FortiSIEM-6.1.2-External Systems Configuration Guide
FortiSIEM-6.1.2-External Systems Configuration Guide
FortiSIEM-6.1.2-External Systems Configuration Guide
Version 6.1.2
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
05/21/2021
FortiSIEM 6.1.2 External Systems Configuration Guide
Change Log
2018-07-24 Revision 2 with a new section under Windows Server Configuration - Configuring Log
Monitoring for Non-Administrative User.
2018-11-28 Revision 6 with updated section: Fortinet FortiGate Firewall > Configuring SSH on FortiSIEM
to communicate with FortiGate
2019-03-28 Revision 9: updates the guide to reflect the new menu hierarchy in the FortiSIEM tool.
2019-04-24 Revision 10: added Carbon Black Security Platform under End Point Security Software.
2019-07-24 Revision 11: updated integration instructions for Microsoft Office 365 Audit.
2019-10-22 Revision 12: added Clavister Firewall and FortiADC devices. Added Active Directory User
Discovery section to Microsoft Active Directory device. Corrections to SQL Server DDL Event
Creation Script and SQL Server Database Level Event Creation Script.
2019-11-22 Revision 13: added Zeek (Bro) installation instructions for Security Onion, Cyberoam
FortiADC, Epic SecuritySIEM, FortiEDR, FortiNAC, FortiDeceptor, Microsoft Network Policy
Server, TrendMicro Deep Discovery. Changed the name of Cisco FireAMP to Cisco AMP
Cloud V0. Changed the name of Cisco AMP to Cisco AMP Cloud V1.
2020-04-15 Revision 15: added Alert Logic Iris API, AWS Kinesis, AWS Security Hub, Cisco Amp, GitLab
Cli, Azure Event Hub, Azure Compute, McAfee ePolicy Orchestrator, LastLine, Imperva
Securesphere Web App Firewall, Imperva Securesphere DB Security Gateway, Imperva
Securesphere DB Monitoring Gateway, Green League WVSS, FortiInsight, Damballa
Failsafe, AWS EC2, Cisco Fireamp, Novell Netware, Green League RSAS, Checkpoint
SmartCenter, FortiTester, Cisco Viptela, MobileIron, Duo, Indegy Industrial Cybersecurity
Suite, Netwrix, Darktrace DCIP, Hirschmann SCADA Firewalls and Switches.
2020-07-22 Revision 16: Edits to Cisco AMP Cloud V0 and Cisco AMP Cloud V1.
2020-10-09 Revision 17: Added Alcide io KAudit, Stormshield Network Security and Tigera Calico
2021-01-05 Revision 19: Added Mapping Active Directory User Attributes to FortiSIEM User Attributes.
2021-18-03 Revision 22: Added Claroty Continuous Threat Detection, Corero Smartwall Threat Defense,
Dragos Platform, Malwarebytes Breach Remediation, Oracle Cloud Access Security Broker
(CASB), Proofpoint.
2021-16-04 Revision 25: Updated Microsoft Office 365 Audit "Create the Office 365 API Credential"
steps.
2021-23-04 Revision 26: Added Salesforce Configuration for 6.2.0, 6.1.x, 5.4.0, 5.3.x, 5.2.x releases.
2021-18-05 Revision 27: Updated Apache Web Server, AWS EC2 CloudWatch API, and Fortigate
Firewall for 6.1.x releases.
Added FortiAnalyzer for 6.1.x releases.
2021-21-05 Revision 28: Updated Windows Agent links for Microsoft sections.
Change Log 3
Overview 12
FortiSIEM External Ports 13
Supervisor Communication 13
Worker Communication 15
Collector Communication 17
Supported Devices and Applications by Vendor 19
Applications 51
Application Server 52
Apache Tomcat 53
IBM WebSphere 57
Microsoft ASP.NET 64
Oracle GlassFish Server 65
Oracle WebLogic 69
Redhat JBOSS 73
Authentication Server 77
Cisco Access Control Server (ACS) 78
Cisco Identity Solution Engine (ISE) 84
Cisco Duo 85
CyberArk Password Vault 89
Fortinet FortiAuthenticator 91
Juniper Networks Steel-Belted RADIUS 92
Microsoft Internet Authentication Server (IAS) 94
Microsoft Network Policy Server (RAS VPN) 95
OneIdentity Safeguard (previously Balabit Privileged Session Management) 96
Vasco DigiPass 97
Database Server 99
IBM DB2 Server 100
Microsoft SQL Server 105
Microsoft SQL Server Scripts 114
MySQL Server 117
Oracle Database Server 122
DHCP and DNS Server 129
Infoblox DNS/DHCP 130
ISC BIND DNS 132
Linux DHCP 134
Microsoft DHCP 136
Microsoft DNS 138
Directory Server 140
Microsoft Active Directory 141
Document Management Server 146
Microsoft SharePoint 147
Healthcare IT 148
Epic EMR/EHR System 149
This document describes how to configure third party devices for monitoring by FortiSIEM.
l Ports Used by FortiSIEM for Discovery and Monitoring
l Supported Devices and Applications by Vendor
l Windows Agent Installation Guide
l Applications
l Blade Servers
l Cloud Applications
l Console Access Devices
l End Point Security Software
l Environmental Sensors
l Firewalls
l Load Balancers and Application Firewalls
l Log Aggregators
l Network Compliance Management Applications
l Network Intrusion Protection Systems (IPS)
l Routers and Switches
l Security Gateways
l Servers
l Storage
l Virtualization
l VPN Gateways
l Vulnerability Scanners
l WAN Accelerators
l Wireless LANs
l Using Virtual IPs to Access Devices in Clustered Environments
l Syslog over TLS
This chapter describes the external communication ports needed for various FortiSIEM nodes to work. The ports are
broken down for:
l Supervisor Communication
l Worker Communication
l Collector Communication
In release 6.1, some clear communication has been replaced by SSL communication. If an entry in the tables below has
5.3, then that entry is valid for releases 5.3 and below. If an entry in the tables below has 6.1, then that entry is valid for
releases 6.1 and above.
Supervisor Communication
Collector, Worker, Supervisor Inbound TCP/443 REST API access via HTTPS
Windows Agent, Linux
Agent
External Device Supervisor Inbound TCP/21 FTP (for receiving Bluecoat logs
via ftp)
Supervisor External Device Outbound TCP/110 POP3 for email monitoring (STM)
Supervisor External Device Outbound TCP/143 IMAP for email monitoring (STM)
Supervisor NFS Server Outbound UDP/111, TCP/111 NFS Portmapper for writing
events in NFS based deployments
Supervisor Spark Master Outbound HTTPS/7077 Querying events for HDFS based
Node (configurable) deployments
Supervisor HDFS Name Outbound HTTPS/9000 Archiving events for HDFS based
Node (configurable) deployments
Worker Communication
External Device Worker Inbound TCP/21 FTP (for receiving Bluecoat logs via ftp)
Worker External Windows Outbound TCP/135 WMI based monitoring and log
Devices collection
Worker External Devices Outbound TCP/1433 JDBC based monitoring and data
collection
Worker External Devices Outbound UDP/8686 JMX based monitoring and data
collection
Worker External Device Outbound TCP/110 POP3 for email monitoring (STM)
Worker External Device Outbound TCP/143 IMAP for email monitoring (STM)
Worker External Device Outbound TCP/993 IMAP/SSL for email monitoring (STM)
Worker External Device Outbound TCP/995 POP/SSL for email monitoring (STM)
Worker NFS Server Outbound UDP/111, NFS Portmapper for writing events in
TCP/111 NFS based deployments
Worker HDFS Name Node Outbound HTTPS/9000 Archiving events for HDFS based
(configurable) deployments
Collector Communication
External Device Worker Inbound TCP/21 FTP (for receiving Bluecoat logs
via ftp)
Collector External Windows Outbound TCP/135 WMI based monitoring and log
Devices collection
Collector External Devices Outbound TCP/1433 JDBC based monitoring and data
collection
Collector External Devices Outbound UDP/8686 JMX based monitoring and data
collection
Collector External Device Outbound TCP/143 IMAP for email monitoring (STM)
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
AirTight SpectraGuard Discovered Not natively supported - Custom CEF format: Over 125 Currently not AirTight
Networks via LOG only monitoring needed event types parsed natively Networks
covering various Wireless supported SpectraGuard
suspicious activities
Alcatel TiMOS Routers SNMP: OS, SNMP: CPU, memory, interface Not natively supported - Currently not Alcatel TiMOS
and Switches Hardware utilization, hardware status Custom parsing needed natively and AOS Switch
supported Configuration
Alcatel AOS Routers and SNMP: OS, SNMP: CPU, memory, interface Not natively supported - Currently not Alcatel TiMOS
Switches Hardware utilization, hardware status Custom parsing needed natively and AOS Switch
supported Configuration
Alert Logic Intrusion Host name Not supported Not Alert Logic IPS
Detection and and Device supported
Prevention type
Systems (IPS)
Alert Logic Iris API Host name Not supported Not Alert Logic IRIS
and Device supported API
type
Alcide.io KAudit Not natively Not natively supported Kubernetes Audit logs Not natively Alcide io KAudit
supported supported
Amazon AWS Servers AWS API: CloudWatch API: System Metrics: CloudTrail API: Over 325 CloudTrail AWS
Server CPU, Disk I/O, Network event types parsed API: various CloudWatch
Name, covering various AWS administrativ AWS CloudTrail
Access IP, activities e changes on
Instance ID, AWS
Image Type, systems and
Availability users
Zone
Amazon AWS Elastic CloudWatch CloudWatch API: Read/Write Bytes, AWS EBS and
Block Storage API: Volume Ops, Disk Queue RDS
(EBS) ID, Status,
Attach Time
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Hub
Apache Tomcat JMX: JMX: CPU, memory, servlet, Currently not natively Currently not Apache Tomcat
Application Version session, database, threadpool, supported - Custom natively
Server request processor metrics parsing needed supported
Apache Apache Web SNMP: SNMP: process level cpu, memory Syslog: W3C formatted Currently not Apache Web
server Process HTTPS via the mod-status module: access logs - per HTTP natively Server
name Apache level metrics (S) connection: Sent supported
Bytes, Received Bytes,
Connection Duration
APC NetBotz SNMP: Host SNMP: Temperature, Relative SNMP Trap: Over 125 Currently not APC Netbotz
Environmental name, Humidity, Airflow, Dew point, SNMP Trap event types natively
Monitor Hardware Current, Door switch sensor etc. parsed covering various supported
model, environmental exception
Network conditions
interfaces
APC UPS SNMP: Host SNMP: UPS metrics SNMP Trap: Over 49 Currently not APC UPS
name, SNMP Trap event types natively
Hardware parsed covering various supported
model, environmental exception
Network conditions
interfaces
Arista Routers and SNMP: OS, SNMP: CPU, Memory, Interface Syslog and NetFlow SSH: Arista Router and
Networks Switches Hardwar; utilization, Hardware Status Running Switch
SSH: config,
configuration, Startup
running config
processes
Aruba Aruba Wireless SNMP: SNMP: Controller CPU, Memory, SNMP Trap: Over 165 Currently not Aruba WLAN
Networks LAN Controller Interface utilization, Hardware event types covering natively
OS, Status SNMP: Access Point Authentication, supported
hardware, Wireless Channel utilization, noise Association, Rogue
Access metrics, user count detection, Wireless IPS
Points events
Avaya Call Manager SNMP: OS, SNMP: CPU, Memory, Interface CDR: Call Records Currently not Avaya Call
Hardware utilization, Hardware Status natively Manager
supported
Avaya Session Manager SNMP: OS, SNMP: CPU, Memory, Interface Currently not
Hardware utilization, Hardware Status natively
supported
Barracuda Spam Firewall Application Currently not natively supported Syslog: Over 20 event Currently not Barracuda Spam
Networks type types covering mail natively
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Bit9 Security platform Application Currently not natively supported Syslog: Over 259 event Currently not Carbon Black
type types covering various natively Security Platform
discovery via file monitoring activities supported
LOG
Blue Coat Security SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Admin access to Currently not Blue Coat Web
Gateway Hardware utilization, Proxy performance Security Gateway ; natively Proxy
Versions v4.x metrics SFTP: Proxy traffic supported
and later analysis
Box.com Cloud Storage Currently not Currently not natively supported Box.com API: File Currently not Box.com
natively creation, deletion, natively
supported modify, file sharing supported
Brocade SAN Switch SNMP: OS, SNMP: CPU, Memory, Interface Currently not natively Currently not Brocade SAN
Hardware utilization supported natively Switch
supported
Brocade ServerIron ADX SNMP: Host SNMP: Uptime, CPU, Memory, Brocade ADX
switch name, serial Interface Utilization, Hardware
number, status, Real Server Statistics
hardware
Carbon Black Security platform Application Currently not natively supported Syslog: Over 259 event Currently not Carbon Black
type types covering various natively Security Platform
discovery via file monitoring activities supported
LOG
CentOS / Linux SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Situations SSH: File Linux Server
Other Linux Hardware, Interface utilization, Process covering Authentication integrity
distributions Software, monitoring, Process stop/start, Port Success/Failure, monitoring,
Processes, up/down SSH: Disk I/O, Paging Privileged logons, Target file
Open Ports User/Group Modification; monitoring;
SSH: SSH: File integrity Agent: File
Hardware monitoring, Command integrity
details, Linux output monitoring, Target monitoring
distribution file monitoring; FortiSIEM
LinuxFileMon Agent: File
integrity monitoring
CentOS / DHCP Server Currently not Currently not natively supported Syslog: DHCP activity Not Linux DHCP
Other Linux natively (Discover, Offer, Applicable
distributions supported Request, Release etc) -
Used in Identity and
Location
Checkpoint FireWall-1 SNMP: OS, SNMP: CPU, Memory, Interface LEA from SmartCenter or LEA: Firewall Check Point
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
versions NG, Hardware utilization Log Server: Firewall Log, Audit trail Provider-1
FP1, FP2, FP3, Audit trail, over 940 IPS Firewall
AI R54, AI R55, Signatures
R65, R70, R77,
NGX, and R75
Checkpoint Provider-1 Currently not Currently not natively supported LEA: Firewall Log, Audit LEA: Firewall Check Point
versions NG, natively trail Audit trail Provider-1
FP1, FP2, FP3, supported
AI R54, AI R55,
R65, R70, R77,
NGX, and R75
Checkpoint VSX SNMP: OS, SNMP: CPU, Memory, Interface LEA from SmartCenter or LEA: Firewall Check Point
Hardware utilization Log Server: Firewall Log, Audit trail Provider-1
Audit trail
Citrix NetScaler SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 465 event Currently not Citrix Netscaler
Application Hardware utilization, Hardware Status, types covering admin natively
Delivery Application Firewall metrics activity, application supported
Controller firewall events, health
events
Citrix ICA SNMP: SNMP: Process Utilization; WMI: Currently not natively Currently not Citrix ICA
Process ICA Session metrics supported natively
Utilization supported
Cisco ASA Firewall SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 1600 event SSH: Cisco ASA
(single and multi- Hardware utilization, Firewall Connections, types parsed for Running
context) version SSH: Hardware Status situations covering admin config,
7.x and later interface access, configuration Startup
security level change, traffic log, IPS config
needed for activity; NetFlow V9:
parsing traffic Traffic log
logs,
Configuration
Cisco ASA firepower SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 1600 event SSH: Cisco ASA
SFR Module Hardware utilization, Firewall Connections, types parsed for Running
SSH: Hardware Status situations covering admin config,
interface access, configuration Startup
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Cisco CatOS based SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 700 event SSH: Cisco IOS
Switches Hardware utilization, Hardware Status types parsed for Running
(Serial situations covering admin config,
Number, access, configuration Startup
Image file, change, interface config
Interfaces, up/down, BGP interface
Component up/down, traffic log, IPS
s); SSH: activity NetFlow V5, V9:
configuration Traffic logs
running
process
Cisco Duo Not natively supported - Custom Via API Not natively Cisco Duo
Monitoring needed supported -
Custom
Custom
Configuration
collection
needed
Cisco PIX Firewall SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 1600 event SSH: Cisco ASA
Hardware utilization, Connections, Hardware types parsed for Running
SSH: Status situations covering admin config,
interface access, configuration Startup
security level change, traffic log, IPS config
needed for activity
parsing traffic
logs,
Configuration
Cisco FWSM SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 1600 event SSH: Cisco ASA
Hardware utilization, Connections, Hardware types parsed for Running
SSH: Status situations covering admin config,
interface access, configuration Startup
security level change, traffic log, IPS config
needed for activity
parsing traffic
logs,
Configuration
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Cisco IOS based SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 200 event SSH: Cisco IOS
Routers and Hardware; utilization, Hardware Status; SNMP: types parsed for Running
Switches SSH: IP SLA metrics; SNMP: BGP situations covering admin config,
configuration, metrics, OSPF metrics; SNMP: access, configuration Startup
running Class based QoS metrics; SNMP: change, interface config
process, NBAR metrics up/down, BGP interface
Layer 2 up/down, traffic log, IPS
connectivity activity; NetFlow V5, V9:
Traffic logs
Cisco Nexus OS based SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Over 3500 event SSH: Cisco NX-OS
Routers and Hardware; utilization, Hardware Status; SNMP: types parsed for Running
Switches SSH: IP SLA metrics, BGP metrics, OSPF situations covering admin config,
configuration metrics, NBAR metrics; SNMP: access, configuration Startup
running Class based QoS metrics change, interface config
process, up/down, BGP interface
Layer 2 up/down, traffic log,
connectivity hardware status,
software and hardware
errors; NetFlow V5, V9:
Traffic logs
Cisco UCS Server UCS API: UCS API: Chassis Status, Memory Syslog: Over 500 event Currently not Cisco UCS
Hardware Status, Processor Status, Power types parsed for natively
components - Supply status, Fan status situations covering supported
processors, hardware errors, internal
chassis, software errors etc
blades,
board, cpu,
memory,
storage,
power supply
unit, fan unit
Cisco WLAN Controller SNMP: OS, SNMP: Controller CPU, Memory, SNMP Trap: Over 88 Currently not Cisco Wireless
and Access Hardware, Interface utilization, Hardware event types parsed for natively LAN
Points Access Status; SNMP: Access Point situations covering supported
Points Wireless Channel utilization, noise Authentication,
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Cisco Call Manager SNMP: OS, SNMP: Call manager CPU, Memory, Syslog: Over 950 Currently not Cisco Call
Hardware, Disk Interface utilization, Hardware messages from Cisco natively Manager
VoIP Phones Status, Process level resource Call Manager as well as supported
usage; SNMP: VoIP phone count, Cisco Unified Real Time
Gateway count, Media Device Monitoring Tool (RTMT);
count, Voice mail server count and CDR Records, CMR
SIP Trunks count; SNMP: SIP Trunk Records: Call Source and
Info, Gateway Status Info, H323 Destination, Time, Call
Device Info, Voice Mail Device Info, Quality metrics (MOS
Media Device Info, Computer Score, Jitter, latency)
Telephony Integration (CTI) Device
Info
Cisco Contact Center SNMP: OS, SNMP: CPU, Memory, Disk Currently not natively Currently not Cisco Contact
Hardware Interface utilization, Hardware supported - Custom natively Center
Status, Process level resource parsing needed supported
usage, Install software change
Cisco Presence Server SNMP: OS, SNMP: CPU, Memory, Disk Currently not natively Currently not Cisco Presence
Hardware Interface utilization, Hardware supported - Custom natively Server
Status, Process level resource parsing needed supported
usage, Install software change
Cisco Tandeberg Tele- SNMP: OS, SNMP: CPU, Memory, Disk Currently not natively Currently not Cisco Tandeberg
presence Video Hardware Interface utilization, Hardware supported - Custom natively Telepresence
Communication Status, Process level resource parsing needed supported VCS
Server (VCS) usage, Install software change
Cisco Tandeberg Tele- SNMP: OS, SNMP: CPU, Memory, Disk Currently not natively Currently not Cisco
presence Hardware Interface utilization, Hardware supported - Custom natively Telepresence
Multiple Control Status, Process level resource parsing needed supported MCU
Unit (MCU) usage, Install software change
Cisco Unity Connection SNMP: OS, SNMP: CPU, Memory, Disk Currently not natively Currently not Cisco Unity
Hardware Interface utilization, Hardware supported - Custom natively
Status, Process level resource parsing needed supported
usage, Install software change
Cisco IronPort Mail SNMP: OS, SNMP: CPU, Memory, Disk Syslog: Over 45 event Currently not Cisco IronPort
Gateway Hardware Interface utilization, Hardware types covering mail natively Mail
Status, Process level resource scanning and forwarding supported
usage, Install software change status
Cisco IronPort Web SNMP: OS, SNMP: CPU, Memory, Disk W3C Access log Currently not Cisco IronPort
Gateway Hardware Interface utilization, Hardware (Syslog): Over 9 event natively Web
Status, Process level resource types covering web supported
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Cisco Cisco Network SNMP: OS, SNMP: CPU, Memory, Disk SDEE: Over 8000 IPS Currently not Cisco NIPS
IPS Appliances Hardware Interface utilization, Hardware signatures natively
Status supported
Cisco Cisco Security SNMP or SNMP or WMI: Process CPU and SNMP Trap: Over 25 Currently not Cisco CSA
Agent WMI: OS, memory utilization event types covering natively
Hardware Host IPS behavioral supported
signatures.
Cisco Cisco Access SNMP or SNMP or WMI: Process CPU and Syslog: Passed and Currently not Cisco ACS
Control Server WMI: OS, memory utilization Failed authentications, natively
(ACS) Hardware Admin accesses supported
Cisco VPN 3000 SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Successful and Currently not Cisco VPN 3000
Hardware utilization Failed Admin natively
Authentication, VPN supported
Authentication, IPSec
Phase 1 and Phase 2
association, VPN
statistics
Cisco Meraki Cloud SNMP: OS, SNMP: Uptime, Network Interface Currently not natively Currently not Cisco Meraki
Controllers Hardware, Utilization; SNMP Trap: Various supported - Custom natively Cloud Controller
Meraki availability scenarios parsing needed supported and Network
devices Devices
reporting to
the Cloud
Controller
Cisco Meraki Firewalls SNMP: OS, SNMP: Uptime, Network Interface Syslog: Firewall log Currently not Cisco Meraki
Hardware Utilization analysis natively Cloud Controller
supported and Network
Devices
Cisco Meraki SNMP: OS, SNMP: Uptime, Network Interface Currently not Cisco Meraki
Routers/Switche Hardware Utilization natively Cloud Controller
s supported and Network
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Devices
Cisco Meraki WLAN SNMP: OS, SNMP: Uptime, Network Interface Currently not Cisco Meraki
Access Points Hardware Utilization natively Cloud Controller
supported and Network
Devices
Cisco MDS Storage SNMP: OS, SNMP: CPU, Memory, Interface Currently not natively Currently not
Switch Hardware utilization, Hardware Status supported - Custom natively
parsing needed supported
Cisco Viptela Discovered Not natively supported - Custom Over 289 Events Types Not natively Cisco Viptela
Via LOG only monitoring needed parsed supported - SDWAN Router
Custom
configuration
collection
needed
Cisco Wide Area SNMP: Host SNMP: CPU, Memory, Interface Cisco WAAS
Application name, utilization, Disk utilization, Process
Services (WAAS) Version, cpu/memory utilization
Hardware
model,
Network
interfaces
CradlePoint CradlePoint Discovered Not natively supported. Custom 29 Event types covering Not currently CradlePoint
via LOG only monitoring needed Security Violations, supported.
Config Changes,
Authentications and
informational events
Cyberoam Cyberoam Discovered Not natively supported. Custom Event, Security, and Connection - Cyberoam
via LOG only monitoring needed. Traffic logs Firewall
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
permit and
deny,
system
events,
maleware
events
Cyxtera AppGate SDP Host name Not supported Not Cyxtera AppGate
and Device supported SDP
type
Darktrace Discovered Not natively supported - Custom Over 40 Events Types Not Natively Darktrace
CyberIntelligenc via LOG only monitoring needed parsed Supported - CyberIntelligenc
e Platform Custom e Platform
Configuration
collection
needed
Dell SonicWall SNMP: OS, SNMP: CPU, Memory, Interface Syslog: Firewall log Currently not Dell SonicWALL
Firewall Hardware utilization, Firewall session count analysis (over 1000 event natively
types) supported
Dell Force10 Router SNMP: OS, SNMP: CPU, Memory, Interface SSH: Dell Force10
and Switch Hardware utilization, Interface Status, Running
Hardware Status config,
Startup
config
Dell NSeries Router SNMP: OS, SNMP: CPU, Memory, Interface SSH: Startup Dell NSeries
and Switch Hardware utilization, Hardware Status config
Dell PowerConnect SNMP: OS, SNMP: CPU, Memory, Interface SSH: Startup Dell
Router and Hardware utilization, Hardware Status config PowerConnect
Switch
Dell Dell Hardware on SNMP: SNMP: Hardware Status: Battery, Currently not
Intel-based Hardware Disk, Memory, Power supply, natively
Servers Temperature, Fan, Amperage, supported.
Voltage
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Dell Compellent SNMP: OS, SNMP: Network Interface utilization, Currently not Dell Compellent
Storage Hardware Volume utilization, Hardware Status natively
(Power, Temperature, Fan) supported.
Dell EqualLogic SNMP: OS, SNMP: Uptime, Network Interface Currently not Dell EqualLogic
Storage Hardware utilization; SNMP: Hardware status: natively
(Network Disk, Power supply, Temperature, supported.
interfaces, Fan, RAID health; SNMP: Overall
Physical Disk health metrics: Total disk
Disks, count, Active disk count, Failed disk
Components) count, Spare disk count; SNMP:
Connection metrics: IOPS,
Throughput; SNMP: Disk
performance metrics: IOPS,
Throughput; SNMP: Group level
performance metrics: Storage,
Snapshot
Digital Code Green DLP LOG Currently not natively supported 1 broad event Type Currently not Digital Guardian
Guardian Discovery natively Code Green DLP
supported
EMC Clariion Storage Naviseccli: Naviseccli: Storage Processor Currently not EMC Clariion
Host name, utilization, Storage Port I/O, RAID natively
Operating Group I/O, LUN I/O, Host HBA supported.
system Connectivity, Host HBA
version, Unregistered Host, Hardware
Hardware component health, Overall Disk
model, Serial health, Storage Pool Utilization
number,
Network
interfaces,
Installed
Software,
Storage
Controller
Ports;
Naviseccli:
Hardware
components,
RAID Groups
and assigned
disks, LUNs
and LUN ->
RAID Group
mappings,
Storage
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Groups and
memberships
EMC Isilon Storage SNMP: Host SNMP: Uptime, Network Interface 5 event types EMC Isilon
name, metrics; SNMP: Hardware
Operating component health: Disk, Power
system, supply, Temperature, Fan, Voltage;
Hardware SNMP: Cluster membership change,
(Model, Serial Node health and performance (CPU,
number, I/O), Cluster health and
Network performance, Cluster Snapshot,
interfaces, Storage Quota metrics, Disk
Physical performance, Protocol performance
Disks,
Components)
Epic SecuritySIEM Discovered Not natively supported. Custom Authentication Query, Currently not Epic EMR/EHR
via LOG only monitoring needed. Client login Query natively System
supported
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
F5 Networks Local Traffic SNMP: Host SNMP: CPU, Memory, Disk, SNMP Trap: Exception F5 Networks
Manager name, Interface utilization, Process situations including Local Traffic
Operating monitoring, Process stop/start hardware failures, certain Manager
system, security attacks, Policy
Hardware violations etc; Syslog:
(Model, Serial Permitted and Denied
number, Traffic
Network
interfaces,
Physical
Disks),
Installed
Software,
Running
Software
Fortinet FortiAP Access point FortiAP CPU, Memory, Clients, Wireless events via FortiAP
– Name, OS, Sent/Received traffic FortiGate
Interfaces,
Controller
(FortiGate)
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Fortinet FortiAuthenticat Vendor, OS, Interface Stat, Authentication Stat Over 150 event types Currently not Fortinet
or Model natively FortiAuthenticat
supported. or
Fortinet FortiDeceptor Discovered Not natively supported. Custom Authentication logs, Currently not Fortinet
via LOG only monitoring needed. Decoy activity natively FortiDeceptor
supported.
Fortinet FortiEDR Discovered Not natively supported. Custom System and security Currently not Fortinet
via LOG only monitoring needed. events (e.g. file blocked) natively FortiEDR
supported
Fortinet FortiGate SNMP: OS, SNMP: Uptime, CPU and Memory Syslog: Over 11000 SSH: Fortinet
firewalls Host name, utilization, Network Interface Traffic and system logs; Running FortiGate
Hardware metrics Netflow: traffic flow, config,
(Serial Application flow Startup
Number, config
Interfaces,
Components)
Fortinet FortiManager SNMP: Host SNMP: Uptime, CPU and Memory FortiManager
name, utilization, Network Interface
Hardware metrics
model,
Network
interfaces,
Operating
system
version
Fortinet FortiNAC Discovered Not natively supported. Custom Administrative and User Currently not Fortinet
via LOG only monitoring needed Admission Control events natively FortiNAC
supported
Fortinet FortiWLC SNMP - Controller – CPU, Memory, Disk, Hardware/Software Not FortiWLC
Controller – Throughput, QoS statistics, Station errors, failures, logons, supported
Name, OS, count license expiry, Access
Serial Point Association /
Number, Disassociation
Interfaces,
Associated
Access
Points –
name, OS,
Interfaces
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Fortinet FortiTester Discovered Not natively supported - Custom CEF format: Over 14 Not natively Fortinet
Via LOG only monitoring needed Event types parsed supported - FortiTester
Custom
configuration
collection
needed
Foundry IronWare Router SNMP: OS, SNMP: Uptime, CPU, Memory, Syslog: Over 6000 event SSH: Foundry
Networks and Switch Hardware Interface utilization, Hardware types parsed for Running Networks
SSH: Status situations covering admin config, IronWare
configuration, access, configuration Startup
running change, interface config
process up/down
FreeBSD
GitLab API GitLab Host name Not supported Not GitLab API
and Device supported
type
GitLab CLI GitLab Host name Not supported Not GitLab CLI
and Device supported
type
Huawei VRP Router and SNMP: OS, SNMP: Uptime, CPU, Memory, Syslog: Over 30 event SSH:
Switch Hardware; Interface utilization, Hardware types parsed for Running
SSH: Status situations covering admin config,
configuration, access, configuration Startup
running change, interface config
process, up/down
Layer 2
connectivity
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
HP TippingPoint SNMP: OS, SNMP: Uptime, CPU, Memory, Syslog: Over 4900 IPS TippingPoint IPS
UnityOne IPS Hardware Network Interface, Network alerts directly or via NMS
Interface Errors
HP Value Series SNMP: OS, SNMP: Uptime, CPU, Memory, SSH: Startup HP Value Series
(19xx) Switches hardware Network Interface, Network config (19xx) and HP
and Routers model, Interface Errors 3Com (29xx)
hardware Switch
serial,
hardware
components;
SSH:
configuration
HP 3Com (29xx) SNMP: OS, SNMP: Uptime, CPU, Memory, SSH: Startup HP Value Series
Switches and hardware Network Interface, Network config (19xx) and HP
Routers model, Interface Errors 3Com (29xx)
hardware Switch
serial,
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
hardware
components;
SSH:
configuration
HP HP/3Com SNMP: OS, SNMP: Uptime, CPU, Memory, Syslog: Over 6000 vent SSH: Startup HP/3Com
Comware hardware Network Interface, Network types parsed for config ComWare
Switches and model, Interface Errors; SNMP: hardware situations covering admin
Routers hardware status access, configuration
serial, change, interface
hardware up/down and other
components; hardware issues and
SSH: internal errors
configuration
Hirschmann Switches Host Name, SNMP – Uptime, CPU, Memory, Not natively supported - Not natively Hirschmann
OS Interface utilization, hardware Custom parsing needed supported - SCADA
Status, OSPF metrics Custom Firfewalls and
configuration Switches
collection
needed
HyTrust CloudControl LOG Currently not natively supported Over 70 event types Currently not HyTrust
Discovery natively CloudControl
supported
IBM DB2 Database SNMP or JDBC: Database Audit trail: Log on, IBM DB2
Server WMI: Database level and Table level
Running CREATE/DELETE/MODIFY
processes operations
IBM AIX Servers SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: General logs IBM AIX
Hardware, Interface utilization, Process including Authentication
Installed monitoring, Process stop/start, Port Success/Failure,
Software, up/down ; SSH: Disk I/O, Paging Privileged logons,
Running User/Group Modification
Processes,
Open Ports;
SSH:
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Hardware
details
Indegy Security Discovered Not natively supported - Custom Over 14 Events Types Not natively Indegy Security
Platform via LOG only monitoring needed parsed supported - Platform
Custom
configuration
collection
needed
Intel/McAfee McAfee SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Firewall logs McAfee Firewall
Sidewinder Hardware, Interface utilization, Process Enterprise
Firewall Installed monitoring, Process stop/start (Sidewinder)
Software,
Running
Processes
Intel/McAfee McAfee ePO SNMP: SNMP: Process resource utilization SNMP Trap: Over 170 McAfee ePolicy
Related event types Orchestrator
process (ePO)
name and
parameters
Intel/McAfee Intrushield IPS SNMP: OS, SNMP: Hardware status Syslog: IPS Alerts McAfee
Hardware IntruShield
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Infoblox DNS/DHCP SNMP: OS, ; SNMP: Zone transfer metrics, DNS Syslog: DNS logs - name Infoblox
Appliance Hardware, Cluster Replication metrics, DNS resolution activity - DNS/DHCP
Installed Performance metrics, DHCP success and failures
Software, Performance metrics, DDNS Update
Running metrics, DHCP subnet usage
Processes metrics ; SNMP: Hardware Status ;
SNMP Trap: Hardware/Software
Errors
ISC Bind DNS Syslog: DNS logs - name ISC BIND DNS
resolution activity -
success and failures
Juniper JunOS SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Over 1420 event SSH: Startup Juniper
Router/Switch Hardware; Interface utilization, Hardware types parsed for configuration Networks JunOS
SSH: Status ; situations covering admin
Configuration access, configuration
change, interface
up/down and other
hardware issues and
internal errors
Juniper SRX Firewalls SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Over 700 event SSH: Startup Juniper
Hardware Interface utilization, Hardware types parsed for configuration Networks JunOS
SSH: Status situations covering traffic
Configuration log, admin access,
configuration change,
interface up/down and
other hardware issues
and internal errors
Juniper SSG Firewall SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Over 40 event SSH: Startup Juniper
Hardware ; Interface utilization, Hardware types parsed for configuration Networks SSG
SSH: Status situations covering traffic Firewall
Configuration log, admin access,
configuration change,
interface up/down and
other hardware issues
and internal errors
Juniper ISG Firewall SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Over 40 event SSH: Startup Juniper
Hardware ; Interface utilization, Hardware types parsed for configuration Networks SSG
SSH: Status situations covering traffic Firewall
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Juniper Secure Access SNMP: OS, SNMP: CPU, Memory, Disk, Syslog - Over 30 event Juniper
Gateway Hardware Interface utilization types parsed for Networks SSL
situations covering VPN VPN Gateway
login, Admin access,
Configuration Change
Liebert FPC SNMP: Host SNMP: Output voltage (X-N, Y-N, Z- Liebert FPC
Name, N), Output current (X, Y. Z), Neutral
Hardware Current, Ground current, Output
model power, Power Factor etc
Liebert UPS SNMP: Host SNMP: UPS metrics: Remaining Liebert UPS
Name, battery charge, Battery status, Time
Hardware on battery, Estimated Seconds
model Remaining, Output voltage etc
McAfee Vormetric Data LOG Currently not natively supported 1 broad event Type Currently not McAfee
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Microsoft Azure Advanced Host name Not supported Not Microsoft Azure
Threat Protection and Device supported ATP
(ATP) type
Microsoft Cloud App Host name Not supported Not Microsoft Cloud
Security and Device supported App Security
type
Microsoft DHCP Server - SNMP: WMI: DHCP metrics: request rate, FortiSIEM Windows Microsoft DHCP
2003, 2008 Running release rate, decline rate, Duplicate Agent (HTTPS): DHCP (2003, 2008)
Processes Drop rate etc logs - release, renew etc;
Snare Agent (syslog):
DHCP logs - release,
renew etc; Correlog
Agent (syslog): DHCP
logs - release, renew etc
Microsoft DNS Server - SNMP: WMI: DNS metrics: Requests FortiSIEM Windows Microsoft DNS
2003, 2008 Running received, Responses sent, WINS Agent (HTTPS): DNS (2003, 2008)
Processes requests received, WINS responses logs - name resolution
sent, Recursive DNS queries activity; Snare Agent
received etc (syslog): DNS logs -
name resolution activity;
Correlog Agent (syslog):
DNS logs - name
resolution activity
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Microsoft Exchange Server SNMP: SNMP or WMI: Process level Exchange Microsoft
Running resource usage; WMI: Exchange Tracker Logs Exchange
Processes performance metrics, Exchange via FSM
error metrics, Exchange mailbox Advanced
metrics, Exchange SMTP metrics, Windows
Exchange ESE Database, Exchange Agent
Database Instances, Exchange Mail
Submission Metrics, Exchange
Store Interface Metrics etc
Microsoft IIS versions SNMP: SNMP or WMI: Process level FortiSIEM Windows Microsoft IIS for
Running resource usage WMI: IIS metrics: Agent (HTTPS): W3C Windows 2000
Processes Current Connections, Max Access logs - Per and 2003;
Connections, Sent Files, Received instance Per Connection - Microsoft IIS for
Files etc Sent Bytes, Received Windows 2008
Bytes, Duration ; Snare
Agent (syslog): W3C
Access logs; Correlog
Agent (syslog): W3C
Access logs
Microsoft Internet SNMP: SNMP or WMI: Process level FortiSIEM Windows Microsoft
Authentication Running resource usage Agent (HTTPS): AAA logs Internet
Server (IAS) Processes - successful and failed Authentication
authentication ; Snare Server (IAS)
Agent (syslog): AAA logs
- successful and failed
authentication ; Correlog
Agent (syslog): AAA logs
- successful and failed
authentication
Microsoft Network Policy Discovered Not natively supported. Custom AAA-based login events Currently not Microsoft
Server via LOG only. monitoring needed. natively Network Policy
supported Server
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Microsoft Sharepoint SNMP: SNMP or WMI: Process level LOGBinder Agent: Microsoft
Server Running resource usage SharePoint logs - Audit SharePoint
Processes trail integrity, Access
control changes,
Document updates, List
updates, Container object
updates, Object changes,
Object Import/Exports,
Document views,
Information Management
Policy changes etc
Microsoft SQL Server - SNMP: SNMP or WMI: Process resource JDBC: database error Microsoft SQL
2005, 2008, Running usage; JDBC: General database log; JDBC: Database Server
2008R2, 2012, Processes info, Configuration Info, Backup audit trail
2014 Info,; JDBC: Per-instance like Buffer
cache hit ratio, Log cache hit ratio
etc; JDBC: per-instance, per-
database Performance metrics Data
file size, Log file used, Log growths
etc; JDBC: Locking info, Blocking
info
Microsoft Windows 2000, SNMP: OS, SNMP: CPU, Memory, Disk, WMI pulling: Security, SNMP: Microsoft
Windows 2003, Hardware (for Interface utilization, Process System and Application Installed Windows
Windows 2008, Dell and HP), utilization ; WMI: SNMP: CPU, logs; FortiSIEM Windows Software Servers
Windows 2008 Installed Memory, Disk, Interface utilization, Agent (HTTPS): Security, Change;
R2, Windows Software, Detailed CPU/Memory usage, System and Application FortiSIEM
2012, Windows Running Detailed Process utilization logs, File Content Windows
2012 R2 Processes; change; Snare Agent Agent:
WMI: OS, (syslog): Security, Installed
Hardware (for System and Application Software
Dell and HP), logs; Correlog Agent Change,
BIOS, (syslog): Security, Registry
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
MobileIron Sentry Discovered Not natively supported - Custom Over 18 Events Types Not natively MobileIron
Sentry and Via LOG only monitoring needed parsed supported - Sentry
Connector Custom
configuration
collection
needed
Mikrotek Mikrotech Host name, SNMP: Uptime CPU utilization, Mikrotek Router
Switches and OS, Network Interface metrics
Routers Hardware
model, Serial
number,
Components
NetApp DataONTAP SNMP: Host SNMP: CPU utilization, Network SNMP Trap: Over 150 NetApp Filer
based Filers name, OS, Interface metrics, Logical Disk alerts - hardware and
Hardware Volume utilization; SNMP: Hardware software alerts
model, Serial component health, Disk health
number, ONTAP API: Detailed NFS V3/V4,
Network ISCSI, FCP storage IO metrics,
interfaces, Detailed LUN metrics, Aggregate
Logical metrics, Volume metrics, Disk
volumes, performance metrics
Physical
Disks
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Vulnerability category,
Vulnerability name,
Vulnerability severity,
Vulnerability CVE Id and
Bugtraq Id, Vulnerability
CVSS Score,
Vulnerability
Consequence, etc
Netwrix Auditor Not natively Not natively supported 2 Event Types parsed Not natively Netwrix Auditor
supported (via Windows Correlog supported
Agent)
Nginx Web Server SNMP: SNMP: Application Resource Usage Syslog: W3C access Nginx Web
Application logs: per HTTP(S) Server
name connection: Sent Bytes,
Received Bytes,
Connection Duration
Nimble NimbleOS Host name, SNMP: Uptime, Network Interface Nimble Storage
Storage Operating metrics, Storage Disk Utilization
system SNMP: Storage Performance
version, metrics: Read rate (IOPS),
Hardware Sequential Read Rate (IOPS), Write
model, Serial rate (IOPS), Sequential Write Rate
number, (IOPS), Read latency, etc
Network
interfaces,
Physical
Disks,
Components
Nortel ERS Switches SNMP: Host SNMP: Uptime CPU/memory Nortel ERS and
and Routers name, OS, utilization, Network Interface Passport Switch
Hardware metrics/errors, Hardware Status
model, Serial
number,
Components
Nortel Passport SNMP: Host SNMP: Uptime CPU/memory Nortel ERS and
Switches and name, OS, utilization, Network Interface Passport Switch
Routers Hardware metrics/errors, Hardware Status
model, Serial
number,
Components
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Oracle Enterprise SNMP or JDBC: Database performance Syslog: Listener log, Alert Oracle Database
Database Server WMI: Proces metrics: Buffer cache hit ratio, Row log, Audit Log
- 10g, 11g, 12c s resource cache hit ratio, Library cache hit
usage ; ratio, Shared pool free ratio, Wait
time ratio, Memory Sorts ratio etc ;
JDBC: Database Table space
information: able space name, table
space type, table space usage,
table space free space, table space
next extent etc; JDBC: Database
audit trail: Database logon,
Database operations including
CREATE/ALTER/DROP/TRUNCAT
E operations on tables, table spaces,
databases, clusters, users, roles,
views, table indices, triggers etc.
Oracle MySQL Server SNMP or JDBC: User Connections, Table MySQL Server
WMI: Updates, table Selects, Table
Process Inserts, Table Deletes, Temp Table
resource Creates, Slow Queries etc; JDBC:
usage Table space performance metrics:
Table space name, table space type,
Character set and Collation, table
space usage, table space free
space etc; JDBC: Database audit
trail: Database log on,
Database/Table
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
CREATE/DELETE/MODIFY
operations
Oracle Sun SunOS and SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Situations Sun Solaris
Solaris Hardware, Interface utilization, Process covering Authentication Server
Software, monitoring, Process stop/start, Port Success/Failure,
Processes, up/down ; SSH: Disk I/O, Paging Privileged logons,
Open Ports ; User/Group Modification
SSH:
Hardware
details
Palo Alto Palo Alto Traps LOG Currently not natively supported Over 80 event types Currently not Palo Alto Traps
Networks Endpoint Discovery natively Endpoint
Security supported Security
Manager Manager
Palo Alto PAN-OS based SNMP: Host SNMP: Uptime, CPU utilization, Syslog: Traffic log, SSH: Palo Alto Firewall
Networks Firewall name, OS, Network Interface metrics, Firewall Threat log (URL, Virus, Configuration
Hardware, connection count Spyware, Vulnerability, Change
Network File, Scan, Flood and
interfaces; data subtypes), config
SSH: and system logs
Configuration
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Scanner
Radware DefensePro LOG Currently not natively supported Over 120 event types Currently not Radware
Discovery natively DefensePro
supported
Riverbed Steelhead WAN SNMP: Host SNMP: Uptime, CPU / Memory / SNMP Trap: About 115 Riverbed
Accelerators name, Network Interface / Disk space event types covering SteelHead WAN
Software metrics, Process cpu/memory software errors, hardware Accelerator
version, utilization; SNMP: Hardware Status errors, admin login,
Hardware SNMP: Bandwidth metrics: performance issues -
model, (Inbound/Outbound Optimized cpu, memory, peer
Network Bytes - LAN side, WAN side; latency issues ; Netflow:
interfaces Connection metrics: Connection statistics
Optimized/Pass through / Half-open
optimized connections etc); SNMP:
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
Redhat Linux SNMP: OS, SNMP: CPU, Memory, Disk, Syslog: Situations SSH: File Linux Server
Hardware, Interface utilization, Process covering Authentication integrity
Software, monitoring, Process stop/start, Port Success/Failure, monitoring,
Processes, up/down ; SSH: Disk I/O, Paging Privileged logons, Target file
Open Ports ; User/Group Modification monitoring
SSH: SSH: File integrity Agent: File
Hardware monitoring, Command integrity
details, Linux output monitoring, Target monitoring
distribution file monitoring Agent: File
integrity monitoring
Ruckus Wireless LAN SNMP: SNMP: Controller Uptime, Controller Ruckus WLAN
Controller Network Interface metrics,
host name, Controller WLAN Statistics, Access
Controller Point Statistics, SSID performance
hardware Stats
model,
Controller
network
interfaces,
Associated
WLAN
Access
Points
Security Zeek (Bro) Discovered Not natively supported - Custom Syslog JSON format: 6 Currently not Zeek (Bro)
Onion via LOG only monitoring needed event types parsed natively Installed on
supported Security Onion
SentinelOne SentinelOne Discovered Not natively supported. Custom System and security Currently not SentinelOne
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
via LOG only monitoring needed. events (e.g. file blocked) natively
supported
Squid Web Proxy SNMP: Syslog: W3C formatted Squid Web Proxy
Process level access logs - per HTTP
CPU/Memor (S) connection: Sent
y usage Bytes, Received Bytes,
Connection Duration
SSH Com CryptoAuditor LOG Currently not natively supported Many event types Currently not SSH Com
Security Discovery natively Security
supported CryptoAuditor
Stormshield Network Security Not natively Not natively supported Firewall logs Not natively Stormshield
supported supported Network Security
Tigera Calico Not natively Not natively supported Flow, Audit and DNS logs Not natively Tigera Calico
supported supported
TrendMicro Deep Discovery Discovered Not natively supportedCustom Malicious file detection Currently not TrendMicro Deep
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
TrendMicro Interscan Web LOG Currently not natively supported 15 event Types Currently not TrendMicro
Filter Discovery natively Interscan Web
supported Filter
VMware VMware ESX and VMWare VMWare SDK: VM level: CPU, VMWare SDK: Over 800
VCenter SDK: Entire Memory, Disk, Network, VMware VCenter events covering
VMware tool status VMWare SDK: ESX level: account creation, VM
hierarchy and CPU, Memory, Disk, Network, Data creation, DRS events,
dependencie store VMWare SDK: ESX level: hardware/software errors
s - Data Hardware Status VMWare SDK:
Center, Cluster level: CPU, Memory, Data
Resource store, Cluster Status VMWare SDK:
Pool, Cluster, Resource pool level: CPU, Memory
ESX and VMs
Vendor Model Discovery Performance Monitoring Log Analysis Overview Config Details
Overview Overview Change
Monitoring
This section describes how to configure applications for discovery and for providing information to FortiSIEM.
l Application Server
l Authentication Server
l Database Server
l DHCP and DNS Server
l Directory Server
l Document Management Server
l Healthcare IT
l Mail Server
l Management Server/Appliance
l Remote Desktop
l Source Code Control
l Unified Communication Server
l Web Server
JMX Database metrics: Web context path, Data source, Database Performance
driver, Peak active sessions, Current active sessions, Peak idle Monitoring
sessions, Current idle sessions
Thread pool metrics: Thread pool name, Application port, Total
threads, Busy threads, Keep alive threads, Max threads, Thread
priority, Thread pool daemon flag
Request processor metrics: Request processor name, Received
Bytes, Sent Bytes, Average Request Process time, Max Request
Processing time, Request Rate, Request Errors
Event Types
In ADMIN > Device Support > Event, search for "tomcat" in the Device Type and Description column to see the
event types associated with this device.
