Skip to main content

Command Palette

Search for a command to run...

Log Source Onboarding in QRadar: A Practical Checklist

The Step Most Teams Rush — And Why It Creates Silent Detection Gaps

Published
4 min read
Log Source Onboarding in QRadar: A Practical Checklist

Every time a new device, application, or cloud service enters your environment, it needs to talk to your SIEM. In IBM QRadar, that conversation happens through log sources and DSMs (Device Support Modules). Getting this right is foundational — events that reach QRadar but are never parsed, categorized, or mapped to QRadar IDs cannot be used in any correlation rule. They show up in Log Activity, give you a false sense of coverage, and contribute nothing to detection.

The full onboarding checklist

Step

What to do

Common mistake

1. Identify the log format

Syslog, LEEF, CEF, JDBC, API pull?

Assuming all Linux systems send identical syslog

2. Check DSM availability

Does QRadar have a native DSM for this device?

Skipping this and using Universal DSM blindly

3. Configure the source device

Enable logging, set correct facility/severity

Logging to wrong syslog facility (local0 vs local7)

4. Set the log source in QRadar

Correct protocol, listener port, timezone

Timezone mismatch shifts all event timestamps

5. Validate parsing

Check QRadar log activity — are events categorized?

Events showing as "unknown" — DSM not mapping fields

6. Map to QID

Ensure events have QRadar Event IDs (QIDs)

Unparsed events cannot be used in any rule

7. Test with a rule

Write a simple test rule and verify it fires

Assuming "I see events" means correlation works

Understanding log protocols in QRadar

QRadar supports multiple collection protocols and choosing the wrong one is a common source of onboarding failures. Syslog (UDP/TCP) is the most common for network devices and Linux systems. LEEF (Log Event Extended Format) is IBM's own format, used by QRadar-aware products. CEF (Common Event Format) is used by many security products including Palo Alto, CrowdStrike, and others. JDBC is used for pulling logs directly from databases. Each protocol has specific listener port requirements and parsing behaviour in QRadar.

Protocol

Typical source

QRadar listener port

Syslog UDP

Network devices, Linux, Unix

514

Syslog TCP

High-volume or reliable delivery needed

514 (configurable)

LEEF

IBM products, QRadar-native integrations

514 (via syslog)

CEF

Palo Alto, CrowdStrike, ArcSight agents

514 (via syslog)

JDBC

Databases, Oracle, MSSQL audit logs

Custom per data source

The Universal DSM trap

When QRadar does not have a native DSM for a device, teams fall back to the Universal DSM. It will accept the logs. Events will appear in Log Activity. Everything looks fine. But fields like username, source IP, and event category will not be parsed correctly. A correlation rule looking for "failed authentication from external IP" cannot fire if QRadar does not know which raw log field contains the username. The Universal DSM is a placeholder, not a solution.

The right fix: build a custom Log Source Extension (LSE) that maps your device's raw log fields to QRadar's normalized fields. This takes time, but it is the only way to make the events usable in correlation.

Timezone — the silent data quality killer

This one causes more confusion than almost anything else in QRadar onboarding. If the log source device is in UTC but QRadar is configured to expect IST, every event timestamp will be off by 5 hours 30 minutes. This makes time-based correlation rules unreliable and makes forensic timelines inaccurate. Always verify the timezone configuration of the source device and match it exactly in the QRadar log source settings.

Validating that onboarding actually worked

Seeing events in Log Activity is not enough. True validation means confirming that events are correctly categorized (not showing as "Unknown"), that key fields like username and source IP are populated in normalized form, and that a simple test rule built on those events actually fires. Only then is the log source truly onboarded. Add it to your SIEM documentation with the onboarding date, DSM version, and the name of the analyst who validated it.

Closing

Log source onboarding is unglamorous work, but it is the foundation of every detection that comes after it. A SIEM with 200 connected log sources but 40 percent of them unparsed is not a 200-source SIEM — it is a 120-source SIEM with a misleading dashboard. Take the time to do it properly, document what you did, and validate before you move on.

More from this blog

shesecures

15 posts

Welcome to SheSecures.in!

Dive into the world of cybersecurity with expert tips, latest threats, practical advice, and industry insights to safeguard your digital life. Stay informed, stay secure!