Security Intelligence Latest

Security Intelligence Latest Courses:


Using a particular use case, this video demonstrates how to take advantage of reference data collections in QRadar SIEM.


In this video series, you learn how QRadar can map your network flows to applications using different techniques. 

In part 1, we configure QRadar to assign an application name to flow records when a specific source IP address and port combination is detected. In parts 2 and 3, we configure QRadar to assign an application name to flow records based on various information found in the payload of the flow data.


Employees in every organization are granted different levels of clearance to access information and classified or restricted areas based on their job profiles, such as different network locations, applications, or data. This process includes users who manage and have access to IT security products that protect the organization's critical resources, such as QRadar. 

Every organization implements its own security policies to provide users with different permissions according to their roles. In this context, QRadar provides the ability to segment users' access based on a combination of factors, which can yield granular results. The information contained in QRadar includes network hierarchy and topology, assets, log and flow sources, event and flow data, offenses, scanning activity, management activity, and more. 

This course introduces QRadar user management foundations, where you learn about user accounts and the different methods to authenticate, and how to implement granular user controls, such as user roles, security profiles, domains, and tenants.