Reports
In RESOURCE > Reports , search for "tomcat" in the Name column to see the reports associated with this
application or device.
Configuration
JMX
Windows
Modify the file ${CATALINA_BASE}\bin\catalina.bat by adding these arguments for JVM before the
comment:
rem ----Execute The Requested Command ------
Linux
Modify the file ${CATALINA_BASE}/bin/catalina.sh by adding these arguments for JVM before the comment:
# ----Execute The Requested Command ------
3. In Linux, set permissions for the jmxremote.access and jmxremote.password files so that they are read-only and
accessible only by the Tomcat operating system user.
You can configure FortiSIEM to communicate with your device, and then initiate discovery of the device. For more
information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
Use these Access Method Definition settings to allow FortiSIEM to access your Apache Tomcat application server
over JMX:
Setting Value
Pull Interval 5
(minutes)
Port 0
1,[maxInactiveInterval]=1800
IBM WebSphere
HTTPS Preferred for Monitoring over JMX IBM WebSphere performance metrics can be obtained via HTTP(S) or
JMX. The HTTP(S) based method is highly recommended since it consumes significantly less resources on FortiSIEM.
Event Types
In ADMIN > Device Support > Event, search for "websphere" in the Description column to see the event types
associated with this device.
l PH_DEV_MON_WEBSPHERE_CPU (from HTTPS)
<134>Dec 08 16:11:55 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_CPU]:[eventSeverity]=PHL_INFO,
[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=Host-10.1.2.16,[destDevPort]=9443,
[appVersion]=8.5.5.3,[appServerInstance]=server1,[cpuUtil]=0,[sysUpTime]=2340206,
[appServerState]=RUNNING
l PH_DEV_MON_WEBSPHERE_CPU (from JMX)
<134>Jan 22 02:15:23 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_CPU]:[eventSeverity]=PHL_INFO,
[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=SH-WIN08R2-JMX,[destDevPort]=8880,
[appVersion]=IBM WebSphere Application Server 7.0.0.11,[appServerInstance]=server1,
[cpuUtil]=0,[sysUpTime]=42206,[appServerState]=STARTED
l PH_DEV_MON_WEBSPHERE_MEMORY (from HTTPS)
<134>Dec 08 16:11:55 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_MEMORY]:[eventSeverity]=PHL_
INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=Host-10.1.2.16,
[destDevPort]=9443,[appVersion]=8.5.5.3,[appServerInstance]=server1,
[appServerState]=running,[heapFreeKB]=93208,[heapUsedKB]=168936,[heapCommitKB]=232576,
[heapMaxKB]=262144,[heapUtil]=72
l PH_DEV_MON_WEBSPHERE_MEMORY (from JMX)
<134>Jan 22 02:15:25 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_MEMORY]:[eventSeverity]=PHL_
INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=SH-WIN08R2-JMX,
[destDevPort]=8880,[appVersion]=IBM WebSphere Application Server 7.0.0.11,
[appServerInstance]=server1,[appServerState]=STARTED,[maxSystemDumpsOnDisk]=10,
[maxHeapDumpsOnDisk]=10,[heapFreeKB]=48140,[heapUsedKB]=172018,[heapCommitKB]=217815,
[heapMaxKB]=262144,[heapUtil]=78
l PH_DEV_MON_WEBSPHERE_APP (from HTTPS)
<134>Dec 08 16:11:55 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_APP]:[eventSeverity]=PHL_INFO,
[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=Host-10.1.2.16,[destDevPort]=9443,
[appVersion]=8.5.5.3,[appServerInstance]=server1,[appName]=isclite,
[webAppName]=ISCAdminPortlet.war,[activeSessions]=0,[activeSessionsPeak]=1
l PH_DEV_MON_WEBSPHERE_APP (from JMX)
<134>Jan 22 02:18:24 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_APP]:[eventSeverity]=PHL_INFO,
[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=SH-WIN08R2-JMX,[destDevPort]=8880,
[appVersion]=IBM WebSphere Application Server 7.0.0.11,[appServerInstance]=server1,
[appName]=isclite,[webAppName]=isclite.war,[webContextRoot]=admin_host/ibm/console,
[activeSessions]=0,[activeSessionsPeak]=1
l PH_DEV_MON_WEBSPHERE_SERVLET (from HTTPS)
<134>Dec 08 16:11:55 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_SERVLET]:[eventSeverity]=PHL_
INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=Host-10.1.2.16,
[destDevPort]=9443,[appVersion]=8.5.5.3,[appServerInstance]=server1,[appName]=isclite,
[webAppName]=isclite.war,
[servletName]=/com.ibm.ws.console.servermanagement/collectionTableLayout.jsp,
[invocationCount]=2
l PH_DEV_MON_WEBSPHERE_SERVLET (from JMX)
<134>Jan 22 02:15:24 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_SERVLET]:[eventSeverity]=PHL_
INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=SH-WIN08R2-JMX,
[destDevPort]=8880,[appVersion]=IBM WebSphere Application Server 7.0.0.11,
[appServerInstance]=server1,[appName]=isclite,[webAppName]=isclite.war,
[servletName]=action,[reqErrors]=0,[invocationCount]=14
l PH_DEV_MON_WEBSPHERE_DB_POOL (from HTTPS)
<134>Dec 08 16:14:55 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_DB_POOL]:[eventSeverity]=PHL_
INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=Host-10.1.2.16,
[destDevPort]=9443,[appVersion]=8.5.5.3,[appServerInstance]=server1,[jdbcProvider]=Derby
JDBC Provider (XA),[dataSource]=jdbc/DefaultEJBTimerDataSource,[poolSize]=0,
[closedConns]=0,[activeConns]=0,[waitForConnReqs]=0,[connUseTime]=0
l PH_DEV_MON_WEBSPHERE_DB_POOL (from JMX)
<134>Jan 22 02:15:23 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_DB_POOL]:[eventSeverity]=PHL_
INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=SH-WIN08R2-JMX,
[destDevPort]=8880,[appVersion]=IBM WebSphere Application Server 7.0.0.11,
[appServerInstance]=server1,[jdbcProvider]=Derby JDBC Provider (XA),
[dataSource]=DefaultEJBTimerDataSource,[poolSize]=0,[closedConns]=0,[activeConns]=0,
[waitForConnReqs]=0,[connUseTime]=0,[connFactoryType]=,[peakConns]=0
l PH_DEV_MON_WEBSPHERE_THREAD_POOL (from HTTPS)
<134>Dec 08 16:14:55 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_THREAD_POOL]:
[eventSeverity]=PHL_INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=Host-
10.1.2.16,[destDevPort]=9443,[appVersion]=8.5.5.3,[appServerInstance]=server1,
[threadPoolName]=WebContainer,[executeThreads]=2,[executeThreadPeak]=6
l PH_DEV_MON_WEBSPHERE_THREAD_POOL (from JMX)
<134>Jan 22 02:18:25 10.1.2.16 java: [PH_DEV_MON_WEBSPHERE_THREAD_POOL]:
[eventSeverity]=PHL_INFO,[destIpAddr]=10.1.2.16,[hostIpAddr]=10.1.2.16,[hostName]=SH-
WIN08R2-JMX,[destDevPort]=8880,[appVersion]=IBM WebSphere Application Server 7.0.0.11,
[appServerInstance]=server1,[threadPoolName]=ORB.thread.pool,[executeThreads]=0,
[executeThreadPeak]=0
l PH_DEV_MON_WEBSPHERE_TRANSACTION (from HTTPS)
Reports
In RESOURCE > Reports , search for "websphere" in the Name column to see the reports associated with this
device.
Configuration
HTTP(S)
JMX
By default, your Websphere application server uses port 8880 for JMX. You can change this by logging in to your
application server console and going to Application servers > {Server Name} > Ports > SOAP_CONNECTOR_
ADDRESS. The username and password for JMX are the same as the credentials logging into the console. To
configure JMX communications between your Websphere application server and FortiSIEM, you must copy several files
from your application server to the Websphere configuration directory for each FortiSIEM virtual appliance that will be
used for discovery and performance monitoring jobs. FortiSIEM does not include these files because of licensing
restrictions.
1. Copy these files to the directory /opt/phoenix/config/websphere/ for each Supervisor, Worker, and
Collector in your FortiSIEM deployment.
File Location
Type
Client l ${WebSphere_
Jars Home}/AppServer/runtimes/
com.ibm.ws.admin.client.jar
l ${WebSphere_
Home}/AppServer/plugins/
com.ibm.ws.security.crypto.jar
SSL l ${WebSphere_
files Home}/AppServer/profiles/${Profile_
Name}/etc/DummyClientKeyFile.jks
l ${WebSphere_
Home}/AppServer/profiles/${Profile_
Name}/etc/DummyClientTrustFile.jks
2. Install IBM JDK 1.6 or higher in the location /opt/phoenix/config/websphere/java for each Supervisor,
Worker, and Collector in your FortiSIEM deployment.
You can now configure FortiSIEM to communicate with your device by following the instructions in the User Guide >
Section: Setting Credentials, and then initiate discovery of the device as described in the topics under Discovery
Settings.
Use these Access Method Definition options to let FortiSIEM access your IBM Websphere device over HTTPS and
SNMP. When you set the Device Credential Mapping Definition, make sure to map both the HTTPS and SNMP
credentials to the same IP address for your Websphere device. HTTPS.
Setting Value
Name websphere_https
Port 9443
URL /wasPerfTools/servlet/perfservlet
User Name Use the user name that you provided with
access to the application
Use these Access Method Definition settings to let FortiSIEM access your IBM Websphere device over SNMP. When
you set the Device Credential Mapping Definition, make sure to map both the HTTPS and SNMP credentials to the
same IP address for your Websphere device.
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
Setting Value
Use these Access Method Definition settings to let FortiSIEM access your IBM Websphere device over JMX.
Setting Value
Name websphere
Pull Interval 5
(minutes)
Port 8880
Microsoft ASP.NET
WMI Request Execution Time, Request Wait Time, Current Requests, Performance
Disconnected Requests, Queued requests, Disconnected Requests Monitoring
Event Types
In ADMIN > Device Support > Event, search for "asp.net" in the Description column to see the event types
associated with this device.
Reports
In RESOURCE > Reports , search for "asp.net" in the Name column to see the reports associated with this
application or device.
Configuration
WMI
[PH_DEV_MON_APP_ASPNET_MET]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=4868,[hostName]=QA-EXCHG,[hostIpAddr]=172.16.10.28,
[appGroupName]=Microsoft ASPNET,[aspReqExecTimeMs]=0,[aspReqCurrent]=0,[aspReqDisconnected]=0,
[aspReqQueued]=0,[aspReqRejected]=0,[aspReqWaitTimeMs]=0
JMX Session metrics: Web context path, Peak active sessions, Current Performance
active sessions, Duplicate sessions, Expired sessions, Rejected Monitoring
sessions, Average session lifetime, Peak session lifetime, Session
processing time, Session create rate, Session expire rate, Process
expire frequency, Max session limited, Max inactive Interval
Database metrics: Data source
Thread pool metrics: Current live threads, Max live threads
Request processor metrics: Request processor name, Received
Bytes, Sent Bytes, Total requests, Average Request Process time,
Max Request Processing time, Request Rate, Request Errors, Max
open connections, Current open connections, Last Request URI,
Last Request method, Last Request completion time
Application level metrics: Cache TTL, Max cache size, Average
request processing time, App server start time, Cookies allowed flag,
Caching allowed flag, Linking allowed flag, Cross Context Allowed
flag
EJB metrics: EJB component name, EJB state, EJB start time
Connection metrics: Request processor name, HTTP status code,
HTTP total accesses
Event Types
In ADMIN > Device Support > Event, search for "glassfish" in the Description column to see the event types
associated with this device.
Reports
In RESOURCE > Reports , search for "glassfish" in the Name column to see the reports associated with this
application or device.
Configuration
JMX
1. The default JMX port used by Oracle GlassFish is 8686. If you want to change it, modify the node jmx-
connector of the file ${GlassFish_Home}\domains\${Domain_Name}\config\domain.xml.
2. The username and password for JMX are the same as the web console.
You can now configure FortiSIEM to communicate with your device by following the instructions in "Discovery Settings"
and "Setting Credentials" in the User Guide.
Use these Access Method Definition settings to allow FortiSIEM to access your Oracle GlassFish device over JMX.
Setting Value
Name glassfish
Pull Interval 5
(minutes)
Port 8686
Oracle WebLogic
Event Types
In ADMIN > Device Support > Event, search for "WebLogic in the Description column to see the event types
associated with this device.
Reports
In RESOURCE > Reports , search for "WebLogic" in the Name column to see the reports associated with this
application or device.
Configuration
JMX
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Use these Access Method Definition settings to allow FortiSIEM to access your Oracle WebLogic application server
over JMX.
The port for JMX is the same as the web console, and the default value is 7001.
Setting Value
Name weblogic
Pull Interval 5
(minutes)
Port 7001
Setting Value
[activeSessions]=0,[activeSessionsPeak]=0,[activeSessionTotal]=0,[numServlet]=4,
[singleThreadedServletPool]=5
Redhat JBOSS
Event Types
In ADMIN > Device Support > Event, search for "boss" in the Description column to see the event types associated
with this device.
Reports
In RESOURCE > Reports , search for jobs" in the Name column to see the reports associated with this application
or device.
Configuration
4. Configure DNS resolution for the JBOSS application server in your FortiSIEM Supervsior, Workers, and Collectors
by adding the IP address and DNS name of the JBOSS application server to their /etc/hosts files. If DNS is
already configured to resolve the JBOSS application server name, you can skip this step.
5. Start JBoss.
${JBoss_Home}/bin/run.sh -b 0.0.0.0
or
${JBoss_Home}/bin/run.sh -b ${Binding IP}
Configuring FortiSIEM to Use the JMX Protocol with JBOSS Application Server
To configure JMX communications between your JBOSS application server and FortiSIEM, you must copy several files
from your application server to the JBOSS configuration directory for each FortiSIEM virtual appliance that will be used
for discovery and performance monitoring jobs. FortiSIEM does not include these files because of licensing restrictions.
You can configure FortiSIEM to communicate with your device, and then initiate discovery of the device. For more
information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
Use these Access Method Definition settings to allow FortiSIEM to access your Redhat JBOSS device over JMX:
Setting Value
Name jboss
Pull Interval 5
(minutes)
Port 8880
Authentication Server
WMI Application type, service Process level metrics: uptime, CPU Performance
mappings Utilization, Memory utilization, Read I/O, Monitoring
Write I/O
Event Types
In ADMIN > Device Support > Event, search for "cisco secure acs" in the Device Type and Description column to
see the event types associated with this device.
Configuration
SNMP
1. Log into the device you want to enable SNMP for as an administrator.
2. Go to Control Panel >Program and Features.
3. Click Turn Windows features on or off .
4. If you are installing on a Windows 7 device, select Simple Network Management Protocol (SNMP).
If you are installing on a Windows 2008 device, in the Server Manager window, go to Features > Add features
> SNMP Services.
5. If necessary, select SNMP to enable the service.
6. Go to Programs > Administrative Tools > Services.
7. to set the SNMP community string and include FortiSIEM in the list of hosts that can access this server via SNMP.
8. Select SNMP Service and right-click Properties.
9. Set the community string to public.
10. Go to the Security tab and enter the FortiSIEM IP Address.
11. Restart the SNMP service.
WMI
Configuring WMI on your device so FortiSIEM can discover and monitor it requires you to create a user who has access
to WMI objects on the device. There are two ways to do this:
l Creating a Generic User Who Does Not Belong to the Local Administrator Group
l Creating a User Who Belongs to the Domain Administrator Group
Creating a Generic User Who Does Not Belong to the Local Administrator Group
Enable Remote WMI Requests by Adding a Monitoring Account to the Distributed COM Users
Group and the Performance Monitor Users Group
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Local Users and
Groups.
2. Right-click Users and select Add User.
3. Create a user.
4. Go to Groups, right-click Distributed COM Users, and then click Add to group.
5. In the Distributed COM Users Properties dialog, click Add.
6. Find the user you created, and then click OK.
This is the account you must use to set up the Performance Monitor Users group permissions.
7. Click OK in the Distributed COM Users Properties dialog, and then close the Computer Management dialog.
8. Repeat steps 4 through 7 for the Performance Monitor Users group.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then Properties.
3. Select the COM Security tab, and then under Access Permissions, click Edit Limits.
4. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
5. Click OK.
6. Under Access Permissions, click EditDefault.
7. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
8. Click OK.
9. Under Launch and Activation Permissions, click Edit Limits.
10. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
11. Click OK.
12. Under Launch and Activation Permissions, click Edit Defaults.
13. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
See the sections on Enabling WMI Privileges and Allowing WMI Access through the Windows Firewall in the
Domain Admin User set up instructions for the remaining steps to configure WMI.
Enable remote WMI requests by Adding a Monitoring Account to the Domain Administrators
Group
1. Go to Start > Control Pane > Administrative Tools > Active Directory Users and Computers > Users.
2. Right-click Users and select Add User.
3. Create a user for the @accelops.com domain.
For example, [email protected].
4. Go to Groups, right-click Administrators, and then click Add to Group.
5. In the Domain Admins Properties dialog, select the Members tab, and then click Add.
6. For Enter the object names to select, enter the user you created in step 3.
7. Click OK to close the Domain Admins Properties dialog.
8. Click OK.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then select Properties.
3. Select the Com Security tab, and then under Access Permissions, click Edit Limits.
4. Find the user you created for the monitoring account, and make sure that user has the permission Allow for both
Local Access and Remote Access.
5. Click OK.
6. In the Com Security tab, under Access Permissions, click Edit Defaults.
7. Find the user you created for the monitoring account, and make sure that user has the permission Allow for
both Local Access and Remote Access.
8. Click OK.
9. In the Com Security tab, under Launch and Activation Permissions, click Edit Limits.
10. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
11. In the Com Security tab, under Launch and Activation Permissions, click Edit Defaults.
12. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
The monitoring account you created must have access to the namespace and sub-namespaces of the monitored
device.
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Services and
Applications.
2. Select WMI Control, and then right-click and select Properties.
3. Select the Security tab.
4. Expand the Root directory and select CIMV2.
5. Click Security.
6. Find the user you created for the monitoring account, and make sure that user has the
permission Allow for Enable Account and Remote Enable.
7. Click Advanced.
8. Select the user you created for the monitoring account, and then click Edit.
9. In the Apply onto menu, select This namespace and subnamespaces.
10. Click OK to close the Permission Entry for CIMV2 dialog.
11. Click OK to close the Advanced Security Settings for CIMV2 dialog.
12. In the left-hand navigation, under Services and Applications, select Services.
13. Select Windows Management Instrumentation, and then click Restart.
Syslog
Passed l Message-Type
Authentication l User-Name
l NAS-IP-Address
l Authen-Failure-Code
l Author-Failure-Code
l Caller-ID
l NAS-Port
l Author-Date
l Group-Name
l Filter Information
l Access Device
l AAA Server
l Proxy-IP-Address
l Source-NAS
l PEAP/EAP-FAST-Clear-Name
l Real Name
RADIUS l User-Name
Accounting l NAS-IP-Address
l NAS-Port
l Group-Name
l Service-Type
l Framed-Protocol
l Framed-IP-Address
l Calling-Station-Id
l Acct-Status-Type
l Acct-Input-Octets
l Acct-Output-Octets
l Acct-Session-Id
l Acct-Session-Time
l Acct-Input-Packets
l Acct-Output-Packets
6. For each of these reports, click Configure under Syslog, and for Syslog Server, enter the IP address of the
FortiSIEM virtual appliance that will receive the syslogs as the syslog server, enter 514 for Port, and set Max
message length to 1024.
7. To make sure your changes take effect, go to System Configuration > Service Control, and click Restart
ACS.
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
l Integration points
l Configuring Cisco ISE
l Configuring FortiSIEM
l Access Credentials
l Parsing and Events
Integration points
Configuring FortiSIEM
FortiSIEM automatically recognizes Cisco ISE syslog as long it follows the following format as shown in the sample
syslog:
<181>Sep 21 06:50:51 fcmb-hq-psn01 CISE_Passed_Authentications 0000066354 3 0 2016-
09-21 06:50:51.516 +01:00 2915312533 5200 NOTICE Passed-Authentication:
Authentication succeeded, ConfigVersionId=287, Device IP Address=1.1.1.1,
DestinationIPAddress=1.1.1.2, DestinationPort=1812, UserName=00-15-65-20-33-E5,
Protocol=Radius, RequestLatency=33, NetworkDeviceName=ACME, User-Name=johndoe, NAS-
IP-Address=1.1.1.2, NAS-Port=50009, Service-Type=Call Check, Framed-IP-
Address=1.1.1.2, Framed-MTU=1500, Called-Station-ID=38-1C-1A-87-87-09, Calling-
Station-ID=00-15-65-20-33-E5, NAS-Port-Type=Ethernet, NAS-Port-Id=FastEthernet0/9,
EAP-Key-Name=, cisco-av-pair=service-type=Call Check, cisco-av-pair=audit-session-
id=AC1B35F8000001240FC38F8A, OriginalUserName=0015652033e5, AcsSessionID=fcmb-hq-
psn01/251903157/22970712, AuthenticationIdentityStore=Internal Endpoints,
AuthenticationMethod=Lookup, SelectedAccessService=Default Network Access,
SelectedAuthorizationProfiles=IP_Phones,
Access Credentials
For Device Type Cisco Identity Solutions Engine, see Access Credentials.
Over 20 events are parsed – see event Types in Resources > Event Types and search for 'Cisco-ISE'.
Cisco Duo
API Host name and Device Type from LOG 4 log types Security and Compliance
Event Types
Go to Admin > Device Type > Event Types and search for “Cisco-Duo”.
Rules
None
Reports
None
Configuring FortiSIEM
Use these Access Method Definition settings to allow FortiSIEM to access Cisco Duo logs.
Setting Value
Pull Interval 2
(minutes)
Secret Key Enter the secret key you obtained from Cisco
Duo.
Setting Value
3. In Step 2, click Add to create a new association between the credential and the API hostname.
4. Select Test Connectivity without Ping. A pop up will appear and show the connectivity results.
Sample Events
Event Types
In ADMIN > Device Support > Event, search for "CyberArk-Vault" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Fortinet FortiAuthenticator
SNMP Vendor, OS, Model, Network Interface Stat, Authentication Stat Performance Monitoring
Interfaces
Syslog LOG Discovery Over 150 event types Security and Compliance
Event Types
Configuration
SNMP Application type Process level CPU utilization, Memory utilization Performance
Monitoring
WMI Application type, Process level metrics: uptime, CPU Utilization, Performance
service mappings Memory utilization, Read I/O, Write I/O Monitoring
Syslog Application type Successful and Failed Authentications, Successful Security Monitoring and
and Failed administrative logons, RADIUS compliance
accounting logs
Event Types
In ADMIN > Device Support > Event, search for "Juniper Steel-Belted RADIUS" in the Device Type column to see
the event types associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Syslog
1. Login as administrator.
2. Install and configure Epilog application to convert log files written by Steelbelted RADIUS server into syslogs for
sending to FortiSIEM:
a. Download Epilog from Epilog download site and install it on your Windows Server.
b. Launch Epilog from Start→All Programs→InterSect Alliance→Epilog for windows.
c. Configure Epilog application as follows:
i. Select Log Configuration on left hand panel, click Add button to add log files whose content must be sent
to FortiSIEM. These log files are written by the Steelbelted RADIUS server and their paths are correct.
Also make sure the Log Type is SteelbeltedLog.
ii. Select Network Configuration on left hand panel. On the right, set the destination address to that of
FortiSIEM server, port to 514 and make sure that syslog header is enabled. Then click Change
Configuration button.
iii. Click the "Apply the latest audit configuration" link on the left hand side to apply the changes to Epilog
applications. DHCP logs will now sent to FortiSIEM in real time.
WMI
Syslog
Event Types
In ADMIN > Device Support > Event, search for "microsoft isa" in the Description column to see the event types
associated with this device.
Configuration
WMI
Syslog
You must configure your Microsoft Internet Authentication Server to save logs, and then you can use the Windows
Agent Manager to configure the type of log information you want sent to FortiSIEM.
1. Log in to your server as an administrator.
2. Go to Start > Administrative Tools > Internet Authentication Service.
3. In the left-hand navigation, select Remote Access Logging, then select Local File.
4. Right-click on Local File to open the Properties menu, and then select Log File.
5. For Directory, enter C:\WINDOWS\system32\LogFiles\IAS.
6. Click OK.
You can now use Windows Agent Installation Guide to configure what information will be sent to FortiSIEM.
l Integration Points
l Configuration
l Setting for Access Credentials
l Sample Events
Integration Points
Syslog Host name, Reporting IP None AAA based login events Security monitoring
Event Types
In ADMIN > Device Support > Event, search for "MS-NPS" to see the event types associated with this device.
Rules
No specific rules are written for Microsoft Network Policy Server but regular AA Server rules apply.
Reports
No specific reports are written for Microsoft Network Policy Server but regular AA Server reports apply.
Configuration
Configure Microsoft Network Policy Server system to send logs to FortiSIEM in the supported format (see Sample
Events). See https://docs.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-accounting-
configure.
None required.
Sample Events
"HOSTXXVPN","RAS",03/10/2019,03:47:04,4,"domain\user",,"10.1.1.130","192.168.22.2",,"172.17.22
0.130",
"HOSTXXVPN","10.5.5.212",387,,"10.5.5.212","HOSTXXVPN",1552214822,,5,,1,2,,,0,
"311 1 fe80::a1bf:5c1c:7ebc:6ab7 02/07/2019 04:24:00
4805",,,,,2,,268050551,253119217,"4806",3,69101,833955,726102,1,"1251",1,,79617,1,
"192.168.22.2","10.1.1.130",,,,,,,"MSRASV5.20",311,,"0x00504F4C42",0,,
"Microsoft Routing and Remote Access Service Policy",,,,"MSRAS-0-HOST123413","MSRASV5.20"
l Integration points
l Configuring OneIdentity Safeguard
l Parsing and Events
Integration points
Configuring OneIdentitySafeguard
Configuring FortiSIEM
FortiSIEM automatically recognizes OneIdentity Safeguard syslog as long as it follows the following format in the
sample syslog:
<123>2018-10-08T22:59:49+08:00 scbdemo.balabit zorp/scb_rdp[31769]: core.debug(4):
(svc/i9CTbTzV2wrRur3quVRzF4/GET_gateway_rdp:498:2): After NAT mapping; nat_
type='0', src_addr='AF_INET(10.19.9.245:0)', dst_addr='AF_INET(10.46.26.196:3389)',
new_addr='AF_INET(10.11.101.30:0)'
Over 50 events are parsed – see event Types in Resources > Event Types and search for 'OneIdentity-Safeguard-'.
Vasco DigiPass
Event Types
In ADMIN > Device Support > Event, search for "Vasco DigiPass" in the Device Type column to see the event types
associated with this device. Some important ones are:
l Vasco-DigiPass-KeyServer-AdminLogon-Success
l Vasco-DigiPass-KeyServer-UserAuth-Success
l Vasco-DigiPass-KeyServer-UserAuth-Failed
l Vasco-DigiPass-KeyServer-AccountLocked
l Vasco-DigiPass-KeyServer-AccountUnlocked
Configuration
Configure the Vasco DigiPass management Console to send syslog to FortiSIEM. FortiSIEM is going to parse the logs
automatically. Make sure the syslog format is as follows.
May 16 18:21:50 vascoservername ikeyserver[3575]: {Success}, {Administration}, {S-001003}, {A
command of type [User] [Unlock] was successful.}, {0xA46B6230BA60B240CE48011B0C30D393},
{Source Location:10.1.2.3}, {Client Location:10.1.2.3}, {User ID:flast}, {Domain:company.com},
{Input Details: {User ID : flast} {Domain Name : company.com}}, {Output Details: {User ID :
flast} {Password : ********} {Created Time : 2013/05/13 19:06:52} {Modified Time : 2013/05/16
18:21:49} {Has Digipass : Unassigned} {Status : 0} {Domain Name : company.com} {Local
Authentication : Default} {Back-end Authentication : Default} {Disabled : no} {Lock Count : 0}
{Locked : no} {Last Password Set Time : 2013/05/13 19:06:52} {Static Password History :
d0NdVMhSdvdNEQJkkKTWmiq8iB4K1dWreMf5FQlZM7U=} {Key ID : SSMINSTALLSENSITIVEKEY}},
{Object:User}, {Command:Unlock}, {Client Type:Administration Program}
Database Server
WMI Application Process level metrics: uptime, CPU utilization, Memory utilization, Performance
type, service Read I/O KBytes/sec, Write I/O KBytes/sec Monitoring
mappings
JDBC None Database audit trail: Successful and failed database log on, Security
Database CREATE/DELETE/MODIFY operations, Table Monitoring
CREATE/DELETE/MODIFY/INSERT operations
Event Types
In ADMIN > Device Support > Event, search for "db2" in the Device Type and Description column to see the
event types associated with this device.
Configuration
Setting Value
Setting Value
User ID The username you want to use to access this Server from
FortiSIEM
1. Create a non-admin user on Windows, for example “AoAuditUser” , and set password
2. Login DB2 task center, add the user to DB Users, connect it to database
3. Grant Permission (use Administrator), use commands below
a. Grant audit permission to db2admin
db2 connect to sample user administrator using 'ProspectHills!'
DB2 GRANT EXECUTE ON PROCEDURE SYSPROC.AUDIT_ARCHIVE TO DB2ADMIN
DB2 GRANT EXECUTE ON PROCEDURE SYSPROC.AUDIT_DELIM_EXTRACT TO DB2ADMIN
db2 grant load on database to db2admin
db2 grant secadm on database to db2admin
db2 connect reset
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device:
Values for Used For = Audit:
Setting Value
Name db2_linux
Pull Interval 5
(minutes)
Port 50000
Setting Value
Setting Value
Name db2_linux
Pull Interval 5
(minutes)
Port 50000
Sample Events
IBMDB2_CHECKING_OBJECT
<134>May 14 13:57:39 10.1.2.68 java: [IBMDB2_CHECKING_OBJECT]:[eventSeverity]=PHL_INFO,
[objName]=TABLES,[srcIpAddr]=127.0.0.1,[srcApp]=DB2HMON,[dbName]=SAMPLE,[appVersion]=DB2
v10.1.0.0,[instanceName]=db2inst1,[eventTime]=2014-05-14-13.44.41.085567,[user]=db2inst1,
[eventCategory]=CHECKING,[dbRetCode]=0
IBMDB2_CHECKING_FUNCTION
<134>May 14 13:57:39 10.1.2.68 java: [IBMDB2_CHECKING_FUNCTION]:[eventSeverity]=PHL_INFO,
[objName]=CHECKING,[srcIpAddr]=127.0.0.1,[srcApp]=DB2HMON,[dbName]=SAMPLE,[appVersion]=DB2
v10.1.0.0,[instanceName]=db2inst1,[eventTime]=2014-05-14-13.44.40.739649,[user]=db2inst1,
[eventCategory]=CHECKING,[dbRetCode]=0
IBMDB2_STATEMENT
<134>May 14 13:57:40 10.1.2.68 java: [IBMDB2_STATEMENT]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=127.0.0.1,[srcApp]=db2bp,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.48.59.433204,[user]=db2inst1,
[eventCategory]=EXECUTE,[dbRetCode]=0
IBMDB2_COMMIT
<134>May 14 13:57:40 10.1.2.68 java: [IBMDB2_COMMIT]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=10.1.2.81,[srcApp]=db2jcc_application,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.51.30.447924,[srcName]=SP81,[user]=db2inst1,
[eventCategory]=EXECUTE,[dbRetCode]=0
IBMDB2_ROLLBACK
<134>May 14 13:57:40 10.1.2.68 java: [IBMDB2_ROLLBACK]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=127.0.0.1,[srcApp]=db2bp,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.43.43.827986,[user]=db2inst1,
[eventCategory]=EXECUTE,[dbRetCode]=0
IBMDB2_CONNECT
<134>May 14 13:57:40 10.1.2.68 java: [IBMDB2_CONNECT]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=127.0.0.1,[srcApp]=DB2HMON,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.44.39.991288,[user]=db2inst1,
[eventCategory]=EXECUTE,[dbRetCode]=0
IBMDB2_CONNECT_RESET
<134>May 14 13:57:40 10.1.2.68 java: [IBMDB2_CONNECT_RESET]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=127.0.0.1,[srcApp]=db2bp,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.43.43.829149,[user]=db2inst1,
[eventCategory]=EXECUTE,[dbRetCode]=0
IBMDB2_CREATE_OBJECT
<134>May 14 13:57:40 10.1.2.68 java: [IBMDB2_CREATE_OBJECT]:[eventSeverity]=PHL_INFO,
[objName]=CAN_MONITOR=CAN_MONITOR_FUNC,[srcIpAddr]=10.1.2.68,[srcApp]=DS_ConnMgt_,
[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,[instanceName]=db2inst1,[eventTime]=2014-05-14-
13.30.14.827242,[srcName]=10.1.2.68,[user]=db2inst1,[eventCategory]=OBJMAINT,[dbRetCode]=0
IBMDB2_JDBC_PULL_STAT
<134>May 14 13:57:39 10.1.2.68 java: [IBMDB2_JDBC_PULL_STAT]:[eventSeverity]=PHL_INFO,
[reptModel]=DB2,[dbName]=SAMPLE,[instanceName]=db2inst1,[reptVendor]=IBM,[rptIp]=10.1.2.68,
[auditEventCount]=30,[relayIp]=10.1.2.68,[dbEventCategory]=db2inst1.AUDIT,[appGroupName]=IBM
DB2 Server
IBMDB2_ARCHIVE
<134>May 14 13:57:39 10.1.2.68 java: [IBMDB2_ARCHIVE]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=127.0.0.1,[srcApp]=db2bp,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.43.44.002046,[user]=db2inst1,
[eventCategory]=AUDIT,[dbRetCode]=0
IBMDB2_EXTRACT
<134>May 14 13:57:39 10.1.2.68 java: [IBMDB2_EXTRACT]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=127.0.0.1,[srcApp]=db2bp,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.38.45.865016,[user]=db2inst1,
[eventCategory]=AUDIT,[dbRetCode]=0
IBMDB2_LIST_LOGS
<134>May 14 14:03:39 10.1.2.68 java: [IBMDB2_LIST_LOGS]:[eventSeverity]=PHL_INFO,
[srcIpAddr]=127.0.0.1,[srcApp]=db2bp,[dbName]=SAMPLE,[appVersion]=DB2 v10.1.0.0,
[instanceName]=db2inst1,[eventTime]=2014-05-14-13.58.43.204054,[user]=db2inst1,
[eventCategory]=AUDIT,[dbRetCode]=0
l Supported Versions
l What is Discovered and Monitored
l Configuration
l Settings for Access Credentials
l Sample Events
Supported Versions
The following protocols are used to discover and monitor various aspects of Microsoft SQL server.
SNMP Application type Process level CPU and memory Performance Monitoring
utilization
WMI Application type, service Process level metrics: uptime, Performance Monitoring
mappings CPU utilization, Memory utilization,
Read I/O KBytes/sec, Write I/O
KBytes/sec
Event Types
In ADMIN > Device Support > Event, search for "sql server" in the Device Name and Description column to see
the event types associated with this device.
Rules
In RESOURCE > Rules, search for " sql server" in the Name column to see the rules associated with this application
or device.
Reports
In RESOURCE > Reports , search for "sql server" in the Name column to see the reports associated with this
application or device.
Configuration
SNMP
WMI
1. Log in to your SQL Server with an sa account, and then create a read-only user to access system tables.
EXEC SP_ADDLOGIN 'AOPerfLogin', 'ProspectHills!', 'master';
EXEC SP_ADDROLE 'AOPerfRole';
EXEC SP_ADDUSER 'AOPerfLogin', 'AOPerfUser', 'AOPerfRole';
GRANT VIEW SERVER STATE TO AOPerfLogin;
GRANT SELECT ON dbo.sysperfinfo TO AOPerfRole;
GRANT EXEC on xp_readerrorlog to AOPerfRole
2. Log in with your newly created read-only account and run these commands.
Check to see if you get the same results with your read-only account as you do with your sa account.
SP_WHO2 'active';
SELECT * FROM sys.databases;
SELECT * FROM dbo.sysperfinfo;
SELECT COUNT(*) as count FROM sysprocesses GROUP BY loginame;
3. The following additional configuration steps should be performed for the collection of Logon Failures.
l For Server 2012 - https://technet.microsoft.com/en-us/library/ms175850(v=sql.110).aspx
1. Log in to your SQL Server with an sa account, and then create a read-only user to access system tables.
EXEC SP_ADDLOGIN 'AOPerfLogin', 'ProspectHills!', 'master';
EXEC SP_ADDROLE 'AOPerfRole';
EXEC SP_ADDUSER 'AOPerfLogin', 'AOPerfUser', 'AOPerfRole';
GRANT VIEW SERVER STATE TO AOPerfLogin;
GRANT SELECT ON dbo.sysperfinfo TO AOPerfRole;
GRANT EXEC on xp_readerrorlog to AOPerfRole
2. Save the four SQL Server Scripts as separate files to My Documents > SQL Server Management Studio >
Projects:
l SQL Server database-level event creation script (PH_Database_Level_Events.sql)
l SQL Server trigger creation script (PH_LogonEventsTrigger.sql)
l SQL Server DDL event creation script (PH_DDL_Server_Level_Events.sql)
l SQL Server table creation script (PH_EventDB_Tables_Create.sql)
See Setting Access Credentials in the Microsoft Windows Server Configuration section.
Settings for SQL Server JDBC Access Credentials for Performance Monitoring
Use these Access Method Definition settings to allow FortiSIEM to communicate with your SQL Server over JDBC
for performance monitoring:
If multiple database instances are running on the same server, then each instance must run on a separate port, and you
must create a separate access credential for each instance. You must also remember to associate each instance with
the server's IP number for the Device Credential Mapping Definition.
Setting Value
Pull Interval 5
(minutes)
Port 1433
Settings for SQL Server JDBC Access Credentials for Database Audit Trail Collection
Use these Access Method Definition settings to allow FortiSIEM to communicate with your SQL Server database
instance over JDBC for database audit trail collection:
If multiple database instances are running on the same server, then each instance must run on a separate port, and you
must create a separate access credential for each instance. You must also remember to associate each instance with
the server's IP number for the Device Credential Mapping Definition.
Setting Value
Pull Interval 5
(minutes)
Port 1433
Since audit tables grow after time, it is often a good idea to create a database truncate script that can run as a
maintenance task and keep the table size under control. it is often necessary to create a database truncate procedure
as follows
1. Log into Microsoft SQL Management Studio and connect to the DB instance.
2. Under Management, go to Maintenance Plans, and create a new plan with the name RemoveOldLogs.
3. For Subplan, enter TRUNCATE, and for Description, enter TRUNCATE TABLE.
4. Click the Calendar icon to create a recurring, daily task starting at 12:00AM and running every 30 minutes until
11:59:59PM.
5. Go to View > Tool Box > Execute T-SQL Statement.
A T-SQL box will be added to the subplan.
6. In the T-SQL box, enter this command
use PH_Events;
EXEC sp_MSForEachTable 'TRUNCATE TABLE ?';
7. Click OK.
8. You will be able to see the history of this script's actions by right-clicking on the maintenance task, and then
selecting View History.
Settings for MySQL Server JBDC Access Credentials for Synthetic Transaction Monitoring, Snort Audit,
McAfee VulnMgr
Use these Access Method Definition settings to allow FortiSIEM to communicate with your Microsoft SQL Server
over JDBC for Synthetic Transaction Monitoring, Snort Audit, or McAfee VulnMgr:
Setting Value
Name <name>
Pull Interval 5
(minutes)
Port 1433
Sample Events
[dbDataFileSizeKB]=109504,[dbLogFileUsedKB]=434,[dbLogGrowthCount]=4,[dbLogShrinkCount]=0,
[dbTransPerSec]=0.96,[dbLogFlushPerSec]=0.01,[dbLogCacheHitRatio]=44.44,
[appVersion]=Microsoft SQL Server 2008 R2 (RTM) - 10.50.1600.1 (X64),[serverName]=WIN-08-
VCENTER,[instanceName]=MSSQLSERVER,[appPort]=1433
Generic Info
[PH_DEV_MON_PERF_MSSQL_GEN_INFO]:[eventSeverity]=PHL_INFO,[dbName]= tempdb,[dbSize]= 3.0,
[dbowner]= sa,[dbId]= 2,[dbcreated]= 1321545600,
[dbstatus]= Status=ONLINE; Updateability=READ_WRITE; UserAccess=MULTI_USER; Recovery=SIMPLE;
Version=655; Collation=SQL_Latin1_General_CP1_CI_AS; SQLSortOrder=52; IsAutoCreateStatistics;
IsAutoUpdateStatistics,
[dbcompatibilityLevel]= 100,[spaceAvailable]= 0.9,[appVersion]= Microsoft SQL Server 2008
(RTM) - 10.0.1600.22 (Intel X86),[serverName]= WIN03MSSQL\SQLEXPRESS
Config Info
[PH_DEV_MON_PERF_MSSQL_CONFIG_INFO]:[eventSeverity]=PHL_INFO,[configureName]= user instances
enabled,[configMinimum]= 0,[configMaximum]= 1,[dbConfigValue]= 1,
[configRunValue]= 1,[appVersion]= Microsoft SQL Server 2008 (RTM) - 10.0.1600.22 (Intel X86),
[serverName]= WIN03MSSQL\SQLEXPRESS
Locking Info
[PH_DEV_MON_PERF_MSSQL_LOCK_INFO]:[eventSeverity]=PHL_INFO,[dbId]= 4,[objId]= 1792725439,
[lockType]= PAG,[lockedResource]= 1:1256,[lockMode]= IX,
[lockStatus]= GRANT,[appVersion]= Microsoft SQL Server 2008 (RTM) - 10.0.1600.22 (Intel X86),
[serverName]= WIN03MSSQL\SQLEXPRESS
Blocking Info
[PH_DEV_MON_PERF_MSSQL_BLOCKBY_INFO]:[eventSeverity]=PHL_INFO,[blockedSpId]= 51,
[blockedLoginUser]= WIN03MSSQL\Administrator,[blockedDbName]= msdb,
[blockedCommand]= UPDATE,[blockedProcessName]= Microsoft SQL Server Management Studio - Query,
[blockingSpId]= 54,[blockingLoginUser]= WIN03MSSQL\Administrator,
[blockingDbName]= msdb,[blockingCommand]= AWAITING COMMAND,[blockingProcessName]= Microsoft
SQL Server Management Studio - Query,[blockedDuration]= 5180936,
[appVersion]= Microsoft SQL Server 2008 (RTM) - 10.0.1600.22 (Intel X86),[serverName]=
WIN03MSSQL\SQLEXPRESS
Error Log
[PH_DEV_MON_PERF_MSSQL_ERROR_LOG_INFO]:[eventSeverity]=PHL_INFO,[logDate]= 1321585903,
[processInfo]= spid52,[logText]= Starting up database 'ReportServer$SQLEXPRESSTempDB'.,
[appVersion]= Microsoft SQL Server 2008 (RTM) - 10.0.1600.22 (Intel X86),[serverName]=
WIN03MSSQL\SQLEXPRESS
Logon Events
134>Feb 08 02:55:34 10.1.2.54 java: [MSSQL_Logon_Success]:[eventSeverity]=PHL_INFO,
[eventTime]=2014-02-08 02:54:00.977, [rptIp]=10.1.2.54, [relayIp]=10.1.2.54, [srcName]=<local
machine>, [user]=NT SERVICE\ReportServer$MSSQLSERVEJIANFA, [srcApp]=Report Server,
[instanceName]=MSSQLSERVEJIANFA, [procId]=52, [loginType]=Windows (NT) Login,
This script is to create a server level trigger called PH_LoginEvents. It will record all logon events when a user
establishes a session to the database server. The trigger locates at the database server > Server Objects >
Triggers.
CREATE TRIGGER PH_LoginEvents
ON ALL SERVER WITH EXECUTE AS self
FOR LOGON
AS
BEGIN
DECLARE @event XML
SET @event = EVENTDATA()
INSERT INTO PH_Events.dbo.LogonEvents
(EventTime,EventType,SPID,ServerName,LoginName,LoginType,SID,HostName,IsPooled,AppName,XMLEven
t)
VALUES(CAST(CAST(@event.query('/EVENT_INSTANCE/PostTime/text()') AS VARCHAR(64)) AS DATETIME),
CAST(@event.query('/EVENT_INSTANCE/EventType/text()') AS VARCHAR(128)),
CAST(@event.query('/EVENT_INSTANCE/SPID/text()') AS VARCHAR(128)),
CAST(@event.query('/EVENT_INSTANCE/ServerName/text()') AS VARCHAR(128)),
CAST(@event.query('/EVENT_INSTANCE/LoginName/text()') AS VARCHAR(128)),
CAST(@event.query('/EVENT_INSTANCE/LoginType/text()') AS VARCHAR(128)),
CAST(@event.query('/EVENT_INSTANCE/SID/text()') AS VARCHAR(128)),
CAST(@event.query('/EVENT_INSTANCE/ClientHost/text()') AS VARCHAR(128)),
CAST(@event.query('/EVENT_INSTANCE/IsPooled/text()') AS VARCHAR(128)),
APP_NAME(),
@event)
END;
GO
CREATE TABLE PH_Events.dbo.DDLEvents
(
XMLEvent XML,
DatabaseName VARCHAR(64),
EventTime DATETIME DEFAULT (GETDATE()),
EventType VARCHAR(128),
SPID VARCHAR(128),
ServerName VARCHAR(128),
LoginName VARCHAR(128),
ObjectName VARCHAR(128),
ObjectType VARCHAR(128),
SchemaName VARCHAR(128),
CommandText VARCHAR(128)
)
GO
CREATE TABLE PH_Events.dbo.LogonEvents
(
XMLEvent XML,
EventTime DATETIME,
EventType VARCHAR(128),
SPID VARCHAR(128),
ServerName VARCHAR(128),
LoginName VARCHAR(128),
LoginType VARCHAR(128),
SID VARCHAR(128),
HostName VARCHAR(128),
IsPooled VARCHAR(128),
AppName VARCHAR(255)
)
USE master;
GO
CREATE TRIGGER PH_Database_Level_Events on DATABASE
FOR DDL_DATABASE_LEVEL_EVENTS
AS
DECLARE @eventData AS XML;
SET @eventData = EVENTDATA();
INSERT INTO PH_Events.dbo.DDLEvents(EventTime, EventType, SPID, ServerName, LoginName,
ObjectName, ObjectType, SchemaName, DatabaseName, CommandText, XMLEvent)
VALUES(cast(@eventData.query('data(//PostTime)') as varchar(64)),
cast(@eventData.query('data(//EventType)') as varchar(128)),
cast(@eventData.query('data(//SPID)') as varchar(128)),
cast(@eventData.query('data(//ServerName)') as varchar(128)),
cast(@eventData.query('data(//LoginName)') as varchar(128)),
cast(@eventData.query('data(//ObjectName)') as varchar(128)),
cast(@eventData.query('data(//ObjectType)') as varchar(128)),
cast(@eventData.query('data(//SchemaName)') as varchar(128)),
cast(@eventData.query('data(//DatabaseName)') as varchar(64)),
cast(@eventData.query('data(//TSQLCommand/CommandText)') AS NVARCHAR(MAX)),
@eventData
);
MySQL Server
WMI Application Process level metrics: uptime, CPU utilization, Memory utilization, Performance
type, service Read I/O KBytes/sec, Write I/O KBytes/sec Monitoring
mappings
JDBC None Database audit trail: Successful and failed database log on, Security
Database CREATE/DELETE/MODIFY operations, Table Monitoring
CREATE/DELETE/MODIFY/INSERT operations
Event Types
In ADMIN > Device Support > Event, search for "mysql" in the Device Type and Description columns to see the
event types associated with this device.
