Security Intelligence Latest

Security Intelligence Latest Courses:

NEW

In this video, you learn how to use rule explorer in the QRadar Use Case Manager app, which offers flexible reports related to your rules. QRadar Use Case Manager also packages the Cyber Advisory Framework Mapping application to expose pre-defined mappings to system rules and to help you map your own custom rules to MITRE ATT&CK tactics and techniques.

NEW

Learn how IBM QRadar uses the JDBC protocol, and how to configure a JDBC Log Source for a Microsoft database with TLS encryption in the QRadar Log Source Manager application.

NEW

In this course, you learn about the high availability (HA) design for QRadar, including setup and synchronization of HA hosts, and how to work with host states in a failover situation.


NEW

Learn how IBM QRadar uses the JDBC protocol, and how to configure a JDBC Log Source in the QRadar Log Source Manager application.