IBM Qradar User Behavior Analytics (UBA) App 4.1.2
Total Page:16
File Type:pdf, Size:1020Kb
IBM QRadar User Behavior Analytics (UBA) app 4.1.2 User Guide IBM Note Before you use this information and the product that it supports, read the information in “Notices” on page 267. Product information This document applies to IBM® QRadar® Security Intelligence Platform V7.3.3 and subsequent releases unless superseded by an updated version of this document. © Copyright International Business Machines Corporation 2016, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. QRadar User Behavior Analytics............................................................ 1 What's new in the User Behavior Analytics app..........................................................................................2 Earlier versions....................................................................................................................................... 8 Known issues............................................................................................................................................. 16 Process overview....................................................................................................................................... 17 Video demonstrations and tutorials..........................................................................................................18 UBA overview and user details..................................................................................................................18 Managing the UBA dashboard views.........................................................................................................22 Investigating users in QRadar Advisor with Watson.................................................................................23 Prerequisites for installing the User Behavior Analytics app................................................................... 24 Log source types relevant to the UBA app................................................................................................ 24 Chapter 2. Installing and uninstalling...................................................................25 Installing the User Behavior Analytics app............................................................................................... 25 Uninstalling the UBA app...........................................................................................................................26 Chapter 3. Upgrading the User Behavior Analytics app..........................................29 Chapter 4. Configuring the User Behavior Analytics app........................................31 Configuring UBA settings...........................................................................................................................31 Configuring the authorization token in QRadar settings..................................................................... 31 Configuring content package settings................................................................................................. 32 Configuring application settings.......................................................................................................... 32 Configure user import................................................................................................................................ 35 Importing users....................................................................................................................................36 Importing users with LDAP or Active Directory...................................................................................37 Importing users from a reference table.............................................................................................. 38 Importing users from a CSV file...........................................................................................................40 Tuning user import configurations.......................................................................................................41 Chapter 5. Administering..................................................................................... 45 Administrative functions............................................................................................................................45 Assigning user capabilities for the QRadar UBA app................................................................................ 45 Creating watchlists.................................................................................................................................... 46 Viewing the trusted users list.................................................................................................................... 48 Managing network monitoring tools..........................................................................................................48 Managing restricted programs...................................................................................................................49 Adding log sources to the trusted log source group................................................................................. 49 New accounts.............................................................................................................................................50 Dormant accounts......................................................................................................................................50 Chapter 6. Tuning................................................................................................ 53 Enabling indexes to improve performance............................................................................................... 53 Integrating new or existing QRadar content with the UBA app................................................................54 Integrate dynamic content in 4.1.0 or later........................................................................................ 54 Integrate content into UBA 3.4.0 and earlier...................................................................................... 56 Reference sets........................................................................................................................................... 56 Chapter 7. Multitenancy in UBA............................................................................59 iii QRadar configurations for setting up multitenancy in UBA......................................................................61 Installing and configuring UBA instances to support multitenancy.........................................................63 Installing and configuring Machine Learning in Multitenancy.................................................................. 65 UBA user roles for multitenancy............................................................................................................... 66 Rules and tuning for multitenancy in UBA................................................................................................ 68 Chapter 8. Rules and tuning for the UBA app........................................................ 71 UBA content pack summary......................................................................................................................72 Access and authentication........................................................................................................................ 72 UBA : Bruteforce Authentication Attempts......................................................................................... 72 UBA : Detected Activity from a Locked Machine................................................................................. 74 UBA : Executive only asset accessed by non-executive user from external network........................74 UBA : Executive only asset accessed by non-executive user from internal network.........................75 UBA : High Risk User Access to Critical Asset..................................................................................... 76 UBA : Large number of denied access events towards external domain............................................77 UBA : Multiple VPN Accounts Failed Login From Single IP................................................................. 78 UBA : Multiple VPN Accounts Logged In From Single IP.....................................................................78 UBA : Remote access hole in corporate firewall..................................................................................79 UBA : Repeat Unauthorized Access..................................................................................................... 79 UBA : Terminated User Activity............................................................................................................81 UBA : Unauthorized Access..................................................................................................................81 UBA : Unix/Linux System Accessed With Service or Machine Account.............................................. 82 UBA : User Access - Failed Access to Critical Assets.......................................................................... 83 UBA : First Access to Critical Assets....................................................................................................84 UBA : User Access from Multiple Hosts...............................................................................................86 UBA : User Access to Internal Server