Rules
In RESOURCE > Rules, search for "mysql" in the Name column to see the rules associated with this application or
device.
Reports
In RESOURCE > Reports , search for ""mysql" in the Name and Description columns to see the reports associated
with this application or device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device. For more
information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
You must configure your MySQL Server to write audit logs to a database table. This topic in the MySQL documentation
explains more about how to set the destination tables for log outputs.
1. Start MySQL server with TABLE output enabled.
bin/mysqld_safe --user=mysql --log-output=TABLE &
2. Login to mysql, run the following SQL commands to enable general.log in MyISAM.
SET @old_log_state = @@global.general_log;
SET GLOBAL general_log = 'OFF';
ALTER TABLE mysql.general_log ENGINE = MyISAM;
SET GLOBAL general_log = @old_log_state;
SET GLOBAL general_log = 'ON';
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Setting Value
Settings for MySQL Server JBDC Access Credentials for Performance Monitoring
Use these Access Method Definition settings to allow FortiSIEM to communicate with your MySQL Server over JDBC
for performance monitoring:
Setting Value
Name MySQL-Performance-Monitoring
Pull Interval 5
(minutes)
Port 3306
Settings for MySQL Server JBDC Access Credentials for Database Auditing
Use these Access Method Definition settings to allow FortiSIEM to communicate with your MySQL Server over JDBC
for database auditing:
Setting Value
Name MySQL-Audit
Pull Interval 5
(minutes)
Port 1433
Settings for MySQL Server JBDC Access Credentials for Synthetic Transaction Monitoring, Snort Audit,
McAfee VulnMgr
Use these Access Method Definition settings to allow FortiSIEM to communicate with your MySQL Server over JDBC
for Synthetic Transaction Monitoring, Snort Audit, or McAfee VulnMgr:
Setting Value
Name <name>
Pull Interval 5
(minutes)
Port 1433
Sample events
Logon/Logoff Events
<134>Apr 29 15:14:54 abc-desktop java: [MYSQL_ Logon_Success]: [eventSeverity]=PHL_INFO,
[eventTime]=2013-04-29 15:14:54, [rptIp]=172.16.22.227,
[srcIp]=172.16.22.227, [user]=admin, [logonTime]=2013-04-29 15:14:54, [logoffTime]=,
[actionName]=Connect, [msg][email protected] on
l Supported Versions
l What is Discovered and Monitored
l Configuration
l Settings for Access Credentials
l Sample Events
Supported Versions
WMI Application Process level metrics: uptime, CPU utilization, Memory utilization, Performance
type, service Read I/O KBytes/sec, Write I/O KBytes/sec Monitoring
mappings
JDBC Database performance metrics: Buffer cache hit ratio, Row cache Performance
hit ratio, Library cache hit ratio, Shared pool free ratio, Wait time Monitoring
ratio, Memory Sorts ratio, Host CPU Util ratio, CPU Time ratio, Disk
Read/Write rates (operations and MBps), Network I/O Rate,
Enqueue Deadlock rate, Database Request rate, User Transaction
rate, User count, Logged on user count, Session Count, System
table space usage, User table space usage, Temp table space
usage, Last backup date, Days since last backup
Table space performance metrics: Table space name, table
space type, table space usage, table space free space, table space
next extent
triggers etc.
Event Types
In ADMIN > Device Support > Event, search for "oracle database" in the Description column to see the event types
associated with this device.
Rules
In RESOURCE > Rules, search for "oracle database" in the Description column to see the rules associated with this
application or device.
Reports
In RESOURCE > Reports , search for "oracle database" in the Name column to see the reports associated with this
application or device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
To configure your Oracle Database Server for performance monitoring by FortiSIEM, you must create a read-only user
who has select permissions for the database. This is the user you will use to create the access credentials for FortiSIEM
to communicate with your database server.
1. Open the SQLPlus application.
2. Log in with a system-level account.
3. Connect to your instance as sysdba.
SQL> conn / as sysdba;
Connected.
4. Create a non-admin user account. (Note: If you already created the phoenix_agent user, you can skip this
step.)
SQL> create user phoenix_agent identified by
"accelops";
User created.
Windows:
sqlplus /nolog
conn / as sysdba;
@%ORACLE_HOME%/rdbms/admin/cataudit.sql;
quit
AUDIT_TRAIL = DB
or
AUDIT_TRAIL = true
5. Turn on auditing.
su - oracle
sqlplus /nolog
conn / as sysdba;
audit session;
quit;
6. Fetch the audit data to make sure the configuration was successful.
su - oracle;
sqlplus phoenix_agent/phoenix_agent_pwd;
select count (*) from dba_audit_trail;
You should see the count changing after logging on a few times.
Configuring listener log and error log via SNARE - Oracle side
v. Click the "Apply the latest audit configuration" link on the left hand side to apply the changes to Epilog
applications. DHCP logs will now sent to FortiSIEM in real time.
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Setting Value
Settings for Oracle Database Server JDBC Access Credentials for Performance Monitoring
Use these Access Method Definition settings to allow FortiSIEM to communicate with your Oracle database server
over JDBC:
Setting Value
Name phoenix_agent_accelops
Pull Interval 5
(minutes)
Port 1521
Sample Events
<172>Oracle Audit[6561]: LENGTH : '158' ACTION :[6] 'COMMIT' DATABASE USER:[8] 'user'
PRIVILEGE :[6] 'SYSDBA' CLIENT USER:[6] 'user' CLIENT TERMINAL:[0] '' STATUS:[1] '0' DBID:[9]
'200958341'
(SERVICE=LISTENER)(VERSION=185599744)) * status * 0
FortiSIEM supports these DHCP and DNS servers for discovery and monitoring.
l Infoblox DNS/DHCP
l ISC BIND DNS
l Linux DHCP
l Microsoft DHCP (2003, 2008)
l Microsoft DNS (2003, 2008)
Infoblox DNS/DHCP
SNMP Host Name, System CPU utilization, Memory utilization, Disk usage, Disk Performance
Hardware model, I/O Monitoring
Serial number,
Network Interfaces,
Running processes,
Installed software
SNMP Zone Transfer metrics: For each zone: DNS Responses Security
Sent, Failed DNS Queries, DNS Referrals, Non-existent DNS Monitoring and
Record Queries, DNS Non-existent Domain Queries, Recursive compliance
DNS Query Received
DNS Cluster Replication metrics: DNS Replication Queue
Status, Sent Queue From Master, Last Sent Time From
Master, Sent Queue To Master, Last Sent Time To Master
DNS Performance metrics: NonAuth DNS Query Count,
NonAuth Avg DNS Latency, Auth DNS Query Count, Auth Avg
DNS Latency, Invalid DNS Port Response, Invalid DNS TXID
Response
DHCP Performance metrics: Discovers/sec, Requests/Sec,
Releases/Sec, Offers/sec, Acks/sec, Nacks/sec, Declines/sec,
Informs/sec
DDNS Update metrics: DDNS Update Success, DDNS
Update Fail, DDNS Update Reject, DDNS Prereq Update
Reject, DDNS Update Latency, DDNS Update Timeout
DHCP subnet usage metrics: For each DHCP Subnet (addr,
mask) - percent used
Event Types
In ADMIN > Device Support > Event, search for "infoblox" in the Device Type and Description columns to see the
event types associated with this device.
Reports
In RESOURCE > Reports , search for "infoblox" in the Name and Description column to see the reports associated
with this application or device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
SNMP Trap
FortiSIEM processes events from this device via SNMP traps sent by the device. Configure the device to send send
SNMP traps to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
Syslog Application DNS name resolution activity: DNS Query Success and Failure by Security
type type Monitoring and
compliance
Event Types
In ADMIN > Device Support > Event, search for "isc bind" in the Device Type and Description column to see the
event types associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Syslog
1. Edit syslog.conf and add a new line: Local7.* @<IP address of the FortiSIEM server>.
2. Restart the syslog daemon by issuing /etc/init.d/syslog restart.
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
Linux DHCP
Syslog Application DHCP address release/renew events that are used by FortiSIEM Security and
type for Identity and location: attributes include IP Address, MAC address, compliance
Host Name (associate
machines to IP
addresses)
Event Types
In ADMIN > Device Support > Event, search for "linux dhcp" in the Device Type column to see the event types
associated with this device.
Configuration
SNMP
Syslog
Sample Syslog
<13>Aug 26 19:28:11 DNS-Pri dhcpd: DHCPREQUEST for 172.16.10.200 (172.16.10.8) from
00:50:56:88:4e:17 (26L2233B1-02)
Setting Value
Microsoft DHCP
l Supported OS
l What is Discovered and Monitored
l Configuration
l Settings for Access Controls
Supported OS
l Windows 2003
l Windows 2008 and 2008 R2
l Windows 2012 and 2012 R2
l Windows 2016
l Windows 2019
SNMP Process details Process level CPU utilization, Memory utilization Performance
Monitoring
Windows Application DHCP address release/renew events that are used by FortiSIEM Security and
Agent type for Identity and location: attributes include IP Address, MAC address, compliance
Host Name (associate
machines to IP
addresses)
Event Types
In ADMIN > Device Support > Event, search for "microsoft dhcp" in the Description column to see the event types
associated with this device.
Configuration
SNMP
WMI
For information on configuring DHCP for FortiSIEM Windows Agent, see Configuring Windows DHCP in the Windows
Agent Installation Guide.
See Setting Access Credentials in the Microsoft Windows Server Configuration section.
Microsoft DNS
l Supported OS
l What is Discovered and Monitored
l Configuration
l Settings for Access Credentials
Supported OS
l Windows 2003
l Windows 2008 and 2008 R2
l Windows 2012 and 2012 R2
l Windows 2016
l Windows 2019
Windows Application DNS name resolution activity: DNS Query Success and Failure by Security
Agent type type Monitoring
Event Types
In ADMIN > Device Support > Event, search for "microsoft dans" in the Description column to see the event types
associated with this device.
Configuration
SNMP
WMI
For information on configuring DNS for FortiSIEM Windows Agent, see Configuring Windows DNS in the Windows
Agent 3.2.0 Installation Guide.
See Setting Access Credentials in the Microsoft Windows Server Configuration section.
Directory Server
WMI "dcdiag -e" command output - detect successful and failed domain Domain
controller diagnostic tests Controller
Replication
status
Event Types
Rules
Reports
Configuration
WMI
If you want to add Active Directory users to FortiSIEM, follow these steps in the FortiSIEM UI.
1. Add the login credentials for Active Directory server and associate them to an IP range.
2. Discover the Active Directory server.
If the Active Directory server is discovered successfully, then all of the users and their properties will be added to
FortiSIEM.
After the users have been added to FortiSIEM, you can re-run discovery to get new changes from Active Directory. You
cannot make changes in FortiSIEM as this will inevitably make FortiSIEM out of synch with Active Directory.
Since Active Directory can contain many users, it is possible to choose a sub-tree by specifying a base DN (see below).
3. From the Active Directory console, select the User that added in FortiSIEM Supervisor.
The following table shows how user attributes in Microsoft Active Directory are shown in the FortiSIEM UI. To find Active
Directory user attributes, take the following steps:
1. Log in to Active Directory.
2. Go to Active Directory Users and Computers.
3. Click View > Enable Advanced Features.
4. Find a user, and take the following steps:
a. Double click user.
b. Click Attribute Editor.
You will see a set of attributes and the values they are set to.
In FortiSIEM, user details can be found in CMDB > Users. First, click the tree node on the left that you have
discovered, then locate the user in the right pane. Attributes are displayed on the main page and under Summary,
Contact, and Member Of.
mail Email
company Company
employeeID Employee ID
manager Manager
I <Not shown>
postalCode ZIP
streetAddress Address
c City
st State
co Country
memberOf Member Of
FortiSIEM supports this document management server for discovery and monitoring.
l Microsoft SharePoint
Microsoft SharePoint
LOGbinder SharePoint logs - Audit trail integrity, Access control changes, Log analysis
Agent Document updates, List updates, Container object updates, Object and
changes, Object Import/Exports, Document views, Information compliance
Management Policy changes
Event Types
In ADMIN > Device Support > Event, search for "sharepoint" in the Description column to see the event types
associated with this device.
Reports
In RESOURCE > Reports , search for "sharepoint" in the Name column to see the reports associated with this
application or device.
Configuration
Microsoft SharePoint logs are supported via LOGbinder SP agent from Monterey Technology group. The agent must be
installed on the SharePoint server. Configure the agent to write logs to Windows Security log. FortiSIEM simply
reads the logs from windows security logs via WMI and categorizes the SharePoint specific events and parses
SharePoint specific attributes.
Healthcare IT
l Integration Points
l Configuration
l Settings for Access Credentials
l Sample Events
Integration Points
Event Types
In ADMIN > Device Support > Event, search for "Epic-SecuritySIEM" to see the event types associated with this
device. There are two events that are parsed:
l Epic-SecuritySIEM-AUTHENTICATION-Query
l Epic-SecuritySIEM-LOGIN-Query
Rules
Reports
Configuration
Configure the Epic-SecuritySIEM system to send logs to FortiSIEM in the supported format (see Sample Events).
None required.
Sample Events
Mail Server
Microsoft Exchange
SNMP Application Process level CPU and memory utilization for the various exchange Performance
type server processes Monitoring
WMI Application Process level metrics: uptime, CPU utilization, Memory utilization, Performance
type, service Read I/O KBytes/sec, Write I/O KBytes/sec for the various exchange Monitoring
mappings server processes
Event Types
In ADMIN > Device Support > Event, search for "microsoft exchange" in the Description column to see the event
types associated with this device.
Reports
In RESOURCE > Reports , search for "microsoft exchange" in the Name column to see the reports associated with
this application or device.
Configuration
SNMP
WMI
See Setting Access Credentials in the Microsoft Windows Server Configuration section.
Sample Logs
Management Server/Appliance
Cisco Overall Health, Tenant Health, Node Health, Cluster Health, Availability and
APIC API Application Health, EPG health, Fault Record, Event record, Log Performance
(REST) Record, Configuration Change Monitoring
Event Types
Go to ADMIN > Device Support > Event and search for "Cisco_ACI".
Rules
Reports
Configuration
Please configure Cisco ACI Appliance so that FortiSIEM can access it via APIC API.
FortiSIEM Configuration
Settings Description
Port 443
Settings Description
3. In Step 2: Enter IP Range to Credential Associations click New and create the association.
a. IP - specify the IP address of the ACI Controller
b. Credential - specify the Name as in 2a
4. Test Connectivity - Run Test Connectivity with or without ping and make sure the test succeeds
5. Check Pull Events tab to make sure that a event pulling entry is created
Sample Events
10","cur":"90","maxSev":"cleared","prev":"100","rn":"health","status":"","twScore":"90","updTs
":"2016-09-05T07:50:08.415+00:00"}}}]
Fortinet FortiInsight
FortiInsight is a unique data security and threat detection solution that delivers advanced threat hunting to help you
spot, respond to, and manage risky behaviors that put your business-critical data at risk. It combines powerful and
flexible Machine Learning with detailed forensics around user actions to bring focus to the facts more rapidly than other
solutions.
l What is Discovered and Monitored
l Event Types
l Rules
l Reports
l Configuration in FortiInsight
l Configuration in FortiSIEM
l Sample Events
FortiInsight API Policy based alerts and AI based alerts Data security, threat protection
This feature allows FortiSIEM to get Policy-based alerts and AI-based alerts from FortiInsight.
Event Types
In RESOURCES > Event Types, enter "FortiInsight" in the Search column to see the event types associated with this
device.
Rules
In RESOURCES > Rules, enter "FortiInsight" in the Search column to see the rules associated with this device.
Reports
No defined reports.
Configuration in FortiInsight
3. Click New API Key to open the New API Key dialog box.
4. Enter a descriptive Name.
5. Click Save to generate the API key. This will download a file containing the API key information (Client ID, Client
Secret, and Name). Make a note of these values; you will need them when you configure FortiSIEM.
Configuration in FortiSIEM
Settings Description
Sample Events
[FORTIINSIGHT_POLICY_ALERT] = {"description":"","events":[{"act":"file
downloaded","app":"chrome.exe","childId":null,"d":"2019-03-
18T13:22:24.344+00:00","id":null,"m":"uqP","mn":{"dh":"tcp://server-10-230-2-
153.lhr5.r.cloudfront.net","dip":"10.1.1.76","dp":61024,"ext":".mkv","fp":"c:\\users\\Administ
rator\\documents\\secret\\prototypedemo1.mkv","fs":2307792448,"loc":
{"altCode":null,"city":"Augsburg","code":"DE","country":"Germany","latitude":"48.3718","longit
ude":"10.8925"},"p":"tcp-ip-
4","sip":"78.47.38.226","sp":443,"ts":1460},"r":"c:\\users\\Administrator\\documents\\secret\\
prototypedemo1.mkv-> tcp://server-54-230-2-153.lhr5.r.cloudfront.net:443","u":"acmeltd__
engineer2"}],"extendedEvents":[{"act":"file
downloaded","app":"chrome.exe","childId":null,"d":"2019-03-
18T13:22:24.344+00:00","id":null,"latestHostname":"mimas","latestIp":"10.10.0.1","m":"uqP","m
n":{"dh":"tcp://server-54-230-2-
153.lhr5.r.cloudfront.net","dip":"10.1.1.76","dp":61024,"ext":".mkv","fp":"c:\\users\\Administ
rator\\documents\\secret\\prototypedemo1.mkv","fs":2307792448,"loc":
{"altCode":null,"city":"Augsburg","code":"DE","country":"Germany","latitude":"48.3718","longit
ude":"10.8925"},"p":"tcp-ip-
4","sip":"78.47.38.226","sp":443,"ts":1460},"r":"c:\\users\\Administrator\\documents\\secret\\
prototypedemo1.mkv-> tcp://server-10-230-2-
153.lhr5.r.cloudfront.net:443","resolvedUsername":"","u":"acmeltd__
engineer2"}],"id":"AWmQ98PYg7b_-i6_5Rvg","labels":[""],"policyId":"default_
6COnUMjTCB8N","policyName":"Browser Download","regimes":
["ZoneFox"],"serverIp":"52.209.49.52","serverName":"fortisiemtest.dev.fortiinsight.cloud","sev
erity":10,"status":"New","time":"2019-03-18T13:22:29.473715+00:00"}
Fortinet FortiManager
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface metrics Availability and
Hardware (utilization, bytes sent and received, packets sent and received, Performance
model, errors, discards and queue lengths) Monitoring
Network
interfaces,
Operating
system version
Event Types
Rules
Reports
Configuration
You can now configure FortiSIEM to communicate with FortiManager. For more information, refer to sections
"Discovery Settings" and "Setting Credentials" in the User Guide. For Device Type Fortinet FortiManager, see
Access Credentials.
Remote Desktop
FortiSIEM supports this remote desktop application for discovery and monitoring.
l Citrix Receiver (ICA)
Event Types
In ADMIN > Device Support > Event, search for "citrix ICA" in the Description column to see the event types
associated with this device.
Reports
In RESOURCE > Reports , search for "citrix ICA" in the Name column to see the reports associated with this
application or device.
Configuration
WMI
Creating a Generic User Who Does Not Belong to the Local Administrator Group
Enable Remote WMI Requests by Adding a Monitoring Account to the Distributed COM Users
Group and the Performance Monitor Users Group
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Local Users and
Groups.
2. Right-click Users and select Add User.
3. Create a user.
4. Go to Groups, right-click Distributed COM Users, and then click Add to group.
5. In the Distributed COM Users Properties dialog, click Add.
6. Find the user you created, and then click OK.
This is the account you must use to set up the Performance Monitor Users group permissions.
7. Click OK in the Distributed COM Users Properties dialog, and then close the Computer Management dialog.
8. Repeat steps 4 through 7 for the Performance Monitor Users group.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then Properties.
3. Select the COM Security tab, and then under Access Permissions, click Edit Limits.
4. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
5. Click OK.
6. Under Access Permissions, click EditDefault.
7. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
8. Click OK.
9. Under Launch and Activation Permissions, click Edit Limits.
10. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
11. Click OK.
12. Under Launch and Activation Permissions, click Edit Defaults.
13. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
See the sections on Enabling WMI Privileges and Allowing WMI Access through the Windows Firewall in the
Domain Admin User set up instructions for the remaining steps to configure WMI.
Enable remote WMI requests by Adding a Monitoring Account to the Domain Administrators
Group
1. Go to Start > Control Pane > Administrative Tools > Active Directory Users and Computers > Users.
2. Right-click Users and select Add User.
3. Create a user for the @accelops.com domain.
For example, [email protected].
4. Go to Groups, right-click Administrators, and then click Add to Group.
5. In the Domain Admins Properties dialog, select the Members tab, and then click Add.
6. For Enter the object names to select, enter the user you created in step 3.
7. Click OK to close the Domain Admins Properties dialog.
8. Click OK.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then select Properties.
3. Select the Com Security tab, and then under Access Permissions, click Edit Limits.
4. Find the user you created for the monitoring account, and make sure that user has the permission Allow for both
Local Access and Remote Access.
5. Click OK.
6. In the Com Security tab, under Access Permissions, click Edit Defaults.
7. Find the user you created for the monitoring account, and make sure that user has the permission Allow for
both Local Access and Remote Access.
8. Click OK.
9. In the Com Security tab, under Launch and Activation Permissions, click Edit Limits.
10. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
11. In the Com Security tab, under Launch and Activation Permissions, click Edit Defaults.
12. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
The monitoring account you created must have access to the namespace and sub-namespaces of the monitored
device.
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Services and
Applications.
2. Select WMI Control, and then right-click and select Properties.
3. Select the Security tab.
4. Expand the Root directory and select CIMV2.
5. Click Security.
6. Find the user you created for the monitoring account, and make sure that user has the
permission Allow for Enable Account and Remote Enable.
7. Click Advanced.
8. Select the user you created for the monitoring account, and then click Edit.
9. In the Apply onto menu, select This namespace and subnamespaces.
10. Click OK to close the Permission Entry for CIMV2 dialog.
11. Click OK to close the Advanced Security Settings for CIMV2 dialog.
12. In the left-hand navigation, under Services and Applications, select Services.
13. Select Windows Management Instrumentation, and then click Restart.
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
FortiSIEM supports the GitHub and GitLab Source Code Control tools for log collection via an API.
l GitHub
l GitLab API
l GitLab CLI
GitHub
l Integration points
l Event Types
l Rules
l Reports
l GitHub API Integration
l Configuring GitHub Server
l Configuring FortiSIEM
Integration points
GitHub API Logs from the GitHub Service Security and Compliance
Event Types
In ADMIN > Device Support > Event, search for "GitHub" to see the event types associated with this device.
Rules
In RESOURCE > Rules, search for "GitHub" to see the rules associated with this device.
Reports
In RESOURCE > Reports, search for "GitHub" to see the reports associated with this device.
Configuring FortiSIEM
Settings Description
User Name and Enter the user name and password for the
Password account created while Configuring GitHub
Server.
Organization Choose the Organization if it is an MSP
deployment and the same credential has to
be used for multiple customers.
GitLab API
l Integration Points
l Event Types
l Rules
l Reports
l Syslog Integration
l API Integration
l Configuring GitLab Server
l Configuring FortiSIEM for GitLab API
l Sample Event
Integration Points
syslog 15 Log files including production.log and application.log – over 130 event types pre- Security and
fixed with 'GitLab-' Compliance
API Code commit, Changes to Projects, Branches, Tag, DiscussionNoted, Tag, Issues, Security and
Snippets, Repositories, User created, deleted, modified. Compliance
Event Types
In RESOURCES > Event Types, enter "GitLab" in the Search field to see the events associated with this device.
Rules
No defined rules.
Reports
In RESOURCES > Reports, enter "GitLab" in the Search column to see the reports associated with this device.
Syslog Integration
Configure GitLab to send syslog to FortiSIEM via UDP on port 514. See here for details.
FortiSIEM will automatically detect GitHLab log patterns and parse the logs. Currently, the following log files are
parsed: api_json.log, application.log, gitaly, gitlab-monitor, gitlab-shell.log, gitlab-workhorse.log, gitlab_
access.log,production.log, production_json.log, Prometheus, Redis, remote-syslog, sidekiq, sidekiq_exporter.log,
unicorn_stderr.log.
Currently, over 134 GitLab event types are parsed. To see the event types:
1. Login to FortiSIEM.
2. Go to RESOURCES > Event Types.
3. Search for 'GitLab'.
Use cases covered via syslog:
l Failed and Successful Login
l Git command execution
l Git API requests
To test for received GitLab events received via syslog:
1. Login to FortiSIEM.
2. Go to ANALYTICS.
3. Click Edit Filters and Time Range:
a. Choose Attributes option.
b. Create Search condition 'Event Type CONTAIN GitLab'.
c. Select Time Range: Last 1 hour
d. Click Apply & Run.
4. See the GitLab events on the GUI.
API Integration
FortiSIEM can also pull logs from GitLab using GitLab API.
Currently, over 134 GitLab event types are parsed. To see the event types:
1. Login to FortiSIEM.
2. Go to RESOURCES > Event Types.
3. Search for 'GitLab'.
Use cases covered via API:
l Code commit – note that the current API does not capture committed files.
l Changes to Projects, Branches, Tag, DiscussionNoted, Tag, Issues, Snippets, Repositories etc
l User created, deleted, modified
For more details, see here.
Use the Personal Access Token in Configuring GitLab Server to enable FortiSIEM access.
1. Login to FortiSIEM.
2. Go to ADMIN > Setup > Credentials.
3. Click New to create a GitLab credential.
4. In Step 1: Enter Credentials, enter these settings in the Access Method Definition dialog box:
Settings Description
Sample Event
url":"https://dac.com/gitmirror"},"author_id":185,"author_username":"
user1","created_at":"2018-11-13T22:30:30.340Z","project_id":553,"push_data":
{"action":"pushed","commit_count":2,"commit_
from":"da5a4fd97fd1f6b7c5a8611c12592eb5e9ff9e2b","commit_title":"Merge \"Fix
bizservice popup display issue and switching org in bizs...","commit_
to":"30d863ece3957aacc95ec45c7663c426c73f38f2","ref":"releases/FCS5_2_1","ref_
type":"branch"},"serverIp":"172.30.35.11","serverName":"abc.com","target_
id":null,"target_iid":null,"target_title":null,"target_type":null}
GitLab CLI
Events that are obtained with the GitLab REST API do not contain up-to-date information. To avoid this limitation,
FortiSIEM uses the GitLab CLI to obtain events from the GitLab server in real time.
l Integration Points
l Event Types
l Rules
l Reports
l Generate an SSH Key in FortiSIEM
l Configure an SSH Key in GitLab
l Configuration in FortiSIEM
l Sample Events
Integration points
Event Types
In RESOURCES > Event Types, enter "GitLab" in the Search field to see the events associated with this device.
Rules
No defined rules.
Reports
In RESOURCES > Reports, enter "GitLab" in the Search column to see the reports associated with this device.
Generate an SSH key for FortiSIEM. The key will allow you to access the GitLab by using Git commands. Use the
following command to generate the public key file and the private key file in the /opt/phoenix/bin/.ssh/
directory.
ssh-keygen -t rsa -b 4096 -C "root@localhost"
Complete these steps to install the SSH key in the GitLab server:
Configuration in FortiSIEM
Settings Description
Sample Events
[PH_DEV_MON_GIT_COMMIT]: [deviceTime]=1547013028,[user]="abc",
[exchMboxName]="[email protected]",
[hashCode]="fa408380aa4296d13aeb24418164994eea2c2737",
[preHashCode]="d9cd6e31346611a4f75dc7fe768f6202a46dd7e6",[title]="Add new file",
[details]="",[updateCount]="1",[deleteCount]="0",[filePath]="testfile2",
[fileType]="testfile2",[repoURL]="[email protected]:abc/testproject_mei_
willremove.git"
SFTP Call Description Records (CDR): Calling Phone IP, Called Phone Performance
IP, Call Duration and Availability
Monitoring
Event Types
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
SFTP
4. The CDR records do not have field definitions, but only values. Field definitions are needed to properly interpret the
values. Make sure that the CDR fields definitions matches the default one supplied by FortiSIEM in
/opt/phoenix/config/AvayaCDRConfig.csv.
FortiSIEM will interpret the CDR record fields according to the field definitions specified
in: /opt/phoenix/config/AvayaCDRConfig.csv and generate events like the following:
Wed Feb 4 14:37:41 2015 1.2.3.4 FortiSIEM-FileLog-AvayaCM [Time of day-
hours]="11" [Time of day-minutes]="36" [Duration-hours]="0" [Duration-
minutes]="00" [Duration-tenths of minutes]="5" [Condition code]="9" [Dialed
number]="5908" [Calling number]="2565522011" [FRL]="5" [Incoming circuit
ID]="001" [Feature flag]="0" [Attendant console]="8" [Incoming TAC]="01 1"
[INS]="0" [IXC]="00" [Packet count]="12" [TSC flag]="1"
Field Value
Protocol SFTP
See Access Credentials to set access and protocol for SMTP, SSH, and Telnet.
SNMP Application System metrics: Uptime, CPU utilization, Memory utilization, Disk Performance
type utilization, Interface utilization, Process count, Per process: CPU Monitoring
utilization, Memory utilization
SNMP VoIP phones Call Manager metrics:Global Info: VoIP phone count, Gateway Availability
and count, Media Device count, Voice mail server count and SIP Trunks Monitoring
registration count broken down by Registered/Unregistered/Rejected status
status (FortiSIEM Event Type: PH_DEV_MON_CCM_GLOBAL_INFO)
SIP Trunk Info: Trunk end point, description, status (FortiSIEM
Event Type: PH_DEV_MON_CCM_SIP_TRUNK_STAT)
SIP Trunk Addition, Deletion: FortiSIEM Event Type: PH_DEV_
MON_CCM_NEW_SIP_TRUNK, PH_DEV_MON_CCM_DEL_SIP_
TRUNK
Gateway Status Info: Gateway name, Gateway IP, description,
status (FortiSIEM Event Types: PH_DEV_MON_CCM_GW_STAT)
Gateway Status Change, Addition, Deletion: FortiSIEM Event
Type: PH_DEV_MON_CCM_GW_STAT_CHANGE, PH_DEV_
MON_CCM_NEW_GW, PH_DEV_MON_CCM_DEL_GWH323
Device Info: H323 Device name, H323 Device IP, description,
status (FortiSIEM Event Types: PH_DEV_MON_CCM_H323_
STAT)
Gateway Status Change, Addition, Deletion: FortiSIEM Event
Type: PH_DEV_MON_CCM_H323_STAT_CHANGE, PH_DEV_
MON_CCM_NEW_H323, PH_DEV_MON_CCM_DEL_H323
Voice Mail Device Info: Voice Mail Device name, Voice Mail
Device IP, description, status (FortiSIEM Event Types: PH_DEV_
MON_CCM_VM_STAT)
Voice Mail Device Status Change, Addition, Deletion:
FortiSIEM Event Type: PH_DEV_MON_CCM_VM_STAT_
CHANGE, PH_DEV_MON_CCM_NEW_VM, PH_DEV_MON_
CCM_DEL_VM
Media Device Info: Media Device name, Media Device IP,
description, status (FortiSIEM Event Types: PH_DEV_MON_CCM_
MEDIA_STAT)
WMI (for Application Process level metrics: Per process: Uptime, CPU utilization, Performance
Windows type, service Memory utilization, Read I/O KBytes/sec, Write I/O KBytes/sec Monitoring
based Call mappings
Managers)
SFTP Call Description Records (CDR): Calling Phone IP, Called Performance
Phone IP, Calling Party Number, Original Called Party Number, and Availability
Final Called Party Number, Call Connect Time, Call Disconnect Monitoring
Time, Call Duration
Call Management Records (CMR): Latency, Jitter, Mos Score -
current, average, min, max for each call in CDR
Syslog Syslog messages from Cisco Call Manager as well as Cisco Unified
Real Time Monitoring Tool (RTMT)
Event Types
In ADMIN > Device Support > Event, search for "cisco_uc" and "cisco_uc_rtmt" in the Display Name column to see
the event types associated with this device.
Rules
In RESOURCE > Rules, search for "cisco call manager" in the Name column to see the rules associated with this
device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Configuring WMI on your device so FortiSIEM can discover and monitor it requires you to create a user who has access
to WMI objects on the device. There are two ways to do this:
l Creating a Generic User Who Does Not Belong to the Local Administrator Group
l Creating a User Who Belongs to the Domain Administrator Group
Creating a Generic User Who Does Not Belong to the Local Administrator Group
Enable Remote WMI Requests by Adding a Monitoring Account to the Distributed COM Users Group and
the Performance Monitor Users Group
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Local Users and
Groups.
2. Right-click Users and select Add User.
3. Create a user.
4. Go to Groups, right-click Distributed COM Users, and then click Add to group.
5. In the Distributed COM Users Properties dialog, click Add.
6. Find the user you created, and then click OK.
This is the account you must use to set up the Performance Monitor Users group permissions.
7. Click OK in the Distributed COM Users Properties dialog, and then close the Computer Management dialog.
8. Repeat steps 4 through 7 for the Performance Monitor Users group.
Enable DCOM Permissions for the Monitoring Account
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then Properties.
3. Select the COM Security tab, and then under Access Permissions, click Edit Limits.
4. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
5. Click OK.
6. Under Access Permissions, click EditDefault.
7. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
8. Click OK.
9. Under Launch and Activation Permissions, click Edit Limits.
10. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
11. Click OK.
12. Under Launch and Activation Permissions, click Edit Defaults.
13. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
See the sections on Enabling WMI Privileges and Allowing WMI Access through the Windows Firewall in the
Domain Admin User set up instructions for the remaining steps to configure WMI.
Enable remote WMI requests by Adding a Monitoring Account to the Domain Administrators
Group
1. Go to Start > Control Pane > Administrative Tools > Active Directory Users and Computers > Users.
2. Right-click Users and select Add User.
3. Create a user for the @accelops.com domain.
For example, [email protected].
4. Go to Groups, right-click Administrators, and then click Add to Group.
5. In the Domain Admins Properties dialog, select the Members tab, and then click Add.
6. For Enter the object names to select, enter the user you created in step 3.
7. Click OK to close the Domain Admins Properties dialog.
8. Click OK.
The monitoring account you created must have access to the namespace and sub-namespaces of the monitored
device.
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Services and
Applications.
2. Select WMI Control, and then right-click and select Properties.
3. Select the Security tab.
4. Expand the Root directory and select CIMV2.
5. Click Security.
6. Find the user you created for the monitoring account, and make sure that user has the
permission Allow for Enable Account and Remote Enable.
7. Click Advanced.
8. Select the user you created for the monitoring account, and then click Edit.
9. In the Apply onto menu, select This namespace and subnamespaces.
10. Click OK to close the Permission Entry for CIMV2 dialog.
11. Click OK to close the Advanced Security Settings for CIMV2 dialog.
12. In the left-hand navigation, under Services and Applications, select Services.
13. Select Windows Management Instrumentation, and then click Restart.
SFTP
Protocol SFTP
6. Click Save.
See Access Credentials to set access and protocol for SMTP, SSH, and Telnet.
SNMP Application System metrics: CPU utilization, Memory utilization, Disk Performance
type utilization, Interface utilization, Hardware Status, Process count, Monitoring
Process level CPU and memory utilization, Install software change
Event Types
Rules
In RESOURCE > Rules, search for "cisco contact center" in the Name column to see the rules associated with this
device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
See Access Credentials to set access and protocol for SMTP, SSH, and Telnet.
SNMP Application System metrics: CPU utilization, Memory utilization, Disk Performance
type utilization, Interface utilization, Hardware Status, Process count, Monitoring
Process level CPU and memory utilization, Install software change
Event Types
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
See Access Credentials to set access and protocol for SMTP, SSH, and Telnet.
SNMP Application System metrics: CPU utilization, Memory utilization, Disk Performance
type utilization, Interface utilization, Hardware Status, Process count, Monitoring
Process level CPU and memory utilization, Install software change
Event Types
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
The following protocols are used to discover and monitor various aspects of Cisco Tandeberg VCS
Event Types
In ADMIN > Device Support > Event, search for "cisco telepresence" in the Description column to see the event
types associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
Syslog Call attempts, Call rejects, Media stats, Request, response, Search Log Analysis
Event Types
In ADMIN > Device Support > Event, search for "Cisco-TVCS" in the Description column to see the event types
associated with this device.
SNMP Application System metrics: CPU utilization, Memory utilization, Disk Performance
type utilization, Interface utilization, Hardware Status, Process count, Monitoring
Process level CPU and memory utilization
Event Types
In ADMIN > Device Support > Event, search for "cisco unity" in the Description column to see the event types
associated with this device.
Rules
In RESOURCES > Rules, search for "cisco unity" in the Name column to see the rules associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
See Access Credentials to set access and protocol for SMTP, SSH, and Telnet.
Web Server
SNMP Application Process level metrics: CPU utilization, Memory utilization Performance
type Monitoring
HTTP(S) Apachemetrics: Uptime, CPU load, Total Accesses, Total Bytes Performance
via the Connections, Requests/sec, Bytes/sec, Bytes/req, Busy Workers, Monitoring
mod- Idle Workers
status
module
Syslog Application W3C access logs: attributes include Client IP, URL, User Agent, Security
type Referrer, HTTP Version, HTTP Method, HTTP Status Code, Sent Monitoring and
Bytes, Received Bytes, Connection Duration compliance
Event Types
In ADMIN > Device Support > Event, search for "apache" in the Device Type and Description column to see the
event types associated with this device.
Reports
In RESOURCES > Reports , search for "apache" in the Name column to see the reports associated with this device.
Configuration
The Apache Web Server Configuration instructions utilizes a reference point for where Apache installs by default. Based
on your own configuration, Apache may be installed in the following locations:
l /etc
l /etc/httpd
l /usr/local
Adjust your configuration according to your installed Apache directory.
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
HTTPS
To communicate with FortiSIEM over HTTPS, you must configure the mod_status module in your Apache web server.
1. Log in to your web server as an administrator.
2. Open the configuration file /etc/Httpd.conf.
3. Modify the file as shown in these code blocks, depending on whether you are connecting over HTTP without
authentication, or over HTTPS with authentication.
Without Authentication
LoadModule status_module modules/mod_status.so
...
ExtendedStatus on
...
#Configuration without authentication
<Location /server-status> SetHandler server-status
Order Deny,Allow
Deny from all
Allow from .foo.com
</Location>
With Authentication
LoadModule status_module modules/mod_status.so
...
ExtendedStatus on
...
#Configuration with authentication
<Location /server-status> SetHandler server-status
Order deny,allow
Deny from all
Allow from all
AuthType Basic
AuthUserFile /etc/httpd/account/users
AuthGroupFile /etc/httpd/account/groups
AuthName "Admin" Require group admin
Satisfy all
</Location>
4. If you are using authentication, you will have to add user authentication credentials.
a. Go to /etc/httpd, and if necessary, create an account directory.
b. In the account directory, create two files, users and groups.
c. In the groups file, enter admin:admin.
d. Create a password for the admin user.
htpasswd --c users admin
5. Reload Apache.
/etc/init.d/httpd reload
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Syslog
/etc/httpd/logs/ssl_access_log
l
b. Go to Network Configuration
i. Set AO System IP(all-in-1 or collector) in Destination Server address (10.1.2.20 here);
ii. Set 514 in Destination Port text area
iii. Click Change Configuration to save the configuration
c. Apply the Latest Audit Configuration. Apache logs will now sent to FortiSIEM in real time.
You must define the format of the logs that Apache will send to FortiSIEM.
1. Open the file /etc/httpd/conf.d/ssl.conf for editing.
2. Add this line to the file.
CustomLog logs/ssl_request_log combined
5. Reload Apache.
/etc/init.d/httpd reload
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
Use these Access Method Definition settings to allow FortiSIEM to communicate with your Apache web server over
https.
Setting Value
Name Apache-https
URL server-status?auto
SNMP Application Process level metrics: CPU utilization, memory utilization Performance
type Monitoring
WMI Application Process level metrics: uptime, CPU Utilization, Memory Performance
type, service utilization, Read I/O, Write I/O Monitoring
mappings IIS metrics: Current Connections, Max Connections, Sent Files,
Received Files, Sent Bytes, Received Bytes, ISAPI Requests, Not
Found Errors
Windows Application W3C access logs: attributes include IIS Service Instance, Client IP, Security
Agent type URL, User Agent, Referrer, HTTP Version, HTTP Method, HTTP Monitoring and
Status Code, Sent Bytes, Received Bytes, Connection Duration compliance
Event Types
In ADMIN > Device Support > Event, search for "microsoft is" in the Description column to see the event types
associated with this device.
Configuration
SNMP
WMI
For information on configuring IIS for FortiSIEM Windows Agent, see Configuring Windows IIS in the Windows Agent
Installation Guide.
See Setting Access Credentials in the Microsoft Windows Server Configuration section.
SNMP Application Process level metrics: CPU utilization, memory utilization Performance
type Monitoring
WMI Application Process level metrics: uptime, CPU Utilization, Memory Performance
type, service utilization, Read I/O, Write I/O Monitoring
mappings IIS metrics: Current Connections, Max Connections, Sent Files,
Received Files, Sent Bytes, Received Bytes, ISAPI Requests, Not
Found Errors
Windows Application W3C access logs: attributes include IIS Service Instance, Client IP, Security
Agent type URL, User Agent, Referrer, HTTP Version, HTTP Method, HTTP Monitoring and
Status Code, Sent Bytes, Received Bytes, Connection Duration compliance
Event Types
In ADMIN > Device Support > Event, search for "microsoft is" in the Description column to see the event types
associated with this device.
Configuration
SNMP
WMI
For information on configuring IIS for FortiSIEM Windows Agent, see Configuring Windows IIS in the Windows Agent
Installation Guide.
See Setting Access Credentials in the Microsoft Windows Server Configuration section.
SNMP Application Process level metrics: CPU utilization, Memory utilization Performance
type Monitoring
Syslog W3C access logs: attributes include Client IP, URL, User Agent, Security
Referrer, HTTP Version, HTTP Method, HTTP Status Code, Sent Monitoring and
Bytes, Received Bytes, Connection Duration compliance
Event Types
In ADMIN > Device Support > Event, search for "nginx" in the Device Type and Description column to see the
event types associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Example nginx Syslog
<29>Jun 15 07:59:03 ny-n1-p2 nginx: "200.158.115.204","-","Mozilla/5.0 (Windows NT 5.1 WOW64;
rv:9.0.1) Gecko/20100178 Firefox/9.0.1","/images/design/header-2-logo.jpg","GET","http://wm-
center.com/images/design/header-2-logo.jpg","200","0","/ypf-cookie_
auth/index.html","0.000","877","-","10.4.200.203","80","wm-center.com","no-cache, no-store,
must-revalidate","-","1.64","_","-","-"
Use these Access Method Definition settings to allow FortiSIEM to communicate with your device over SNMP. Set
the Name and Community String.
Setting Value
Cisco Host name, Chassis status: Input Power, Input Avg Power, Input Max Power, Availability and
UCS API Access IP, Input Min Power, Output Power, Output Avg Power, Output Max Performance
Hardware Power, Output Min Power Monitoring
components - Memory status: Temp (C), Avg Temp (C), Max Temp (C), Min
processors, Temp (C)
chassis, Processor status: Input Current, Input Avg Current, Input Max
blades, board, Current, Input Min Current, Temp (C), Avg Temp (C), Max Temp (C),
cpu, memory, Min Temp (C)
storage, power
Power supply status: Temp (C), Max Temp (C), Avg Temp (C),
supply unit, fan
Min Temp (C), Input 210Volt, Avg Input 210Volt, Max Input 210Volt,
unit
Min Input 210Volt, Output 12Volt, Avg Output 12Volt, Max Output
12Volt, Min Output 12Volt, Output 3V3Volt, Avg Output 3V3Volt,
Max Output 3V3Volt, Min Output 3V3Volt, Output Current, Avg
Output Current, Max Output Current, Min Output Current, Output
Power, Avg Output Power, Max Output Power,Min Output Power
Fan status: Fan Speed, Average Fan Speed, Max Fan Speed, Min
Fan Speed
Event Types
In ADMIN > Device Support > Event, search for "cisco us" in the Description column to see the event types
associated with this device.
Reports
In RESOURCES > Reports , search for "cisco us" in the Name column to see the reports associated with this
application or device.
Configuration
FortiSIEM uses Cisco the Cisco UCS XML API to discover Cisco UCS and to collect hardware statistics. See the Cisco
UCS documentation for information on how to configure your device to connect to FortiSIEM over the API.
You can configure FortiSIEM to communicate with your device, and then initiate discovery of the device. For more
information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Name ucs
Pull Interval 5
(minutes)
Port 5988
User Name The user name you set up in your UCS server to
communicate with FortiSIEM
[PH_DEV_MON_UCS_HW_PSU_STAT]:[eventSeverity]=PHL_INFO,[hostName]=machine,
[hostIpAddr]=10.1.2.36,[hwComponentName]=sys/chassis-1/psu-2,
[envTempdDegC]=47.764706,[envTempAvgDegC]=36.176472,[envTempMaxDegC]=47.764706,
[envTempMinDegC]=25.529411,[input210Volt]=214.294113,
[input210AvgVolt]=210.784317,[input210MaxVolt]=214.294113,[input210MinVolt]=207.823532,
[ouput12Volt]=12.188235,[ouput12AvgVolt]=12.109803,
[ouput12MaxVolt]=12.376471,[ouput12MinVolt]=11.905882,[ouput3V3Volt]=3.141176,
[ouput3V3AvgVolt]=3.374510,[ouput3V3MaxVolt]=3.458823,
[ouput3V3MinVolt]=3.141176,[outputCurrentAmp]=15.686275,[outputCurrentAvgAmp]=20.261436,
[outputCurrentMaxAmp]=24.509804,
[outputCurrentMinAmp]=15.686275,[outputPowerWatt]=191.188004,[outputPowerAvgWatt]=245.736252,
[outputPowerMaxWatt]=303.344879,
[outputPowerMinWatt]=191.188004
[PH_DEV_MON_UCS_HW_PROCESSOR_STAT]:[eventSeverity]=PHL_INFO, [hostName]=machine,
[hostIpAddr]=10.1.2.36,
[hwComponentName]=sys/chassis-1/blade-3/board/cpu-2,
[inputCurrentAmp]=101.101959,[inputCurrentAvgAmp]=63.420914, [inputCurrentMaxAmp]=101.101959,
[inputCurrentMinAmp]=44.580391,
[envTempdDegC]=5.788235,[envTempAvgDegC]=6.216993,[envTempMaxDegC]=6.431373,
[envTempMinDegC]=5.788235,
[PH_DEV_MON_UCS_HW_CHASSIS_STAT]:[eventSeverity\]=PHL_INFO,[hostName]=machine,
[hostIpAddr]=10.1.2.36,[hwComponentName]=sys/chassis-1,
[inputPowerWatt]=7.843137,[inputPowerAvgWatt]=7.843137,[inputPowerMaxWatt]=7.843137,
[inputPowerMinWatt]=7.843137,
outputPowerWatt]=0.000000,[outputPowerAvgWatt]=0.000000,[outputPowerMaxWatt]=0.000000,
[outputPowerMinWatt]=0.000000
[PH_DEV_MON_UCS_HW_MEMORY_STAT]:[eventSeverity]=PHL_INFO,[hostName]=machine,
[hostIpAddr]=10.1.2.36,
[hwComponentName]=sys/chassis-1/blade-1/board/memarray-1/mem-9,[envTempdDegC]=51.000000,
[envTempAvgDegC]=50.128208,
[envTempMaxDegC]=51.000000,[envTempMinDegC]=48.000000
[PH_DEV_MON_UCS_HW_FAN_STAT]:[eventSeverity]=PHL_INFO,[hostName]=machine,
[hostIpAddr]=10.1.2.36,
[hwComponentName]=sys/chassis-1/fan-module-1-5/fan-2,[fanSpeed]=7800.000000,
[fanSpeedAvg]=7049.000000,
[fanSpeedMax]=8550.000000,[fanSpeedMin]=2550.00000
HP BladeSystem
SNMP Host name, Access Hardware status:Fan status, Power supply status, power Availability and
IP, Hardware enclosure status, Overall status Performance
components - Monitoring
processors, chassis,
blades, board, cpu,
memory, storage,
power supply unit,
fan unit
Configuration
SNMP
FortiSIEM uses SNMP to discover the HP BladeSystem and collect hardware statistics. See the instructions on
configuring SNMP in your Bladesystem documentation to enable communications with FortiSIEM.
