QRadar Searches
QRadar Searches
Jack Radigan
Principal Security Sales Specialist
Agenda
Quick Filter
– Full text search of event or flow payloads using the Lucene index engine
– Fastest search and easy to learn
Basic Search
– Uses event or flow properties
– Very easy to use, and to get into trouble (painfully slow search execution)
Advanced Search
– Uses Ariel Query Language (AQL)
– Most powerful, but takes time to learn and use effectively
The Quick Filter is one of the fastest methods to search event and flow information that contains specific
data by using a full-text index of payloads. Use Quick Filter in combination with other filers to accelerate
searches.
The minimum retention period is 1 day, and the maximum period is 2 years.
/.*.pdf/ OR /.*.exe/
– Regular expressions are defined within a pair of forward slashes
/.*\^.*\..*/ OR \*END\*
– Special characters must be escaped with a backslash
+ - && || ! ( ) { } [ ] ^ " ~ * ? : \ .
– Special characters
Basic Searches
One tip to rule them all – limit the scope of the search, be as specific as possible
Start with small time ranges, then expand the duration of the search gradually
– There is a near linear relationship to time frame and duration to complete a search
– Interim results may show opportunities of further refining the search criteria
Always try to have at least one [Indexed] property in your search criteria
– Searches without any indexed properties will take much longer to complete
Indexed Properties
Adding at least one filter for an indexed property will improve search speed in QRadar. When the search
is first started the search engine filters the data set based on the indexed property first.
Look for properties with the tag [Indexed] after its name. Searching on “Indexed“ will list all of them.
IBM Security / © 2022 IBM Corporation 12
Default Indexed Properties
Events Flows
If users are performing searches with many different saved searches that use properties that are not widely
used across all searches, a threshold lower than 30% should be used.
Indexes are updated once a minute and indexing too many properties can potentially lead to performance
issues in the event pipeline and could also impact disk storage.
Advanced Searches
Advanced searches support the use of a SQL-like language called Ariel Query Language (AQL).
SELECT
sourceip AS ‘Source IP’,
destinationip AS ‘Destination IP’,
UNIQUECOUNT(DATEFORMAT(starttime,’hh’)) AS ’Different Hours’,
COUNT(*) as ’Total Flows’
FROM flows
WHERE flowdirection = ‘L2R’
GROUP BY “Source IP”, “Destination IP”
HAVING ’Different Hours’ > 20
AND ’Total Flows’ < 25
LAST 24 Hours
Select
REFERENCETABLE('ip_threat_data','Category',destinationip) AS 'Category’,
REFERENCETABLE('ip_threat_data','Rating', destinationip) AS 'Threat Rating’,
UNIQUECOUNT(sourceip) as 'Source IP Count’,
UNIQUECOUNT(destinationip) as 'Destination IP Count'
FROM events
GROUP BY 'Category', 'Threat Rating'
LAST 1 Days
Resources
Follow us on: © Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for
informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of
direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives.
ibm.com/security IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines
Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
securityintelligence.com Statement of Good Security Practices: IT system security involves protecting systems and information through
prevention, detection and response to improper access from within and outside your enterprise. Improper access can
result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your
systems, including for use in attacks on others. No IT system or product should be considered completely secure and no
ibm.com/security/community single product, service or security measure can be completely effective in preventing improper use or access. IBM
systems, products and services are designed to be part of a lawful, comprehensive security approach, which will
necessarily involve additional operational procedures, and may require other systems, products or services to be most
xforce.ibmcloud.com effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise
immune from, the malicious or illegal conduct of any party.
@ibmsecurity
youtube.com/ibmsecurity