Security Intelligence Latest
Security Intelligence Latest Courses:
In this video, you learn how to use rule explorer in the QRadar Use Case Manager app, which offers flexible reports related to your rules. QRadar Use Case Manager also packages the Cyber Advisory Framework Mapping application to expose pre-defined mappings to system rules and to help you map your own custom rules to MITRE ATT&CK tactics and techniques.
In this course, you learn about the high availability (HA) design for QRadar, including setup and synchronization of HA hosts, and how to work with host states in a failover situation.
Learn how IBM QRadar uses the JDBC protocol, and how to configure a JDBC Log Source in the QRadar Log Source Manager application.