After you have configured SNMP on your BladeSystem blade server, you can configure FortiSIEM to communicate with
your device. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
See Access Credentials to set access and protocol for SSH, and Telnet.
l Integration Points
l Configuring Alcide.io to Send Logs
l Configuring FortiSIEM to Receive Logs
l Alcid.io Event Types
l Alcide.io Sample Log
Integration Points
No configuration is needed. FortiSIEM can automatically detect and parse Alcide.io logs based on the built in parser.
To monitor AWS resources in FortiSIEM, an access key and a corresponding secret access key is needed. Prior to the
availability of AWS IAM users, the recommendation was to create an access key at the level of root AWS account. This
practice has been deprecated since the availability of AWS IAM users as you can read from the AWS Security
Credentials best practice guide. If you were monitoring AWS using such access keys, the first step is to delete such
keys and create keys based on a standalone IAM user dedicated for monitoring purposes in FortiSIEM. This document
explains how to create such a user, and what permissions and policies to add to allow FortiSIEM to monitor your AWS
environment.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:Get*",
"s3:List*" ],
"Resource": [
"arn:aws:s3:::aocloudtrail1",
"arn:aws:s3:::aocloudtrail2" ]
}
]
}
AWS CloudTrail
Event Types
In ADMIN > Device Support > Event, search for "Cloudtrail" in the Device Type column to see the event types
associated with this device. See the Amazon API reference for more information about the event types available for
CloudTrail monitoring.
Reports
In RESOURCE > Reports, search for "cloudtrail" in the Name column to see the rules associated with this device.
Configuration
If you have not already configured Access Keys and permissions in AWS, please follow the steps outlined in AWS
Access Key IAM Permissions and IAM Policies.
FortiSIEM receives information about AWS events through the CloudTrail API. After creating an S3 bucket for the
storage of log files on AWS, you then configure the Simple Notification Service (SNS) and Simple Queue Service (SQS)
to create a notification for the log file and have it delivered by SQS. In your FortiSIEM virtual appliance you then enter
access credentials so FortiSIEM can communicate with CloudTrail as it would any other device.
Note: Do not add any extra SNS notifications in the SQS queue. The queue should only have one SNS subscription,
otherwise pulling logs will not function.
1. Log in to https://console.aws.amazon.com/cloudtrail.
2. Switch to the region for which you want to generate cloud trail logs.
3. Click Trails.
4. Click on Add New Trail
1. Log in to https://console.aws.amazon.com/sqs.
2. Switch to the region in which you created a new cloudtrail above
3. Click Create New Queue.
4. Enter a Queue Name such as sqsaocloudtrail
Setting Value
1. Log in to https://console.aws.amazon.com/sns.
2. Switch to the region where you created the trail and SQS.
3. Select Topics.
4. Select the SNS topic snsaocloudtrail that you specified when creating a cloudtrail.
5. Click Actions > Subscribe to topic from the menu to launch the popup Create Subscription.
6. For Protocol, select Amazon SQS.
7. For Endpoint, enter the ARN of the queue that you created when setting up SQS.
8. Click Create Subscription.
1. Log in to https://console.aws.amazon.com/sqs.
2. Select the queue you created, sqsaocloudtrail.
3. In the Queue Actions menu, select Subscribe Queue to SNS Topic.
4. From the Choose a Topic dropdown, select the SNS topic snsaocloudtrail that you created earlier.
5. The Topic ARN will be automatically filled.
6. Click Subscribe.
Note: Ensure that SQS, SNS, S3 bucket and CloudTrail are in the same region.
You do not need to initiate discovery of AWS Cloud Trail, but should check that FortiSIEM is pulling events for AWS by
checking for an amazon.com entry in ADMIN > Setup > Event Pulling.
You can configure FortiSIEM to communicate with your device by following the instructions in "Discovery Settings" and
"Setting Credentials" in the User Guide.
Use these Access Method Definition settings to allow FortiSIEM to communicate with the CloudTrail API.
Setting Value
Name aocloudtrail
SQS Queue URL Enter the ARN of your queue without the
http:// prefix.
Password Config See Password Configuration.
hashArgs%23&isauthcode=true
[additionalEventData/MFAUsed]=No [additionalEventData/MobileVersion]=No [awsRegion]=us-east-1
[eventID]=fdf8f837-7e75-46a0-ac95-b6d15993ebf7 [eventName]=ConsoleLogin [eventSource]=SIGNIN
[eventTime]=2014-10-10T06:38:11Z [eventVersion]=1.01 [requestParameters]=null
[responseElements/ConsoleLogin]=Success [sourceIPAddress]=211.144.207.10
[userAgent]=Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/37.0.2062.120 Safari/537.36 [userIdentity/accountId]=623885071509
[userIdentity/arn]=arn:aws:iam::623885071509:user/John.Adams
[userIdentity/principalId]=AIDAIUSNMEIUYBS7AN4UW [userIdentity/type]=IAMUser
[userIdentity/userName]=John.Adams
AWS CloudTrail can generate a lot of events. Follow these recommendations to enable FortiSIEM to keep up with high
EPS CloudTrail events.
1. In the AWS configuration, change the Message retention period of SQS to 1 day.
2. Adjust the CloudTrail event pulling parameters as follows. Go to the Collector that pulls AWS CloudTrail
events. You will find these three relevant parameters in the /opt/phoenix/config/phoenix_config.txt
file:
l cloudtrail_msg_pull_interval (default 30 seconds, minimum recommended 10 seconds) - how
Event Types
Reports
Configuration
Setup in FortiSIEM
Settings Description
c. Click Save.
4. Click Test to test the connection to Amazon AWS EC2.
5. To see the jobs associated with AWS, select ADMIN > Pull Events.
6. To see the received events select ANALYTICS, then enter AWS in the search box.
Event Types
Configuration
If you have not already configured Access Keys and permissions in AWS, please follow the steps outlined in AWS
Access Key IAM Permissions and IAM Policies.
You can configure FortiSIEM to communicate with your device, and then initiate discovery of the device. For more
information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide. You should also be
sure to read the topic Discovering Amazon Web Services (AWS) Infrastructure.
VPC Flow logs are supported. For more information, see HOW TO - Integrate Amazon VPC Flows.
Use these Access Method Definition settings to allow FortiSIEM to access AWS CloudWatch.
Setting Value
Name ec2
Sample events
[PH_DEV_MON_EC2_METRIC]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=6571,[hostName]=ec2-54-81-216-218.compute-1.amazonaws.com,
[hostIpAddr]=10.144.18.131,[cpuUtil]=0.334000,[diskReadKBytesPerSec]=0.000000,
[diskWriteKBytesPerSec]=0.000000,[diskReadReqPerSec]=0.000000,[diskWriteReqPerSec]=0.000000,
[sentBytes]=131,[recvBytes]=165,[sentBitsPerSec]=17.493333,[recvBitsPerSec]=22.026667,
[phLogDetail]=
[PH_DEV_MON_EBS_METRIC]:[eventSeverity]=PHL_INFO,[fileName]=deviceAws.cpp,
[lineNumber]=133,[hostName]=ec2-52-69-215-178.ap-northeast-1.compute.amazonaws.com,
[hostIpAddr]=172.30.0.50,[diskName]=/dev/sda1,[volumeId]=vol-63287d9f,
[diskReadKBytesPerSec]=7.395556,[diskWriteKBytesPerSec]=7.395556,[ioReadsPerSec]=0.000000,
[ioWritesPerSec]=0.010000,[diskQLen]=0,[phLogDetail]=
AWS Kinesis
Amazon Kinesis is an Amazon Web Service (AWS) for processing big data in real time. Kinesis is capable of processing
hundreds of terabytes per hour from high volumes of streaming data from sources such as operating logs, financial
transactions and social media feeds.
l What is Discovered and Monitored
l Event Types
l Rules
l Reports
l Configuring AWS Kinesis
l Configuring FortiSIEM
l Sample Events
Amazon AWS Client Library Streaming data Collect, process, and analyze real-time streaming data.
Event Types
In RESOURCES > Event Types, enter "Kinesis" in the Search column to see the event types associated with this
device.
Rules
No defined rules.
Reports
No defined reports.
1. Use your AWS account ID or account alias, your IAM user name, and your password to sign in to the IAM console.
2. In the navigation bar on the upper right, choose your user name, and then choose My Security Credentials.
3. On the AWS IAM Credentials tab, in the Access keys for CLI, SDK, and API access section, do any of the
following:
l To create an access key, choose Create access key. Then choose Download .csv file to save the access
key ID and secret access key to a .csv file on your computer. Store the file in a secure location. You will not
have access to the secret access key again after this dialog box closes. After you have downloaded the .csv
file, choose Close. When you create an access key, the key pair is active by default, and you can use the pair
right away.
l To disable an active access key, choose Make inactive.
l To reenable an inactive access key, choose Make active.
l To delete an access key, choose its X button at the far right of the row. Then choose Delete to confirm. When
you delete an access key, it's gone forever and cannot be retrieved. However, you can always create new keys.
Configuring ForitSIEM
Settings Description
Sample Events
AWS Kinesis can collect data from different devices or services. The data format is the same as the source data.
AWS RDS
Event Types
Configuration
If you have not already configured Access Keys and permissions in AWS, please follow the steps outlined in AWS
Access Key IAM Permissions and IAM Policies.
Sample Events
[PH_DEV_MON_RDS_METRIC]:[eventSeverity]=PHL_INFO,[fileName]=deviceAwsRDS.cpp,[lineNumber]=104,
[hostName]=mysql1.cmdzvvce07ar.ap-northeast-1.rds.amazonaws.com,[hostIpAddr]=54.64.131.93,
[dbCpuTimeRatio]=1.207500,[dbUserConn]=0,[dbEnqueueDeadlocksPerSec]=0.000587,[freeMemKB]=489,
[freeDiskMB]=4555,[swapMemUtil]=0.000000,[ioReadsPerSec]=0.219985,[ioWritesPerSec]=0.213329,
[devDiskRdLatency]=0.08,[devDiskWrLatency]=0.4029,[phLogDetail]=
Security Hub collects security data from across AWS accounts, services, and supported third-party partner products.
FortiSIEM want to get this data collected by Security Hub and analyze this data to identify the highest priority security
issues.
Event Types
In RESOURCES > Event Types, enter "AWS Sechub" in the Search column to see the event types associated with
this device.
Rules
In RESOURCES > Rules, enter "AWS Sechub" in the Search column to see the rules associated with this device.
Reports
In RESOURCES > Reports, enter "AWS Security Hub" in the Search column to see the reports associated with this
device.
Requirements
FortiSIEM uses PHP V3 SDK to integrate data from the security hub to perform comprehensive security analytics.
Security Hub only collects events from the region where you enabled Security Hub. If you don't enable the Security Hub
for other regions, then you won't get events from those regions. FortiSIEM allows you to specify multiple regions when
you create a new credential. In the regions you specify, the Security Hub will be enabled. These regions should use the
following AWS region codes:
EU (Frankfurt) eu-central-1
EU (Ireland) eu-west-1
EU (London) eu-west-2
EU (Paris) eu-west-3
EU (Stockholm) eu-north-1
},
{
"Effect": "Allow",
"Action": "iam:CreateServiceLinkedRole",
"Resource": "*",
"Condition": {
"StringLike": {
"iam:AWSServiceName": "securityhub.amazonaws.com"
}
}
}
]
}
2. Use the credentials of the IAM identity from step 1 to sign in to the Security Hub console. When you open the
Security Hub console for the first time, choose Get Started and then choose Enable Security Hub.
This feature supports long-term access keys. Access keys consist of two parts: an access key ID and a secret access
key.
Permissions Required
To create access keys for your own IAM user, you must have the permissions from the following policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "CreateOwnAccessKeys",
"Effect": "Allow",
"Action": [
"iam:CreateAccessKey",
"iam:GetUser",
"iam:ListAccessKeys"
],
"Resource": "arn:aws:iam::*:user/${aws:username}"
}
]
}
To create, modify, or delete your own IAM user access keys (console):
1. Use your AWS account ID or account alias, your IAM user name, and your password to sign in to the IAM console.
2. In the navigation bar on the upper right, choose your user name, and then choose My Security Credentials.
3. On the AWS IAM Credentials tab, in the Access keys for CLI, SDK, and API access section, do any of the following:
l To create an access key, choose Create access key. Then choose Download .csv file to save the access key ID
and secret access key to a .csv file on your computer. Store the file in a secure location. You will not have
access to the secret access key again after this dialog box closes. After you have downloaded the .csv file,
choose Close. When you create an access key, the key pair is active by default, and you can use the pair right
away.
l To disable an active access key, choose Make inactive.
l To delete an access key, choose its X button at the far right of the row. Then choose Delete to confirm. When
you delete an access key, it's gone forever and cannot be retrieved. However, you can always create new keys.
Settings Description
Settings Description
Sample Events
[AWS_SECURITY_HUB_EVENT_DATA] ={
"AwsAccountId": "111111111111",
"CreatedAt": "2019-08-06T04:56:44.894Z",
"Description": "10.10.10.72 is performing SSH brute force attacks against i-
0100ee1e110c011c1. Brute force attacks are used to gain unauthorized access to your instance
by guessing the SSH password.",
"FirstObservedAt": "2019-08-06T04:51:14Z",
"GeneratorId": "arn:aws:guardduty:us-west-
2:111111111111:detector/50b2ea07131dbe1530c23facb594b1fa",
"Id": "arn:aws:guardduty:us-west-
2:111111111111:detector/50b2ea07131dbe1530c23facb594b1fa/finding/8cb632a4b32f7c3b854d9f5347bf0
7a4",
"LastObservedAt": "2019-08-06T05:22:54Z",
"ProductArn": "arn:aws:securityhub:us-west-2::product/aws/guardduty",
"ProductFields": {
"action/actionType": "NETWORK_CONNECTION",
"action/networkConnectionAction/blocked": "false",
"action/networkConnectionAction/connectionDirection": "INBOUND",
"action/networkConnectionAction/localPortDetails/port": "22",
"action/networkConnectionAction/localPortDetails/portName": "SSH",
"action/networkConnectionAction/protocol": "TCP",
"action/networkConnectionAction/remoteIpDetails/country/countryName": "China",
"action/networkConnectionAction/remoteIpDetails/geoLocation/lat": "34.7725",
"action/networkConnectionAction/remoteIpDetails/geoLocation/lon": "113.7266",
"action/networkConnectionAction/remoteIpDetails/ipAddressV4": "10.10.10.72",
"action/networkConnectionAction/remoteIpDetails/organization/asn": "56047",
"action/networkConnectionAction/remoteIpDetails/organization/asnOrg": "China Mobile
communications corporation",
"action/networkConnectionAction/remoteIpDetails/organization/isp": "China Mobile Guangdong",
"action/networkConnectionAction/remoteIpDetails/organization/org": "China Mobile",
"action/networkConnectionAction/remotePortDetails/port": "33242",
"action/networkConnectionAction/remotePortDetails/portName": "Unknown",
"archived": "false",
"aws/securityhub/CompanyName": "Amazon",
"aws/securityhub/FindingId": "arn:aws:securityhub:us-west-
2::product/aws/guardduty/arn:aws:guardduty:us-west-
2:111111111111:detector/50b2ea07131dbe1530c23facb594b1fa/finding/8cb632a4b32f7c3b854d9f5347bf0
7a4",
"aws/securityhub/ProductName": "GuardDuty",
"aws/securityhub/SeverityLabel": "MEDIUM",
"count": "7",
"detectorId": "50b2ea07131dbe1530c23facb594b1fa",
"resourceRole": "TARGET"
},
"RecordState": "ACTIVE",
"Resources": [
{
"Details": {
"AwsEc2Instance": {
"ImageId": "ami-f2c2408a",
"IpV4Addresses": [
"10.10.10.20",
"10.0.0.137"
],
"LaunchedAt": "2019-08-05T17:10:47.000Z",
"SubnetId": "subnet-931605f1",
"Type": "m5.4xlarge",
"VpcId": "vpc-c66576a4"
}
},
"Id": "arn:aws:ec2:us-west-2:111111111111:instance/i-0799ee6e490c078c5",
"Partition": "aws",
"Region": "us-west-2",
"Tags": {
"Name": "elasticsearch-node-coordinator"
},
"Type": "AwsEc2Instance"
}
],
"SchemaVersion": "2018-10-08",
"Severity": {
"Normalized": 40,
"Product": 2
},
"Title": "310.10.10.72 is performing SSH brute force attacks against i-0799ee6e490c078c5. ",
"Types": [
"TTPs/Initial Access/UnauthorizedAccess:EC2-SSHBruteForce"
],
"UpdatedAt": "2019-08-06T05:28:24.425Z",
"WorkflowState": "NEW",
"phCustId": 1,
"serverIp": "10.10.10.22",
"serverName": "amzon.com"
}
Box.com
l Integration points
l Box API Integration
l Configuring Box.com Service
l Configuring FortiSIEM
Integration points
FortiSIEM can pull audit events from Box.com Cloud Service via Box API.
Configuring FortiSIEM
Google Apps Admin Configuration Change, Account Create/Delete/Modify, Account Group Security
SDK Create/Delete/Modify, Document Create/Delete/Modify/Download, Monitoring
Document Permission Change, Logon Success, Logon Failure, Device
compromise
Event Types
In ADMIN > Device Support > Event, search for "Google_Apps" in the Search column to see the event types
associated with this device.
Reports
There are many reports defined in Resource > Reports > Device > Application > Document Mgmt. Search for
"Google Apps".
Configuration
Test Connectivity
6. Click Save.
7. Select the entry just created and click Test Connectivity without Ping. A pop up will appear and show the Test
Connectivity results.
8. Go to Admin > Setup > Pull Events and make sure an entry is created for Google Audit Log Collection.
Logon Success
Logon Failure
<134>Jan 21 19:29:21 google.com java: [Google_Apps_login_login_failure]:
[eventSeverity]=PHL_INFO,[actor.profileId]=117858279951236905887,
[id.applicationName]=login,[kind]=admin#reports#activity,[event.parameters.login_
type]=google_password,[ipAddress]=45.79.100.103,[event.name]=login_failure,[id.time]=2016-
09-19T09:27:51.000Z,[id.customerId]=C01lzy8ye,[id.uniqueQualifier]=4795688196368428241,
[event.type]=login,[actor.email][email protected],[etag]=""6KGrH_
UY2JDZNpgjPKUOF8yJF1A/v5zsUPNoEdXLLK79zQpBcuxNbQU"",[event.parameters.login_failure_
type]=login_failure_invalid_password",Google_Apps_login_login_failure,login_
failure,1,45.79.100.103,
Create User
<134>Jan 21 19:29:20 google.com java: [Google_Apps_USER_SETTINGS_CREATE_USER]:
[eventSeverity]=PHL_INFO,[actor.callerType]=USER,[actor.profileId]=117858279951236905887,
[id.applicationName]=admin,[kind]=admin#reports#activity,[ipAddress]=45.79.100.103,
[event.name]=CREATE_USER,[id.time]=2016-09-19T09:22:44.646Z,[id.customerId]=C01lzy8ye,
[id.uniqueQualifier]=-8133102622954793216,[event.type]=USER_SETTINGS,
[event.parameters.USER_EMAIL][email protected],[actor.email][email protected],
[etag]=""6KGrH_UY2JDZNpgjPKUOF8yJF1A/R5GJyWG9YHSiGRvo3-8ZBM0ZlL0""",Google_Apps_USER_
SETTINGS_CREATE_USER,CREATE_USER,1,45.79.100.103,
Delete user
USER,DELETE_USER,1,45.79.100.103,
Event Types
In ADMIN > Device Support > Event, search for "Microsoft Azure Audit" in the Search column to see the event types
associated with this device.
Configuration
You must define a user account in Azure for use by FortiSIEM to pull Audit logs. Use any of the following roles:
l Owner
l Reader
l Monitoring Reader
l Monitoring Contributor
l Contributor
FortiSIEM recommends using the 'Monitoring Reader' role, which is the least privileged to do the job.
User administration Add user, Change user license, Change user password, Delete user, Reset user
activities password, Set force change user password, Set license properties, Update user
Group administration Add group, Add member to group, Delete group, Remove member from group, Update
activities group
Application administration Add delegation entry, Add service principal, Add service principal credentials, Remove
activities delegation entry, Remove service principal, Remove service principal credentials, Set
delegation entry
Role administration Add role member to role, Remove role member from role, Set company contact
activities information
Directory administration Add domain to company, Add partner to company, Remove domain from company,
activities Remove partner from company, Set company information, Set domain authentication,
Set federation settings on domain, Set password policy, Set DirSyncEnabled flag on
company, Update domain, Verify domain, Verify email verified domain
Event Types
In ADMIN > Device Support > Event Types, search for "MS_Office365" in the Search field to see the event types
associated with Office 365.
Reports
There are many reports defined in RESOURCES > Reports > Device > Application > Document Mgmt. Search
for "Office365" in the main content panel Search... field.
To be able to search audit logs, you must first enable Office 365 audit log search. For instructions on how to enable
audit log search, see https://docs.microsoft.com/en-us/office365/securitycompliance/turn-audit-log-search-on-or-off.
To use the Office 365 Management Activity API to access auditing data for your organization, you must enable audit log
search in the Security & Compliance Center.
If you do not enable audit log search, you cannot access auditing data for your organization.
Before you can enable or disable audit log search for your Microsoft 365 organization, you must be assigned the Audit
Logs role in the Exchange admin center.
Follow these steps to assign the Audit Logs role and enable audit log search for your organization.
5. Select one of Microsoft 365 services. In this example, Microsoft 365 Business Premium Trial is selected.
6. Click Admin > Security & compliance > Exchange admin center.
7. Click Exchange admin center > permissions > admin roles > New to create a new role.
8. Select Audit Logs Roles and add the members you want to add the group. Click Save.
9. The Audit Log role will display in the Exchange admin center > permissions > admin roles table.
Configuration in FortiSIEM
Configuration is done in two parts. Follow the steps in these two sections to configure your FortiSIEM.
l Define Office 365 Management Credential in FortiSIEM
l Create IP Range to Credential Association and Test Connectivity
Complete these steps in the FortiSIEM UI by first logging in to the FortiSIEM Supervisor node.
1. Go to the ADMIN > Setup > Credentials tab.
2. In Step 1: Enter Credentials:
a. Follow the instructions in “Setting Credentials“ in the User's Guide to create a new credential.
1. b. Enter these settings in the Access Method Definition dialog box and click Save:
Settings Description
Settings Description
[OFFICE365_EVENT_DATA] = {"Actor":[{"ID":"[email protected]","Type":5},
{"ID":"10030000873CEE9F","Type":3},{"ID":"18ed3507-a475-4ccb-b669-d66bc9f2a36e","Type":2},
{"ID":"User_68d76168-813d-4b9f-88cd-37b66a5b3841","Type":2},
{"ID":"68d76168-813d-4b9f-88cd-37b66a5b3841","Type":2},
{"ID":"User","Type":2}],"ActorContextId":"653e32e8-fb2d-41aa-8841-90f05b340318","ActorIpAddres
s":"<null>","AzureActiveDirectoryEventType":1,"ClientIP":"<null>","CreationTime":"2019-07-23T1
3:16:05UTC","ExtendedProperties":
[{"Name":"actorContextId","Value":"653e32e8-fb2d-41aa-8841-90f05b340318"},
{"Name":"actorObjectId","Value":"68d76168-813d-4b9f-88cd-37b66a5b3841"},
{"Name":"actorObjectClass","Value":"User"},
{"Name":"actorUPN","Value":"[email protected]"},
{"Name":"actorAppID","Value":"18ed3507-a475-4ccb-b669-d66bc9f2a36e"},
{"Name":"actorPUID","Value":"10030000873CEE9F"},{"Name":"teamName","Value":"MSODS."},
{"Name":"targetContextId","Value":"653e32e8-fb2d-41aa-8841-90f05b340318"},
{"Name":"targetObjectId","Value":"02232019-4557-45d6-9630-f78694bc8341"},
{"Name":"extendedAuditEventCategory","Value":"Application"},
{"Name":"targetName","Value":"FSM"},{"Name":"targetIncludedUpdatedProperties","Value":"
[\"AppAddress\",\"AppId\",\"AvailableToOtherTenants\",\"DisplayName\",\"RequiredResourceAcces
s\"]"},{"Name":"correlationId","Value":"a854ecc6-31d6-4fea-8d56-aeed05aa1174"},
{"Name":"version","Value":"2"},{"Name":"additionalDetails","Value":"{}"},
{"Name":"resultType","Value":"Success"},
{"Name":"auditEventCategory","Value":"ApplicationManagement"},
{"Name":"nCloud","Value":"<null>"},{"Name":"env_ver","Value":"2.1"},{"Name":"env_
name","Value":"#Ifx.AuditSchema#IfxMsods.AuditCommonEvent"},{"Name":"env_
time","Value":"2019-07-23T13:16:05.0208099Z"},{"Name":"env_epoch","Value":"64BOV"},
{"Name":"env_seqNum","Value":"25454285"},{"Name":"env_popSample","Value":"0"},{"Name":"env_
iKey","Value":"ikey"},{"Name":"env_flags","Value":"257"},{"Name":"env_
cv","Value":"##17a913a8-943a-42f3-b8ad-2ea3bc4bf927_00000000-0000-0000-0000-000000000000_
17a913a8-943a-42f3-b8ad-2ea3bc4bf927"},{"Name":"env_os","Value":"<null>"},{"Name":"env_
osVer","Value":"<null>"},{"Name":"env_appId","Value":"restdirectoryservice"},{"Name":"env_
appVer","Value":"1.0.11219.0"},{"Name":"env_cloud_ver","Value":"1.0"},{"Name":"env_cloud_
name","Value":"MSO-AM5R"},{"Name":"env_cloud_role","Value":"restdirectoryservice"},
{"Name":"env_cloud_roleVer","Value":"1.0.11219.0"},{"Name":"env_cloud_
roleInstance","Value":"AM5RRDSR582"},{"Name":"env_cloud_environment","Value":"PROD"},
{"Name":"env_cloud_
deploymentUnit","Value":"R5"}],"Id":"fc12de96-0cbc-4618-9c8f-cc8ab7891e3b","ModifiedPropertie
s":[{"Name":"AppAddress","NewValue":"[\r\n {\r\n \"AddressType\": 0,\r\n \"Address\":
\"https://10.222.248.17\",\r\n \"ReplyAddressClientType\": 1\r\n }\r\n]","OldValue":"[]"},
{"Name":"AppId","NewValue":"[\r\n \"0388f2da-dbcc-4506-ba57-a85c578297c0\"\r\n]","OldValue":"
[]"},{"Name":"AvailableToOtherTenants","NewValue":"[\r\n false\r\n]","OldValue":"[]"},
{"Name":"DisplayName","NewValue":"[\r\n \"FSM\"\r\n]","OldValue":"[]"},
{"Name":"RequiredResourceAccess","NewValue":"[\r\n {\r\n \"ResourceAppId\":
\"00000003-0000-0000-c000-000000000000\",\r\n \"RequiredAppPermissions\": [\r\n {\r\n
\"EntitlementId\": \"e1fe6dd8-ba31-4d61-89e7-88639da4683d\",\r\n \"DirectAccessGrant\":
false,\r\n \"ImpersonationAccessGrants\": [\r\n 20\r\n ]\r\n }\r\n ],\r\n \"EncodingVersion\":
1\r\n }\r\n]","OldValue":"[]"},{"Name":"Included Updated Properties","NewValue":"AppAddress,
AppId, AvailableToOtherTenants, DisplayName,
RequiredResourceAccess","OldValue":""}],"ObjectId":"Not Available","Operation":"Add
application.","OrganizationId":"653e32e8-fb2d-41aa-8841-90f05b340318","RecordType":8,"ResultSt
atus":"Success","SupportTicketId":"","Target":[{"ID":"Application_
02232019-4557-45d6-9630-f78694bc8341","Type":2},
{"ID":"02232019-4557-45d6-9630-f78694bc8341","Type":2},{"ID":"Application","Type":2},
{"ID":"FSM","Type":1}],"TargetContextId":"653e32e8-fb2d-41aa-8841-90f05b340318","TenantId":"65
3e32e8-fb2d-41aa-8841-90f05b340318","UserId":"[email protected]","UserKey":"10030000873CEE
[email protected]","UserType":0,"Version":1,"Workload":"AzureActiveDirectory","phCustId":1}
l Integration points
l Configuring a SIEM Agent
l Connecting Office 365 to Cloud App Security
l Event Types
l Sample Events
Integration points
SIEM Agent Logon, User creation/deletion and other Audit activity for Azure Applications Security and
including Office 365, SharePoint, OneDrive, Teams, PowerBI , Exchange Compliance
FortiSIEM integrates with Microsoft Cloud App Security to collect alerts and activities from apps to Microsoft Cloud. As
new activities and events are supported by connected apps, they become available to FortiSIEM via Microsoft Cloud
App Security integration.
The integration is done via the Microsoft Cloud App Security SIEM agent. It can run on any server (including FortiSIEM).
It pulls alerts and activities from Microsoft Cloud App Security and then streams them into FortiSIEM.
For details, see here.
FortiSIEM integration is accomplished in three steps:
1. Set up a SIEM Agent in the Microsoft Cloud App Security portal.
2. Download the SIEM agent (JAR file) and run it on a server. The agent would connect to the portal, collect logs and
forward to FortiSIEM. The server could be a FortiSIEM node such as Collector.
3. Validate that the SIEM agent is working correctly.
4. Configure an application to connect to Microsoft Cloud App Security portal. See those events in FortiSIEM.
Step 1: Set up a SIEM agent in the Microsoft Cloud App Security portal
1. In the Cloud App Security portal, under the Settings cog, click Security extensions and then click on the SIEM
agents tab.
2. Click the plus icon to start the Add SIEM agent wizard.
3. In the wizard:
a. Click Start Wizard.
b. Fill in a name.
c. Select your SIEM format as 'Generic CEF'.
d. In Advanced settings:
i. Set Time Format to 'RFC 5424'.
ii. Check Include PRI.
iii. Check Include system name.
e. Click Next.
f. Type in the IP address or hostname FortiSIEM node receiving the events and port 514. Select TCP or UDP as
the SIEM protocol. In most common situations, you would choose a FortiSIEM Collector. Click Next.
g. Select which data types, Alerts and Activities you want to export to your FortiSIEM. We recommend
choosing All Alerts and All Activities. You can use the Apply to drop-down to set filters to send only
specific alerts and activities. You can click Edit and preview results to check that the filter works as
expected. Click Next.
h. The wizard will say that SIEM agent configuration is finished. Copy the token and save it for later.
i. After you click Finish and leave the Wizard, back in the SIEM page, you can see the SIEM agent you added in
the table. It will show that it's Created until it’s connected later.
Step 2: Download the SIEM agent (JAR file) and run it on a server
1. In the Microsoft Download Center, after accepting the software license terms, download the .zip file and unzip it.
2. Run the following command:
java -jar mcas-siemagent-0.87.20-signed.jar --logsDirectory <DIRNAME> --token <TOKEN> &
where:
l DIRNAME (optional) is the path to the directory for agent to write debug log.
l TOKEN is the SIEM agent token you copied in the previous Step 1 Sub-step 3.h.
Make sure the status of the SIEM agent in the Cloud App Security portal is 'Connected'.
If the connection is down for more than two hours, then the status may show 'Connection error'. The status will be
'Disconnected' if down for more than 12 hours.
Cloud App Security currently supports the following Office 365 apps:
l Office 365
l Dynamics 365 CRM
l Exchange (only appears after activities from Exchange are detected in the portal and requires you to turn on
auditing)
l OneDrive
l PowerBI (only appears after activities from PowerBI are detected in the portal, and requires you to turn on auditing)
l SharePoint
l Teams (only appears after activities from Teams are detected in the portal)
See the Microsoft documentation to setup these applications.
Use the app connector API to connect Microsoft Cloud App Security to your existing Microsoft Office 365 account. The
Microsoft Cloud App Security connection gives you visibility into and control over Office 365 use.
For information on how Cloud App Security helps protect your Office 365 environment, see here.
For information on the prerequisites and steps to connect Microsoft Cloud App Security to your existing Microsoft Office
365 account, see How to connect Office 365 to Cloud App Security.
Event Types
Search for 'MS-Azure-CloudAppSec' in Admin > Device Support > Event Types.
Sample Events
l Integration points
l Configuration
l Event Types
Integration Points
Syslog (CEF) Suspicious alerts occurring on Windows machine in Azure Security and Compliance
Configuration
FortiSIEM receives alerts via CEF formatted syslog. See here for details.
Event Types
Search for 'MS-AzureATP' in Admin > Device Support > Event Types.
Sample Event
The purpose of this integration is to discover Virtual Machines running in Azure. It does not collect events or
performance statistics.
Configuration
l Setup in Azure
l Setup in FortiSIEM
Setup in Azure
l Select the particular subscription to assign your application to. In here, it uses Pay-As-You-GO as the example.
Click Pay-AS-You-GO to open it. Save the Subscription ID for FortiSIEM credential.
l Copy the Subscription ID, it will be needed when defining the credential in FortiSIEM.
l Select Access control (IAM).
l Select Owner to assign to the application and select the app that you created. And then click Save.
l Copy the Application (client) ID and Directory (tenant) ID, it will be needed when defining the credential in
FortiSIEM.
5. Test
l Command:
Setup in FortiSIEM
1. Create a new credential. Make sure to select Azure Resource SDK as the Access Protocol.
2. Define a credential.
FortiSIEM uses the Azure Python SDK to integrate logs from the event hub to perform comprehensive security analysis.
Azure Log Integration simplifies the task of integrating Azure logs with your on-premises SIEM system. The
recommended method for integrating Azure logs is to stream the logs into event hubs via the Azure Monitor. FortiSIEM
provides a connector to further integrate logs from the event hub into the SIEM.
Azure produces extensive logging for each Azure service. The logs represent these log types:
l Control/management logs: Provide visibility into the Azure Resource Manager CREATE, UPDATE, and DELETE
operations. An Azure activity log is an example of this type of log.
l Data plane logs: Provide visibility into events that are raised when you use an Azure resource. An example of this
type of log is the Windows Event Viewer's System, Security, and Application channels in a Windows virtual
machine. Another example is Azure Diagnostics logging, which you configure through Azure Monitor.
l Processed events: Provide analyzed event and alert information that are processed for you. An example of this
type of event is Azure Security Center alerts. Azure Security Center processes and analyzes your subscription to
provide alerts that are relevant to your current security posture.
For more information on how to stream any type of log to an event hub, see:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/stream-monitoring-data-event-hubs
l What is Discovered sand Monitored
l Event Types
l Reports
l Rules
l Configuration in Azure
l Configuration in FortiSIEM
l Sample Events
Event Types
Reports
No defined reports.
Rules
No defined rules.
Configuration in Azure
A resource group is a logical collection of Azure resources. All resources are deployed and managed in a resource group.
To create a resource group:
1. Login to the Azure portal: https://portal.azure.com/ .
2. Click Resource groups in the left navigation pane.
3. Click Add.
4. For Subscription, select the name of the Azure subscription in which you want to create the resource group.
5. Enter a unique name for the resource group, The system immediately checks to see if the name is available in the
currently selected Azure subscription.
6. Select a Region for the resource group.
7. Click Review + Create.
8. Click Create on the Review + Create page.
Note: In the example used in step 2, a Resource Group called fsm1 was created.
An Event Hub namespace provides a unique scoping container, referenced by its fully-qualified domain name, in which
you create one or more event hubs. To create a namespace in your resource group using the portal, complete the
following steps:
1. In the Azure portal, click Create a resource at the top left of the screen.
2. In the “Search the Market text box, enter Select All services in the left menu, select star (*) next to Event
Hubs, and then click the Create button in the ANALYTICS category.
4. Refresh the Event Hubs page to see the event hub namespace. You can check the status of the event hub
creation in the alerts.
5. Select the namespace. You see the home page for your Event Hubs Namespace in the portal.
4. You can check the status of the event hub creation in alerts. After the event hub is created, you see it in the list of
event hubs.
1. Select an event hub namespace and go to Shared access policies, and then click +Add. Enter the Policy
name, check the Manage box, and then click Create.
Note: When the event hub namespace is created, Azure will also create a default Shared Access Policy named
RootManageSharedAcessKey.
4. Select an event hub namespace and go to Event Hubs.
5. Select an event hub and go to Consumer group. You can click +Consumer group or use default group name
$default.
Note: If you have selected Basic (1 Consumer Group), then there will be no option to add a another Consumer
group.
Configuration in FortiSIEM
Settings Description
Pull Interval The interval in which FortiSIEM will pull events from Azure Event Hub.
Default is 5 minutes.
Event Hub Namespace The name of the Azure event hub namespace
c. Click Save.
Sample Events
l Integration points
l Configuring Windows Defender for FortiSIEM REST API Access
l Configuring FortiSIEM for Windows Defender ATP REST API Access
Integration points
c. Click Save.
5. Select the entry in step 4 and click Test Connectivity. If it succeeds, then the credential is correct.
6. An entry will be created in ADMIN > Setup > Pull Events corresponding to this event pulling job. FortiSIEM will
start to pull events from Windows Defender Center using the REST API.
To test for events received via Windows Defender ATP REST API:
1. Go to ADMIN > Setup > Pull Events.
2. Select the Windows Defender ATP entry and click Report.
The system will take you to the Analytics tab and run a query to display the events received from Windows Defender
Center in the last 15 minutes. You can modify the time interval to get more events.
Okta
FortiSIEM can integrate with Okta as a single-sign service for FortiSIEM users, discover Okta users and import them
into the CMDB, and collect audit logs from Okta. See Setting Up External Authentication for information on configuring
Okta to use as a single-sign on service, and Adding Users from Okta for discovering users and associating them with
the Okta authentication profile. Once you have discovered Okta users, FortiSIEM will begin to monitor Okta events.
l What is Discovered and Monitored
l Configuration
l Access Credentials in FortiSIEM
l Sample Okta Event
l Adding Users from Okta
l Configuring Okta Authentication
l Logging In to Okta
l Setting Up External Authentication
Okta API
Event Types
In ADMIN > Device Support > Event, search for "okta" in the Device Type column to see the event types associated
with this device.
Configuration
l In Okta Administartion -> Security -> API, create a Token. Note, tokens generated by this mechanism will
have the permissions of the user who generated them.
l Tokens are valid for 30 days and automatically refresh with each API call. Tokens that are not used for 30 days will
expire. The token lifetime is currently fixed and cannot be changed.
Setting Value
Name <name>
Setting Value
Pull Interval 5
9. Click Save.
Your LDAP credentials will be added to the list of Credentials.
10. Under Enter IP Range to Credential Associations, click Add.
11. Select your Okta credentials from the list of Credentials.
12. Enter the IP range or host name for your Okta account.
13. Click OK.
Your Okta credentials will appear in the list of credential/IP address associations.
14. Click Test Connectivity to make sure you can connect to the Okta server.
If the number of users are less than 200, then Test Connectivity will discover all the users.
Okta API has some restrictions that does not allow FortiSIEM to pull more than 200 users. In this case, follow these
steps:
1. Login to Okta.
2. Download user list CSV file (OktaPasswordHealth.csv) from Admin > Reports > Okta Password Health.
3. Rename the CSV file to all_user_list_%s.csv (where %s is the placeholder of token obtained in Create an
Okta API Token - Step 3, for example, all_user_list_00UbCrgrU9b1Uab0cHCuup-5h-
6Hi9ItokVDH8nRRT.csv).
4. Login to FortiSIEM Supervisor node:
a. Upload csv file all_user_list_%s.csv to this directory /opt/phoenix/config/okta/
b. Make sure the permissions are admin and admin (Run "chown -R admin:admin
/opt/phoenix/config/okta/")
c. Go to ADMIN > Setup > Enter IP Range to Credential Associations. Select the Okta entry and run Test
connectivity to import all users.
To use Okta authentication for your FortiSIEM deployment, you must set up a SAML 2.0 Application in Okta, and then
use the certificate associated with that application when you configure external authentication.
1. Log in to Okta.
2. In the Applications tab, create a new application using Template SAML 2.0 App.
3. Under Settings, configure the settings similar to the table below:
Recipient FortiSIEM
authnContextClassRef PasswordProtectedTransport
Response Signed
Assertion Signed
Request Uncompressed
Destination https://<FortiSIEMIP>/phoenix/okta
4. Click Save.
5. In the Sign On tab, click View Setup Instructions.
6. Click Download Certificate.
7. Enter the downloaded certificate for Okta authentication.
Logging In to Okta
Follow these steps to log in to Okta from the Okta domain https://fortinetfsm.okta.com. You cannot log into
Okta from the FortiSIEM UI.
1. Create a new Okta account from https://www.okta.com/ or log in to an existing account, using the domain
fortinetfsm.okta.com.
2. Configure users for the account, for example, [email protected], [email protected], and so
on. See Adding Users From Okta and Create Login Credentials and Associate Them with an IP Address.
3. Discover the Okta users to ensure that you have users to test. See Discover Okta Users.
4. Create a SAML authentication configuration from Okta based on the OKTA SAML 2.0 template. See Configuring
Okta Authentication.
5. Associate the users (for example, [email protected] and [email protected]) to the external
profile in CMDB > Users.
6. Log in to the Okta domain https://fortinetfsm.okta.com as one of the users you defined in Step 2.
7. Click the SAML configuration application in Okta (see Configuring Okta Authentication). You can now log in to
Okta.
You have three options for setting up external authentication for your FortiSIEM deployment LDAP, Radius, and Okta.
If more than one authentication profile is associated with a user, then the servers will be contacted one-by-one until a
connection to one of them is successful. Once a server has been contacted, if the authentication fails, the process ends,
and the user is notified that the authentication failed.
1. Log in to your Supervisor node.
2. Go to Admin > General Settings > External Authentication.
3. Click Add.
4. If you are setting up authentication for an organization within a multi-tenant deployment, select the Organization.
5. Select the Protocol.
LDAP Access IP
Select Set DN Pattern to open a text field in which you
can enter the DN pattern if you want to override the
discovered pattern, or you want to add a specific LDAP
user.
RADIUS Access IP
Shared Secret
Select CHAP if you are using encrypted authentication
to your RADIUS server. See also Juniper Networks
Steel-Belted RADIUS.
Okta Certificate
See Configuring Okta Authentication for more
information.
7. Click Test, and then enter credentials associated with the protocol you selected to make sure users can
authenticate to your deployment.
Salesforce API Successful/Failed Login, API Query Activity, Dashboard Activity, Security Monitoring
Opportunity Activity, Report Export Activity, Report Activity,
Document Download Activity
Event Types
In ADMIN > Device Support > Event Types, search for "Salesforce Audit" in the Search field to see the event types
associated with this device.
Reports
There are many reports defined in RESOURCES > Reports > Device > Application > CRM
l Salesforce Failed Logon Activity
l Salesforce Successful Logon Activity
l Top Browsers By Failed Login Count
l Top Browsers By Successful Login Count
l Top Salesforce Users By Failed Login Count
l Top Salesforce Users By Successful Login Count
l Top Successful Salesforce REST API Queries By Count, Run Time
l Top Failed Salesforce Failed REST API Queries By Count, Run Time
l Top Salesforce API Queries By Count, Run Time
l Top Salesforce Apex Executions By Count, Run Time
l Top Salesforce Dashboards Views By Count
l Top Salesforce Document Downloads By Count
l Top Salesforce Opportunity Reports By Count
l Top Salesforce Report Exports By Count
l Top Salesforce Reports By Count, Run Time
l Top Salesforce Events
Configuration
l Salesforce Configuration
l Define Salesforce Audit Credential in FortiSIEM
l Create IP Range to Credential Association and Test Connectivity
Salesforce Configuration
Salesforce saves events in a SQL Database, where FortiSIEM will pull the following events from tables: EventLogFile,
LoginHistory,User, Dashboard, Opportunity, Report through SQL commands.
If you get an error about missing columns, please make sure your administrator has enabled Set History Tracking for
the missing columns in the tables.
For more information on how to enable Set History Tracking, please refer to
https://help.salesforce.com/articleView?id=sf.updating_picklists.htm&type=5
The required columns are listed in this table.
For example, if Type in Opportunity is not enabled in Set History Tracking, FortiSIEM will fail to get events in
Opportunity.
Complete these steps in the FortiSIEM UI by first logging in to the FortiSIEM Supervisor node.
1. Go to the ADMIN > Setup > Credentials tab.
2. In Step 1: Enter Credentials:
a. Follow the instructions in “Setting Credentials“ in the User's Guide to create a new credential.
1. b. Enter these settings in the Access Method Definition dialog box and click Save:
Settings Description
Timeout 30 seconds
From the FortiSIEM Supervisor node, take the following steps (From ADMIN > Setup > Credentials).
[Salesforce_Activity_Perf]:[activityType]=API,[activityName]=get_user_info,
[srcIpAddr]=23.23.13.166,[user][email protected],[deviceTime]=1458112097,
[isSuccess]=false,[runTime]=31,[cpuTime]=9,[dbTime]=19434051,[infoURL]=Api
FortiSIEM supports this console access device for discovery and monitoring.
l Lantronix SLC Console Manager
Event Types
Around 10 event types are generated by parsing Lantronix SLC logs. The complete list can be found in ADMIN >
Device Support > Event by searching for Lantronix-SLC. Some important ones are:
l Lantronix-SLC-RunCmd
l Lantronix-SLC-Update
l Lantronix-SLC-User-Logon-Success
Configuration
FortiSIEM processes events from this device via syslog. Configure the device to send syslog to FortiSIEM as directed in
the device's product documentation, and FortiSIEM will parse the contents.
Example Syslog
The following anti-virus and host security (HIPS) applications are supported for discovery and monitoring by FortiSIEM.
l Bit9 Security Platform
l Carbon Black Security Platform
l Cisco AMP Cloud V0
l Cisco AMP Cloud V1
l Cisco Security Agent (CSA)
l CloudPassage Halo
l CrowdStrike
l Digital Guardian CodeGreen DLP
l ESET NOD32 Anti-Virus
l FortiClient
l FortinetFortiEDR
l Malwarebytes Endpoint Protection
l McAfee ePolicy Orchestrator (ePO)
l MobileIron Sentry and Connector
l Netwrix Auditor
l Palo Alto Traps Endpoint Security Manager
l SentinelOne
l Sophos Central
l Sophos Endpoint Security and Control
l Symantec Endpoint Protection
l Symantec SEPM
l Tanium Connect
l Trend Micro Interscan Web Filter
l Trend Micro Intrusion Defense Firewall (IDF)
l Trend Micro OfficeScan
Event Types
In ADMIN > Device Support > Event, search for "Bit9" in the Device Type columns to see the event types
associated with this device.
Rules
Reports
Bit9 Configuration
Syslog
FortiSIEM processes events from this device via syslog. Configure the device to send syslog to FortiSIEM on port 514.
Sample Syslog
Event Types
In ADMIN > Device Support > Event, search for "Carbon Black" in the Device Type columns to see the event types
associated with this device.
Rules
Reports
Syslog
FortiSIEM processes events from this device via syslog. Configure the device to send syslog to FortiSIEM on port 514.
CEF formatted logs are also supported.
Sample Syslog
Standard Syslog:
Event Types
In ADMIN > Device Support > Event, search for "Cisco FireAMP Cloud" in the Search column to see the event types
associated with this device.
Configuration
1. Login in https://auth.amp.cisco.com/.
2. Click Accounts-> API Credentials.
5. Record the API Client ID and API key. You will need them in a later step.
8. Click Save.
7. Go to Admin > Credentials, select the credential, and run Test Connectivity.
8. Go to Admin > Pull Events. An entry will appear in the Event Pulling table. That means events are being
pulled.
Sample Events
[FireAMP_Cloud_Threat_Detected]:[eventSeverity]=PHL_CRITICAL,
[connectorGUID]=12345,[date]=2015-11- 25T19:17:39+00:00,
[detection]=W32.DFC.MalParent, [detectionId]=6159251516445163587,
[eventId]=6159251516445163587, [eventType]=Threat Detected,
[eventTypeId]=1090519054, [fileDispostion]=Malicious,[fileName]=rjtsbks.exe,
[fileSHA256]=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370,
Cisco Advanced Malware Protection (AMP) for Endpoints is a lightweight connector that can use the public cloud or be
deployed as a private cloud.
l What is Discovered and Monitored
l Event Types
l Rules
l Reports
l Configure Cisco AMP Cloud V1
l Configure FortiSIEM
l Sample Events
AMQP Global threat intelligence, advanced sand boxing, and real-time malware Intrusion protection
blocking. system
Event Types
In RESOURCES > Event Types, enter "Cisco AMP" in the Search column to see the event types associated with this
device.
