SIEM-W5
SIEM-W5
WEEK-05
NAME : DATE:
HT NO : BRANCH: CSE-CS-B
PROBLEM STATEMENT:
Output:
On the IBM® Security Threat Intelligence Insights landing page, complete the
following steps.
1. Scroll to the Top relevant threats section and choose the threat activity that
is not yet scanned.
2. Click Scan now.
Threat Intelligence Insights cross-references the user logs in all connected data
sources to determine whether events and flows are related to any indicators of
compromise (IoC) that are captured within the threat reports.
Important: Your Am I Affected scan might not start if it is scanning for a threat that
contains more than 300 indicators of compromise.
A tis_system key is automatically created when you first initiate a scan. Threat
Intelligence Insights uses this key to provide Am I Affected Scans. If the tis_system
key is deleted, scans cannot be completed. Data sources must be connected
These indicators provide the first concrete targets for your investigation. Different
threat intelligence feeds might use different indicators, depending on your region,
business sector, or security requirements. Threat Intelligence Insights uses the
following indicators:
URLs
IP addresses
MD5 and SHA-256 hashes
What to do next
Filtering rules by their properties
Filtering rules by their properties
Filter your rules to fine-tune the report results. Examine your MITRE ATT&CK
coverage by filtering your rules based on their mappings to tactics and
techniques. IBM QRadar rules can be modified in QRadar or QRadar Use
Case Manager.
Exporting rules
Export rule data from the current report in CSV format so that you can further
process the data or view it in Excel.