Configuring PPS with IBM QRadar

The PPS configuration requires defining the IBM QRadar as a client in PPS. PPS acts as a REST API server for IBM QRadar.

A high-level overview of the configuration steps needed to set up and run the integration is described below:

The Administrator configures the basic PPS configurations such as creating an authentication server, authentication realm, user roles, and role mapping rules.

Configure IBM QRadar as a client in PPS. PPS acts as a REST API Server for IBM QRadar. The REST API access for the admin user needs to be enabled by accessing the serial console or alternatively from the PPS admin UI (Authentication > Auth Server > Administrators > Users > click “admin”, enable Allow access to REST APIs).

Configure PPS to block/quarantine the endpoint based on the threat prevention policy.

Configure the Switches/WLC as RADIUS Client in PPS (Endpoint Policy > Network Access > Radius Clients > New Radius Client). Switch should be configured with PPS as a RADIUS server.

Configure RADIUS return attribute policies to define the action upon receiving the event.

Ensure that PPS has the endpoint IP Address for the enforcement to work correctly.

Admission Control Template

The admission control template provides the list of possible events that can be received from the network security device along with regular expression to parse the message. The template also provides possible actions that can be taken for an event. PPS is loaded with default templates for IBM QRadar.

To view the admission control template in PPS:

1.Select Endpoint Policy > Admission Control > Templates.

Admission Control Client

The admission control clients are the network security devices on which the syslog forwarding is enabled. The messages are received by the syslog server module running on PPS.

To add IBM QRadar as a client:

1.Select Endpoint Policy > Admission Control > Clients.

2.Click New Client.

3.Enter the name.

4.Enter the description.

5.Enter the IP address of the client.

6.Under Template, select IBM Qradar-SIEM-HTTP-JSON.

7.Click Save Changes.

Admission Control Policies

The admission control policies define the list of actions to be performed on PPS for the user sessions. The actions are based on the event and the severity information received from the network security device.

To view and add the new integration policy:

1.Select Endpoint Policy > Admission Control > Policies.

2.Click New Policy.

3.Enter the policy name.

4.Select IBM QRadar--SIEM-HTTP-JSON as a template.

5.Under Rule on Receiving, select the event type (block-endpoint, quarantine-endpoint, alert, any) and the severity level. The event types and the severity level are based on the selected template.

The actions on sessions supported are:

Block Endpoint: Blocks the host MAC Address on the PPS permanently. If admin choose to clear this, it can be cleared either by using IBM QRadar application or by using the PPS Admin UI.

Quarantine Endpoint (Change user roles): Changes the roles assigned to the user on PPS so that restriction/privileges for the user can be changed.

Offense – Generated based on the Severity level and magnitude of the alert. Specify the magnitude and severity of the offense (High, Information, Low, Medium, Any). Enter the Count Value (1-256)

6.Under then perform this action, select the desired action.

Block the endpoint from authenticating the network.

Put the endpoint into a quarantine network by assigning this role — choose the role to put endpoint in quarantine role. Specify whether to apply the role assignment permanently or only for the session.

Terminate user session—Terminates the user session on the PPS.

Ignore (log the event) —Received syslog event details are logged on the PPS and no specific action is taken.

7.Under Roles, specify:

Policy applies to ALL roles—To apply the policy to all users.

Policy applies to SELECTED roles—To apply this policy only to users who are mapped to roles in the Selected roles list. You must add roles to this list from the Available roles list.

Policy applies to all roles OTHER THAN those selected below—To apply this policy to all users except for those who map to the roles in the Selected roles list. You must add roles to this list from the Available roles list.

8.Click Save Changes.

Once the policy is created. You can see the summary page as shown below. The following page shows the different policies created for different events with different user roles.