Rules
No defined rules.
Reports
No defined reports.
4. In the Application name field, enter a name, and then select Read & Write.
Note: you must have Read & Write access to manage event streams on your Cisco AMP for Endpoints platform.
5. Click Create.
6. In the API Key Details section, make note of the values for the 3rd Party API Client ID and the API Key. You
will need these values to manage queues.
7. Click Management > Group
8. In the Groups pane, click Create Group.
10. Enter the following curl command to get the group_guid of the group that is created in the previous step.
curl -X GET -H 'accept: application/json' \
-H 'content-type: application/json' --compressed \
-H 'Accept-Encoding: gzip, deflate' \
-u <CLIENTID:APIKEY>\
'https://api.amp.cisco.com/v1/groups'
where:
l <CLIENTID:APIKEY> is the Client ID and the API key that you created in Step 6.
l If you are in the Asia Pacific Japan and China (APJC) region, change
https://api.amp.cisco.com/v1/event_streams to
https://api.apjc.amp.cisco.com/v1/event_streams.
l If you are in the European region, change https://api.amp.cisco.com/v1/event_streams to
https://api.eu.amp.cisco.com/v1/event_streams.
11. Enter the following curl command to create a Cisco AMP event stream:
curl -X POST -H 'accept: application/json' \
Configure ForitSIEM
3. Click Save.
4. Go to Admin > Setup > IP to Credential Mapping and create an association as follows.
Click New and enter the following information:
a. Set IP/Host Name to host in Step 12 in previous section.
b. Choose Credential to the one created in Steps 1 to Step 3 in the previous section.
c. Click Save.
5. Go to Admin > Credentials, select the credential, and run Test Connectivity.
6. If connectivity is successful, go to Admin > Pull Events. An entry will appear in the Event Pulling table. That
means events are being pulled.
Sample Events
SNMP Trap
Rules
Rule Description
Buffer overflow
attacks
Rule Description
by suspect applications
Reports
Configuration
SNMP Trap
FortiSIEM processes events from this device via SNMP traps sent by the device. Configure the device to send send
SNMP traps to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
CloudPassage Halo
l Integration points
l CloudPassage REST API Integration
Integration points
CloudPassage Halo events – over 110 event types including User login and account activity, server Security
REST API compliance and vulnerability status, server FIM and firewall policy modification etc. and
Compliance
FortiSIEM can pull logs from CloudPassage Halo via CloudPassage REST API. Currently, over 110 CloudPassage event
types are parsed.
To see the event types:
1. Login to FortiSIEM.
2. Go to ADMIN > Resources > Event Types.
3. Search for 'CloudPassage-Halo'.
Use cases covered via API:
l User login to Halo and user account creation/deletion/modification activity
l Vulnerable software package found and Compromised host detection
l Server FIM, Firewall policy modification
l Server account creation
l Server login via ghostport
Configuring FortiSIEM
Use the API Key and Secret in previous step to enable FortiSIEM access.
1. Login to FortiSIEM.
2. Go to ADMIN > Setup > Credential.
l Integration Points
l Falcon Streaming API Integration
l Falcon Data Replicator Integration
Integration Points
Falcon Streaming Detection Summary, Authentication Log, Detection Status Update, Security and
API Indicators of Compromise, Containment Audit Events, IP White- Compliance
listing events, Sensor Grouping Events.
Falcon Data Detection Summary, User Activity, Authentication Activity. Security and
Replicator Compliance
FortiSIEM can collect following types of events from CrowdStrike Cloud Service via Falcon Streaming API:
l Detection Summary
l Authentication Log
l Detection Status Update
l Customer Indicators of Compromise
l Containment Audit Events
l IP White-listing Events
l Sensor Grouping Events
CrowdStrike provides details about Falcon Streaming API here.
To receive Crowdstrike security events via Falcon Streaming API, follow these two steps:
1. Configure Crowdstrike Service for Falcon Streaming API.
2. Configure FortiSIEM for Falcon Streaming API Based Access.
FortiSIEM can collect following types of events from CrowdStrike Cloud Service via Falcon Data Replicator method:
l Detection Summary Events
l User Activity Audit Events
l Auth Activity Audit Events
CrowdStrike provides details about Data Replicator method here.
To receive Crowdstrike security events via Falcon Data Replication Integration, follow these two steps:
1. Obtain AWS Credentials from Crowdstrike.
2. Configure FortiSIEM for Falcon Data Replicator.
Contact CrowdStrike to obtain AWS credentials for pulling CrowdStrike logs from AWS.
Event Types
Rules
There are no specific rules, but generic rules for Data Leak Protection apply.
Reports
There are no specific reports, but generic rules for Data Leak Protection and Generic Servers apply.
Configuration
Configure Digital Guardian Code Green DLP to send syslog on port 514 to FortiSIEM.
Sample Event
Syslog
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM
Supervisor.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Example Syslog
FortiClient
Syslog via Traffic logs (IPSec, VPN, File Cleaning/Blocking) Event logs Security
FortiAnalyzer (Antivirus, Web Filter, Vulnerability Scan, Application Monitoring
(FortiClient > Firewall, VPN, WAN Optimization, Update logs) and Log
FortiAnalyzer -> analysis
FortiSIEM)
Event Types
Search for 'FortiClient' to see the event types associated with this device under RESOURCES > Event Types.
Rules
There are generic rules that trigger for this device as event types are mapped to specific event type groups.
Reports
Generic reports are written for this device as event types are mapped to specific event type groups.
Configuration
Setting Value
Name <name>
Setting Value
Sample Events
Traffic Log
Event Log
Fortinet FortiEDR
l Integration Points
l Configuration
l Settings for Access Credentials
l Sample Events
Integration Points
Syslog Host name, Reporting None System and Security Events (e.g., file Security
IP blocked) monitoring
Event Types
In ADMIN > Device Support > Event, Search for "FortiEDR " to see the event types associated with this device.
Rules
No specific rules are written for FortiEDR but generic end point rules apply
Reports
No specific reports are written for FortiEDR but generic end point rules apply
Configuration
Configure FortiEDR system to send logs to FortiSIEM in the supported format (see Sample events below)
None required
Sample Events
<133>1 2019-09-18T06:42:18.000Z 1.1.1.1 enSilo - - - Organization: Demo;Organization ID: 156646;Event ID: 458478;
Raw Data ID: 1270886879;Device Name: WIN10-VICTIM;Operating System: Windows 10 Pro N;
Process Name: svchost.exe;Process Path: \Device\HarddiskVolume4\Windows\System32\svchost.exe;
Process Type: 64bit;Severity: Critical;Classification: Suspicious;Destination: File Creation;
Event Types
In ADMIN > Device Support > Event, search for "malwarebytes" to see the event types associated with this device.
Rules
Reports
In RESOURCE > Reports, search for "malware found" to see the reports associated with this device.
Configuration
Syslog
FortiSIEM processes events from this device via syslog. Configure the device to send syslog to FortiSIEM on port 514.
Sample Syslog:
<45>1 2016-09-23T14:40:35.82-06:00 reportDeviceName Malwarebytes-Endpoint-Security 1552 -
- {"security_log":{"client_id":"ef5f8fc8-ad0e-46f8-b6d7-1a85d5f73e64","host_name":"Abc-
cbd","domain":"abc.com","mac_address":"FF-FF-FF-FF-FF","ip_
address":"10.1.1.1","time":"2016-09-23T14:40:14","threat_level":"Moderate","object_
type":"FileSystem","object":"HKLM\\SOFTWARE\\POLICIES\\GOOGLE\\UPDATE","threat_
name":"PUM.Optional.DisableChromeUpdates","action":"Quarantine","operation":"QUARANTINE","
resolved":true,"logon_user":"dsamuels","data":"data","description":"No
description","source":"MBAM","payload":null,"payload_url":null,"payload_
process":null,"application_path":null,"application":null}}
SNMP Traps
Event Types
In ADMIN > Device Support > Event Types, search for "mcafee epolicy" to see the event types associated with this
application or device.
Configuration
FortiSIEM processes events from a device via SNMP traps sent by the device.
1. Log in to the McAfee ePO web console.
2. Go to Main Menu > Configuration > Registered Servers, and click New Server.
The Registered Server Builder opens.
By default, McAfee ePO does not send SNMP Trap alerts for the events that occur. This must be configured.
1. Go to Main Menu > Automation > Automatic Response.
2. By default, there are a few Automatic Response configured, but are in a disabled state.
3. Click on New Response button.
4. Enter a Name for the 'Response'.
5. Set Status as 'Enabled' and click Next.
6. Click the Ellipsis icon and select the top level under Select System Tree Group and click OK.
7. On the left side of the same screen, select Threat Handled.
Syslog Host name and Device Type from LOG Over 14 types of security logs Security and Compliance
Event Types
Go to Admin > Device Type > Event Types and search for “MobileIron-”.
Rules
None
Reports
None
Configuration
Configure MobileIron to send syslog in the supported format to FortiSIEM. No configuration is required in FortiSIEM.
Sample Events
Via Correlog Windows Host name and Device Type from 2 Security logs Security and Compliance
Agent LOG monitoring
Event Types
Go to Admin > Device Type > Event Types and search for “Netwrix_Auditor_”.
Rules
None
Reports
None
Configuration
Configure Netwrix Auditor to send logs to Correlog Windows Agent. FortiSIEM will automatically parse the logs as long
as they appear in the format below.
Sample Events
Syslog (CEF format) - Over 150 event types Security and Compliance
Event Types
Configuration
Configure Palo Alto Traps Endpoint Security Manager to send syslog on port 514 to FortiSIEM.
SentinelOne
l Integration Points
l Event Types
l Rules
l Reports
l Configuration
l Settings for Access Credentials
l Sample Events
Integration Points
Syslog Host name, Reporting None System and Security Events (e.g., file Security
IP blocked) monitoring
Event Types
In ADMIN > Device Support > Event, Search for "SentinelOne" to see the event types associated with this device.
Rules
No specific rules are written for SentinelOne but generic end point rules apply.
Reports
No specific reports are written for SentinelOne but generic end point rules apply.
Configuration
Configure SentinelOne system to send logs to FortiSIEM in the supported format (see Sample Events).
None required.
Sample Events
fileHash=4b9c5fe8ead300a0be2dbdbcdbd193591451c8b4
filePath=\Device\HarddiskVolume2\Windows\AutoKMS\AutoKMS.exe
Sophos Central
l Integration points
l Configuring Sophos Central for API Access
l Configuring FortiSIEM for Sophos Central for API Access
l Parsing and Events
Integration points
Sophos Central API Endpoint suspicious activity detected by Sophos agent Security and Compliance
Over 20 events are parsed – see event types in Resources > Event Types and search for 'Sophos-Central'.
SNMP Trap
Event Types
In ADMIN > Device Support > Event, search for "sophos endpoint" in the Device Type column to see the event
types associated with this application or device.
Sophos Configuration
SNMP Trap
FortiSIEM processes Sophos Endpoint control events via SNMP traps sent from the management console. Configure
the management console to send SNMP traps to FortiSIEM, and the system will automatically recognize the messages.
SNMP Traps are configured within the Sophos policies.
1. In the Policies pane, double-click the policy you want to change.
2. In the policy dialog, in the Configure panel, click Messaging.
3. In the Messaging dialog, go to the SNMP messaging tab and select Enable SNMP messaging.
4. In the Messages to send panel, select the types of event for which you want Sophos Endpoint Security and
Control to send SNMP messages.
5. In the SNMP trap destination field, enter the IP address of the recipient.
6. In the SNMP community name field, enter the SNMP community name.
2011-05-03 18:22:32 172.15.30.8(via UDP: [172.15.30.8]:1216) TRAP, SNMP v1, community public
SNMPv2-SMI::enterprises.2604.2.1.1.1 Enterprise Specific Trap (1) Uptime: 5:59:55.31
SNMPv2-SMI::enterprises.2604.2.1.1.2.1.1 = STRING: "File \"C:\WINDOWS\system32\LDPackage.dll\"
belongs to virus/spyware 'Mal/Generic-S'."SNMPv2-SMI::enterprises.2604.2.1.1.2.2.2 = STRING:
"9.5.5"
Event Types
In ADMIN > Device Support > Event, search for "symantec endpoint" in the Device Type
and Description columns to see the event types associated with this device.
Syslog
FortiSIEM processes events from this device via syslogs sent by the device.
Sample Syslog
Symantec SEPM
follow these steps to configure Symantec SEPM to send logs to FortiSIEM. For more information about Symantec
SEPM, see the SEPM Installation and Administration Guide:
https://support.symantec.com/us/en/article.DOC10654.html
1. In the Symantec SEPM console, go to Admin > Servers.
2. Click the local site or remote site that you want to export log data from.
3. Click Configure External Logging.
4. On the General tab, in the Update Frequency list box, select how often to send the log.
5. In the Master Logging Server list box, select the management server to send the logs to. If you use SQL Server
and connect multiple management servers to the database, then specify only one server as the Master Logging
Server.
6. Check Enable Transmission of Logs to a Syslog Server (FortiSIEM).
7. Provide the following information. Be sure that syslog server IP and Port can be reached from SEPM.
a. Syslog Server—Enter the IP address or domain name of the Syslog server that will receive the log data (in
this case, the IP of FortiSIEM).
b. Destination Port—Select the protocol to use, and enter the destination port that the Syslog server uses to
listen for Syslog messages. (for example, UDP 514 for FortiSIEM).
c. Log Facility—Enter the number of the log facility that you want to the Syslog configuration file to use, or use
the default value. Valid values range from 0 to 23.
8. On the Log Filter tab, check which logs to export
1. Check for events in FortiSIEM. Go to the ANALYTICS page and search on "Symantec".
2. Check for the device added by log. Go to CMDB > Devices.
Tanium Connect
l Integration points
l Configuring Tanium Connect
l Configuring FortiSIEM
l Parsing and Events
Integration points
Configuring FortiSIEM
FortiSIEM automatically recognizes Tanium Connect syslog as long it follows the following format as shown in the
sample syslog:
<134>1 2018-09-06T02:50:02.762000+00:00 tanium-server-1 Tanium 7020 - [Comply-
Deployment-Status---Deployment-5@017472 Installed=true Version=3.0.45 Type=full
Installed1=true Version1=8u131-e1 Comply---Has-Latest-Tools=true Count=2
Currently, 4 events are parsed – see event Types in Resources > Event Types and search for “TaniumConnect-“. User
can extend the parser to add other events.
Event Types
<130>abc.com: <Mon, 18 Sep 2017 10:00:48,IST> [EVT_URL_BLOCKING|LOG_CRIT] Blocked URL log tk_
username=1.1.1.1,tk_date_field=2017-09-18 10:00:48+0530,tk_protocol=https,tk_
url=https://google.com:443/,tk_malicious_entity=,tk_file_name=,tk_entity_name=,tk_action=,tk_
scan_type=user defined,tk_blocked_by=rule,tk_rule_name=google.com,tk_opp_id=0,tk_group_
name=None,tk_category=URL Blocking,tk_uid=0099253425-0ecd0076872a9d0ace16,tk_filter_action=0
Rules
There are no specific rules, but generic rules for Web Filters and Generic Servers apply.
Reports
There are no specific reports, but generic rules for Web Filters and Generic Servers apply.
Configuration
Configure TrendMicro Interscan Web Filter to send syslog on port 514 to FortiSIEM.
Syslog
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Example Syslog
SNMP Trap
Configuration
SNMP Trap
FortiSIEM processes events from this device via SNMP traps sent by the device. Configure the device to send send
SNMP traps to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
SNMP Host name, Temperature: Sensor Id, Sensor label, Enclosure Id, Temperature Availability and
(V1, V2c) Hardware Relative Humidity: Sensor Id, Sensor label, Enclosure Id, Relative Performance
model, Humidity Monitoring
Network Air Flow: Sensor Id, Sensor label, Enclosure Id, Air Flow
interfaces
Dew Point Temperature: Sensor Id, Sensor label, Enclosure Id,
Dew Point Temperature
Current: Sensor Id, Sensor label, Enclosure Id, Current
Audio Sensor Reading: Sensor Id, Sensor label, Enclosure Id,
Audio Sensor Reading
Dry Contact Sensor Reading: Sensor Id, Sensor label, Enclosure
Id, Dry Contact Sensor Reading
SNMP SNMP Trap See Event Types for more information about viewing the SNMP Availability and
Trap (V1, traps collected by FortiSIEM for this device. Performance
V2c) Monitoring
Event Types
In ADMIN > Device Support > Event, search for "NetBotz" in the Name column to see the event types associated
with this application or device.
Event types for NetBotz NBRK0200
l PH_DEV_MON_HW_STATUS
[PH_DEV_MON_HW_STATUS]:[eventSeverity]=PHL_INFO,[fileName]=deviceNetBotz.cpp,
[lineNumber]=1642,[hostName]=Unknown,[hostIpAddr]=10.62.97.61,[hwStatusCode]=2,
[hwProbeStatus]=2,[hwInputContactStatus]=2,[hwOutputRelayStatus]=0,[hwOutletStatus]=2,
[hwAlarmDeviceStatus]=0,[hwMemSensorStatus]=0,[hwMemOutputStatus]=2,[hwMemOutletStatus]=2,
[hwMemBeaconStatus]=2,[phLogDetail]=
l PH_DEV_MON_HW_EMS_STATUS
[PH_DEV_MON_HW_EMS_STATUS]:[eventSeverity]=PHL_INFO,[fileName]=deviceNetBotz.cpp,
[lineNumber]=1871,[hostName]=Unknown,[hostIpAddr]=10.62.97.61,[reptDevName]=Unknown,
[emsHwStatus]=0,[phyMachConnectionStateCode]=2,[hwLogStatus]=1,[phLogDetail]=
l PH_DEV_MON_HW_PROBE
[PH_DEV_MON_HW_PROBE]:[eventSeverity]=PHL_INFO,[fileName]=deviceNetBotz.cpp,
[lineNumber]=2100,[hostName]=Unknown,[hostIpAddr]=10.62.97.61,[envSensorLabel]=Sensor MM:4,
[envTempDegF]=74,[envTempHighThreshDegF]=138,[envHumidityRel]=51,
[envHumidityRelHighThresh]=90,[envHumidityRelLowThresh]=10,[serialNumber]=L3,
[phyMachConnectionStateCode]=3,[maxTempThresh]=140,[minTempThresh]=32,
[maxHumidityThresh]=99,[minHumidityThresh]=0,[phLogDetail]=
l PH_DEV_MON_HW_MODULE_SENSOR
[PH_DEV_MON_HW_MODULE_SENSOR]:[eventSeverity]=PHL_INFO,[fileName]=deviceNetBotz.cpp,
[lineNumber]=2567,[hostName]=Unknown,[hostIpAddr]=10.62.97.61,[moduleNumber]=0,
[envSensorId]=1,[envSensorLabel]=Sensor MM:1,[envSensorLoc]=Orland Park Server,
[envTempDegF]=74,[envHumidityRel]=50,[phyMachConnectionStateCode]=1,[hwAlarmDevicetatus]=1,
[phLogDetail]=
Rules
In RESOURCE > Rules, search for "NetBotz" in the Name column to see the rules associated with this application or
device.
Reports
In RESOURCE > Reports, search for "Netbotz" in the Name column to see the reports associated with this
application or device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
SNMP Trap
FortiSIEM processes events from this device via SNMP traps sent by the device. Configure the device to send SNMP
traps to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
APC UPS
SNMP Host name, UPS metrics: Remaining battery charge, Battery status, Replace Availability and
(V1, V2c) Hardware battery indicator, Time on battery, Output status, Output load, Performance
model, Output voltage, Output frequency Monitoring
Network
interfaces
Event Types
In ADMIN > Device Support > Event, search for "apc" in the Device Type column to see the event types
associated with this device.
Rules
In RESOURCE > Rules, search for "apc" in the Name column to see the rules associated with this device.
Reports
In RESOURCE > Reports , search for "apc" in the Name column to see the reports associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
SNMP Trap
FortiSIEM processes events from this device via SNMP traps sent by the device. Configure the device to send send
SNMP traps to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Generic UPS
SNMP Host name, UPS metrics: Remaining battery charge, Battery status, Time on Availability and
(V1, V2c) Hardware battery, Estimated Seconds Remaining, Output voltage, Output Performance
model, current, Temperature Monitoring
Network
interfaces
Configuration
SNMP
UPS-MIB Required
Your device must have a UPS-MIB database to communicate with FortiSIEM over SNMP.
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation, then follow the instructions in "Discovery Settings" and "Setting Credentials" in the User
Guide, to establish the connection between the device and FortiSIEM, and to initiate the device discovery process.
Use these Access Method Definition settings to allow FortiSIEM to access your device over SNMP. Set the Name
and Community String.
Setting Value
Liebert FPC
SNMP Host name, Output voltage (X-N, Y-N, Z-N), Output current (X, Y. Z), Neutral Availability and
(V1, V2c) Hardware Current, Ground current, Output power, Power Factor, Output Performance
model, Frequency, Output Voltage THD (Vx, Vy, Vz), Output Current THD Monitoring
Network (Lx, Ly. Lz), Output KWh, Output Crest factor (Lx, Ly, Lz), Output K-
interfaces factor (Lx, Ly, Lz), Output Lx Capacity, output Ly capacity
Event Types
In ADMIN > Device Support > Event, search for "LIebert FPC" in the Description column to see the event types
associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "Liebert FPC" in the Name column to see the reports associated with this
device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting Value
Liebert HVAC
SNMP Host name, HVAC metrics: Temperature: current value, upper threshold, lower Availability and
(V1, V2c) Hardware threshold, Relative Humidity: current value, upper threshold, lower Performance
model, threshold, System state, Cooling state, Heating state, Humidifying Monitoring
Network state, Dehumidifying state, Economic cycle, Fan state, Heating
interfaces capacity, Cooling capacity
FortiSIEM uses SNMP to discover and collector metrics from Generic UPS devices. This requires the presence of UPS-
MIB on the UPS device.
See the Liebert HVAC documentation to enable FortiSIEM to poll the device via SNMP.
Event Types
In ADMIN > Device Support > Event, search for "Liebert HVAC" in the Description column to see the event types
associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "Liebert HVAC" in the Name column to see the reports associated with this
device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting Value
Liebert UPS
SNMP Host name, UPS metrics: Remaining battery charge, Battery status, Time on Availability and
(V1, V2c) Hardware battery, Estimated Seconds Remaining, Output voltage, Output Performance
model, current, Temperature Monitoring
Network
interfaces
Event Types
Rules
Reports
Configuration
SNMP
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting Value
Firewalls
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface metrics Availability and
Firewall model (utilization, bytes sent and received, packets sent and received, Performance
and version, errors, discards and queue lengths), Firewall connection count Monitoring
Network
interfaces
Event Types
In ADMIN > Device Support > Event, search for "firewall-1" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
LEA
1. In Servers and Opsec > OPSEC Applications, select your FortiSIEM application.
2. In the Rules menu, select Top.
3. Right-click SOURCE, then click Add and select your FortiSIEM virtual appliance.
4. Right-click DESTINATION, then click Add and select your Check Point firewall.
5. Right-click SERVICE, then click Add and select FW1_lea, and CPMI.
Also select snmp if you are configuring a Check Point FireWall-1 firewall.
6. Right-click ACTION and select Accept.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface metrics Availability and
Firewall model (utilization, bytes sent and received, packets sent and received, Performance
and version, errors, discards and queue lengths), Firewall connection count Monitoring
Network
interfaces
Event Types
Rules
Reports
Configuration Overview
The configuration of Check Point Provider-1 depends on the type of log that you want sent to FortiSIEM. There are two
options:
l Domain level audit logs, which contain information such as domain creation, editing, etc.
l Firewall logs, which include both audit log for firewall policy creation, editing, etc., and traffic logs
These logs are generated and stored among four different components:
l Multi-Domain Server (MDS), where domains are configured and certificates have to be generated.
l Multi-Domain Log Module (MLM), where domain logs are stored.
l Customer Management Add-on (CMA), the customer management module.
l Customer Log Module (CLM), which consolidates logs for an individual customer/domain.
1. Configure MDS.
2. Use the Client SIC obtained while configuring MDS to configure MLM.
3. Pull logs from MLM.
1. Configure CMA.
2. Use the Client SIC obtained while configuring CMA to configure CLM.
3. Pull logs from CLM.
If you want to pull firewall logs from a domain, you have to configure CLM for that domain.
See these topics for instructions on how to configure each component for Check Point Provider-1 firewalls.
l Configuring MDS for Check Point Provider-1 Firewalls
l Configuring MLM for Check Point Provider-1 Firewalls
l Configuring CMA for Check Point Provider-1 Firewalls
l Configuring CLM for Check Point Provider-1 Firewalls
The Check Point Provider-1 Customer Management Add-On (CMA) creates logs that are then consolidated by the
Customer Log Module (CLM). If you want the CLM to send logs to FortiSIEM, you must first configure the CMA and
obtain the AO Client SIC to configure access credentials for communication between the CLM and FortiSIEM.
l Configuration
l Settings for Access Credentials
Discover Paired Components on the Same Collector or Supervisor
Discovery of the MLM requires the certificate of the MDS, and discovery of the CLM requires the certificate of the CMA.
Make sure that you discover the MDS & MLM pair, and the CMA & CLM pair, on the same Supervisor or Collector. If you
attempt to discover them on separate Collectors, discovery will fail.
Configuration
1. In Servers and Opsec > OPSEC Applications, select your FortiSIEM application.
2. In the Rules menu, select Top.
3. Right-click SOURCE, then click Add and select your FortiSIEM virtual appliance.
4. Right-click DESTINATION, then click Add and select your Check Point firewall.
5. Right-click SERVICE, then click Add and select FW1_lea, and CPMI.
Also select snmp if you are configuring a Check Point FireWall-1 firewall.
6. Right-click ACTION and select Accept.
7. Right-click TRACK and select Log.
8. Go to Policy > Install.
9. Click OK.
10. Go to OPSEC Applications and select your FortiSIEM application.
11. In the General tab of the Properties window, make sure that the communications have been enabled between
your firewall and FortiSIEM.
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Settings for Check Point Provider-1 Firewall CLA SSLCA Access Credentials
Use these Access Method Definition settings to allow FortiSIEM to access your Check Point Provider-1 Firewall
CMA. When you complete the access credentials, click Generate Certificate to establish access between your firewall
and FortiSIEM.
Setting Value
Name CMA
l Prequisites
l Configuration
l Settings for Access Credentials
Prequisites
l You must first configure and discover the Check Point CLA and obtain the AO Client SIC before you can configure
the Customer Log Module (CLM). The AO Client SIC is generated when you create the FortiSIEM OPSEC
application.
Discover Paired Components on the Same Collector or Supervisor
Discovery of the MLM requires the certificate of the MDS, and discovery of the CLM requires the certificate of the CMA.
Make sure that you discover the MDS & MLM pair, and the CMA & CLM pair, on the same Supervisor or Collector. If you
attempt to discover them on separate Collectors, discovery will fail.
Configuration
Settings for Check Point Provider-1 Firewall CLM SSLCA Access Credentials
Use these Access Method Definition settings to allow FortiSIEM to access your Check Point Provider-1 Firewall
CMA. When you complete the access credentials, click Generate Certificate to establish access between your firewall
and FortiSIEM.
Setting Value
Name CLM
l Configuration
l Settings for Access Credentials
The Check Point Provider-1 firewall Multi-Domain Server (MDS) is where domains are configured and certificates are
generated for communicating with FortiSIEM. If you want to have domain logs from the Multi-Domain Log Module
(MLM) sent from your firewall to FortiSIEM, you must first configure and discover MDS, then use the AO Client SIC
created for your FortiSIEM OPSEC application to configure the access credentials for MLM.
Discover Paired Components on the Same Collector or Supervisor
Discovery of the MLM requires the certificate of the MDS, and discovery of the CLM requires the certificate of the CMA.
Make sure that you discover the MDS & MLM pair, and the CMA & CLM pair, on the same Supervisor or Collector. If you
attempt to discover them on separate Collectors, discovery will fail.
Configuration
You will use the MDS Server SIC to create access credentials in FortiSIEM for communicating with your server.
1. Log in to your Check Point SmartDomain Manager.
2. Select Multi-Domain Server Contents.
3. Select MDS, and then right-click to select Configure Multi-Domain Server... .
4. In the General tab, under Secure Internet Communication, note the value for DN.
1. In Servers and Opsec > OPSEC Applications, select your FortiSIEM application.
2. In the Rules menu, select Top.
3. Right-click SOURCE, then click Add and select your FortiSIEM virtual appliance.
4. Right-click DESTINATION, then click Add and select your Check Point firewall.
5. Right-click SERVICE, then click Add and select FW1_lea, and CPMI.
Also select snmp if you are configuring a Check Point FireWall-1 firewall.
6. Right-click ACTION and select Accept.
7. Right-click TRACK and select Log.
8. Go to Policy > Install.
9. Click OK.
10. Go to OPSEC Applications and select your FortiSIEM application.
11. In the General tab of the Properties window, make sure that the communications have been enabled between
your firewall and FortiSIEM.
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Setting Value
Name MDS
l Prerequisites
l Configuration
l Settings for Access Credentials
Prerequisites
l You must configure and discover your Check Point Provider-1 MDS before you configure the Multi-Domain Log
Module (MLM). You will need the AO Client SIC that was generated when you created your FortiSIEM OPSEC
application in the MDS to set up the access credentials for your MLM in FortiSIEM.
Discover Paired Components on the Same Collector or Supervisor
Discovery of the MLM requires the certificate of the MDS, and discovery of the CLM requires the certificate of the CMA.
Make sure that you discover the MDS & MLM pair, and the CMA & CLM pair, on the same Supervisor or Collector. If you
attempt to discover them on separate Collectors, discovery will fail.
Configuration
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
Setting Value
Name MLM
Setting Value
FortiSIEM uses SNMP, LEA to discover the device and to collect logs, configurations and performance metrics.
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface metrics Availability and
Firewall model (utilization, bytes sent and received, packets sent and received, Performance
and version, errors, discards and queue lengths), Firewall connection count Monitoring
Network
interfaces
Event Types
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
LEA
1. In Servers and Opsec > OPSEC Applications, select your FortiSIEM application.
2. In the Rules menu, select Top.
3. Right-click SOURCE, then click Add and select your FortiSIEM virtual appliance.
4. Right-click DESTINATION, then click Add and select your Check Point firewall.
5. Right-click SERVICE, then click Add and select FW1_lea, and CPMI.
Also select snmp if you are configuring a Check Point FireWall-1 firewall.
6. Right-click ACTION and select Accept.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP (V1, Host name, Uptime, CPU and Memory utilization, Free processor and I/O Availability and
V2c, V3) Hardware model, memory, Network Interface metrics (utilization, bytes sent Performance
Network interfaces, and received, packets sent and received, errors, discards and Monitoring
Hardware queue lengths), Firewall connection count
component details:
serial number,
model,
manufacturer,
software and
firmware versions of
components such as
fan, power supply,
network cards etc.,
Operating system
version, SSM
modules such as IPS
SNMP (V1, Hardware health: temperature, fan and power supply status
V2c, V3)
SNMP (V1, IPSec VPN Phase 1 tunnel metrics: local and remote Vpn Performance
V2c, V3) Ip addresses, Tunnel status, Tunnel Uptime, Received/Sent Monitoring
BitsPerSec, Received/Sent Packets, Received/Sent
BitsPerSec, Received/Sent Dropped Packets, Received/Sent
Rejected Exchanges, Received/Sent Invalid Exchanges
Invalid Received Pkt Dropped, Received Exchanges
Rejected, Received Exchanges Invalid IPSec VPN Phase
2 tunnel metrics: local and remote Vpn Ip addresses,
Tunnel status, Tunnel Uptime, Received/Sent BitsPerSec,
Received/Sent Packets, Received/Sent BitsPerSec,
Received/Sent Dropped Packets, Received/Sent Auth Failed,
Telnet/SSH Running and startup Startup configuration change, delta between running and Performance
configuration, startup configuration Monitoring,
Interface security Security and
levels, Routing Compliance
tables, Image file
name, Flash
memory size
Netflow Open server ports Traffic logs (for ASA 8.x and above) Security and
(V9) Compliance
Syslog Device type All traffic and system logs Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "asa" in the Device Type column to see the event types associated
with this device.
Rules
In RESOURCE > Rules, search for "asa" in the Description column to see the rules associated with this device.
Reports
In RESOURCE > Reports, search for "asa" in the Description column to see the reports associated with this device.
Configuration
security level is 100, outside is 0 and other interfaces are in between. This information can either be discovered via SSH
or entered manually after SNMP discovery. Without correct security level information, ASA traffic built and teardown
logs can not be parsed correctly (they may not have correct source and destination addresses and ports).
SNMP
Syslog
l logging enable
l logging timestamp
l logging debug-trace
l logging facility 16
<134>Nov 28 2007 17:20:48: %ASA-6-302013: Built outbound TCP connection 76118 for
outside:207.68.178.45/80 (207.68.178.45/80)
to inside:192.168.20.31/3530 (99.129.50.157/5967)
SSH
Telnet
The following commands are used for discovery and performance monitoring via SSH. Make sure that the accounts
associated with the ASA access credentials you set up in FortiSIEM have permission to execute these commands.
Critical Commands
It is critical to have no names and logging timestamp commands in the configuration, or logs will not be parsed
correctly.
1. show startup-config
2. show running-config
3. show version
4. show flash
5. show context
6. show ip route
7. enable
8. terminal pager 0
9. terminal length 0
NetFlow
NetFlow is an optimized protocol for collecting high volume traffic logs. You should configure NetFlow with ASM, the
ASA device manager.
1. Login to ASDM.
2. Go to Configuration > Device Management > Logging > Netflow.
3. Under Collectors, click Add.
4. For Interface, select the ASA interface over which NetFlow will be sent to FortiSIEM.
5. For IP Address or Host Name, enter the IP address or host name for your FortiSIEM virtual appliance that will
receive the NetFlow logs.
6. For UDP Port, enter 2055.
7. Click OK.
8. Select Disable redundant syslog messages.
This prevents the netflow equivalent events from being also sent via syslog.
9. Click Apply.
This is an optional step. The template refresh rate is the number of minutes between sending a template record to
FortiSIEM. The default is 30 minutes, and in most cases this is sufficient. Since flow templates are dynamic, FortiSIEM
cannot process a flow until it knows the details of the corresponding template. This command may not always be
needed, but if flows are not showing up in FortiSIEM, even if tcpdump indicates that they are, this is worth trying.
You can find out more about configuring NetFlow in the Cisco support forum.
Use these Access Method Definition settings to allow FortiSIEM to access your device over SNMP. Set the Name
and Community String.
Setting Value
These are the generic settings for providing Telnet access to your device from FortiSIEM.
Setting Value
Name Telnet-generic
Port 23
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
Clavister Firewall
Integration Points
Event Types
In ADMIN > Device Support > Event, Search for "Clavister" to see the event types associated with this device.
Rules
No specific rules are written for Clavister firewall but generic firewall rules will apply.
Reports
No specific reports are written for Clavister firewall but generic firewall rules will apply.
Configuration
Configure Clavister firewall to send logs to FortiSIEM in the supported format (see Sample Events below).
None required
Sample Events
Cyberoam Firewall
l Integration Points
l Configuration
l Setting for Access Credentials
l Sample Events
Integration Points
Event Types
In ADMIN > Device Support > Event, search for "Cyberoam-" to see the event types associated with this device.
Rules
No specific rules are written for Cyberoam firewall but generic firewall rules will apply.
Reports
No specific reports are written for Cyberoam firewall but generic firewall rules will apply.
Configuration
Configure Cyberoam firewall to send logs to FortiSIEM in the supported format (see Sample Events ).
None required.
Sample Events
SNMP Host name, CPU Utilization, Memory utilization and Firewall Session Count Availability and
Hardware model, Performance
Network interfaces, Monitoring
Operating system
version
Event Types
In ADMIN > Device Support > Event, search for "sonicwall" in the Device Type column to see the event types
associated with Dell SonicWALL firewalls.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
l Dell SonicWALL Firewall Administrator's Guide (PDF)
Syslog
Example Syslog
Setting Value
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface Availability and
Hardware model, metrics (utilization, bytes sent and received, packets sent Performance
Network and received, errors, discards and queue lengths). Monitoring
interfaces, Operating For 5xxx series firewalls, per CPU utilization (event PH_DEV_
system version MON_FORTINET_PROCESSOR_USGE)
Event Types
In ADMIN > Device Support > Event, search for "fortigate" in the Name and Description columns to see the event
types associated with this device.
Rules
In Resource > Rules, search for "fortigate" in the Name column to see the rules associated with this device.
Reports
Search for Reports under Network device, Firewall and Security groups.
Follow these steps to configure SNMP on FortiGate. For more information on configuring the FortiGate to allow
detailed interface monitoring using SNMP, see Data Source in the FortiSIEM User’s Guide.
1. Log in to your firewall as an administrator.
2. Go to System > Network.
3. Select the FortiGate interface IP that FortiSIEM will use to communicate with your device, and then click Edit.
4. For Administrative Access, makes sure that SSH and SNMP are selected.
5. Click OK
6. Go to System > Config > SNMP v1/v2c.
7. Click Create New to enable the public community.
FortiSIEM Collector SSH Client, when communicating to FortiGate via SSH, may use the
public key authentication method first. This may fail and create some alerts in FortiGate. To
prevent this, modify the per user config file as follows:
1. Log in to the FortiSIEM node that communicates to FortiGate via SSH, as admin.
2. Open /opt/phoenix/bin/.ssh/config and create a new file, if necessary.
3. Add these two lines and save:
PreferredAuthentications password
PubkeyAuthentication no
4. Ensure that the owner is admin:
chown admin.admin /opt/phoenix/bin/.ssh/config
chmod 600 /opt/phoenix/bin/.ssh/config
5. Verify using the commands:
su admin
ssh -v <fgt host>
Alternatively, modify the global ssh_config file as below. Since this is a global
configuration, all programs will use this setting.
1. Log in to a FortiSIEM node that communicates to FortiGate via SSH, as root.
2. Open /etc/ssh/ssh_config
3. Add these two lines:
PreferredAuthentications password
PubkeyAuthentication no
These commands are used for discovery and performance monitoring via SSH. Please make sure that the access
credentials you provide in FortiSIEM have the permissions necessary to execute these commands on the device.
show firewall address
show full-configuration
If you are sending these logs across a VPN, Fortigate will try to use the WAN interface for the source of all system
traffic. You can change this by setting the source-ip option to the IP used on the Fortigates Internal/LAN interface.
You can now configure FortiSIEM to communicate with your device by following the instructions in the User Guide >
Section: Configuring FortiSIEM > Discovering Infrastructure > Setting Access Credentials for Device Discovery,
and then initiate discovery of the device as described in the topics under Discovering Infrastructure.
If you are already sending FortiGate logs to FortiAnalyzer, then you can forward those logs to FortiSIEM by configuring
FortiAnalyzer as follows:
1. Login to FortiAnalyzer.
2. Go to System Settings > Advanced > Syslog Server.
a. Click the Create New button.
b. Enter the Name. (It is recommended to use the name of the FortiSIEM server.)
c. Fill in the IP address (or FQDN) with the IP or a fully qualified name of the FortiSIEM server.
d. Leave the Syslog Server Port to the default value '514'.
e. Click OK to save your entries.
3. Go to System Settings > Dashboard > CLI Console.
4. Click in the CLI Console and enter the following commands:
l For FortiAnalyzer versions 6.0 and later:
Note: Replace <id> with the actual name of the log forward created earlier.
config system log-forward
edit <id>
set mode forwarding
set fwd-max-delay realtime
set server-name "<FSM_Collector>"
set server-ip "a.b.c.d"
set fwd-log-source-ip original_ip
set fwd-server-type syslog
next
end
con vdom
edit root ( root is an example, change to the required VDOM name.)
con sys interface
edit wan1 (change the interface to the one to use.)
set netflow-sampler both
end
end
1. Login to FortiGate.
2. Go to Policy & Objects > IPv4 Policy.
3. Click on the Policy IDs you wish to receive application information from.
4. Add SSL inspection and App Control on the policy by clicking the + button in the Security Profiles column.
Event Types
Reports
Configuration
Setup in FortiSIEM
Setting Value
5. To see the jobs associated with Imperva, select ADMIN > Pull Events.
6. To see the received events select ANALYTICS, then enter Imperva in the search box.
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface Availability and
Hardware model, metrics (utilization, bytes sent and received, packets sent and Performance
Network interfaces, received, errors, discards and queue lengths), Firewall Monitoring
Operating system connection count
version
Syslog Device type Traffic log, Admin login activity logs, Interface up/down logs Availability,
Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "SSG" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
1. Go to Policies.
2. Select a policy and click Options.
3. Select Logging.
4. Click OK.
Use these Access Method Definition settings to allow FortiSIEM to access your over SNMP. Set the Name and
Community String.
Setting Value
These are the generic settings for providing Telnet access to your device from FortiSIEM.
Setting Value
Name Telnet-generic
Port 23
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
Syslog
Event Types
In ADMIN > Device Support > Event, search for "sidewinder" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting Value
SNMP Host name, Uptime, CPU utilization, Network Interface metrics (utilization, Availability and
Hardware bytes sent and received, packets sent and received, errors, discards Performance
model, and queue lengths), Firewall connection count Monitoring
Network
interfaces,
Operating
system version
Syslog Device type Traffic log, Threat log (URL, Virus, Spyware, Vulnerability, File, Availability,
Scan, Flood and data subtypes), config and system logs Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "palo alto" in the Description column to see the event types
associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "palo alto" in the Description column to see the reports associated with this
device.
Configuration
1. Log in to the management console for your firewall with administrator privileges.
2. In the Device tab, click Setup.
3. Click Edit.
4. Under MGMT Interface Services, make sure SSH, Ping, and SNMP are selected.
5. For SNMP Community String, enter public.
6. If there are entries in the Permitted IP list, Add the IP address of your FortiSIEM virtual appliance.
7. Click OK.
8. Go to Setup > Management and check that SNMP is enabled on the management interface.
Syslog
1. Log in to the management console for your firewall with administrator privileges.
2. In the Device tab, go to Log Destinations > Syslog.
3. Click New.
4. Enter a Name for your FortiSIEM virtual appliance.
5. For Server, enter the IP address of your virtual appliance.
6. For Port, enter 514.
7. For Facility, select LOG_USER.
8. Click OK.
4. Click OK.
5. Commit changes.
By default, Palo Alto firewalls only log web traffic that is blocked by URL filtering policies. If you must log permitted web
traffic, follow these steps.
1. In the Objects tab, go to Security Profiles > URL Filtering.
2. Edit an existing profile by clicking on its name, or click Add to create a new one.
3. For website categories that you want to log, select Alert.
Traffic matching these website category definitions will be logged.
4. Click OK.
5. For each security rule that you want to send logs to FortiSIEM, edit the rule and add the new url filter.
Use these Access Method Definition settings to allow FortiSIEM to access your device over SNMP. Set the Name
and Community String.
Setting Value
These are the generic settings for providing Telnet access to your device from FortiSIEM.
Setting Value
Name Telnet-generic
Port 23
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
Sophos UTM
Event Types
In ADMIN > Device Support > Event, search for "sophos-utm" to see the event types associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslog to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting Value
Setting Value
l Integration Points
l Configuring Stormshield to Send Logs
l Configuring FortiSIEM to Receive Logs
l Stormshield Event Types
l Stormshield Sample Logs
Integration Points
Follow the steps listed here under the Choose where to save logs section, to save logs.
No configuration is needed. FortiSIEM can automatically detect and parse Stormshield logs based on the built in parser.
Tigera Calico
l Integration Points
l Configuring Tigera Calico to Send Logs
l Configuring FortiSIEM to Receive Logs
l Tigera Calico Event Types
l Tigera Calico Sample Logs
Integration Points
Syslog Flow, Audit and DNS logs Security and Compliance Monitoring
No configuration is needed. FortiSIEM can automatically detect and parse Tigera Calico logs based on the built in
parser.
data=true","elasticsearch.k8s.elastic.co/config-
hash=1585026949","elasticsearch.k8s.elastic.co/node-
ml=true","common.k8s.elastic.co/type=elasticsearch","elasticsearch.k8s.elastic.co/
node-ingest=true","elasticsearch.k8s.elastic.co/node-
master=true","elasticsearch.k8s.elastic.co/cluster-name=tigera-
secure"]},"proto":"tcp","action":"allow","reporter":"dst","policies":{"all_
policies":["0|allow-tigera|tigera-elasticsearch/allow-tigera.elasticsearch-
access|allow"]},"bytes_in":2593,"bytes_out":4617,"num_flows":3,"num_flows_
started":1,"num_flows_completed":1,"packets_in":17,"packets_out":10,"http_requests_
allowed_in":0,"http_requests_denied_in":0,"original_source_ips":null,"num_original_
source_ips":0,"host":"fluentd-node-xzscj"}
l Integration points
l Configuring Watchguard Firebox for SNMP Access
l Configuring FortiSIEM
Integration points
SNMP Performance metrics – CPU., Memory, Uptime, Interface Usage statistics, Performance and
Connection rate and Policy Statistics Availability
Monitoring
Configuring FortiSIEM
7. Create a discovery entry containing the IP Address of the Firebox firewall and discover the device. Make sure
Discovery succeeds.
8. An entry will be created in ADMIN > Setup > Change/Monitor corresponding to this firewall. FortiSIEM will start
to pull SNMP metrics from this firewall.
FortiSIEM supports these load balancers and application firewalls for discovery and monitoring.
l Brocade ServerIron ADX
l Citrix Netscaler Application Delivery Controller (ADC)
l F5 Networks Application Security Manager
l F5 Networks Local Traffic Manager
l F5 Networks Web Accelerator
l Fortinet FortiADC
l Qualys Web Application Firewall
SNMP Host name, Uptime, CPU, Memory, Interface Utilization, Hardware Performance/Availability
serial number, status, Real Server Statistics Monitoring
hardware
(CPU,
memory,
network
interface etc)
Event Types
l PH_DEV_MON_SYS_CPU_UTIL
[PH_DEV_MON_SYS_CPU_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=deviceBrocadeServerIron.cpp,
[lineNumber]=434,[cpuName]=CPU,[hostName]=lb1-1008-qts,[hostIpAddr]=10.120.3.15,
[cpuUtil]=55.000000,[pollIntv]=176,[phLogDetail]=
l PH_DEV_MON_SYS_MEM_UTIL
[PH_DEV_MON_SYS_MEM_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=deviceBrocadeServerIron.cpp,
[lineNumber]=456,[memName]=Physical
Memory,[hostName]=lb1-1008-qts,[hostIpAddr]=10.120.3.15,[memUtil]=10.000000,[pollIntv]=176,
[phLogDetail]=
l PH_DEV_MON_NET_INTF_UTIL
[PH_DEV_MON_NET_INTF_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phIntfFilter.cpp,
[lineNumber]=323,[intfName]=GigabitEthernet8,[intfAlias]=,[hostName]=lb1-1008-qts,
[hostIpAddr]=10.120.3.15,[pollIntv]=56,[recvBytes64]=1000000,
[recvBitsPerSec]=142857.142857,[inIntfUtil]=0.014286,[sentBytes64]=2000000,
[sentBitsPerSec]=285714.285714,[outIntfUtil]=0.028571,[recvPkts64]=0,[sentPkts64]=0,
[inIntfPktErr]=0,[inIntfPktErrPct]=0.000000,[outIntfPktErr]=0,[outIntfPktErrPct]=0.000000,
[inIntfPktDiscarded]=0,[inIntfPktDiscardedPct]=0.000000,[outIntfPktDiscarded]=0,
[outIntfPktDiscardedPct]=0.000000,[outQLen64]=0,[intfInSpeed64]=1000000000,
[intfOutSpeed64]=1000000000,[intfAdminStatus]=up,[intfOperStatus]=up,[daysSinceLastUse]=0,
[totIntfPktErr]=0,[totBitsPerSec]=428571.428571,[phLogDetail]=
l PH_DEV_MON_SERVERIRON_REAL_SERVER_STAT
[PH_DEV_MON_SERVERIRON_REAL_SERVER_STAT]:[eventSeverity]=PHL_INFO,
[fileName]=deviceBrocadeServerIron.cpp,[lineNumber]=507,[hostName]=lb1-1008-qts,
[hostIpAddr]=10.120.3.15,[realServerIpAddr]=10.120.10.131,[realServerState]=7,
[failedPortExists]=2,[openConnectionsCount]=2,[peakConns]=114,[activeSessions]=4,
[phLogDetail]=
l PH_DEV_MON_HW_STATUS
[PH_DEV_MON_HW_STATUS]:[eventSeverity]=PHL_INFO,[fileName]=deviceBrocadeServerIron.cpp,
[lineNumber]=359,[hostName]=lb1-1008-qts,[hostIpAddr]=10.120.3.15,[hwStatusCode]=2,
[hwPowerSupplyStatus]=0,[hwTempSensorStatus]=2,[hwFanStatus]=0,[phLogDetail]=
[PH_DEV_MON_HW_STATUS_TEMP_CRIT]:[eventSeverity]=PHL_CRITICAL,[fileName]=device.cpp,
[lineNumber]=13812,[hostName]=lb1-1008-qts,[hostIpAddr]=10.120.3.15,[hwStatusCode]=2,
[hwComponentName]=1-Temperature
sensor,[hwComponentStatus]=Critical,[phLogDetail]=
l PH_DEV_MON_HW_TEMP
[PH_DEV_MON_HW_TEMP]:[eventSeverity]=PHL_INFO,[fileName]=deviceBrocadeServerIron.cpp,
[lineNumber]=401,[hostName]=lb1-1008-qts,[hostIpAddr]=10.120.3.15,[hwComponentName]=Temp1,
[envTempDegF]=90,[phLogDetail]=
Rules
There are no predefined rules for this device other than covered by generic network devices.
