QRadar from IBM is a popular SIEM for log analysis. It provides a powerful interface for analyzing large chunks of data, such as the logs provided by Cisco Umbrella for your organization's DNS traffic. The Cisco Cloud Security App for IBM QRadar provide insight from multiple security products (Investigate, Enforcement and CloudLock) and integrates them with QRadar. It also helps the user to automate security and contain threats faster and directly from QRadar.
When you set up Cisco Cloud Security app for QRadar, it integrates all the data from Cisco Cloud Security platform and allows you to view the data in graphical form in the QRadar console. From the application, analysts can:
- Investigate domains, ip addresses, email addresses
- Block and Unblock domains (enforcement)
- View the information of all the incidents of the network.
This article outlines the basic how-to of getting QRadar set up and running so that it is able to pull the logs from your S3 bucket and consume them.
Note: Support for QRadar must come from IBM, as Cisco is unable to directly support third-party hardware or software. For any issues connecting your Umbrella dashboard to your S3 bucket, we can provide support. Much of the information found below can also be found on the IBM website:
Cisco Umbrella requirements
This document assumes that your Amazon AWS S3 bucket has been configured in Umbrella (Settings > Log Management) and is showing green with recent logs having been uploaded.
For more information on how to configure this feature, read here: https://support.umbrella.com/hc/en-us/articles/231248448-Cisco-Umbrella-Log-Management-in-Amazon-S3
IBM Security QRadar SIEM requirements
The administrator will be required to have administrative rights to the QRadar appliance(s), the Amazon S3 configuration and Umbrella dashboard, these instructions assume that the QRadar administrator is familiar with creating LSX (Log source Extension) files.
Installing Cisco Cloud Security App for IBM QRadar
- Download and install the Cisco Cloud Security App for IBM QRadar found here: QRadar app for Cisco Cloud Security
- After the installation, deploy changes in QRadar.
Cisco Cloud Security App Configuration: Adding Log Source
To add a log source, click on the Admin tab on the QRadar navigation bar, scroll down to Log Sources, and click Add:
- Log Source Name:
- Cisco DNS Logs: cisco_umbrella_dns_logs
- Cisco Umbrella IP Logs: cisco_umbrella_ip_logs
- Cisco Umbrella Proxy Logs: cisco_umbrella_proxy_logs
- Log Source Type: Cisco Umbrella
- Protocol Configuration: Amazon AWS S3 REST API
- File Pattern: .*?\.csv\.gz
- Log Source Extension: CiscoUmbrella_ext **
- Please select any groups you would like this log source to be a member of: cisco_umbrella_logsource_group
** Note: If the Log Source Extension is not mapped to "CiscoUmbrella_ext", please choose the Log Source Name from the list:
Here's an example of what a Cisco Managed Bucket looks like:
Bucket name: cisco-managed-us-west-1
Your Directory Prefix is the key part of this. This is the customers folder,
followed by the appropriate log folder.
For example: xxxxxxx_cfa37bd906xxxxxx3aff94e205db7bxxxxxxx/dnslogs
Generating Authentication Token
The administrator will need to generate a service token to add to your Cisco Security App. As best practice, the Authorized Service Token should be recreated every 90 days:
1. Login to QRadar > Admin Tab > Authorized Services
2. Add Authorized Services
3. Enter the details and generate authentication token
4. After generating the token, click "Deploy Changes"
Configuring the Cisco Cloud Security App
1. From the "Admin" tab on the QRadar navigation bar, scroll down and open "Cisco Cloud Security App Settings"
2. Enter the Authentication Token generated in previous step
3. Add Base URLs in the indicated fields:
- Investigate: https://investigate.api.umbrella.com/
- Enforcement: https://s-platform.api.opendns.com/1.0/
- CloudLock: https://<Your Environments Address>.cloudlock.com/api/v2/ (i.e. https://api-demo.cloudlock.com/api/v2/. Please request your address by sending an email to email@example.com)
A popup will indicate that a the application settings have been successfully updated.
Indexing in QRadar
1.Navigate to Admin tab>Click on Index Management
2.Index the CEPs Packaged with the app
Recommended CEPs to be indexed are the following:
1. Log Source
2. DNS Category
3. Event Type
4. Domain URL
6. Granular User
8. Location Origin ID
9. Event Category
Now you are ready to use QRadar to start monitoring activities for Cisco Umbrella, Investigate, and CloudLock details. More instructions on how to navigate QRadar can be found here: Navigating the Cisco Cloud Security App