criteria. The system supports multiple indexed properties. Properties that can be
indexed in the system are listed below.
Network Hierarchy:
Using this option in qradar , local and remote IP’s are differentiated
pg. 38
Cyberpr
oof:
Business
Sensitiv
20/06/23 e
Informa
tion
Windows:
Snare Agent
Linux:
Procedure
Open the /etc/syslog.conf file and add the following facility information:
authpriv.*@<ip_address>
where:
pg. 39
Cyberpr
oof:
Business
Sensitiv
<ip_address> is the IP address of IBM® QRadar®.
e
Informa
tion
Save the file.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Log retention:
pg. 40
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
Magnitude:
Severity
Credebility
Releavance
https://www.ibm.com/docs/en/qradar-on-cloud?topic=management-offense-prioritization
Reference set:
Rule Wizard:
pg. 41
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
>>>>>>>>>>>>>>>>
19/06/23
Agenda:
Upgrade Process
pg. 42
Cyberpr
oof:
Business
Sensitiv
Non supported device then we need to write regex
e for the device to fetch the properties from the
log. Informa
tion
Log source health check , Report Creation
Parsed Logs:
When events aren’t parsed correctly, they appear on the Log Activity tab as one of the following
event types:
Unknown events
The event is collected and parsed, but cannot be mapped or categorized to a specific log source. Log
sources that aren't automatically discovered are typically identified as an unknown event log until a
log source is manually created in the system. When an event cannot be associated to a log source,
the event is assigned to a generic log source. You can identify these events by searching for events
that are associated with the SIM Generic log source or by using the Event is Unparsed filter.
Stored events
The event cannot be understood or parsed by QRadar. When QRadar cannot parse an event, it writes
the event to disk and categorizes the event as stored.
What ever events which are going to store category for these we need write regex (regular
Expressions)
https://rubular.com/
pg. 43
Cyberpr
oof:
Business
Sensitiv
systemctl status hostcontext e
Informa
systemctl status hostservices tion
systemctl status ecs-ec
The hostcontext is the primary service that runs on each managed host and controls core QRadar
processes. To verify the status of the hostcontext service, type:
What is hostcontext:
Hostcontext is responsible for listening for deployment requests from the QRadar Console, reporting
deployed status, downloading configurations replication processes (every 60 seconds), reporting host
status, and High Availability (HA) host status. Administrators should be aware that hostcontext is the
manager of other core QRadar services. A restart of hostcontext starts and stops the following
services:
Accumulator
ECS-EC (Protocols, license Throttling, Routing, DSM Parsing, Traffic analysis, Coalescing, Forwarding)
ECS-EP (Event Throttling, CRE, Magistrate, Event Storage, Offense Analyzer, Host Profiler, Event
Streaming)
Note: QRadar 7.3.1 added the service ecs-ec-ingress to QRadar to allow event collection outside
of service restarts.
Ha_manager
Offline Forwarder
VIS (scanners)
pg. 44
Cyberpr
oof:
Business
Sensitiv
Asset Profiler (Console) e
Informa
Tunnel Services (Console) tion
Ariel_proxy_server (Console)
Restarting hostcontext
Hostcontext does NOT restart ecs-ec-ingress. When required the ecs-ec-ingress service can be
restarted independent of hostcontext. Due to these features, administrators can restart hostcontext
without impacting event collection. Performing a Deploy Change restarts the hostcontext, which can
affect the services that are running on appliances. Restarting hostcontext might cause an
interruption in these services listed here:
Accumulator
Offline Forwarder
VIS (scanners)
Ariel_proxy_server (Console)
pg. 45
Cyberpr
oof:
Business
Sensitiv
e
Informa
tion
Second method is last 24 hours logs select the filter from log activity and then take the total count.
>We call.
Console
Pull mechanism (All windows devices follow this Pull mechanism- QRadar itself request logs from the
windows machine)
pg. 46