Reports
There are no predefined reports for this device other than covered by generic network devices.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting Value
Setting Value
Event Types
In ADMIN > Device Support > Event, search for "netscaler" in the Device Type column to see the event types
associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "nestler" in the Name column to see the reports associated with this device.
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting Value
Example Syslog
Syslog Various application level attack scenarios - invalid directory access, Log analysis
SQL injections, cross site exploits. and
compliance
Event Types
In ADMIN > Device Support > Event, search for "f5-asm" in the Name column to see the event types associated
with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Example Syslog
SNMP Host name, serial Uptime, CPU, Memory, Disk utilization, Interface Performance/Availability
number, hardware Utilization, Hardware status, process level CPU and Monitoring
(CPU, memory, memory urilization
network interface, disk
etc) and software
information (running
and installed
software)
Event Types
In ADMIN > Device Support > Event, search for "f5-LTM" in the Name column to see the event types associated
with this device.
Search for "f5-BigIP" in ADMIN > Device Support > Event to see event types associated with SNMP traps for this
device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
SNMP Trap
FortiSIEM processes events from this device via SNMP traps sent by the device. Configure the device to send send
SNMP traps to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
2012-01-18 14:13:43 0.0.0.0(via UDP: [192.168.20.243]:161) TRAP2, SNMP v2c, community public
. Cold Start Trap (0) Uptime: 0:00:00.00 DISMAN-EVENT-
MIB::sysUpTimeInstance = Timeticks: (33131) 0:05:31.31 SNMPv2-
MIB::snmpTrapOID.0 = OID: SNMPv2-SMI::enterprises.3375.2.5.0.1
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Example Syslog
<134>Jul 30 15:28:33 tmm1 info tmm1[7562]: 01070417: 134: ICSA: non-session UDP packet
accepted, source: 112.120.125.48 port: 10144, destination: 116.58.240.252 port: 53
<134>Jul 30 15:28:33 tmm1 info tmm1[7562]: 01070417: 134: ICSA: non-session TCP packet
accepted, source: 108.83.156.153 port: 59773, destination: 116.58.240.225 port: 80
<134>Jul 30 15:28:33 tmm2 info tmm2[7563]: 01070417: 134: ICSA: non-session ICMP packet
accepted, source: 10.11.218.10, destination: 10.255.111.2, type code: Echo Reply
Setting Value
Event Types
In ADMIN > Device Support > Event, search for "f5-web" in the Name column to see the event types associated with
this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Example Syslog
Fortinet FortiADC
Integration Points
syslog Host name, None Event, Security and Traffic logs Security
Reporting IP monitoring
Event Types
In ADMIN > Device Support > Event, Search for "FortiADC" to see the event types associated with this device.
Rules
No specific rules are written for FortiADC Web application firewall but generic firewall rules will apply.
Reports
No specific reports are written for FortiADC Web application firewall but generic firewall rules will apply.
Configuration
Configure FortiADC Web application firewall to send logs to FortiSIEM in the supported format (see Sample events
below)
None required
Sample Events
Syslog Permitted and Denied Web traffic Log analysis and compliance
Event Types
The following event types are generated by parsing Qualys Web Application Firewall traffic logs and analyzing the
HTTP error code.
l Qualys-WAF-Web-Request-Success
l Qualys-WAF-Web-Bad-Request
l Qualys-WAF-Web-Client-Access-Denied
l Qualys-WAF-Web-Client-Error
l Qualys-WAF-Web-Forbidden-Access-Denied
l Qualys-WAF-Web-Length-Reqd-Access-Denied
l Qualys-WAF-Web-Request
l Qualys-WAF-Web-Request-Redirect
l Qualys-WAF-Web-Server-Error
Rules
Reports
Relevant reports are defined in RESOURCE > Reports > Device > Network > Web Gateway.
Configuration
FortiSIEM processes events from this device via syslog sent in JSON format. Configure the device to send syslog to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Example Syslog
:443},"request":{"method":"POST","uri":"/","protocol":"HTTP/1.1","host":"esers-
test.foo.org","bandwidth":0,"headers":[{"name":"Content-Length","value":"645"},
{"name":"Accept","value":"text/html,application/xhtml+xml,application/xml;q=0.9,image/web
p,*/*;
"type":"Alert","rule":"main/qrs/sqli/xpathi/condition_escaping/boolean/confidence_
high/3","message":"Condition escaping detected (SQL or XPATH injection) -
txtUserId.","confidence":80,"severity":60,"id":"262845566"},{"tags":
["cat/correlation","qid/226016"],"type":"Observation","rule":"main/correlation/1",
"main/correlation/1","message":"Detected:
XPATHi.","confidence":80,"severity":60,"id":"268789851"}]}}
Log Aggregators
Fortinet FortiAnalyzer
Overview
l Configuring FortiAnalyzer
l Configuring FortiSIEM Collectors to Receive Logs from FortiAnalyzer
Overview
Customers of both FortiAnalyzer and FortiSIEM may want to take already aggregated event data received on
FortiAnalzyer and forward those events to FortiSIEM.
Configuring FortiAnalyzer
1. Login to FortiAnalyzer.
2. Go to System Settings > Advanced > Syslog Server.
a. Click the Create New button.
b. Enter the Name. (It is recommended to use the name of the FortiSIEM server.)
c. Fill in the IP address (or FQDN) with the IP or a fully qualified name of the FortiSIEM server.
d. Leave the Syslog Server Port to the default value '514'.
e. Click OK to save your entries.
To configure FortiAnalyzer event forwarding to FortiSIEM, you must first set up the following.
1. 1. Install a FortiSIEM collector in the same subnet as FortiAnalyzer that will be forwarding the events.
Note: The same subnet request is required as FortiAnalyzer will later be configured to spoof packets to the
collector. RPF (reverse path forwarding checks) on network equipment would have to be disabled if FortiAnalyzer
and collector existed on different subnets.
2. 2. It is recommended that for every 5,000 EPS (events per second) ingested, you add 1 collector that is 8vCPU,
8GB RAM. If you have more than 5,000 EPS forwarding from FortiAnalyzer, please set up a load balancer with
multiple collectors behind it, allowing UDP 514 inbound.
Field Input
Name FortiSIEM-Forwarding
Status On
Compression OFF
Log Forwarding Filters Select all desired Administrative Domains (ADOMs) / device logs you’d like to
forward
4. Go to the CLI Console and configure the CLI only log forward option by running the following CLI commands.
Notes:
l Logs received by FortiAnalyzer, and then forwarded to FortiSIEM, have the source IP of the log packet
overwritten with the IP address of the FortiAnalyzer appliance. This hides the “true” source of the log packet
from FortiSIEM. To override this behavior, FortiAnalyzer can spoof the original log sender's IP address when
forwarding to FortiSIEM. This allows FortiSIEM collectors to receive all the original information as if it received
the logs directly from the originating device.
l For FortiAnalyzer versions 6.0 and later, use the following CLI:
Note: Replace <id> with the actual name of the log forward created earlier.
config system log-forward
edit <id>
set mode forwarding
set fwd-max-delay realtime
set server-name "<FSM_Collector>"
set server-ip "a.b.c.d"
set fwd-log-source-ip original_ip
set fwd-server-type syslog
next
end
next
end
l For FortiAnalyzer versions earlier than 5.6, use the following CLI:
Note: For <id>, you can choose the number for your FortiSIEM syslog entry.
config system aggregation-client
edit <id>
set fwd-log-source-ip original_ip
end
To configure the FortiSIEM collector to receive logs from FortiAnalyzer, you will need to disable RPF checks that would
normally cause the collector virtual machine from dropping the log packet as it is spoofed.
sysctl -w net.ipv4.conf.all.rp_filter=0
To make this change persistent across reboots, add the following code to the /etc/sysctl.conf file.
net.ipv4.conf.all.rp_filter=0
Syslog Network device software update, configuration analysis for Log analysis
compliance, admin login and
compliance
Event Types
Over 40 event types are generated by parsing Cisco Network Configuration Manager logs. The complete list can be
found in ADMIN > Device Support > Event by searching for Cisco-NCM. Some important ones are
l Cisco-NCM-Device-Software-Change
l Cisco-NCM-Software-Update-Succeeded
l Cisco-NCM-Software-Update-Failed
l Cisco-NCM-Policy-Non-Compliance
l Cisco-NCM-Device-Configuration-Deployment
l Cisco-NCM-Device-Configuration-Deployment-Failure
Rules
Reports
Configuration
FortiSIEM processes events from this device via syslog. Configure the device to send syslog to FortiSIEM as directed in
the device's product documentation, and FortiSIEM will parse the contents.
Example Syslog
Login / Authentication - Succeeded Successfully used: Last successful password (Password rule
Retail TACACS NCM Login) Optional:Script - Succeeded Successfully executed: prepare
configuration for deployment Script - Succeeded Successfully executed: deploy to running
configuration via TFTP through CLI Bypassed: deploy to running configuration via SCP through
CLI. (Requires SCP, CLI to be enabled.) Tried: deploy to running configuration via FTP
through CLI (Warning: SSH server username or password not specified in NA admin settings.)
Optional:Script - Succeeded Successfully executed: determine result of deployment operation
Script run: ------------------------------------------------------------ ! interface fast0/16
no shut
491354611 Tue Mar 04 03:38:22 EST 2014 FooA Software Update Succeeded server01.foo.com
1.1.1.32 44571 10.173.30.9 $OrignatorEmail$ FooA Update Device Software 2014-03-04 03:30:00.0
usmist_1699295009 (1.13.3.9) Succeeded
l Integration points
l Configuring PacketFence Network Access Control
l Parsing and Events
Integration points
Configuring FortiSIEM
FortiSIEM automatically recognizes PacketFence NAC syslog as long it follows the following format as shown in the
sample syslog:
Oct 9 11:29:34 10.2.204.81 1 2018-10-09T11:29:34.04189+01:00 example.com packetfence.log - - -
Oct 11 15:42:00 httpd.aaa(4765) WARN: [mac:40:83:1d:12:2a:cb] Calling match with empty/invalid
rule class. Defaulting to 'authentication' (pf::authentication::match)
Over 20 events are parsed – see event Types in Resources > Event Types and search for “PacketFence-NAC-“.
FortiSIEM supports these intrusion protection systems for discovery and monitoring.
l 3COM TippingPoint UnityOne IPS
l AirTight Networks SpectraGuard
l Alert Logic IRIS API
l Cisco FireSIGHT and FirePower Threat Defence
l Cisco Intrusion Protection System
l Cisco Stealthwatch
l Cylance Protect Endpoint Protection
l Cyphort Cortex Endpoint Protection
l Damballa Failsafe
l Darktrace CyberIntelligence Platform
l FireEye Malware Protection System (MPS)
l FortiDDoS
l Fortinet FortiDeceptor
l Fortinet FortiNAC
l Fortinet FortiSandbox Configuration
l Fortinet FortiTester
l IBM Internet Security Series Proventia
l Indegy Security Platform
l Juniper DDoS Secure
l Juniper Networks IDP Series
l McAfee IntruShield
l McAfee Stonesoft IPS
l Motorola AirDefense
l Nozomi
l Radware DefensePro
l Snort Intrusion Protection System
l Sourcefire 3D and Defense Center
l Trend Micro Deep Discovery
l Zeek (Bro) Installed on Security Onion
Event Types
In ADMIN > Device Support > Event, search for "tippingpoint" in the Device Type and Description columns to see
the event types associated with this device.
Configuration
SNMP
Syslog
In addition, filter events contain a UUID, which is a unique numerical identifier that correlates with the exact security
threat defined by Tipping Point Digital Vaccine Files. The FortiSIEM Virtual Appliance will correlate these with
authoritative databases of security threats.
1. Go to IPS > Action Sets.
2. Click Permit + Notify.
3. Under Contacts, click Remote Syslog.
4. Under Remote Syslog Information, enter the IP Address of the FortiSIEM virtual appliance.
5. Make sure the Port is set to 514.
6. Make sure Delimiter is set to tab, comma, or semicolon.
7. Click Add to Table Below.
You should now see the IP address of the FortiSIEM virtual appliance appear as an entry in the Remote Syslogs
table.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Syslog
Event Types
In ADMIN > Device Support > Event, search for "airtight" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Example Syslog
Support for Alert Logic IRIS API allows FortiSIEM to respond to incidents and events in real-time with up-to-date
situational awareness and comprehensive security analytics.
l Integration Points
l Event Types
l Reports
l Rules
l Configuring AlertLogic IRIS for FortiSIEM API Access
l Configuring FortiSIEM for AlertLogic IRIS API Access
l Sample Events
Integration points
AlertLogic Iris API Security Alerts created by AlertLogic Security and Compliance
Event Types
In RESOURCES > Event Types, enter "AlertLogic" in the Search field to see the event types associated with this
device.
Rules
In RESOURCE > Rules, enter "AlertLogic" in the Search field to see the rules associated with this device.
Reports
No defined reports.
Settings Description
Sample Events
[inIncidentStatus]=closed,[attackType]=suspicious-activity,[type]=,[count]=0.0,
[comment]=Test,[eventSeverity]=5,[eventType]=AlertLogic-Incident-Mei_Test,
[srcIpAddr]=255.255.255.255,[destIpAddr]=255.255.255.255
Raw events of an associated event start with [AlertLogic_Incident_Associated_Event]:
AlertLogic_Incident_Associated_Event]:[reptDevIpAddr]=10.10.10.10,[phCustId]=,
[reptDevIpAddr]=34.192.118.124,[reptDevName]=api.cloudinsight.alertlogic.com,
[accountId]=100000,[inIncidentId]=e9113683d6815742,[httpContentType]=application/x-
alpacket-megmsgs,[description]=meta,[resourceType]=associated log,
[resourceName]=Log,
[uuid]=UVUxSk5BQ2tNS3NBQUFBQVhQQnNkRnp3YkhRQUFiRE1BQUVBSG1Gd2NHeHBZMkYwYVc5dUwzZ3R
ZV3h3WVdOclpYUXRiV1ZuYlhObmN3QUdURTlIVFZOSDphcHBsaWNhdGlvbi94LWFscGFja2V0LW1lZ21zZ
3M6ZTkxMTM2ODNkNjgxNTc0MjoxMDc2MDM2Mw==,[hostName]=meta,[msg]=dddddddd,
[eventSeverity]=5,[procId]=0,[procName]=meta,[collectorTime]=1559260276,
[reptDevName]=user,[eventType]=AlertLogic_e9113683d6815742_Associated_Event
This section describes how FortiSIEM collects logs from Cisco FireSIGHT console and FirePower Threat Defence via
the eStreamer API integration. FortiSIEM provides two integrations options, either through the FortiSIEM built-in
eStreamer integration or via the Cisco FirePower eStreamer eNcore client.
The Cisco eNcore client Collects System intrusion, discovery, and connection data from Firepower Management Center
or managed device (also referred to as the eStreamer server) to external client applications, in this case via Syslog to
FortiSIEM.
l What is Discovered and Monitored
l Using FortiSIEM Client
l Using Cisco eStreamer Client
Rules
Reports
Event Types
l Discovery events:
l PH_DEV_MON_FIREAMP_DISCOVERY_NETWORK_PROTOCOL
PH_DEV_MON_FIREAMP_DISCOVERY_NETWORK_PROTOCOL]:[eventSeverity]=PHL_INFO,
[fileName]=phFireAMPAgent.cpp,[lineNumber]=815,[reptDevIpAddr]=10.1.23.177,
[destIpPort]=2054,[ipProto]=54,[phLogDetail]=
l PH_DEV_MON_FIREAMP_DISCOVERY_OS_FINGERPRINT
[PH_DEV_MON_FIREAMP_DISCOVERY_OS_FINGERPRINT]:[eventSeverity]=PHL_INFO,
[fileName]=phFireAMPAgent.cpp,[lineNumber]=737,[reptDevIpAddr]=10.1.23.177,
[fingerprintId]=01f772b2-fceb-4777-8a50-1e1f27426ad0,[osType]=Windows 7,
[hostVendor]=Microsoft,[osVersion]=NULL,[phLogDetail]=
l PH_DEV_MON_FIREAMP_DISCOVERY_CLIENT_APP
[PH_DEV_MON_FIREAMP_DISCOVERY_CLIENT_APP]:[eventSeverity]=PHL_INFO,
[fileName]=phFireAMPAgent.cpp,[lineNumber]=775,[reptDevIpAddr]=10.1.23.177,
[clientAppId]=638,[appName]=Firefox,[phLogDetail]=
l PH_DEV_MON_FIREAMP_DISCOVERY_SERVER
[PH_DEV_MON_FIREAMP_DISCOVERY_SERVER]:[eventSeverity]=PHL_INFO,
[fileName]=phFireAMPAgent.cpp,[lineNumber]=853,[reptDevIpAddr]=10.1.23.177,
[applicationId]=676,[appTransportProto]=HTTP,[phLogDetail]=
Configuration
FortiSIEM Configuration
Cisco has published a free eStreamer client to pull events from FireAMP server. This client is more up-to-date than
FortiSIEM’s own eStreamer client.
If you decide to use Cisco’s eStreamer client instead of FortiSIEM’s eStreamer client, follow these steps.
This is required because the python version used by FortiSIEM is compiled with PyUnicodeUCS2, while eStreamer
client requires the standard version of python built with PyUnicodeUCS4.
1. Log in to FortiSIEM Collector or the node where eStreamer client is going to be installed.
2. Create eStreamer user using the command:
a. useradd estreamer
3. Download the python library using the commands:
a. su estreamer
b. mkdir ~/python
c. cd ~/python
d. wget https://www.python.org/ftp/python/2.7.11/Python-2.7.11.tgz
4. Install python library :
a. tar zxfv Python-2.7.11.tgz
b. find ~/python -type d | xargs chmod 0755
c. cd Python-2.7.11
d. ./configure --prefix=$HOME/python --enable-unicode=ucs4
e. make && make install
f. Add below two lines to ~/.bashrcp:
export PATH=$HOME/python/Python-2.7.11/:$PATH
export PYTHONPATH=$HOME/python/Python-2.7.11
g. source ~/.bashrc
1. SSH to FortiSIEM Collector or the node where eStreamer client is going to be installed as estreamer user.
2. Git clone: git://github.com/CiscoSecurity/fp-05-firepower-cef-connector-arcsight.git
3. Change directory using the command:
cd fp-05-firepower-cef-connector-arcsight
4. Login to eStreamer server and:
a. Go to System > Integration > eStreamer.
b. Create a New client and enter the IP address of the Supervisor/Collector as the host.
c. Download the pkcs12 file and save it to directory:
fp-05-firepower-cef-connector-arcsight
5. Go back to fp-05-firepower-cef-connector-arcsight directory.
6. Run sh encore.sh, and type 2 for selection of output in CEF as prompted. An estreamer.conf file is generated.
l servers.host : eStreamer_Server_IP
l servers.pkcs12Filepath : /path/to/pkcs12
firepower-cef-connector-arcsight/client_pkcs.key"
l openssl pkcs12 -in "client.pkcs12" -clcerts -nokeys -out "/path/to/fp-05-
firepower-cef-connector-arcsight/client_pkcs.cert"
SSH to FortiSIEM Collector or the node where eStreamer client is installed, as estreamer user. Start eStreamer client by
entering:
encore.sh start
Now eStreamer client is ready for use. FortiSIEM 5.2.5 contains an updated parser for the events generated by Cisco
eStreamer client. Trigger few events in eStreamer server and query from FortiSIEM to verify if everything is working.
Event Types
In ADMIN > Device Support > Event, search for "cisco ips" in the Device Type and Description columns to see the
event types associated with this device.
Rules
In RESOURCE > Rules, search for "cisco ips" in the Name column to see the rules associated with this device.
Reports
In RESOURCE > Reports , search for "cisco ips" in the Name column to see the reports associated with this device.
Configuration
SNMP
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Port 443
Set these Access Method Definition values to allow FortiSIEM to communicate with yourdevice over SNMP. Set the
Name and Community String.
Setting Value
Cisco Stealthwatch
l Integration points
l Configuring FortiSIEM
l Parsing and Events
Integration points
Configuring FortiSIEM
FortiSIEM automatically recognizes Cisco Stealthwatch syslog as long it follows the following format as shown in the
sample syslog:
<129>Jun 18 14:56:00 ED2ALENTSVRSMC-1 StealthWatch[2699]:
Lancope|StealthWatch|PRIORITY A|time=2018-06-18T14:55:30Z|target_hostname=|alarm_
severity_id=5|alarm_type_id=60|alarm_type_description=Host may be infected with an
SMB
Currently over 150 events are parsed – see event Types in Resources > Event Types and search for 'Cisco-
StealthWatch-'. User can extend the parser to add other events.
Event Types
In ADMIN > Device Support > Event, search for "cylance" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via CEF formatted syslog sent by the device. Configure the device to
send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Example Syslog
CylancePROTECT: Event Type: AppControl, Event Name: pechange, Device Name: WIN-7entSh64, IP
Address: (192.168.119.128), Action: PEFileChange, Action Type: Deny, File Path:
C:\Users\admin\AppData\Local\Temp\MyInstaller.exe, SHA256:
04D4DC02D96673ECA9050FE7201044FDB380E3CFE0D727E93DB35A709B45EDAA
Event Types
In ADMIN > Device Support > Event, search for "cyphort" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via CEF formatted syslog sent by the device. Configure the device to
send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Example Syslog
Damballa Failsafe
Configuration in FortiSIEM
Setting Value
Syslog (CEF formatted) Over 40 security logs Security and Compliance monitoring
Event Types
Go to Admin > Device Type > Event Types and search for “Darktrace-DCIP”.
Rules
None
Reports
None
Configuration
Configure Darktrace to send CEF formatted logs to FortiSIEM. FortiSIEM will automatically parse the logs. No
configuration is required in FortiSIEM.
Sample Events
Syslog
Event Types
In ADMIN > Device Support > Event, search for "fireeye mps" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Example Syslog
FortiDDoS
Syslog Host Name, Access Over 150 event types to include Protocol Anomaly, Traffic Security
IP, Vendor/Model Volume Anomaly, DoS Attacks, Monitoring
Event Types
In ADMIN > Device Support > Event, search for "FortiDDoS" to see the event types associated with this device.
Rules
There are many IPS correlation rules for this device under Rules > Security > Exploits.
Reports
There are many reports for this device under Reports > Function > Security.
Configuration
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Syslog
FortiSIEM processes FortiDDoS events via syslog. Configure FortiDDoS to send syslog to FortiSIEM as directed in the
device's product documentation.
Example Syslog
Fortinet FortiDeceptor
l Integration Points
l Configuration
l Settings for Access Credentials
l Sample Events
Integration Points
Syslog Host name, Reporting IP None Authentication logs, Decoy activity Security monitoring
Event Types
In ADMIN > Device Support > Event, search for "FortiDeceptor" to see the event types associated with this device.
Rules
Reports
Configuration
Configure FortiDeceptor system to send logs to FortiSIEM in the supported format (see Sample Events).
None required.
Sample Events
Fortinet FortiNAC
l Integration Points
l Configuration
l Settings for Access Credentials
l Sample Events
Integration Points
Syslog Host name, Reporting None Administrative and User Admission Control Security
IP events monitoring
Event Types
In ADMIN > Device Support > Event, search for "FortiNAC " to see the event types associated with this device.
Rules
No specific rules are written for FortiNAC but generic rules for network admission control apply
Reports
No specific reports are written for FortiNAC but generic reports for network admission control apply Configuration
Configuration
Configure FortiNAC system to send logs to FortiSIEM in the supported format (see Sample Events).
None required.
Sample Events
Fortinet FortiSandbox
SNMP Host Name, OS, version, CPU, Memory, Disk, Interface utilization Performance
Hardware Monitoring
Syslog Threat feed - Malware Malware found/cleaned, Botnet, Malware URL, System Log
URL, Malware Hash Events Management,
Security
Compliance,
SIEM
Event Types
In ADMIN > Device Support > Event, search for "fortisandbox-" to see the event types associated with this device.
Rules
In RESOURCE > Rules, search for "fortisandbox-" to see the rules associated with this device.
Also, basic availability rules in RESOURCE > Rules > Availability > Network and performance rules in
RESOURCE > Rules> Performance > Network also trigger.
Reports
In RESOURCE > Reports, search for "fortisandbox-" to see the rules associated with this device.
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
For Port, enter 514.
Make sure that the syslog format is the same as that shown in the example.
Example Syslog:
Oct 12 14:35:12 172.16.69.142 devname=turnoff-2016-10-11-18-46-05-172.16.69.142 device_
id=FSA3KE3A13000011 logid=0106000001 type=event subtype=system pri=debug user=system
ui=system action= status=success reason=none letype=9 msg="Malware package: urlrel version
2.88897 successfully released, total 1000"
<14>2016-08-19T06:48:51 devhost=turnoff-2016-08-15-19-24-55-172.16.69.55
devid=FSA35D0000000006 tzone=-25200 tz=PDT date=2016-08-19 time=06:48:51 logid=0106000001
type=event subtype=system level=information user=admin ui=GUI action=update status=success
reason=none letype=9 msg="Remote log server was successfully added"
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Fortinet FortiTester
Syslog (CEF Host name and Device Type from Over 14 log types Security and
formatted) LOG Compliance
Event Types
Go to Admin > Device Type > Event Types and search for “FortiTester”.
Rules
None
Reports
None
Configuration
Configure FortiTester to send CEF formatted syslog to FortiSIEM. No configuration is required on FortiSIEM.
Sample Events
CEF:0|Fortinet|FortiTester|3.8|Event|information|category=System
deviceExternalId=FTS2KET618000005 msg=The system is started deviceCustomDate1=2019-11-05-
15:12:30 cs1= cs1Label=Description
SNMP Traps
Event Types
In ADMIN > Device Support > Event, search for "proventia" in the Device Type and Description column to see the
event types associated with this device.
Rules
Reports
Configuration
SNMP Trap
FortiSIEM receives SNMP traps from IBM/ISS Proventia IPS appliances that are sent by IBM/ISS SiteProtector
Management Console. You must first configure IBM/ISS Proventia to send alerts to IBM/ISS SiteProtector, then
configure IBM/ISS SiteProtector to send those alerts as SNMP traps to FortiSIEM.
Configure IBM/ISS Proventia Appliances to Send SNMP Notifications to IBM/ISS SiteProtector
Management Console
1. Log in to the IBM Proventia IPS web interface.
2. Click Manage System Settings > SiteProtector Management.
3. Click and select Register withSiteProtector.
4. Click and select Local Settings Override SiteProtector Group Settings.
Setting Description
1. Go to Response Rules.
2. Click Add.
3. Select Enabled.
4. Enter a Name and Comment for the response rule.
5. In the Responses tab, select SNMP.
6. Select Enabled for the response object that represents your FortiSIEM virtual appliance.
7. Click OK.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Syslog (CEF Host name and Device Type from Over 14 types of security Security and
formatted) LOG logs Compliance
Event Types
Go to Admin > Device Type > Event Types and search for “Indegy-”.
Rules
None
Reports
None
Configuration
Configure Indegy Security Platform to send syslog in the supported format to FortiSIEM. No configuration is required in
FortiSIEM.
Sample Events
Event Types
In ADMIN > Device Support > Event, search for "juniper ddos" in the Device Type and Description columns to see
the event types associated with this device.
l Juniper-DDoS-Secure-WorstOffender
l Juniper-DDoS-Secure-Blacklisted
l Juniper-DDoS-Secure-Generic
Rules
Reports
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration
Configure the device to send syslog to FortiSIEM. Make sure that the event matches the format specified below.
<134>Juniper: End : 117.217.141.32 : IND: Worst Offender: Last Defended 66.145.37.254: TCP
Attack - Port Scan (Peak 55/s, Occurred 554)
<134>Juniper: End : 78.143.172.52 : IRL: IP Address Temp Black-Listed (Valid IP) Exceeds SYN +
RST + F2D Count (Peak 114/s, Dropped 83.5K pkts)
Syslog
Event Types
In ADMIN > Device Support > Event, search for "juniper_idp" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
McAfee IntruShield
Syslog
Event Types
Rules
Reports
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration
Syslog
l AttackTime
l AttackSeverity
l SourceIp
l SourcePort
l DestinationIp
l DestinationPort
l AlertId
l AlertType
l AttackId
l AttackSignature
l AttackConfidence
l AdminDomain
l SensorName:ASCDCIPS01
l Interface
l Category
l SubCategory
l Direction
l ResultStatus
l DetectionMechanism
l ApplicationProtocol
l NetworkProtocol
l Relevance
AttackName:$IV_ATTACK_NAME$,AttackTime:$IV_ATTACK_TIME$,AttackSeverity::$IV_ATTACK_
SEVERITY$,SourceIp:$IV_SOURCE_IP$,SourcePort:$IV_SOURCE_PORT$,
DestinationIp:$IV_DESTINATION_IP$,DistinationPort:$IV_DESTINATION_PORT$,AlertId:$IV_ALERT_
ID$,AlertType:$IV_ALERT_TYPE$,AttackId$IV_ATTACK_ID$,
AttackSignature:$IV_ATTACK_SIGNATURE$,AttackConfidence:$IV_ATTACK_
CONFIDENCE$,AdminDomain:$IV_ADMIN_DOMAIN$,SensorName:$IV_SENSOR_NAME$,
Interface:$IV_INTERFACE$,Category:$IV_CATEGORY$,SubCategory:$IV_SUB_
CATEGORY$,Direction:$IV_DIRECTION$,ResultStatus:$IV_RESULT_STATUS$,
DetectionMechanism:$IV_DETECTION_MECHANISM$,ApplicationProtocol:$IV_APPLICATION_
PROTOCOL$,NetworkProtocol:$IV_NETWORK_PROTOCOL$,Relevance:$IV_RELEVANCE$
SourcePort:N/A,DestinationIp:127.255.106.252,DistinationPort:N/A,AlertId:5260607647261334188,A
lertType:Signature,AttackId:
0x00009300,AttackSignature:N/A,
AttackConfidence:N/A,AdminDomain:ASC,SensorName:ASCDCIPS01,Interface:1A-
1B,Category:Exploit,SubCategory:protocol-violation,Direction:Outbound,
ResultStatus:May be
successful,DetectionMechanism:signature,ApplicationProtocol:N/A,NetworkProtocol:
N/A,Relevance:N/A,HostIsolationEndTime:N/A
Event Types
In ADMIN > Device Support > Event, search for "stonesoft" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration
Syslog
FortiSIEM processes events from this device via CEF formatted syslog sent by the device. Configure the device to
send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Example Syslog
<6>CEF:0|McAfee|IPS|5.4.3|70018|Connection_Allowed|0|spt=123 deviceExternalId=STP-NY-FOO01
node 1 dmac=84:B2:61:DC:E1:31 dst=169.132.200.3 cat=System Situations app=NTP (UDP) rt=Apr 08
2016 00:26:13 deviceFacility=Inspection act=Allow deviceOutboundInterface=Interface #5
deviceInboundInterface=Interface #4 proto=17 dpt=123 src=10.64.9.3 dvc=12.17.2.17
dvchost=12.17.2.17 smac=78:DA:6E:0D:FF:C0 cs1Label=RuleId cs1=2097152.6
Motorola AirDefense
Event Types
About 37 event types covering various Wireless attack scenarios - search for them by entering "Motorola-AirDefense" in
ADMIN > Device Support > Event.
Rules
Reports
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration
Configure the device to send logs to FortiSIEM. Make sure that the format is as follows.
Nov 8 18:48:00 Time=2014-10-29T05:39:00,Category=Rogue
Activity,CriticalityLevel=Severe,Desc=Rogue AP on Wired Network,device=00:22:cf:5d:ee:60
(00:22:cf:5d:ee:60),sensor=fc:0a:81:12:7b:4b(COMP-SENS302EA[a,b,g,n])
Nov 12 13:33:00 Time=2015-11-12T08:47:00,Category=Exploits,CriticalityLevel=Critical,Desc=NAV
Attack - CTS,device=5c:0e:8b:cb:d5:40(5c:0e:8b:cb:d5:40),sensor=fc:0a:81:12:77:3f(COMP-
SENS201EA[a,b,g,n])
Nozomi
Syslog Device type Node detection, protocol information, network changes Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "Nozomi" in the Name and Description columns to see the event
types associated with this device.
Rules
There are no specific rules for Nozomi, however rules that match the Event Type Groups associated with Nozomi
Events may trigger.
Reports
There are no specific Reports for Nozomi, however reports that match the Event Type Groups associated with
Nozomi Events may return results.
Radware DefensePro
Event Types
<132>DefensePro: 13-09-2017 15:18:45 WARNING 150 HttpFlood "HTTP Page Flood Attack" TCP
1.1.1.3 0 1.1.1.4 80 0 Regular "President-1.1.1.4" ongoing 100 0 N/A 0 N/A medium forward
FFFFFFFF-FFFF-FFFF-9CCF-000F57F7595F
<132>DefensePro: 13-09-2017 14:37:53 WARNING 200000 SynFlood "SYN Flood HTTP" TCP 0.0.0.0 0
1.1.1.5 80 0 Regular "GSN_Web" ongoing 1 0 N/A 0 N/A medium challenge FFFFFFFF-FFFF-FFFF-9C46-
000F57F7595F
Rules
There are no specific rules but generic rules for Network IPS and Generic Servers apply.
Reports
There are no specific reports but generic rules for Network IPS and Generic Servers apply.
Configuration
Configure Radware DefensePro Security Manager to send syslog on port 514 to FortiSIEM.
Syslog
Event Types
In ADMIN > Device Support > Event Types, search for "snort-org" to see the event types associated with this
device.
Configuration
Syslog
Collecting event information from Snort via syslog has two drawbacks:
1. It is not reliable because it is sent over UDP.
2. Information content is limited because of UDP packet size limit.
For these reasons, you should consider using JDBC to collect event information from Snort.
These instructions illustrate how to configure Snort on Linux to send syslogs to FortiSIEM. For further information, you
should consult the Snort product documentation.
1. Log in to your Linux server where Snort is installed.
2. Navigate to and open the file /etc/snort/snort.conf.
3. Modify alert_syslog to use a local log facility, for example:
output alert_syslog: LOG_LOCAL4 LOG_ALERT
JDBC
When using JDBC to collect IPS information from Snort, FortiSIEM can capture a full packet that is detailed enough to
recreate the packet via a PCAP file.
FortiSIEM supports collecting Snort event information over JDBC these database types:
l Oracle
l MS SQL
l MySql
l PostgreSQL
FortiSIEM supports Snort database schema 107 or higher.
You must set up an SNMP access credential for the server that hosts the Snort database. See the topics
under Database Server Configuration for information on setting up SNMP for communication with FortiSIEM for
several common types of database servers.
Once you have set up SNMP on your database server, you can now configure FortiSIEM to communicate with your
device. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
Snort IPS alert are pulled over JDBC by a Java agent, which has to join multiple database tables to create the events.
An internal log file is created for each pull.
2012-08-07T10:02:27.576777+08:00 AO-foo java:[PH_JAVA_AGENT_INFO]:[eventSeverity]=PHL_INFO,
[procName]=phAgentManager,[fileName]=AgentSnort,[phLogDetail]=10.1.20.51:ICMP:Max record
id:17848444 Total records in one round of pulling:20
At most 1000 database records (IPS Alerts) are pulled at a time. If FortiSIEM finds more than 1000 new records, then it
begins to fall behind and this log is created.
2012-08-07T10:02:27.576777+08:00 AO-foo java:[PH_JAVA_AGENT_INFO]:[eventSeverity]=PHL_INFO,
[procName]=phAgentManager,[fileName]=AgentSnort,[phLogDetail]=Event count of snort exceeds the
threshold in one round of pulling, which means there may be more events need to be pulled.
l UDP Event
l TCP Event
UDP Event
TCP Event
FortiSIEM creates an event for each IPS alert in Snort database. You can view the full payload packet associated with a
Snort event when you run a report.
1. Set up a structured historical search.
2. Set these conditions, where Reporting IP is an IP belonging to the Snort Application group.
After running a report, click the Export button and choose the PCAP option.
Set these Access Method Definition values to allow FortiSIEM to communicate with your Snort IPS over JDBC.
Setting Value
Pull Interval 1
(minutes)
Port 3306
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP, Telnet,
or SSH.
Setting Value
Syslog
Event Types
In ADMIN > Device Support > Event, search for "sourcefire" in the Description column to see the event types
associated with this device.
Rules
Reports
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration
Syslog
FortiSIEM handles SourceFire alerts via syslog either from IPS appliances themselves or from DefenseCenter. Events
are classified as Snort event types.
Simply configure SourceFire appliances or DefenseCenter to send syslogs to FortiSIEM as directed in the device's
product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
l Integration Points
l Configuration
l Settings for Access Credentials
l Sample Events
Integration Points
Syslog Host name, Reporting IP None Malicious file detection Security monitoring
Event Types
In ADMIN > Device Support > Event, search for " Trend-DeepDiscoveryAnalyzer " and “Trend-
DeepDiscoveryInspector” to see the event types associated with this device.
Rules
No specific rules are written for Trend-DeepDiscoveryAnalyzer and Trend-DeepDiscoveryInspector but regular end point
rules apply.
Reports
No specific reports are written for Trend-DeepDiscoveryAnalyzer and Trend-DeepDiscoveryInspector but regular end
point reports apply.
Configuration
Configure Trend Deep Discovery system to send logs to FortiSIEM in the supported format (see Sample Events).
None required.
Sample Events
Bro/Zeek is an OpenSource network analysis product that is also installed as part of Security Onion.
l What is Discovered and Monitored
l Configuration
l Sample Events
Event Types
Rules
Reports
Configuration
Complete the following task on Onion Security, as this is crucial to get the headers working in the parser:
Add the following code in the /etc/syslog-ng/syslog-ng.conf file, but change <IP> to the IP of the FortiSIEM
Super/Worker/Collector which will receive the syslog:
destination d_fortisiem { tcp("<IP>" port(514));};
log {
source(s_bro_dns);
source(s_bro_dhcp);
log { filter(f_bro_headers); };
log { destination(d_fortisiem);};
};
Sample Events
FortiSIEM supports these routers and switches for discovery and monitoring.
l Alcatel TiMOS and AOS Switch
l Arista Router and Switch
l Brocade NetIron CER Routers
l Cisco 300 Series Routers
l Cisco IOS Router and Switch
l How CPU and Memory Utilization is Collected for Cisco IOS
l Cisco Meraki Cloud Controller and Network Devices
l Cisco NX-OS Router and Switch
l Cisco ONS
l Cisco Viptela SDWAN Router
l Dell Force10 Router and Switch
l Dell NSeries Switch
l Dell PowerConnect Switch and Router
l Foundry Networks IronWare Router and Switch
l HP/3Com ComWare Switch
l HP ProCurve Switch
l HP Value Series (19xx) and HP 3Com (29xx) Switch
l Hirschmann SCADA Firewalls and Switches
l Juniper Networks JunOS Switch
l MikroTik Router
l Nortel ERS and Passport Switch
SNMP (V1, Host name, Software Uptime, CPU and Memory utilization, Network Interface Availability and
V2c) version, Hardware metrics (utilization, bytes sent and received, packets sent Performance
model, Network and received, errors, discards and queue lengths) Monitoring
interfaces
Event Types
In ADMIN > Device Support > Event, search for "alcatel" in the Device Type and Description columns to see the
event types associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP. Set the
Name and Community String.
Setting Value
SNMP (V1, Host name, Serial number, Uptime, Network Interface metrics (utilization, bytes Availability
V2c) Software version, Hardware sent and received, packets sent and received, errors, and
model, Network interfaces, discards and queue lengths), CPU utilization, Memory Performance
Hardware Components utilization, Flash utilization, Hardware Status Monitoring
Telnet/SSH Running and Startup Startup Configuration Change, Difference between Change
configurations Running and Startup configurations monitoring
Event Types
Rules
Reports
Configuration
Telnet/SSH
FortiSIEM uses Telnet/SSH to communicate with this device. Refer to the product documentation for your device to
enable Telnet/SSH.
These commands are used for discovery and performance monitoring via SSH. Please make sure that the access
credentials you provide in FortiSIEM have the permissions necessary to execute these commands on the device.
l show startup-config
l show running-config
l show version
l show ip route
l enable
l terminal pager 0
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation.
You can configure FortiSIEM to communicate with your device, and then initiate discovery of the device. For more
information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
Setting Value
These are the generic settings for providing Telnet access to your device from FortiSIEM.
Setting Value
Name Telnet-generic
Port 23
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
SNMP Host name, CPU, Memory, Network Interface metrics (utilization, bytes sent and Availability and
(V1, V2c) software received, packets sent and received, errors, discards and queue Performance
version, lengths), Hardware Status, Real Server Status Monitoring
Hardware
model,
Network
interfaces
Event Types
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Host name, Network Interface metrics (utilization, bytes sent and received, Availability and
(V1, V2c) software packets sent and received, errors, discards, and queue lengths) Performance
version, Monitoring
Hardware
model,
Network
interfaces
Event Types
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP. Set the
Name and Community String.
Setting Value
If the value is a generic value, then set it to the actual serial number.
Router(config)#snmp-server chassis-id
Router(config)#exit
Router#write memory
Run the snmpwalk again to verify that the serial number is updated, then perform discovery of your Cisco router.
SNMP (V1, Host name, IOS Uptime, CPU and Memory utilization, Free processor and I/O Availability and
V2c, V3) version, Hardware memory, Free contiguous processor and I/O memory, Performance
model, Memory Network Interface metrics (utilization, bytes sent and Monitoring
size, Network received, packets sent and received, errors, discards and
interface details - queue lengths),
name, address,
mask and
description
SNMP (V1, Hardware Hardware health: temperature, fan and power supply Availability
V2c, V3) component details:
serial number,
model,
manufacturer,
software firmware
versions of hardware
components such as
chassis, CPU, fan,
power supply,
Telnet/SSH Running and startup Startup configuration change, delta between running and Performance
configuration, startup configuration, Running process CPU and memory Monitoring,
Image file name, utilization Security and
Flash memory size, Compliance
Running processes
Syslog Device type System logs and traffic logs matching acl statements Availability,
Security and
Compliance
Event Types
Syslog events
In ADMIN > Device Support > Event, search for "cisco_os" in the Description column to see the event types
associated with this device.
Rules
Reports
Configuration
Telnet/SSH
FortiSIEM uses SSH and Telnet to communicate with your device. Follow the instructions in the product documentation
for your device to enable SSH and Telnet.
These commands are used for discovery and performance monitoring via SSH. Please make sure that the access
credentials you provide in FortiSIEM have the permissions necessary to execute these commands on the device.
l show startup-config
l show running-config
l show version
l show flash
l show ip route
l show mac-address-table or show mac address-table
l show vlan brief
l show process cpu
l show process mem
l show disk0
l enable
l terminal pager 0
SNMP
SNMP V1/V2c
SNMP V3
Syslog
4. Make sure that the timestamp in syslog message sent to FortiSIEM does not contain milliseconds.
no service timestamps log datetime msec
service timestamps log datetime
5. To log traffic matching acl statements in stateless firewall scenarios, add the log keyword to the acl statements.
access-list 102 deny udp any gt 0 any gt 0 log
6. To turn on logging from the IOS Firewall module, use this command.
ip inspect audit-trail
<189>Oct 27 20:18:43.254 UTC: %SNMP-3-AUTHFAIL: Authentication failure for SNMP request from
host 192.168.2.98
NetFlow
On MLS switches, such as the 6500 or 7200 models, also run these commands.
mls netflow
mls nde sender
mls aging long 64
mls flow ip full
Exit configuration mode
You can verify that you have set up NetFlow correctly by running these commands.
#shows the current NetFlow configuration
show ip flow export
#summarizes the active flows and gives an indication of how much NetFlow data the device is
exporting
show ip cache flow or show ip cache verbose flow
flow exporter e1
! destination is the collector address, default port needs to be changed to 2055
destination <accelopsIp> transport udp 2055
!
flow record r1
! record specifies packet fields to collect
match ipv4 protocol
match ipv4 source address
match ipv4 destination address
match transport source-port
match transport destination-port
match interface input
collect transport tcp flags
collect interface output
collect counter bytes
collect counter packets
!
flow monitor m1
! monitor refers record configuration and exporter configuration.
record r1
exporter e1
cache timeout active 60
cache timeout inactive 30
cache entries 1000
!
interface GigabitEthernet 2/48
ip flow monitor m1 input
IP SLA
IP SLA is a technology where a pair of routers can run synthetic tests between themselves and report detailed traffic
statistics. This enables network administrators to get performance reports between sites without depending on end-host
instrumentation.
Cisco provides detailed documents for configuring IP SLA for both general traffic and VoIP.
A variety of IP SLA tests can be run, for example UDP/ICMP Jitter, UDP Jitter for VoIP, UDP/ICMP Echo, TCP Connect,
HTTP, etc. You can see the traffic statistics for these these tests by routing appropriate Show commands on the router.
However, only these IP SLA tests are exported via RTT-MON SNMP MIB.
l UDP Jitter (reported by FortiSIEM event type PH_DEV_MON_IPSLA_MET)
l UDP Jitter for VoIP (reported by FortiSIEM event type PH_DEV_MON_IPSLA_VOIP_MET)
l HTTP performance (reported by FortiSIEM event type PH_DEV_MON_IPSLA_HTTP_MET)
l ICMP Echo (reported by FortiSIEM event type PH_DEV_MON_IPSLA_ICMP_MET)
l UDP Echo (reported by FortiSIEM event type PH_DEV_MON_IPSLA_UDP_MET)
These are the only IP SLA tests monitored by FortiSIEM.
