Part 3: Understanding QRadar Apps, Extensions, and Their Deployment
On the IBM Security App Exchange portal, IBM has published applications and extensions that can be used out of the box. These are like ready-made solutions for the products with which you want to integrate. There are also other apps offering predefined searches, ML integrations, AI integrations, defined rules, building blocks, and so on. This makes it very easy for analysts and CISOs to get a bird’s-eye view as well as deep-diving into the technicalities and mining data as required.
There are innumerable apps on offer, of which we will discuss only a few important ones. We will also examine the WinCollect agent and how to manage it. In the final chapter, we will see the fundamental issues regularly encountered on QRadar and how to resolve them. We also provide a helpful list of frequently asked questions in this chapter. We end this book with a small sneak-peek into the new QRadar suite of products.
This...