IBM Security QRadar SIEM Administration



In this course, you will learn how to minimize the time between when suspicious activity occurs and when you detect it. There are a variety of administrative tools you can use to manage a QRadar SIEM deployment. This course covers system configuration, data source configuration, and remote networks, and services configuration.

QRadar SIEM administrators and professional services personnel managing QRadar SIEM deployments
  • Basic knowledge of the purpose and use of a security intelligence platform
  • Familiarity with the Linux command line interface and PuTTY
  • Familiarity with Custom Rules engine (CRE) rules
  • Familiarity with the Ariel database and its purpose in QRadar SIEM
  • Have attended IBM Security QRadar SIEM Foundations or be able to navigate and use the QRadar SIEM Console
Learning Objectives
  • Install and manage automatic updates to QRadar SIEM assets
  • Configure QRadar backup and restore policies
  • QRadar administration tools to aggregate, review, and interpret metrics
  • Network hierarchy objects to manage QRadar SIEM objects and groups
  • Manage QRadar hosts and licenses and deploy assets
  • Monitor the health of assets in a QRadar deployment
  • Configure system settings and asset profiles
  • Configure reasons that QRadar administrators use to close offenses
  • Create and manage reference sets
  • Configure user accounts including user profiles and authorizations
  • Manage QRadar log sources
  • Store event and flow data
  • Manage QRadar flow sources
  • Manage groups that monitor Internet networks and services
Course Outline:
  1. Auto Update
  2. Backup and Recovery
  3. Index and Aggregated Data Management
  4. Network Hierarchy
  5. System Management
  6. License Management
  7. Deployment Actions
  8. High Availability management
  9. System Health and Master Console
  10. System Settings and Asset Profiler Configuration
  11. Custom Offense Close Reasons
  12. Reference Set Management
  13. Authorized Services
  14. Users, User Roles, and Security Profiles
  15. Log Sources
  16. Log Source Extensions
  17. Log Source parsing Ordering
  18. Event and Flow Retention
  19. Flow Sources
  20. Flow Sources Aliases
  21. Remote Networks and Services