Configuring IP SLA involves choosing and configuring a router to initiate the test and a router to respond. The test
statistics are automatically reported by the initiating router via SNMP, so no additional configuration is required. Bi-
directional traffic statistics are also reported by the initiating router, so you don't need to set up a reverse test between
the original initiating and responding routers. FortiSIEM automatically detects the presence of the IP SLA SNMP MIB
(CISCO-RTTMON-MIB) and starts collecting the statistics.
ipsla-init>enable
ipsla-init#config terminal
ipsla-init(config)#ip sla monitor <operation num>ipsla-init(config-sla-monitor)#type jitter
dest-ipaddr <responder ip> dest-port <dest port>ipsla-init(config-sla-monitor-
jitter)#frequency default
ipsla-init(config-sla-monitor-jitter)#exit
ipsla-init(config)# ip sla monitor schedule <operation num> start-time now life forever
ipsla-init>enable
ipsla-init#config terminal
ipsla-init(config)#ip sla monitor <operation num>ipsla-init(config-sla-monitor)#type jitter
dest-ipaddr <responder ip> dest-port <dest port> codec <codec type> advantage-factor 0
ipsla-init(config-sla-monitor-jitter)#frequency default
ipsla-init(config-sla-monitor-jitter)#exit
ipsla-init(config)# ip sla monitor schedule <operation num> start-time now life forever
Router> enable
Router# configure terminal
Router(config)# ip sla monitor 15
Router(config-sla-monitor)# type echo protocol ipIcmpEcho <destination-ip-address>Router
(config-sla-monitor-echo)# frequency 30
Router(config-sla-monitor-echo)# exit
Router(config)# ip sla monitor schedule 10 start-time now life forever
Router(config)# exit
ipsla-resp>enable
ipsla-resp#config terminal
ipsla-resp(config)#ip sla monitor responder
Class-Based QoS
CBQoS enables routers to enforce traffic dependent Quality of Service policies on router interfaces for to make sure that
important traffic such as VoIP and mission critical applications get their allocated network resources.
Cisco provides detailed documents for configuring IP SLA for both general traffic and VoIP.
The CbQoS statistics are automatically reported by the router via SNMP, so no additional configuration is needs.
FortiSIEM detects the presence of valid CBQoS MIBs and starts monitoring them.
NBAR
These are the generic settings for providing SNMP access to your device from FortiSIEM.
Setting Value
These are the generic settings for providing Telnet access to your device from FortiSIEM.
Setting Value
Name Telnet-generic
Port 23
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
FortiSIEM follows the process for collecting information about CPU utlization that is recommended by Cisco.
l Monitoring CPU
l Monitoring Memory using PROCESS-MIB
Monitoring CPU
The OID is 1.3.6.1.4.1.9.9.109.1.1.1.1.8. The issue there are multiple CPUs – which ones to take? A sample SNMP
walk for this OID looks like this
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.8.1 = Gauge32: 46
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.8.2 = Gauge32: 22
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.8.3 = Gauge32: 5
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.8.4 = Gauge32: 4
Note that there are 4 CPUs – indexed 1-4. We must identify Control plane CPU and Data plane CPU
The cpu Id -> entity Id mapping from the following SNMP walk
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.2.1 = INTEGER: 3014
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.2.2 = INTEGER: 3001
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.2.3 = INTEGER: 1001
SNMPv2-SMI::enterprises.9.9.109.1.1.1.1.2.4 = INTEGER: 7001
The following SNMP walk provides the names for each entity Id
SNMPv2-SMI::mib-2.47.1.1.1.1.7.1001 = STRING: "Chassis 1 CPU of Module 2"SNMPv2-SMI::mib-
2.47.1.1.1.1.7.3001 = STRING: "Chassis 1 CPU of Switching Processor 5"SNMPv2-SMI::mib-
2.47.1.1.1.1.7.3014 = STRING: "Chassis 1 CPU of Routing Processor 5"SNMPv2-SMI::mib-
2.47.1.1.1.1.7.7001 = STRING: "Chassis 2 CPU of Module 2"
Combining all this information, we finally obtain the CPU information for each object
Chassis 1 CPU of Routing Processor 5 -> 46%
Chassis 1 CPU of Switching Processor 5 -> 22%
Chassis 1 CPU of Module 2 -> 5
Chassis 2 CPU of Module 2 -> 4%
[PH_DEV_MON_SYS_PER_CPU_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9596,[cpuName]=Chassis 1 CPU of Switching Processor
5,[hostName]=UB-CORE-SW,[hostIpAddr]=10.11.1.2,[cpuUtil]=22.000000,[pollIntv]=176,
[phLogDetail]=
PH_DEV_MON_SYS_PER_CPU_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9596,[cpuName]=Chassis 1 CPU of Module
2,[hostName]=UB-CORE-SW,[hostIpAddr]=10.11.1.2,[cpuUtil]=5.000000,[pollIntv]=176,
[phLogDetail]=
[PH_DEV_MON_SYS_PER_CPU_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9596,[cpuName]=Chassis 2 CPU of Module
2,[hostName]=UB-CORE-SW,[hostIpAddr]=10.11.1.2,[cpuUtil]=4.000000,[pollIntv]=176,
[phLogDetail]=
To get the overall system CPU utilization, we average over “Switching and Routing CPUs”- so CPU Util = (46+22)/2 =
34%
PH_DEV_MON_SYS_CPU_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,[lineNumber]=9611,
[cpuName]=RoutingCpu,[hostName]=UB-CORE-SW,[hostIpAddr]=10.11.1.2,[cpuUtil]=34.0000,
[pollIntv]=176,[phLogDetail]=
Therefore
Used Memory = 98,076,432
Total Memory = 102,324,352
Memory Util = 96%
SNMP (V1, V2c) Host name, Software Uptime, Network Interface metrics (utilization, bytes Availability
to Cloud version, Hardware sent and received, packets sent and received, and
Controller or model, Network errors, discards and queue lengths) Performance
Devices interfaces Monitoring
Event Types
Rules
Reports
None
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP (V1, Host name, IOS Uptime, CPU and Memory utilization, Free processor Availability and
V2c, V3) version, Hardware and I/O memory, Free contiguous processor and I/O Performance
model, Memory size, memory, Network Interface metrics (utilization, bytes Monitoring
Network interface sent and received, packets sent and received, errors,
details - name, discards and queue lengths)
address, mask and
description
SNMP (V1, Hardware Hardware health: temperature, fan and power supply Availability
V2c, V3) component details:
serial number,
model,
manufacturer,
software and
firmware versions of
hardware
components such as
chassis, CPU, fan,
power supply,
network cards etc.
SNMP (V1, Class based QoS metrics: For (router interface, QoS
V2c, V3) policy, class map) tuple: class map metrics including performance
Pre-policy rate, post-police rate, drop rate and drop pct; monitoring
police action metrics including conform rate,
exceeded rate and violated rate; queue metrics
including current queue length, max queue length and
discarded packets
Telnet/SSH Running and startup Startup configuration change, delta between running and Performance
configuration, Image startup configuration, Running process CPU and memory Monitoring,
file name, Flash utilization Security and
memory size, Compliance
Running processes
Syslog Device type> System logs and traffic logs matching acl statements Availability,
Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "nx-os" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide
Telnet/SSH
FortiSIEM uses Telnet/SSH to communicate with this device. Refer to the product documentation for your device to
enable Telnet/SSH.
These commands are used for discovery and performance monitoring via SSH. Please make sure that the access
credentials you provide in FortiSIEM have the permissions necessary to execute these commands on the device.
l show startup-config
l show running-config
l show version
l show flash
l show context
l show ip route
l show cam dynamic
l show mac-address-table
l show mac address-table (for Nexus 1000v)
l show vlan brief
l show process cpu
l show process mem
l show disk0
l enable
l terminal length 0
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
NetFlow
You can can also try using the pre-defined NetFlow template.
interface Vlan613
ip flow monitor Monitortac7000 input
exit
You can now check the configuration using the show commands.
For SNMP, Telnet, and SSH access credentials, see Access Credentials.
Cisco ONS
SNMP Host name, Serial Uptime, Network Interface metrics (utilization, bytes sent and Availability and
(V1, V2c) Number, software received, packets sent and received, errors, discards and Performance
version, Hardware queue lengths) Monitoring
model, Network
interfaces, Hardware
Components
Event Types
Over 1800 event types defined - search for "Cisco-ONS" in ADMIN > Device Support > Event.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Syslog Host name and Device Type from LOG Over 290 log types Security and Compliance
Event Types
Go to Admin > Device Type > Event Types and search for “VIPTELA”.
Rules
None
Reports
None
Configuration
Configure Cisco Viptela to send syslog in the supported format to FortiSIEM. No configuration is required in FortiSIEM.
Sample Events
SNMP (V1, Host name, Serial number, Uptime, Network Interface metrics (utilization, bytes Availability
V2c) Software version, Hardware sent and received, packets sent and received, and
model, Network interfaces, errors, discards and queue lengths), CPU utilization, Performance
Hardware Components Hardware Status Monitoring
Telnet/SSH Running and Startup Startup Configuration Change, Difference between Change
configurations Running and Startup configurations monitoring
Event Types
In ADMIN > Device Support > Event, search for "force10" in the Description column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
TelNet/SSH
FortiSIEM uses Telnet/SSH to communicate with this device. Refer to the product documentation for your device to
enable Telnet/SSH.
These commands are used for discovery and performance monitoring via SSH. Please make sure that the access
credentials you provide in FortiSIEM have the permissions necessary to execute these commands on the device. To
initiate discovery and monitoring of your device over this protocol, refer to sections "Discovery Settings" and "Setting
Credentials" in the User Guide.
l show startup-config
l show running-config
l show version
l show ip route
l enable
l terminal pager 0
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP. Set the
Name and Community String.
Setting Value
These are the generic settings for providing Telnet access to your device from FortiSIEM
Setting Value
Name Telnet-generic
Port 23
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface metrics Availability and
(V1, V2c) software (utilization, bytes sent and received, packets sent and received, Performance
version, errors, discards and queue lengths) Monitoring
Hardware
model,
Network
interfaces,
Event Types
Rules
Availability
Change
Reports
Availability
Performance
Change
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP (V1, Host name, Serial number, Uptime, Network Interface metrics (utilization, bytes Availability
V2c) Software version, Hardware sent and received, packets sent and received, and
model, Network interfaces, errors, discards and queue lengths), CPU utilization, Performance
Hardware Components Hardware Status Monitoring
Telnet/SSH Running and Startup Startup Configuration Change, Difference between Change
configurations Running and Startup configurations monitoring
Event Types
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Telnet/SSH
FortiSIEM uses Telnet/SSH to communicate with this device. Refer to the product documentation for your device to
enable Telnet/SSH.
These commands are used for discovery and performance monitoring via SSH. Please make sure that the access
credentials you provide in FortiSIEM have the permissions necessary to execute these commands on the device. To
initiate discovery and monitoring of your device over this protocol. For more information, refer to sections "Discovery
Settings" and "Setting Credentials" in the User Guide.
l show startup-config
l show running-config
l show version
l show ip route
l enable
l terminal pager 0
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP (V1, Host name, Uptime, CPU and Memory utilization, Network Interface Availability and
V2c) Ironware version, metrics (utilization, bytes sent and received, packets sent and Performance
Hardware model, received, errors, discards and queue lengths) Monitoring
Network interfaces,
Telnet/SSH Running and startup Startup configuration change, delta between running and Performance
configuration startup configuration Monitoring,
Security and
Compliance
Syslog Device type System logs and traffic logs matching acl statements Availability,
Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "foundry_ironware" in the Description column to see the event
types associated with this device.
Rules
Reports
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration
SNMP
1. Log in to the device manager for your switch or router with administrative privileges.
2. Enter configuration mode.
3. Run these commands to set the community string and enable the SNMP service.
snmp-server community <community> RO
snmp-server enable vlan <vlan id>
Telnet/SSH
FortiSIEM uses Telnet/SSH to communicate with this device. Refer to the product documentation for your device to
enable Telnet/SSH.
Syslog
1. Log in to the device manager for your switch or router with administrative privileges.
2. Enter configuration mode.
3. Run this command to set your FortiSIEM virtual appliance as the recipient of syslogs from your router or switch.
logging host <FortiSIEM Ip>
Jun 4 15:51:18 172.16.20.99 Security: telnet logout by admin from src IP 137.146.28.75, src
MAC 000c.dbff.6d00
Jun 4 03:12:53 172.16.20.100 ACL: ACL: List GWI-in permitted tcp 61.158.162.230(6000)
(Ethernet 1/4 0023.3368.f500) -> 137.146.0.0(8082), 1 event(s)
Jun 4 02:54:31 172.16.20.100 ACL: ACL: List XCORE denied udp 137.146.28.75(55603)(Ethernet
1/1 000c.dbde.6000) -> 137.146.3.35(snmp), 1 event(s)
Jun 4 01:49:09 172.16.20.100 STP: VLAN 3104 Port 4/22 STP State -> LEARNING (FwdDlyExpiry)
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP. Set the
Name and Community String.
Setting Value
These are the generic settings for providing Telnet access to your device from FortiSIEM.
Setting Value
Name Telnet-generic
Port 23
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
SNMP (V1, Host name, Uptime, CPU and Memory utilization, Network Interface Availability and
V2c) software metrics (utilization, bytes sent and received, packets sent and Performance
version, received, errors, discards and queue lengths), Hardware Monitoring
Hardware status: Power Supply, Fan, Temperature
model,
Network
interfaces,
Event Types
In ADMIN > Device Support > Event, search for "compare" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
HP ProCurve Switch
SNMP (V1, Host name, version, Uptime, CPU and Memory utilization, Network Interface Availability and
V2c) Hardware model, metrics (utilization, bytes sent and received, packets sent and Performance
Network interfaces, received, errors, discards and queue lengths), Hardware Monitoring
status: Power Supply, Fan, Temperature
Telnet/SSH Running and startup Startup configuration change, delta between running and Performance
configuration startup configuration Monitoring,
Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "procurve" in the Device Type and Description columns to see the
event types associated with this device.
Rules
Reports
Configuration
SNMP
SSH/Telnet
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Host name, Uptime, CPU and Memory utilization, Network Interface metrics Availability and
(V1, V2c) software (utilization, bytes sent and received, packets sent and received, Performance
version, errors, discards and queue lengths) Monitoring
Hardware
model,
Network
interfaces,
Event Types
Rules
Availability
Change
Reports
Availability
Performance
Change
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Host Name SNMP – Uptime, CPU, Memory, Interface utilization, hardware Performance
Status, OSPF metrics Monitoring
Event Types
Rules
Reports
Configuration
Configure Hirschmann Firewalls and Switches for SNMP V1/V2c/V3 discovery and performance monitoring. Define the
basic SNMP credentials on FortiSIEM and discover these devices. See SNMP Access Credentials.
Sample Events
SNMP (V1, Host name, JunOS Uptime, CPU and Memory utilization, Network Interface Availability and
V2c) version, Hardware metrics (utilization, bytes sent and received, packets sent and Performance
model, Network received, errors, discards and queue lengths), Hardware Monitoring
interfaces, status: Power Supply, Fan, Temperature
Telnet/SSH Running and startup Startup configuration change, delta between running and Performance
configuration startup configuration Monitoring,
Security and
Compliance
Syslog System logs and traffic logs matching acl statements Availability,
Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "junos" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
1. Log in to the device manager for your JunOS switch with administrator privileges.
2. Go to Configure > Services > SNMP.
3. Under Communities, click Add.
4. Enter a Community Name.
5. Set Authorization to read-only.
6. Click OK.
Syslog
1. Log in to the device manager for your JunOS switch with administrator privileges.
2. Go to Dashboard > CLI Tools > CLI Editor.
Edit the syslog section to send syslogs to FortiSIEM.
3. JunOS Syslog Configuration
system {
....
syslog {
user * {
any emergency;
}
host <FortiSIEM Ip> {
any any;
explicit-priority;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
time-format year millisecond;
}
....
4. Click Commit.
sFlow
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
MikroTik Router
SNMP Host name, software Uptime, Network Interface metrics (utilization, bytes sent and Availability and
(V1, V2c) version, Hardware received, packets sent and received, errors, discards and Performance
model, Network queue lengths) Monitoring
interfaces
Event Types
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP (V1, Host name, software Uptime, CPU and Memory utilization, Network Interface Availability and
V2c) version, Hardware metrics (utilization, bytes sent and received, packets sent Performance
model, Network and received, errors, discards and queue lengths) Monitoring
interfaces,
SNMP (V1, Layer 2 port mapping: associating switch ports to directly Identity and
V2c, V3) connected host IP/MAC addresses location table;
Topology
Event Types
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Host name, CPU utilization, Memory utilization, Interface Utilization Performance
Interfaces, Monitoring
Serial number
Event Types
In ADMIN > Device Support > Event, search for "barracuda" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SFTP Proxy traffic: attributes include Source IP, Destination IP, Security
Destination Name, Destination Port, URL, Web category, Monitoring and
Proxy action, HTTP User Agent, HTTP Referrer, HTTP compliance
Version, HTTP Method, HTTP Status Code, Sent Bytes,
Received Bytes, Connection Duration
Event Types
In ADMIN > Device Support > Event, search for "blue coat" in the Device Type and Description column to see the
event types associated with this device.
Rules
Reports
Configuration
SNMP
Syslog
SFTP
SFTP is used to send access logs to FortiSIEM. Access logs includes the traffic that Blue Coat proxies between the
client and the server. The access logs are sent via FTP, where Bluecoat is the client and FortiSIEM is the server. You
must configure SFTP in FortiSIEM first, and then on your Blue Coat web proxy server.
The Epilog client converts each line of the log files in the /opt/phoenix/cache/bluecoat/<Bluecoat IP>
directory in real time into a syslog, and sends it to the FortiSIEM parser for processing.
1. Log in to your Supervisor or the Collector node as root.
2. Update the Epilog configuration in /etc/snare/epilog/epilog.conf as shown in this code block, and then
restart the epilog daemon with the /etc/init.d/epilogd restart command.
Output
network=localhost:514
syslog=2
Input
log=BluecoatWebLog:/opt/phoenix/cache/bluecoat/172.16.0.141/SG_FortiSIEM_bluecoat_main.log
log=BluecoatImLog:/opt/phoenix/cache/bluecoat/172.16.0.141/SG_FortiSIEM_bluecoat_im.log
log=BluecoatImLog:/opt/phoenix/cache/bluecoat/172.16.0.141/SG_FortiSIEM_bluecoat_ssl.log
log=BluecoatP2pLog:/opt/phoenix/cache/bluecoat/172.16.0.141/SG_FortiSIEM_bluecoat_p2p.log
Setting Value
Log main
Encryption No Encryption
Certificate
Setting Value
Port 514
Username ftpuser
Filename SG_FortiSIEM_bluecoat_main.log
8. Clear the selections Use Secure Connections (SSL) and Use Local Time.
9. Select Use Pasv.
10. Click OK.
11. Follow this same process to configure the settings for im, ssl and p2p.
For each of these, you will refer to a different Filename.
l For im the file name is SG_FortiSIEM_bluecoat_im.log
l For ssl the file name is SG_FortiSIEM_bluecoat_ssl.log
l For p2p the file name is SG_FortiSIEM_bluecoat_p2p.log
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Ping Status, SNMP Ping Stat, Uptime, CPU Util, Mem Util, Net Intf
Stat, Hardware Status
Syslog Mail attributes: attributes include MID, ICID, DCID, Sender Security
address, Receiver Address, Mail Subject, Sent Bytes, Attachment, Monitoring and
Spam indicator, Virus indicator, Quarantine indicator, SMTP delivery compliance
failures and failure codes, mail action - pass, block, clean.
Event Types
In ADMIN > Device Support > Event, search for "ironport-mail" in the Display Name column to see the event types
associated with this device.
Rules
Reports
In RESOURCE > Reports, search for "ironport mail" in the Name and Description columns to see the reports for this
device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Syslog
1. Log in to your Ironport Mail Gateway device manager with administrator privileges.
2. Edit the Log Subscription settings.
3. For Log Name, enter IronPort-Mail.
This identifies the log to FortiSIEM as originating from an Ironport mail gateway device.
4. For Retrieval Method, select Syslog Push.
5. For Hostname, enter the IP address of your FortiSIEM virtual appliance.
6. For Protocol, select UDP.
Tue Sep 24 11:39:49 2012 IronPort-Mail: Info: MID 200257071 ready 24663 bytes from
<[email protected]>Sep 24 11:39:49 18.0.19.8 IronPort-Mail: Info: MID 1347076 ICID 346818 From:
<[email protected]>Tue Sep 24 11:39:49 2012 IronPort-Mail: Info: Message aborted MID 200257071
Dropped by antivirus
Tue Sep 24 11:39:49 2012 IronPort-Mail: Info: Delayed: DCID 5 MID 200257071 to RID 0 - 4.1.0 -
Unknown address error ('466', ['Mailbox temporarily full.'])[]
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Syslog Squid style web logs: attributes include Source IP Address, Security
Destination Host name, Sent Bytes, Received Bytes, HTTP User Monitoring and
Agent, HTTP Referrer, HTTP Version, HTTP Method, HTTP Status compliance
Code, URL, HTTP Content type, Web Category, HTTP Proxy Action
Event Types
In ADMIN > Device Support > Event, search for "ironport-web" in the Display Name column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
Setting Value
Setting Value
Custom Fields %L %B %u
Protocol UDP
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Fortinet FortiMail
Event Types
In ADMIN > Device Support > Event, search for "fortimail" to see the event types associated with this device.
Rules
In RESOURCE > Rules, search for "fortimail" to see the rules associated with this device.
For generic availability rules, see RESOURCE > Rules > Availability > Network.
For generic performance rules, see RESOURCE > Rules > Performance > Network.
Reports
In RESOURCE > Reports, search for "fortimail" to see the reports associated with this device.
Configuration
Syslog
Configure FortiMail appliance to send logs to FortiSIEM. Make sure the format matches.
In the FortiMail GUI go to Log & Report > Log Setings > Remote (tab) > New.
Suggested Logging configuration:
Name Description
Mode UDP
Level Information
Facility kern
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Fortinet FortiWeb
SNMP Host Name, Vendor, CPU, memory, Disk, Interface, Uptime Performance
Model, Version, monitoring
Hardware Model,
hardware
Currently FortiSIEM supports FortiWeb native logging format and not CEF format.
Event Types
In ADMIN > Device Support > Event, search for "fortiweb" to see the event types associated with this device.
Rules
In RESOURCE > Rules, search for "fortiweb" to see the rules associated with this device.
For generic availability rules, see RESOURCE > Rules > Availability > Network.
For generic performance rules, see RESOURCE > Rules > Performance > Network.
Reports
In RESOURCE > Reports, search for "fortiweb" to see the reports associated with this device.
Configuration
Syslog
Configure FortiWenb appliance to send logs to FortiSIEM. Make sure the format matches.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Configuration in FortiSIEM
Setting Value
Configuration
Setup in FortiSIEM
Setting Value
Sample Events
<14>CEF:0|Imperva Inc.|SecureSphere|11.5.0.20_0|Audit|Audit|Informative|dst=10.2.6.194
dpt=3306 duser=wf_settlement src=10.2.6.48 spt=59876 proto=TCP rt=11 April 2016 14:07:09
cat=Audit Default Rule - All cs2Label=ServerGroup cs3=ProcessMakerDBFX cs3Label=ServiceName
cs4=Default MySql Application cs4Label=ApplicationName cs5=642697783064 cs5Label=EventId
cs6=Query cs6Label=EventType cs7=Default MySql group cs7Label=UserGroup cs8=True
cs8Label=UserAuthenticated cs9= cs9Label=ApplicationUser cs10= cs10Label=SourceApplication
cs11= cs11Label=OSUser cs12= cs12Label=HostName cs13=wf_settlement cs13Label=Database cs14=
cs14Label=Schema cs15=SELECT COUNT(APP_CACHE_VIEW.APP_UID) FROM APP_CACHE_VIEW LEFT JOIN USERS
CU ON (APP_CACHE_VIEW.USR_UID=CU.USR_UID) LEFT JOIN USERS PU ON (APP_CACHE_VIEW.PREVIOUS_USR_
UID=PU.USR_UID) LEFT JOIN APP_CACHE_VIEW APPCVCR ON (APP_CACHE_VIEW.APP_UID=APPCVCR.APP_UID
AND APPCVCR.DEL_LAST_INDEX=1) LEFT JOIN USERS USRCR ON (APPCVCR.USR_UID=USRCR.USR_UID) WHERE
APP_CACHE_VIEW.APP_STATUS='TO_DO' AND APP_CACHE_VIEW.USR_
UID='2800810224bbdfe1cc8bb02024369548' AND APP_CACHE_VIEW.DEL_FINISH_DATE IS NULL AND APP_
CACHE_VIEW.APP_THREAD_STATUS='OPEN' AND APP_CACHE_VIEW.DEL_THREAD_STATUS='OPEN'
cs15Label=RawQuery cs16=select count(app_cache_view.app_uid) from app_cache_view left join
users cu on (app_cache_view.usr_uid=cu.usr_uid) left join users pu on (app_cache_
view.previous_usr_uid=pu.usr_uid) left join app_cache_view appcvcr on (app_cache_view.app_
uid=appcvcr.app_uid and appcvcr.del_last_index=?) left join users usrcr on (appcvcr.usr_
uid=usrcr.usr_uid) where app_cache_view.app_status=? and app_cache_view.usr_uid=? and app_
cache_view.del_finish_date is ? and app_cache_view.app_thread_status=? and app_cache_view.del_
thread_status=? cs16Label=ParsedQuery cs17= cs17Label=BindVariables cs18= cs18Label=SQLError
cs19=1 cs19Label=ResponseSize cs20=0 cs20Label=ResponseTime cs21=0 cs21Label=AffectedRows
Event Types
Rules
There are no specific rules but generic rules for Security Manager and Generic Servers apply.
Reports
There are no specific reports but generic rules for Security Manager and Generic Servers apply.
Configuration
Configure Vormetric Data Security Manager to send syslog in CEF format on port 514 to FortiSIEM.
Syslog Parsed event attributes: include Source IP, Destination URL, Security
HTTP Method, HTTP User agent, HTTP Status Code, HTTP Content Monitoring and
Type, Blocked Reason, Risk compliance
Event Types
In ADMIN > Device Support > Event, search for "mcafee_web" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to
FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
l For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual
appliance.
l For Port, enter 514.
l Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that
shown in the example.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Application Process level metrics: CPU utilization, memory utilization Performance
type Monitoring
WMI Application Process level metrics: uptime, CPU Utilization, Memory Performance
type, service utilization, Read I/O, Write I/O Monitoring
mappings
Syslog Application W3C proxy logs: attributes include Service Instance, Source IP, Security
(via type User, Destination IP, Destination Port, Service Instance, Sent Bytes, Monitoring and
SNARE) Received Bytes, Connection Duration, HTTP User Agent, HTTP compliance
Referrer, HTTP Version, HTTP Method, HTTP Status Code, URL,
Source interface, Destination interface, Proxy action
Event Types
In ADMIN > Device Support > Event, search for "isa server" in the Device Type andDescription column to see the
event types associated with this device.
Rules
Reports
Configuration
SNMP
SNMP is typically enabled by default on Windows Server 2003, but you must still add FortiSIEM to the hosts that are
authorized to accept SNMP packets. First you must make sure that the SNMP Management tool has been enabled for
your device.
1. In the Start menu, go to Administrative Tools > Services.
2. Go to Control Panel > Add or Remove Programs.
3. Click Add/Remove Windows Components.
4. Select Management and Monitoring Tools and click Details.
Make sure that Simple Network Management Tool is selected.
If it isn't selected, select it, and then click Next to install.
5. Go to Start > Administrative Tools > Services.
6. Select and open SNMP Service.
7. Click the Security tab.
8. Select Send authentication trap.
9. Under Accepted communities, make sure there is an entry for public that is set to read-only.
10. Select Accept SNMP packets from these hosts.
11. Click Add.
12. Enter the IP address for your FortiSIEM virtual appliance that will access your device over SNMP.
13. Click Add.
14. Click Apply.
15. Under SNMP Service, click Restart service.
SNMP is typically enabled by default on Windows Server 2008, but you must still add FortiSIEM to the hosts that are
authorized to accept SNMP packets. First you should check that SNMP Services have been enabled for your server.
1. Log in to the Windows 2008 Server where you want to enable SNMP as an administrator.
2. In the Start menu, select Control Panel.
3. Under Programs, click Turn Windows features on/off.
4. Under Features, see if SNMP Services is installed.
If not, click Add Feature, then select SMNP Service and click Next to install the service.
5. In the Server Manager window, go to Services > SNMP Services.
6. Select and open SNMP Service.
7. Click the Security tab.
8. Select Send authentication trap.
9. Under Accepted communities, make sure there is an entry for public that is set to read-only.
10. Select Accept SNMP packets from these hosts.
11. Click Add.
12. Enter the IP address for your FortiSIEM virtual appliance that will access your device over SNMP.
13. Click Add.
14. Click Apply.
15. Under SNMP Service, click Restart service.
WMI
Configuring WMI on your device so FortiSIEM can discover and monitor it requires you to create a user who has access
to WMI objects on the device. There are two ways to do this:
l Creating a Generic User Who Does Not Belong to the Local Administrator Group
l Creating a User Who Belongs to the Domain Administrator Group
Creating a Generic User Who Does Not Belong to the Local Administrator Group
Enable Remote WMI Requests by Adding a Monitoring Account to the Distributed COM Users Group and
the Performance Monitor Users Group
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Local Users and
Groups.
2. Right-click Users and select Add User.
3. Create a user.
4. Go to Groups, right-click Distributed COM Users, and then click Add to group.
5. In the Distributed COM Users Properties dialog, click Add.
6. Find the user you created, and then click OK.
This is the account you must use to set up the Performance Monitor Users group permissions.
7. Click OK in the Distributed COM Users Properties dialog, and then close the Computer Management dialog.
8. Repeat steps 4 through 7 for the Performance Monitor Users group.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then Properties.
3. Select the COM Security tab, and then under Access Permissions, click Edit Limits.
4. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
5. Click OK.
6. Under Access Permissions, click EditDefault.
7. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
8. Click OK.
9. Under Launch and Activation Permissions, click Edit Limits.
10. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
11. Click OK.
12. Under Launch and Activation Permissions, click Edit Defaults.
13. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
See the sections on Enabling WMI Privileges and Allowing WMI Access through the Windows Firewall in the
Domain Admin User set up instructions for the remaining steps to configure WMI.
Enable remote WMI requests by Adding a Monitoring Account to the Domain Administrators Group
1. Go to Start > Control Pane > Administrative Tools > Active Directory Users and Computers > Users.
2. Right-click Users and select Add User.
3. Create a user for the @accelops.com domain.
For example, [email protected].
4. Go to Groups, right-click Administrators, and then click Add to Group.
5. In the Domain Admins Properties dialog, select the Members tab, and then click Add.
6. For Enter the object names to select, enter the user you created in step 3.
7. Click OK to close the Domain Admins Properties dialog.
8. Click OK.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then select Properties.
3. Select the Com Security tab, and then under Access Permissions, click Edit Limits.
4. Find the user you created for the monitoring account, and make sure that user has the permission Allow for both
Local Access and Remote Access.
5. Click OK.
6. In the Com Security tab, under Access Permissions, click Edit Defaults.
7. Find the user you created for the monitoring account, and make sure that user has the permission Allow for
both Local Access and Remote Access.
8. Click OK.
9. In the Com Security tab, under Launch and Activation Permissions, click Edit Limits.
10. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
11. In the Com Security tab, under Launch and Activation Permissions, click Edit Defaults.
12. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
The monitoring account you created must have access to the namespace and sub-namespaces of the monitored
device.
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Services and
Applications.
2. Select WMI Control, and then right-click and select Properties.
3. Select the Security tab.
4. Expand the Root directory and select CIMV2.
5. Click Security.
6. Find the user you created for the monitoring account, and make sure that user has the
permission Allow for Enable Account and Remote Enable.
7. Click Advanced.
8. Select the user you created for the monitoring account, and then click Edit.
9. In the Apply onto menu, select This namespace and subnamespaces.
10. Click OK to close the Permission Entry for CIMV2 dialog.
11. Click OK to close the Advanced Security Settings for CIMV2 dialog.
12. In the left-hand navigation, under Services and Applications, select Services.
13. Select Windows Management Instrumentation, and then click Restart.
Syslog
Use the Windows Agent Installation Guide to configure sending syslogs from your device to FortiSIEM.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP. Set the
Name and Community String.
Setting Value
Syslog Proxy traffic: attributes include Source IP, Destination IP, Security
Destination Name, Destination Port, URL, Web category, Proxy Monitoring and
action, HTTP User Agent, HTTP Referrer, HTTP Version, HTTP compliance
Method, HTTP Status Code, Sent Bytes, Received Bytes,
Connection Duration
Event Types
In ADMIN > Device Support > Event, search for "squid" in the Description and Device Type columns to see the
event types associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Syslog
3. Restart Squid.
@<FortiSIEMIp>
Squid on Linux with syslog locally and forward to syslog-ng remotely to forward to FortiSIEM
Squid on Linux with syslog-ng locally and forward to syslog-ng remotely to forward to FortiSIEM
Squid on Solaris with syslog locally and forward to syslog-ng remotely to forward to FortiSIEM
Event Types
Rules
There are no specific rules but generic rules for Generic Servers apply.
Reports
There are no specific reports but generic rules for Generic Servers apply.
Configuration
Configure SSH Comm Security CryptoAuditor to send syslog on port 514 to FortiSIEM.
Syslog Parsed event attributes: include Source IP, Destination Name, Security
Destination URL, HTTP Method, HTTP User agent, HTTP Status Monitoring and
Code, HTTP Content Type, Blocked Reason, Website category, compliance
HTTP Disposition, Sent Bytes, Recv Bytes, Duration, File Type etc
Event Types
In ADMIN > Device Support > Event, search for "web sense_mail" in the Display Name column to see the event
types associated with this device.
Rules
Reports
Configuration
FortiSIEM integrates with Websense Web Filter via syslogs sent in the SIEM integration format as described in
the Websense SEIM guide. See the instructions on how to install a Websense Multiplexer that integrates with
Websense Policy server and creates syslog for consumption by SIEM products such as FortiSIEM.
http_user_agent=Mozilla/5.0_(Windows;_U;_Windows_NT_6.1;_enUS;_rv:1.9.2.23)_Gecko/20110920_
Firefox/3.6.23
http_proxy_status_code=200 reason=- disposition=1034 policy=- role=8 duration=0
url=https://mail.google.com
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Port 1433
Disposition wslogdb70
Database
SSH Hardware (cpu Memory paging rate, Disk I/O utilization Performance
details, memory) Monitoring
Event Types
In ADMIN > Device Support > Event, search for "hp_ux" in the Description column to see the event types
associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "hp_ux" in the Name column to see the reports associated with this device.
Configuration
1. Make sure that snmp libraries are installed. FortiSIEM has been tested to work with the default HP UX package that
comes with snmpd preinstalled.
2. Start snmpd deamon with the default configuration by issuing /etc/init.d/snmpd restart.
3. Make sure that snmpd is running.
SSH
1. Make sure that the vmstat and iostat commands are available. If not, install these libraries.
2. Create a user account that can issue vmstat and iostat commands. FortiSIEM will use that user account to
login to the server.
LDAP, LDAPS, LDAP Start TLS / OpenLDAP Access Credentials for All Devices
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
LDAP, LDAPS, LDAP Start TLS / Microsoft Active Directory Access Credentials for All Devices
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
SSH Hardware (cpu Memory paging rate, Disk I/O utilization Performance
details, memory) Monitoring
Event Types
In ADMIN > Device Support > Event, search for "ibm_aix" in the Device Type and Description column to see the
event types associated with this device.
Rules
Reports
Configuration
1. Make sure that snmp libraries are installed. Accelops has been tested to work with the default AIX package that
comes with snmpd preinstalled.
2. Start snmpd deamon with the default configuration by issuing /etc/init.d/snmpd restart.
3. Make sure that snmpd is running.
SSH
1. Make sure that the vmstat and iostat commands are available. If not, install these libraries.
2. Create a user account that can issue vmstat and iostat commands. FortiSIEM will use that user account to log
in to the server.
Syslog
1. Makes sure that /etc/syslog.conf contains a *.* entry and points to a log file.
. @<SENSORIPADDRESS>
2. Refresh syslogd.
# refresh -s syslogd
LDAP, LDAPS, LDAP Start TLS / OpenLDAP Access Credentials for All Devices
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
Settings Value
LDAP, LDAPS, LDAP Start TLS / Microsoft Active Directory Access Credentials for All Devices
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
Event Types
In ADMIN > Device Support > Event, search for "os400" in the Device Type column to see the event types
associated with this device.
Rules
Reports
Configuration
Syslog
FortiSIEM parses IBM OS 400 logs received via the PowerTech Agent as described here. The PowerTech agent sends
syslogs to FortiSIEM.
:QPWFSERVSO JUSER :BRENDAN JNBR :025355 PGM :PLKR108JEL OBJECT : LIBRARY : MEMBER: DETAIL: OB
BRENDAN *FILESRV DLTSTRMFIL QPWFSERVSO LNS0811 000112 00025 /home/BRENDAN/BoardReport
Linux Server
SSH OS type, Hardware Memory paging rate, Disk I/O utilization Performance
(cpu details, Monitoring
memory)
Syslog Vendor, Model General logs including Authentication Success/Failure, Security
Privileged logons, User/Group Modification Monitoring and
Compliance
Syslog (via File or directory change: User, Type of change, directory Security
FortiSIEM or file name Monitoring and
Linux Agent) Compliance
Event Types
In ADMIN > Device Support > Event Types, search for "linux" to see the event types associated with this device.
Rules
In RESOURCES > Rules, search for "linux" in the main content panel Search... field to see the rules associated with
this device.
Reports
In RESOURCES > Reports , search for "linux" in the main content panel Search... field to see the reports associated
with this device.
Configuration
1. Make sure that snmp libraries are installed. FortiSIEM has been tested to work with net-snmp libraries.
2. Log in to your server with administrative access.
3. Make these modifications to the /etc/snmp/snmpd.conf file:
a. Define the community string for FortiSIEM usage and permit snmp access from FortiSIEM IP.
b. Allow FortiSIEM read-only access to the mib-2 tree.
c. Allow Accelops read-only access to the enterprise MIB: UCD-SNMP-MIB.
d. Open up the entire tree for read-only view.
4. Reduce the logging level to avoid per connection logging which may cause resource issues (see here for more
details):
a. Edit /etc/sysconfig/snmpd (on RedHat/CentOS) or /etc/defaults/snmpd (on Debian/Ubuntu)
b. Look for the line that passes the command line options to snmpd. On RedHat Enterprise 6 this looks like:
# snmpd command line options
OPTIONS="-LS0-6d -Lf /dev/null -p /var/run/snmpd.pid"
SNMP v3
4. At the end of the file, add this line, substituting your username for snmpv3user and removing the <>
tags: rouser <snmpv3user>.
5. Save the file.
6. Use vi to edit the /var/lib/snmp/snmpd.conf file.
Before you edit this file, make sure you have created a backup, as it is very important to have a valid version of this
file for the SNMP daemon to function correctly.
vi /var/lib/snmp/snmpd.conf
7. At the end of the file, add this line, entering the username you entered in step 4, and then passwords for that user
for MD5 and DES.
If you want to use SHA or AES, then add those credentials as well.
createUser <snmpv3user> MD5 <snmpv3md5password> DES <snmpv3despassword>
Configuring net-smnp-devel
If you have net-snmp-devel on your Linux server/client, follow these steps to configure SNMP v3.
1. Stop SNMP.
service snmpd stop
SSH
1. Make sure that the vmstat and iostat commands are available. If not, install these libraries.
2. Create a user account that can issue vmstat and iostat commands. FortiSIEM will use that user account to log
in to the server.
Syslog Logging
Syslog forwarding can be configured on Linux servers to send the logs to FortiSIEM. There are different options
regarding syslog configuration, including Syslog over TLS.
There are typically two commonly-used Syslog demons:
l Syslog-ng
l rsyslog
FortiSIEM has licensed Linux agents that provide additional capabilities, such as custom log forwarding and central
management. See the “Linux Agent Installation Guide” for details on this agent.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP. Set the
Name and Community String.
Setting Value
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Name ssh-generic
Port 22
l Supported OS
l What is Discovered and Monitored
l Configuration
l Setting Access Credentials
Supported OS
l Windows 2003
l Windows 2008 and 2008 R2
l Windows 2012 and 2012 R2
l Windows 2016
l Windows 2019
SNMP Host name, generic hardware Uptime, Overall CPU/Memory/Network Interface/Disk Performance
(cpu, memory, network space utilization, Network Interface Errors, Running Monitoring
interface, disk), software Process Count, Installed Software change,
(operating system version, Running process CPU/memory utilization, Running
installed software, running process start/stop, TCP/UDP port up/down,
processes, open TCP/UDP
ports)
SNMP Vendor specific server Hardware module status - fan, power supply, thermal
hardware (hardware model, status, battery, disk, memory . Currently supported
hardware serial number, fans, vendors include HP and Dell
power supply, disk, raid
battery). Currently supported
vendors include HP and Dell
Correlog Security, Application and System Event Logs ncluding Security and
agent logon, file/folder edits, network traffic (Win32_ Compliance
NTLogEvent)
FortiSIEM Security, Application and System Event Logs, DNS, Security and
Agent DHCP, IIS, DFS logs, Custom log files, File Integrity Compliance
Monitoring, Registry Change Monitoring, Installed
Software Change Monitoring, WMI and Powershell
output monitoring
Event Types
In ADMIN > Device Support > Event, search for "windows server" in the Description column to see the event types
associated with this application or device.
Rules
In RESOURCE > Rules, search for "windows server" in the Name column to see the rules associated with this
application or device.
Reports
In RESOURCE > Reports , search for "windows server" in the Name column to see the reports associated with this
application or device.
Configuration
l WinRM Configurations
l SNMP Configurations
l WMI Configurations
l Windows Agent Configurations
l Syslog Configurations
WinRM Configurations
WinRM is used for some FortiSIEM Remediation actions. If Windows Remediation actions are not used in FortiSIEM,
this configuration step is not required.
Use the commands below to enable WinRM and set authentication on the target Windows Servers:
1. To configure Windows Server:
winrm quickconfig
winrm set winrm/config/service/auth ‘@{Basic="true"}’
winrm set winrm/config/service ‘@{AllowUnencrypted="true"}’
Single quotes are needed for Windows 2016 and later.
2. To configure FortiSIEM Client (Super or Collector):
pip install pywinrm
SNMP Configurations
SNMP is typically enabled by default on Windows Server 2012R2, Server 2016, and Server 2019. But you must still add
FortiSIEM to the hosts that are authorized to accept SNMP packets. First, you should check that SNMP Services have
been enabled for your server.
1. Log in to the Windows 2016 Server where you want to enable SNMP as an administrator.
2. In the Start menu, select Control Panel.
3. Under Programs, click Turn Windows features on/off.
4. The Add Roles and Features Wizard will open automatically.
5. Select Role-based or feature-based installation. Click Next until the Features option appears.
6. Under Features, see if SNMP Services is installed.
If not, check the checkbox before the SNMP Service and click Next to install the service.
7. From the Start menu, select Services. Go to Services > SNMP Services.
8. Select and open SNMP Service.
9. Click the Security tab.
10. Select Send authentication trap.
11. Under Accepted communities, make sure there is an entry for public that is set to read-only.
12. Select Accept SNMP packets from these hosts.
13. Click Add.
14. Enter the IP address for your FortiSIEM virtual appliance that will access your device over SNMP.
15. Click Add.
16. Click Apply.
17. Under SNMP Service, click Restart service.
SNMP is typically enabled by default on Windows Server 2008, but you must still add FortiSIEM to the hosts that are
authorized to accept SNMP packets. First you should check that SNMP Services have been enabled for your server.
1. Log in to the Windows 2008 Server where you want to enable SNMP as an administrator.
2. In the Start menu, select Control Panel.
3. Under Programs, click Turn Windows features on/off.
4. Under Features, see if SNMP Services is installed.
If not, click Add Feature, then select SMNP Service and click Next to install the service.
5. In the Server Manager window, go to Services > SNMP Services.
6. Select and open SNMP Service.
7. Click the Security tab.
8. Select Send authentication trap.
9. Under Accepted communities, make sure there is an entry for public that is set to read-only.
10. Select Accept SNMP packets from these hosts.
11. Click Add.
12. Enter the IP address for your FortiSIEM virtual appliance that will access your device over SNMP.
13. Click Add.
14. Click Apply.
15. Under SNMP Service, click Restart service.
SNMP is typically enabled by default on Windows Server 2003, but you must still add FortiSIEM to the hosts that are
authorized to accept SNMP packets. First you must make sure that the SNMP Management tool has been enabled for
your device.
1. In the Start menu, go to Administrative Tools > Services.
2. Go to Control Panel > Add or Remove Programs.
3. Click Add/Remove Windows Components.
4. Select Management and Monitoring Tools and click Details.
Make sure that Simple Network Management Tool is selected.
If it isn't selected, select it, and then click Next to install.
5. Go to Start > Administrative Tools > Services.
6. Select and open SNMP Service.
7. Click the Security tab.
8. Select Send authentication trap.
9. Under Accepted communities, make sure there is an entry for public that is set to read-only.
10. Select Accept SNMP packets from these hosts.
11. Click Add.
12. Enter the IP address for your FortiSIEM virtual appliance that will access your device over SNMP.
13. Click Add.
14. Click Apply.
15. Under SNMP Service, click Restart service.
WMI Configurations
To configure WMI on your device so that FortiSIEM can discover and monitor it, you must create a user who has access
to WMI objects on the device. There are two ways to do this:
l Creating a Generic User Who Does Not Belong to the Local Administrator Group
l Creating a User Who Belongs to the Domain Administrator Group
l Differences Between Administrator and Non-Administrator Account
Creating a Generic User Who Does Not Belong to the Local Administrator Group
Step 1. Enable Remote WMI Requests by Adding a Monitoring Account to the Distributed COM Users
Group and the Performance Monitor Users Group
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Local Users and
Groups.
2. Right-click Users and select New User.
3. Create a user.
4. Select this user and right-click to select Properties > Member of tab.
5. Click Add > Advanced > Find Now.
1. Go to Start > Control Panel > Administrative Tools > Component Services > Computers > My
Computer.
2. Right-click My Computer, and then Properties.
3. Select the COM Security tab, and then under Access Permissions, click Edit Limits.
4. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
5. Click OK.
6. Under Access Permissions, click Edit Default.
7. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed. If the Distributed COM Users group and Performance Monitor
Users group are not present, then click Add to add these two groups as described in Step 1.
8. Click OK.
9. Under Launch and Activation Permissions, click Edit Limits.
10. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
11. Click OK.
12. Under Launch and Activation Permissions, click Edit Defaults.
13. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation. If the
Distributed COM Users group and Performance Monitor Users group are not present, then click Add to add
these two groups as described in Step 1.
14. Click OK.
Step 3. See the sections on Enabling WMI Privileges and Allowing WMI Access through the Windows
Firewall in the Domain Admin User set up instructions for the remaining steps to configure WMI.
To configure the non-administrative user to monitor windows event logs, follow the steps below:
1. Go to Start > Control Panel > Administrative Tools > Active Directory Users and Computers (Computer
Management > Local Users and Groups for servers that are not a domain controller).
2. Right-click the non-admin user and select Properties.
3. Select the Member of tab.
4. Select the group Event Log Reader and click Add.
5. Click Apply.
6. Click OK to complete the configuration.
l Domain Users
l Event Log Reader
Step 1. Enable remote WMI requests by adding a Monitoring Account to the Domain Administrators Group
1. Go to Start > Control Pane > Administrative Tools > Active Directory Users and Computers > Users.
2. Right-click Users and select New > User.
3. Create a user for the @accelops.com domain.
For example, [email protected].
4. Right-click Domain Admins in Users and select Properties.
5. In the Domain Admins Properties dialog, select the Members tab, and then click Add.
6. Click Advanced > Find Now, add the Administrator and the user which you created in Step 3.
7. Click OK to close the User select dialog
8. Click OK to close the Domain Admins Properties dialog.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then select Properties.
3. Select the COM Security tab, and then under Access Permissions, click Edit Limits.
4. Find the user you created for the monitoring account, and make sure that user has the permission Allow for both
Local Access and Remote Access.
5. Click OK.
6. In the COM Security tab, under Access Permissions, click Edit Defaults.
7. Find the user you created for the monitoring account, and make sure that the user has the permission Allow for
both Local Access and Remote Access. If the Distributed COM Users group and Performance Monitor
Users group are not present, then click Add to add these two groups as described in Step 1.
8. Click OK.
9. In the COM Security tab, under Launch and Activation Permissions, click Edit Limits.
10. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation. If the Distributed COM Users group and
Performance Monitor Users group are not present, then click Add to add these two groups as described in Step
1.
11. In the COM Security tab, under Launch and Activation Permissions, click Edit Limits.
12. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation. If the Distributed COM Users group
and Performance Monitor Users group are not present, then click Add to add these two groups as described in
Step 1.
13. Click OK.
The monitoring account you created must have access to the namespace and sub-namespaces of the monitored
device.
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Services and
Applications.
2. Select WMI Control, and then right-click and select Properties.
3. Select the Security tab.
4. Expand the Root directory and select CIMV2.
5. Click Security.
6. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Enable
Account and Remote Enable. If the user isn ot present, then click Add to add the user you created.
7. Click Advanced.
8. Select the user you created for the monitoring account, and then click Edit.
9. In the Applies onto menu, select This namespace and subnamespaces.
10. Click OK to close the Permission Entry for CIMV2 dialog.
11. Click OK to close the Advanced Security Settings for CIMV2 dialog.
12. In the left-hand navigation, under Services and Applications, select Services.
13. Select Windows Management Instrumentation, and then click Restart.
Allow WMI through Windows Firewall (Windows Server 2012, 2016 and 2019)
Windows allows certain WMI classes to be pulled only via Administrator account. The following table shows this clearly.
Win32_BIOS Yes No
Win32_LogicalDisk Yes No
Win32_QuickFixEngineering Yes No
Win32_Service Yes No
Win32_UserAccount Yes No
To configure WMI on your device so that FortiSIEM can discover and monitor it, you must create a user who has access
to WMI objects on the device. There are two ways to do this:
l Creating a Generic User Who Does Not Belong to the Local Administrator Group
l Creating a User Who Belongs to the Domain Administrator Group
l Differences Between Administrator and Non-Administrator Account
Creating a Generic User Who Does Not Belong to the Local Administrator Group
Step 1. Enable Remote WMI Requests by Adding a Monitoring Account to the Distributed COM Users
Group and the Performance Monitor Users Group
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Local Users and
Groups.
2. Right-click Users and select New User.
3. Create a user.
4. Select this user and right-click to select Properties > Member of tab.
5. Select Distributed COM Users and click Add.
6. Click OK to save.
This is the account you must use to set up the Performance Monitor Users group permissions.
7. Repeat steps 4 through 6 for the Performance Monitor Users group.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then Properties.
3. Select the COM Security tab, and then under Access Permissions, click Edit Limits.
4. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
5. Click OK.
6. Under Access Permissions, click EditDefault.
7. Make sure that the Distributed COM Users group and the Performance Monitor Users group have Local
Access and Remote Access set to Allowed.
8. Click OK.
9. Under Launch and Activation Permissions, click Edit Limits.
10. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
11. Click OK.
12. Under Launch and Activation Permissions, click Edit Defaults.
13. Make sure that the Distributed COM Users group and the Performance Monitor Users group have the
permissions Allow for Local Launch, Remote Launch, Local Activation, and Remote Activation.
See the sections on Enabling WMI Privileges and Allowing WMI Access through the Windows Firewall in the
Domain Admin User set up instructions for the remaining steps to configure WMI.
To configure the non-administrative user to monitor windows event logs, follow the steps below:
1. Go to Start > Control Panel > Administrative Tools > Active Directory Users and Computers (Computer
Management > Local Users and Groups for servers that are not a domain controller).
2. Right-click the non-admin user and select Properties.
3. Select the Member of tab.
4. Select the group Event Log Reader and click Add.
5. Click Apply.
Step 1. Enable remote WMI requests by Adding a Monitoring Account to the Domain Administrators
Group
1. Go to Start > Control Pane > Administrative Tools > Active Directory Users and Computers > Users.
2. Right-click Users and select Add User.
3. Create a user for the @accelops.com domain.
For example, [email protected].
4. Go to Groups, right-click Administrators, and then click Add to Group.
5. In the Domain Admins Properties dialog, select the Members tab, and then click Add.
6. For Enter the object names to select, enter the user you created in step 3.
7. Click OK to close the Domain Admins Properties dialog.
8. Click OK.
1. Go to Start > Control Panel > Administrative Tools > Component Services.
2. Right-click My Computer, and then select Properties.
3. Select the Com Security tab, and then under Access Permissions, click Edit Limits.
4. Find the user you created for the monitoring account, and make sure that user has the permission Allow for both
Local Access and Remote Access.
5. Click OK.
6. In the Com Security tab, under Access Permissions, click Edit Defaults.
7. Find the user you created for the monitoring account, and make sure that user has the permission Allow for
both Local Access and Remote Access.
8. Click OK.
9. In the Com Security tab, under Launch and Activation Permissions, click Edit Limits.
10. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
11. In the Com Security tab, under Launch and Activation Permissions, click Edit Defaults.
12. Find the user you created for the monitoring account, and make sure that user has the permission Allow for Local
Launch, Remote Launch, Local Activation, and Remote Activation.
The monitoring account you created must have access to the namespace and sub-namespaces of the monitored
device.
1. Go to Start > Control Panel > Administrative Tools > Computer Management > Services and
Applications.
2. Select WMI Control, and then right-click and select Properties.
3. Select the Security tab.
4. Expand the Root directory and select CIMV2.
5. Click Security.
6. Find the user you created for the monitoring account, and make sure that user has the
permission Allow for Enable Account and Remote Enable.
7. Click Advanced.
8. Select the user you created for the monitoring account, and then click Edit.
9. In the Apply onto menu, select This namespace and subnamespaces.
10. Click OK to close the Permission Entry for CIMV2 dialog.
11. Click OK to close the Advanced Security Settings for CIMV2 dialog.
12. In the left-hand navigation, under Services and Applications, select Services.
13. Select Windows Management Instrumentation, and then click Restart.
Windows allows certain WMI classes to be pulled only via Administrator account. The following table shows this clearly.
Win32_BIOS Yes No
Win32_LogicalDisk Yes No
Win32_QuickFixEngineering Yes No
Win32_Service Yes No
Win32_UserAccount Yes No
For information on configuring Windows Agent, see Windows Agent Installation Guide.
Syslog Configurations
See the Windows Agent Installation Guide for information on configuring the sending of syslogs from your device to
FortiSIEM.
Because Windows generates a lot of security logs, you should specify the categories of events that you want logged and
available for monitoring by FortiSIEM.
1. Log in the machine where you want to configure the policy as an administrator.
2. Go to Programs > Administrative Tools > Local Security Policy.
3. Expand Local Policies and select Audit Policy.
You will see the current security audit settings.
4. Selet a policy and edit the Local Security Settings for the events you want audited. Recommended settings are:
Audit account logon For auditing logon activity Select Success and
events and Audit logon Failure
events
Audit object access For auditing access to files and folders. There is an Select Success and
events additional configuration requirement for specifying which Failure
files and folders, users and user actions will be audited. See
the next section, Configuring the File Auditing Policy.
When you enable the policy to audit object access events, you also must specify which files, folders, and user actions
will be logged. You should be very specific with these settings, and set their scope to be as narrow as possible to avoid
excessive logging. For this reason you should also specify system-level folders for auditing.
1. Log in the machine where you want to set the policy with administrator privileges.
On a domain computer, a Domain administrator account is needed
2. Open Windows Explorer, select the file you want to set the auditing policy for, right-click on it, and select
Properties.
3. In the Security tab, click Advanced.
4. Select the Auditing tab, and then click Add.
This button is labeled Edit in Windows 2008.
5. In the Select User or Group dialog, click Advanced, and then find and select the users whose access to this file
you want to monitor.
6. Click OK when you are done adding users.
7. In the Permissions tab, set the permissions for each user you added.
The configuration is now complete. Windows will generate audit events when the users you specified take the actions
specified on the files or folders for which you set the audit policies.
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
Base DN Specify the root of the LDAP tree as the Base DN.
For example: dc=companyABC,dc=com
LDAP, LDAPS, LDAP Start TLS / Microsoft Active Directory Access Credentials for All Devices
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
Settings Value
Settings Value
Configuration
Setup in FortiSIEM
Setting Value
SSH Hardware (cpu Memory paging rate, Disk I/O utilization Performance
details, memory) Monitoring
Event Types
In ADMIN > Device Support > Event, search for "solaris" in the Device Type and Description column to see the
event types associated with this device.
Configuration
1. Check if the netsnmp package installed. Solaris has built-in snmp packages. If the netsnmp is not installed, use
pkgadd cmd to install it.
2. Start snmnp with the default configuration.
SSH
1. Make sure that the vmstat and iostat commands are available. If not, install these libraries.
2. Create a user account that can issue vmstat and iostat commands. FortiSIEM will use that user account to log
in to the server.
LDAP, LDAPS, LDAP Start TLS / OpenLDAP Access Credentials for All Devices
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
LDAP, LDAPS, LDAP Start TLS / Microsoft Active Directory Access Credentials for All Devices
Settings Value
Server Port 389 for LDAP, LDAP Start TLS; 636 for LDAPS
Settings Value
SNMP Host name, Uptime, Network Interface metrics (utilization, bytes sent and Availability and
Operating system received, packets sent and received, errors, discards and Performance
version, Hardware queue lengths) Monitoring
model, Serial
number, Network
interfaces, Physical
Disks, Components
Event Types
In ADMIN > Device Support > Event, search for "brocade" in the Description column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Host name, Uptime, Network Interface metrics (utilization, bytes sent and Availability and
Operating system received, packets sent and received, errors, discards and Performance
version, Hardware queue lengths) Monitoring
model, Serial
number, Network
interfaces, Physical
Disks, Components
Event Types
Rules
Availability
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Host name, Uptime, Network Interface metrics (utilization, bytes sent and Availability and
Operating system received, packets sent and received, errors, discards and Performance
version, Hardware queue lengths) Monitoring
model, Serial
number, Network
interfaces, Physical
Disks, Components
Event Types
In ADMIN > Device Support > Event, search for "equallogic" in the Description column to see the event types
associated with this device.
Rules
In RESOURCE > Rules, search for "equallogic" in the Name column to see the rules associated with this device.
Reports
In RESOURCE > Reports , search for "equallogic" in the Name column to see the reports associated with this
device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
NaviSecCLI Host name, Processor utilization: SP Name, Read request rate (IOPS), Availability and
Operating system Write request rate (IOPS), Read volume (KBps), Write volume Performance
version, Hardware (KBps), Read/Write request rate (IOPS), Read/Write volume Monitoring
model, Serial (KBps)
number, Network Port I/O: Port name, Read request rate (IOPS), Write request
interfaces* Installed rate (IOPS), Read volume (KBps), Write volume (KBps),
Software, Storage Read/Write request rate (IOPS), Read/Write volume (KBps)
Controller Ports RAID Group I/O: RAID Group id, RAID type, Total disk,
Hardware Read request rate (IOPS), Write request rate (IOPS), Read
components: volume (KBps), Write volume (KBps), Read/Write request rate
Enclosures, Fan, (IOPS), Read/Write volume (KBps)
Power Supply, Link LUN I/O: LUN name, LUN id, Total disk, Used disk, Free
Control Card, CPU, disk, Disk util, Read request rate (IOPS), Write request rate
Disk (IOPS), Read volume (KBps), Write volume (KBps),
RAID Groups and Read/Write request rate (IOPS), Read/Write volume (KBps)
the assigned disk Host HBA Connectivity: Source IP, Source Name, Source
LUNs and LUN -> WWN, Dest IP, Destination Name, SP Port Name, Storage
RAID Group Group, LUN Names, Login Status, Registration Status
mappings Host HBA Unregistered Host: Source IP, Source Name,
Storage Groups Source WWN, Dest IP, Destination Name, SP Port Name
and memberships Hardware component health: Component name (Disk,
(Host, Port, LUN). Power supply, LCC, Fan, Link, Port), Component status, Host
spare ready disk count
Overall Disk health: Total disk count, Total disk size (MB),
Active disk count, Failed disk count, Spare disk count
Event Types
In ADMIN > Device Support > Event Types, search for "clariion" to see the event types associated with this device.
Rules
Reports
Configuration
4. Change the user role to the admin su - admin and make sure that the user can run the
command naviseccli -h -User <user> -Password <pwd> -Scope global getall -sp from
the directory /opt/phoenix/bin .
[root@Rob-SP-94 Navisphere]# cd bin
[root@Rob-SP-94 bin]# su - admin
[admin@Rob-SP-94 ~]$ naviseccli
Not enough arguments
Usage:
[-User <username>] [-Password <password>]
[-Scope <0 - global; 1 - local; 2 - LDAP>]
6. If the Navisphere Analyzer module is off, turn it on with the setstats -on command.
[admin@accelops ~]$ naviseccli -user admin -password admin*1 -scope 0 -h 192.168.1.100
setstats -on
[admin@accelops ~]$ naviseccli -user admin -password admin*1 -scope 0 -h 192.168.1.100
getall -sp
SP Information
--------------
Storage Processor: SP A
Storage Processor Network Name: A-IMAGE
Storage Processor IP Address: 192.168.1.100
7. Once this command runs successfully, you are ready to set the access credentials for your device in FortiSIEM
and initiate the discovery process.
Set these Access Method Definition values to allow FortiSIEM to communicate with your EMC Clarion storage
device over NaviSecCLI.
Setting Value
Setting Value
SNMP Host name, Uptime, Network Interface metrics (utilization, bytes sent and Availability and
Operating system received, packets sent and received, errors, discards and Performance
version, Hardware queue lengths) Monitoring
model, Serial
number, Network
interfaces, Physical
Disks, Components
Event Types
In ADMIN > Device Support > Event, search for "isilon" in the Description column to see the event types
associated with this device.
Rules
In RESOURCE > Rules, search for "isilon" in the Name column to see the rules associated with this device.
Reports
In RESOURCE > Reports , search for "isilon" in the Name column to see the reports associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Setting Value
Like EMC Clarion, FortiSIEM uses Navisec CLI to discover the device and to collect performance metrics. The only
difference is that a slightly different command and XML formatted output is used.
Navisec Host name, Operating Processor utilization: SP Name, Read request rate Availability and
CLI system version, Hardware (IOPS), Write request rate (IOPS), Read volume (KBps), Performance
model, Serial number, Write volume (KBps), Read/Write request rate (IOPS), Monitoring
Network interfaces* Read/Write volume (KBps)
Installed Software, Storage Storage Pool I/O: RAID Group id, RAID type, Total
Controller Ports disk, Read request rate (IOPS), Write request rate
Hardware components: (IOPS), Read volume (KBps), Write volume (KBps),
Enclosures, Fan, Power Read/Write request rate (IOPS), Read/Write volume
Supply, Link Control Card, (KBps)
CPU, Disk
Storage Pools, RAID
Groups and the
assigned disks
LUNs and LUN ->
Storage Pool and RAID
Group mappings
Storage Groups and
memberships (Host, Port,
LUN)
LUN I/O: LUN name, LUN id, Total disk, Used disk, Free
disk, Disk util, Read request rate (IOPS), Write request
rate (IOPS), Read volume (KBps), Write volume (KBps),
Read/Write request rate (IOPS), Read/Write volume
(KBps)
Host HBA Connectivity: Source IP, Source Name,
Source WWN, Dest IP, Destination Name, SP Port
Name, Storage Group, LUN Names, Login Status,
Registration Status
Host HBA Unregistered Host: Source IP, Source
Name, Source WWN, Dest IP, Destination Name, SP
Port Name
Hardware component health: Component name
(Disk, Power supply, LCC, Fan, Link, Port), Component
status, Host spare ready disk count
Overall Disk health: Total disk count, Total disk size
(MB), Active disk count, Failed disk count, Spare disk
count
Configuration
4. Change the user role to the admin su - admin and make sure that the user can run the
command naviseccli -h -User <user> -Password <pwd> -Scope global getall -sp from
the directory /opt/phoenix/bin .
[root@Rob-SP-94 Navisphere]# cd bin
[root@Rob-SP-94 bin]# su - admin
[admin@Rob-SP-94 ~]$ naviseccli
Not enough arguments
Usage:
[-User <username>] [-Password <password>]
[-Scope <0 - global; 1 - local; 2 - LDAP>]
[-Address <IPAddress | NetworkName> | -h <IPAddress | NetworkName>]
[-Port <portnumber>] [-Timeout <timeout> | -t <timeout>]
[-AddUserSecurity | -RemoveUserSecurity | -DeleteSecurityEntry]
[-Parse | -p] [-NoPoll | -np] [-cmdtime]
[-Xml] [-f <filename>] [-Help] CMD <Optional Arguments>[security -certificate]
6. If the Navisphere Analyzer module is off, turn it on with the setstats -on command.
[admin@accelops ~]$ naviseccli -user admin -password admin*1 -scope 0 -h 192.168.1.100
setstats -on
[admin@accelops ~]$ naviseccli -user admin -password admin*1 -scope 0 -h 192.168.1.100
getall -sp
SP Information
--------------
Storage Processor: SP A
Storage Processor Network Name: A-IMAGE
Storage Processor IP Address: 192.168.1.100
Storage Processor Subnet Mask: 255.255.255.0
Storage Processor Gateway Address: 192.168.1.254
Storage Processor IPv6 Mode: Not Supported
Management Port Settings:
Link Status: Link-Up
7. Once this command runs successfully, you are ready to set the access credentials for your device in FortiSIEM
and initiate the discovery process.
Enter the Storage Processor IP address when you associate your device's access credentials to an IP address during
the credential set up process. Do not enter any other IP address, such as the Control Station IP.
Use these Access Method Definition settings to allow FortiSIEM to access your EMC VNX storage device over
NaviSecCLI.
Setting Value
NetApp DataONTAP
l Supported Version
l Configuration
Supported Version
FortiSIEM supports the latest NetApp ONTAP API version listed here.
l NetApp ONTAP API 8.2
Configuration
Setup in FortiSIEM
Settings Description
Transport - HTTP
- HTTPS
Settings Description
SNMP Host name, Uptime, CPU utilization, Network Interface metrics (utilization, Availability and
Operating system bytes sent and received, packets sent and received, errors, Performance
version, Hardware discards and queue lengths), Logical Disk Volume utilization Monitoring
model, Serial
number, Network
interfaces, Logical
volumes, Physical
Disks
SNMP NFS metrics: Cache age, CIFS request rate (IOPS), NFS Performance
request rate (IOPS), Disk read rate (IOPS), Disk write rate Monitoring
(IOPS), Network Sent rate (Kbps), Network received rate
(Kbps), RPC Bad calls, NFS Bad calls, CIFS Bad calls
Detailed NFS V3 metrics: Read request rate (IOPS), Write
request rate (IOPS), Read latency, Write latency, Read volume
(KBps), Write volume (KBps)
Detailed NFS V4 metrics: Read request rate (IOPS), Write
request rate (IOPS), Read latency, Write latency, Read volume
(KBps), Write volume (KBps)
Detailed CIFS metrics: Total Read/Write rate (IOPS),
Latency
Detailed ISCSI metrics: Read request rate (IOPS), Write
request rate (IOPS), Read latency, Write latency, Read volume
(KBps), Write volume (KBps)
Detailed FCP metrics: Read request rate (IOPS), Write
request rate (IOPS), Read latency, Write latency, Read volume
(KBps), Write volume (KBps)
Event Types
In ADMIN > Device Support > Event, search for "netapp" in the Device Type column to see the event types
associated with this device.
Rules
In RESOURCE > Rules, search for "netapp" in the Name column to see the rules associated with this device.
Reports
In RESOURCE > Reports , search for "netapp" in the Name column to see the reports associated with this device.
Configuration
SNMP
Setting Value
Nimble Storage
SNMP Host name, Uptime, Network Interface metrics (utilization, bytes sent and Availability and
Operating system received, packets sent and received, errors, discards and Performance
version, Hardware queue lengths) Monitoring
model, Serial
number, Network
interfaces, Physical
Disks, Components
SNMP Storage Disk Utilization: Disk name, Total Disk, Used Disk, Availability
Free Disk, Disk Utilization Monitoring
Event Types
In ADMIN > Device Support > Event, search for "nimble" in the Description column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Nutanix Storage
SNMP Host name, Uptime, Process count, CPU utilization, Real and virtual Availability and
Operating system memory utilization, Disk utilization, Process CPU/Memory Performance
version, Hardware utilization, Network Interface metrics Monitoring
model, Serial
number, Network
interfaces, Physical
Disks, Components
SNMP Disk Status: Cluster, Controller VM, Disk id, Disk serial, Disk Availability
utilization, Total Disk, Used Disk, Free Disk Monitoring
Disk Temp: Disk Id, disk serial, Controller VM, temperature
Cluster Status: Cluster, Cluster version, storage utilization,
total storage, used storage, IOPS, latency
Service Status: Cluster, Controller VM, Cluster VM Status,
Zeus Status, Stargate Status
SNMP Storage Pool Info: Cluster, storage pool name, storage Performance
utilization, total storage, used storage, IOPS, latency Monitoring
Container Info: Cluster, Container name, storage utilization,
total storage, used storage, IOPS, latency
Event Types
l PH_DEV_MON_SYS_CPU_UTIL
[PH_DEV_MON_SYS_CPU_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=1468,[cpuName]=Generic CPU,[hostName]=NTNX-14SM15290052-A-CVM,
[hostIpAddr]=10.0.252.20,[cpuUtil]=100.000000,[sysCpuUtil]=0.000000,[userCpuUtil]=0.000000,
[waitCpuUtil]=0.000000,[kernCpuUtil]=0.000000,[contextSwitchPersec]=0.000000,
[cpuInterruptPersec]=0.000000,[pollIntv]=177,[cpuCore]=8,[loadAvg1min]=2.500000,
[loadAvg5min]=2.500000,[loadAvg15min]=2.390000,[phLogDetail]=
l PH_DEV_MON_SYS_MEM_UTIL
[PH_DEV_MON_SYS_MEM_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9587,[memName]=Physical Memory,[hostName]=NTNX-14SM15290052-A-CVM,
[hostIpAddr]=10.0.252.20,[memUtil]=93.210754,[pollIntv]=177,[phLogDetail]=
l PH_DEV_MON_SYS_VIRT_MEM_UTIL
[PH_DEV_MON_SYS_VIRT_MEM_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9590,[memName]=Virtual memory,[hostName]=NTNX-14SM15290052-A-CVM,
[hostIpAddr]=10.0.252.20,[virtMemUsedKB]=30773124,[virtMemUtil]=93.210754,[pollIntv]=177,
[phLogDetail]=
l PH_DEV_MON_SYS_UPTIME
[PH_DEV_MON_SYS_UPTIME]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=1065,[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.252.20,
[sysUpTime]=1815730,[sysUpTimePct]=100.000000,[sysDownTime]=0,[pollIntv]=56,[phLogDetail]=
l PH_DEV_MON_SYS_DISK_UTIL
[PH_DEV_MON_SYS_DISK_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9664,[diskName]=/home/nutanix/data/stargate-storage/disks/9XG6R3HG,
[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.252.20,[appTransportProto]=SNMP
(hrStorage),[diskUtil]=9.229729,[totalDiskMB]=938899,[usedDiskMB]=86658,
[freeDiskMB]=852241,[pollIntv]=176,[phLogDetail]=
l PH_DEV_MON_NET_INTF_UTIL
[PH_DEV_MON_NET_INTF_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phIntfFilter.cpp,
[lineNumber]=319,[intfName]=eth0,[intfAlias]=,[hostName]=NTNX-14SM15290052-A-CVM,
[hostIpAddr]=10.0.252.20,[pollIntv]=56,[recvBytes64]=0,[recvBitsPerSec]=0.000000,
[inIntfUtil]=0.000000,[sentBytes64]=0,[sentBitsPerSec]=0.000000,[outIntfUtil]=0.000000,
[recvPkts64]=0,[sentPkts64]=0,[inIntfPktErr]=0,[inIntfPktErrPct]=0.000000,
[outIntfPktErr]=0,[outIntfPktErrPct]=0.000000,[inIntfPktDiscarded]=0,
[inIntfPktDiscardedPct]=0.000000,[outIntfPktDiscarded]=0,[outIntfPktDiscardedPct]=0.000000,
[outQLen64]=0,[intfInSpeed64]=10000000000,[intfOutSpeed64]=10000000000,
[intfAdminStatus]=up,[intfOperStatus]=up,[daysSinceLastUse]=0,[totIntfPktErr]=0,
[totBitsPerSec]=0.000000,[phLogDetail]=
l PH_DEV_MON_PROC_RESOURCE_UTIL
[PH_DEV_MON_PROC_RESOURCE_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=4378,[swProcName]=python,[hostName]=NTNX-14SM15290052-A-CVM,
[hostIpAddr]=10.0.23.20,[procOwner]=,[memUtil]=0.379639,[cpuUtil]=0.000000,
[appName]=python,[appGroupName]=,[pollIntv]=116,[swParam]=/home/nutanix/ncc/bin/health_
server.py --log_plugin_output=true --logtostderr=true,[phLogDetail]=
l PH_DEV_MON_SYS_PROC_COUNT
[PH_DEV_MON_SYS_PROC_COUNT]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=11378,[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.252.20,
[procCount]=327,[pollIntv]=176,[phLogDetail]=
l PH_DEV_MON_NUTANIX_DISK_STATUS
[PH_DEV_MON_NUTANIX_DISK_STATUS]:[eventSeverity]=PHL_INFO,[fileName]=devNutanix.cpp,
[lineNumber]=216,[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.23.20,
[cluster]=AmanoxLab01,[diskId]=24,[ntxControllerVMId]=7,[hwDiskSerial]=9XG6V4DS,
[diskUtil]=35.704633,[totalDiskMB]=916,[freeDiskMBNonRoot]=589,[inodeUsedPct]=0.234492,
[inodeMax]=61054976,[inodeFreeNonRoot]=60911807,[phLogDetail]=
l PH_DEV_MON_NUTANIX_CLUSTER_STATUS
[PH_DEV_MON_NUTANIX_CLUSTER_STATUS]:[eventSeverity]=PHL_INFO,[fileName]=devNutanix.cpp,
[lineNumber]=272,[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.23.20,
[cluster]=Lab01,[clusterVersion]=el6-release-danube-4.1.2-stable-
99e1e2dda7a78989136f39132e1f198989ef03a4,[clusterStatus]=started,[diskUtil]=32.000000,
[totalDiskMB]=14482532,[usedDiskMB]=4740567,[diskRWReqPerSec]=3109.000000,
[devDiskRWLatency]=0.631000,[phLogDetail]=
l PH_DEV_MON_NUTANIX_SERVICE_STATUS
[PH_DEV_MON_NUTANIX_SERVICE_STATUS]:[eventSeverity]=PHL_INFO,[fileName]=devNutanix.cpp,
[lineNumber]=287,[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.23.20,
[cluster]=Lab01,[ntxControllerVMId]=5,[ntxClusterVMStatus]=Up,[ntxZeusStatus]=3287, 3310,
3311, 3312, 3389, 3403,[ntxStargateStatus]=5331, 5365, 5366, 5421, 19543,[phLogDetail]=
l PH_DEV_MON_NUTANIX_STORAGE_POOL_INFO
[PH_DEV_MON_NUTANIX_STORAGE_POOL_INFO]:[eventSeverity]=PHL_INFO,[fileName]=devNutanix.cpp,
[lineNumber]=239,[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.23.20,
[cluster]=Lab01,[spoolId]=1474,[spoolName]=amanoxlab_sp,[diskUtil]=32.733000,
[totalDiskMB]=14482532,[usedDiskMB]=4740567,[diskRWReqPerSec]=155.000000,
[devDiskRWLatency]=0.631000,[phLogDetail]=
l PH_DEV_MON_NUTANIX_CONTAINER_INFO
[PH_DEV_MON_NUTANIX_CONTAINER_INFO]:[eventSeverity]=PHL_INFO,[fileName]=devNutanix.cpp,
[lineNumber]=257,[hostName]=NTNX-14SM15290052-A-CVM,[hostIpAddr]=10.0.23.20,
[cluster]=Lab01,[ntxContainerId]=1488,[ntxContainerName]=perflab_ndfs,[diskUtil]=8.357116,
[totalDiskMB]=14482532,[usedDiskMB]=1210322,[diskRWReqPerSec]=0.000000,
[devDiskRWLatency]=0.000000,[phLogDetail]=
Rules
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
FortiInsight is a unique data security and threat detection solution that delivers advanced threat hunting to help you
spot, respond to, and manage risky behaviors that put your business-critical data at risk. It combines powerful and
flexible Machine Learning with detailed forensics around user actions to bring focus to the facts more rapidly than other
solutions.
l What is Discovered and Monitored
l Event Types
l Rules
l Reports
l Configuration in FortiInsight
l Configuration in FortiSIEM
l Sample Events
FortiInsight API Policy based alerts and AI based alerts Data security, threat protection
This feature allows FortiSIEM to get Policy-based alerts and AI-based alerts from FortiInsight.
Event Types
In RESOURCES > Event Types, enter "FortiInsight" in the Search column to see the event types associated with this
device.
Rules
In RESOURCES > Rules, enter "FortiInsight" in the Search column to see the rules associated with this device.
Reports
No defined reports.
Configuration in FortiInsight
3. Click New API Key to open the New API Key dialog box.
4. Enter a descriptive Name.
5. Click Save to generate the API key. This will download a file containing the API key information (Client ID, Client
Secret, and Name). Make a note of these values; you will need them when you configure FortiSIEM.
Configuration in FortiSIEM
Settings Description
Sample Events
[FORTIINSIGHT_POLICY_ALERT] = {"description":"","events":[{"act":"file
downloaded","app":"chrome.exe","childId":null,"d":"2019-03-
18T13:22:24.344+00:00","id":null,"m":"uqP","mn":{"dh":"tcp://server-10-230-2-
153.lhr5.r.cloudfront.net","dip":"10.1.1.76","dp":61024,"ext":".mkv","fp":"c:\\users\\Administ
rator\\documents\\secret\\prototypedemo1.mkv","fs":2307792448,"loc":
{"altCode":null,"city":"Augsburg","code":"DE","country":"Germany","latitude":"48.3718","longit
ude":"10.8925"},"p":"tcp-ip-
4","sip":"78.47.38.226","sp":443,"ts":1460},"r":"c:\\users\\Administrator\\documents\\secret\\
prototypedemo1.mkv-> tcp://server-54-230-2-153.lhr5.r.cloudfront.net:443","u":"acmeltd__
engineer2"}],"extendedEvents":[{"act":"file
downloaded","app":"chrome.exe","childId":null,"d":"2019-03-
18T13:22:24.344+00:00","id":null,"latestHostname":"mimas","latestIp":"10.10.0.1","m":"uqP","m
n":{"dh":"tcp://server-54-230-2-
153.lhr5.r.cloudfront.net","dip":"10.1.1.76","dp":61024,"ext":".mkv","fp":"c:\\users\\Administ
rator\\documents\\secret\\prototypedemo1.mkv","fs":2307792448,"loc":
{"altCode":null,"city":"Augsburg","code":"DE","country":"Germany","latitude":"48.3718","longit
ude":"10.8925"},"p":"tcp-ip-
4","sip":"78.47.38.226","sp":443,"ts":1460},"r":"c:\\users\\Administrator\\documents\\secret\\
prototypedemo1.mkv-> tcp://server-10-230-2-
153.lhr5.r.cloudfront.net:443","resolvedUsername":"","u":"acmeltd__
engineer2"}],"id":"AWmQ98PYg7b_-i6_5Rvg","labels":[""],"policyId":"default_
6COnUMjTCB8N","policyName":"Browser Download","regimes":
["ZoneFox"],"serverIp":"52.209.49.52","serverName":"fortisiemtest.dev.fortiinsight.cloud","sev
erity":10,"status":"New","time":"2019-03-18T13:22:29.473715+00:00"}
Lastline
Syslog Device Type Endpoint activity such as file download, email attachments, Security and
network connections. Compliance
Event Types
In ADMIN > Device Support > Event, search for "Lastline" in the Name and Description columns to see the event
types associated with this device.
Rules
There are no specific rules for Lastline, however rules that match the Event Type Groups associated with Lastline
Events may trigger.
Reports
There are no specific Reports for Lastline, however reports that match the Event Type Groups associated with Lastline
Events may return results.
Syslog
FortiSIEM processes events from this device via syslog. Configure the device to send syslog to FortiSIEM on port 514
using CEF formatting.
Sample Events
ThreatConnect
ThreatConnect API Malware Domain, IP, URL and Hash Detect threats for Security and Compliance
Configuring ThreatConnect
Use the Access ID and Secret Key that were created in the previous section to enable FortiSIEM access.
FortiSIEM can provide the following IOCs from ThreatConnect:
l Malware Domain
l Malware IP
l Malware URL
l Malware Hash
Follow these steps to set up Malware Domain downloads from ThreatConnect.
1. Login to FortiSIEM.
2. Go to RESOURCE > Malware Domain > ThreatConnect Malware Domain.
3. Click More > Update. Select Update via API.
4. Enter the following fields
a. Set User Name to Access ID (Step 3a above).
b. Set Password to Secret Key (Step 3b above).
c. Set Data Format to STIX-TAXII.
d. For Collection:, you have two choices:
The steps for configuring FortiSIEM to download other IOCs are identical, except for the following details:
l Malware IP—Navigate to RESOURCE > Malware Domain > ThreatConnect Malware IP
l Malware URL—Navigate to RESOURCE > Malware Domain > ThreatConnect Malware URL
l Malware Hash—Navigate to RESOURCE > Malware Domain > ThreatConnect Malware Hash
Event Types
[PH_DEV_MON_HYPERV_MEM_PARTITION_PER_VM]:[phyMachIpAddr]=172.16.20.180,[phyMachName]=WIN-
HH2MFBPMHMR,[hostIpAddr]=172.16.20.182,[hostName]=accelops-va-hyperv-4.3.1.1158,
[vmName]=accelops-va-hyperv-4.3.1.1158,[1gGpaPages]=0,[2mGpaPages]=4096,[4kGpaPages]=2089,
[depositedGpaPages]=5044
Rules
Reports
Look in RESOURCES > Reports > Device > Server > HyperV
l HyperV Configuration and Health
l Top HyperV Guests By Virtual Processor Run Time Pct
l Top HyperV Guests by Large Page Size Usage
l Top HyperV Guests by Remote Physical Page Usage
l Top HyperV Root Partitions By Virtual Processor Run Time Pct
l Top HyperV Root Partitions by Large Page Size Usage
l Top HyperV Servers By Logical Processor Run Time Pct
l Top HyperV Servers by Disk Activity
l Top HyperV Servers by Disk Latency
l Top HyperV Servers by Large Page Size Usage
l Top HyperV Servers by Memory Remaining for Guests
l Top HyperV Servers by Remote Physical Page Usage
Configuration
FortiSIEM needs WMI credentials to get the HyperV performance metrics. Configure this following the guidelines
described in Microsoft Windows Server Configuration.
HyTrust CloudControl
Event Types
Rules
There are no specific rules but generic rules for Security Manager and Generic Servers apply.
Reports
There are no specific reports but generic rules for Security Manager and Generic Servers apply.
Configuration
VMware ESX
VMWare ESX Server and the Both ESX level and guest host level performance metrics. Performance
SDK Guest hosts running Guest host level metrics include CPU/memory/disk Monitoring
on that server. ESX utilization, CPU Run/Ready/Limited percent, memory swap
host clusters. in/out rate, free memory state, disk read/write rate/latency,
Hardware (CPU, network interface utilization, errors, bytes in/out.
Memory, Disk, ESX level metrics include physical CPU utilization, ESX
network Interface) for kernel disk read/writre latency etc
all guests, OS vendor
and version for all
guests. Virtual switch
for connecting guest
hosts to network
interfaces.
VMWare ESX logs include scenarios like ESX level login sucess/failure, Availability,
SDK configuration change, Guest host movement, account creation Change and
and modification Security
Monitoring
Configuration
FortiSIEM discovers and monitors VMware ESX servers and guests over the the VMware SDK. Make sure that VMware
Tools is installed on all the guests in your ESX deployment, and FortiSIEM will be able to obtain their IP addresses.
Make sure to provide a user with System View permissions who can access the entire vCenter hierarchy when setting
up the access credentials for your VMware ESX device. See the VMware documentation on how to se tup a user with
System View permissions.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP
Syslog
Event Types
In ADMIN > Device Support > Event, search for "cisco_vpn" in the Name and Device Type column to see the event
types associated with this device.
Rules
Reports
Configuration
SNMP
Syslog
<189>18174 01/07/1999 20:25:27.210 SEV=5 AUTH/31 RPT=14 User [ admin ] Protocol [ Telnet ]
attempted ADMIN logon. Status: <REFUSED> authentication failure
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
l Integration points
l Configuring Cyxtera AppGate Software
l Parsing and Events
Integration points
Configuring FortiSIEM
FortiSIEM automatically recognizes Cyxtera AppGate syslog, so long as it follows the following format as shown in the
sampel syslog:
"id":"a51e7e7d-ab5f-444c-b7f8-ca72e4bb940b","timestamp":"2018-10-
09T10:23:43.992Z","event_type":"ip_access","version":8,"distinguished_
name":"CN=0f1a40d612f741228d7cb73a4308bea8,CN=abc,OU=ACME","entitlement_token_
id":"78174080-a34","action":"allow","direction":"down","client_
ip":"1.1.1.1","client_port":1392,"packet_size":40,"protocol":"TCP","source_
ip":"10.1.1.1","destination_ip":"10.1.1.1","source_port":56100,"destination_
port":59721,"connection_type":"established","rule_name":"rule1"
Over 70 events are parsed – see event Types in Resources > Event Types and search for 'Cyxtera-AppGate-SDP'.
SNMP
Syslog
Event Types
In ADMIN > Device Support > Event, search for "junos_dynamic_vpn" in the Name column to see the event types
associated with this device.
Rules
Reports
Configuration
SNMP
Syslog
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP. Set the
Name and Community String.
Setting Value
c. Give users VPN access rights. Open the properties page for a user, select that user's Dial-In properties page
and select "Allow access" under Remote Access Permissions.
3. Configure Server Logging - Enable authentication and accounting logging from the Settings tab on the properties
of the Local File object in the Remote Access Logging folder in the Routing and Remote Access snap-in. The
authentication and accounting information is stored in a configurable log file or files stored in
the SystemRoot\System32\LogFiles folder. The log files are saved in Internet Authentication Service (IAS) or
database-compatible format, meaning that any database program can read the log file directly for analysis.
4. Configure Snare agent to send logs to FortiSIEM.
192.168.24.11,administrator,04/01/2009,09:28:00,RAS,DEV-V-WIN03-
VC,44,29,4,192.168.24.11,6,2,7,1,5,129,61,5,64,1,65,1,31,192.168.20.38,66,192.168.20.38,4108,1
92.168.24.11,4147,311,4148,MSRASV5.20,4155,1,4154,Use Windows authentication for all
users,4129,DEV-V-WIN03-VC\administrator,4130,DEV-V-WIN03-VC\administrator,4127,4,25,311 1
192.168.24.11 04/01/2009 16:12:12 3,4149,Connections to Microsoft Routing and Remote Access
server,4136,1,4142,0
Pulse Secure
Event Types
In ADMIN > Device Support > Event, search for "PulseSecure" to see the event types associated with this device.
Rules
Reports
Configuration
Syslog
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Setting Value
l Integration points
l Configuring AlertLogic for FortiSIEM API Access
l Configuring FortiSIEM for AlertLogic API Access
Integration points
Contact AlertLogic for API access key. This must be entered in FortiSIEM in the next step.
1. Logon to FortiSIEM
2. Go to ADMIN > Setup > Credential.
3. Click New to create AlertLogic API credential:
Setting Value
Settings Description
Configuration in FortiSIEM
Settings Description
JDBC (SQL Server) Scan name, Scanned Host Name, Host OS, Vulnerability category, Security Monitoring
Vulnerability name, Vulnerability severity, Vulerability CVE Id,
Vulnerability Score, Vulnerability Consequence
Event Types
In ADMIN > Device Support > Event, search for "foundstone" in the Description column to see the event types
associated with this device.
Rules
Reports
Configuration
JDBC
FortiSIEM connects to the faultline database in the McAfee vulnerability scanner to collect metrics. This is a SQL
Server database, so you must have set up access credentials for the database over JDBC to set up access credentials in
FortiSIEM and initiate discovery.
Setting Value
Name mcafee_jdbc
Pull Interval 5
(minutes)
Port 1433
Configuration in FortiSIEM
Settings Description
Port 443
Qualys API Scan name, Scanned Host Name, Host OS, Vulnerability category, Security Monitoring
Vulnerability name, Vulnerability severity, Vulerability CVE Id and Bugtraq
Id, Vulnerability Consequence
Event Types
In ADMIN > Device Support > Event, search for "qualys" in the Device Type column to see the event types
associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "qualys" in the Description column to see the reports associated with this
device.
Configuration
Qualys API
Create a user name and password that FortiSIEM can use as access credentials for the API.
You can configure FortiSIEM to communicate with your device, and then initiate discovery of the device. . For more
information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Name qualys
Pull Interval 5
(minutes)
Port 443
Rapid7 Scan name, Scanned Host Name, Host OS, Vulnerability category, Security Monitoring
Nexpose API Vulnerability name, Vulnerability severity, Vulerability CVE Id and Bugtraq
Id, Vulnerability CVSS Score, Vulnerability Consequence
Event Types
In ADMIN > Device Support > Event, search for "rapid7" in the Description and Device Type columns to see the
event types associated with this device.
Rules
Reports
Configuration
1. Log into the device manger for your vulnerability scanner with administrative credentials.
2. Go to Administration > General > User Configuration, and create a user that FortiSIEM can use to access the
device.
3. Go to Reports > General > Report Configuration.
4. Create a report with the Report Format set to Simple XML Report Version 1.0 or NeXpose XML Report
Version 2.0.
FortiSIEM can pull reports only in these formats.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Pull Interval 60
(minutes)
Port 3780
User Name A user who can access the device over the API
l I ntegration points
l Rapid7 InsightVM API Integration
Integration points
FortiSIEM can pull vulnerability scan data from Rapid7 InsightVM Server via InsightVM API.
InsightVM scan data contains vulnerabilities found on a host. Each host vulnerability is converted into a separate
FortiSIEM event with event type Rapid7-InsightVM-Vuln-Detected.
Configuring FortiSIEM
c. Click Save.
5. Perform Test Connectivity to make sure that the credential works correctly.
6. Discover the Rapid7 InsightVM Server using the IP address used in Step 4. Make sure Discover succeeds.
7. An entry will be created in Admin > Setup > Pull Events corresponding to this event pulling job. FortiSIEM will
start to pull events from Rapid7 InsightVM Server using the InsightVM REST API.
To test for received InsightVM Vulnerability events:
1. Go to Admin > Setup > Pull Events
2. Select the InsightVM entry and click Report.
The system will take you to the Analytics tab and run a query to display the events received from InsightVM Server in
the last 15 minutes. You can modify the time interval to get more events.
Tenable.io
l I ntegration points
l Tenable.io API Integration
Integration points
FortiSIEM can pull vulnerability scan data from Tenable.io Cloud Service via Tenable.io API.
Tenable.io scan data contains vulnerabilities found on a host. Each host vulnerability is converted into a separate
FortiSIEM event with event type TenableIO-Vuln-Detected.
Configuring FortiSIEM
Use the API Key and Secret in previous step to enable FortiSIEM access.
1. Login to FortiSIEM.
2. Go to ADMIN > Setup > Credential.
3. Click New to create a Tenable.io credential:
a. Choose Device Type = Tenable.io Tenable (Vendor = Tenable, Model = Tenable.io).
b. Choose Access Protocol = TenableIO API.
c. Choose Pull Interval = 5 minutes.
d. Choose Account, Access Key and Secret Key obtained from Tenable.io portal (see Configuring Tenable.io
Cloud Service)
e. Choose the Organization if it is an MSP deployment and the same credential is to be used for multiple
customers
f. Click Save.
4. Enter an IP range to Credential Association:
a. Set Hostname = cloud.tenable.com
b. Select the credential created in step 3.
c. Click Save.
5. Select the entry in step 4 and click Test Connectivity.
6. After Test Connectivity succeeds, an entry will be created in ADMIN > Setup > Pull Events corresponding to
this event pulling job. FortiSIEM will start to pull events from Tenable.io portal using the API.
To test for received Tenable.io events:
1. Go to ADMIN > Setup > Pull Events.
2. Select the Tenable.io entry and click Report.
The system will take you to the Analytics tab and run a query to display the events received from Tenable.io in the last
15 minutes. You can modify the time interval to get more events.
Nessus API Scan name, Scanned Host Name, Host OS, Vulnerability category, Security Monitoring
Vulnerability name, Vulnerability severity, Vulerability CVE Id and
Bugtraq Id, Vulnerability CVSS Score, Vulnerability Consequence
Event Types
In ADMIN > Device Support > Event, search for "nessus" in the Description and Device Type column to see the
event types associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "nessus" in the Description column to see the reports associated with this
device.
Configuration
Nessus API
Create a user name and password that FortiSIEM can use as access credentials for the API. Make sure the user has
permissions to view the scan report files on the Nessus device. You can check if your user has the right permissions by
running a scan report as that user.
You can now configure FortiSIEM to communicate with your device. For more information, refer to sections and Setting
Credentials and Testing Credentials and API Event Collection in the User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your Nessus Vulnerability
Scanner over the API.
Setting Value
Pull Interval 5
(minutes)
Port 8834
User Name (for A user who has permission to access the device
Nessus and 6) over the API
l Integration points
l Tenable.sc (Security Center) API Integration
l Sample Events
Integration points
FortiSIEM can pull vulnerability scan data via the Tenable.sc API.
Tenable.sc scan data contains vulnerabilities found on a host. Each host vulnerability is converted into a separate
FortiSIEM event with event type TenableSC-Vuln-Detected.
l Configuring Tenable.sc for FortiSIEM
l Configuring FortiSIEM
Except for setting your Tenable account user name and password, no special configuration is needed for Tenable.sc.
Configuring FortiSIEM
Use the API Key and Secret in previous step to enable FortiSIEM access.
1. Login to FortiSIEM.
2. Go to ADMIN > Setup > Credential.
3. Click New to create a Tenable.sc credential:
a. Enter a Name for the credential.
b. Choose Device Type = Tenable Tenable Security Center (Vendor = Tenable, Model = Security Center).
c. Choose Access Protocol = Tenable.sc API.
d. Choose Pull Interval = 60 minutes.
e. Enter the User Name for the account.
f. Enter the Password for the account.
g. Click Save.
4. Enter an IP range to Credential Association:
a. Enter the host's IP or Hostname.
b. Select the credential created in Step 3 from the drop-down list.
c. Click Save.
Sample Events
[TenableSc-Vuln-Detected]:[serverIp]=10.10.10.79,[serverName]=sc.tenalab.online,
[scanName]=tensc_job1__ordr_1580449845796,[endTime]=1580538767,
[policyName]=6e8a5582-076f-5798-b0c3-5384b8854cad-501013/Advanced Scan
(Vulnerability),[osName]=linux,[hostMACAddr]=00:16:3E:5D:7A:71,[osVersion]=Linux
Kernel 2.6,[hostName]=target-cent7.lxd,[hostIpAddr]=10.238.64.9,
[startTime]=1580538643,[appPort]=22,[appTransportProto]=tcp,[eventSeverity]=1,
[nessusPluginId]=70658,[nessusPluginName]=SSH Server CBC Mode Ciphers Enabled,
[categoryType]=Misc.,[vulnCVEId]=CVE-2008-5161,[vulnCvssBaseScore]=2.6,
[vulnCvssBaseTemporal]=1.9,[cweId]=200,[vulnDesc]=The SSH server is configured to
support Cipher Block Chaining (CBC) encryption. This may allow an attacker to
recover the plaintext message from the ciphertext. Note that this plugin only
checks for the options of the SSH server and does not check for vulnerable software
versions.,[fileName]=ssh_cbc_supported_ciphers.nasl,[vulnType]=remote,
[threatLevel]=Low,[vulnSolution]=Contact the vendor or consult product
documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher
mode encryption.,[vulnCVESummary]=The SSH server is configured to use Cipher Block
Chaining.,[nessusPluginOutput]= The following client-to-server Cipher Block
Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc
blowfish-cbc cast128-cbc The following server-to-client Cipher Block Chaining (CBC)
algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc
cast128-cbc
[TenableSc-Vuln-Detected]:[serverIp]=52.170.35.79,[serverName]=sc.tenalab.online,
[scanName]=tensc_job1__ordr_1580449845796,[endTime]=1580538767,
[policyName]=6e8a5582-076f-5798-b0c3-5384b8854cad-501013/Advanced Scan
(Vulnerability),[osName]=linux,[hostMACAddr]=00:16:3E:5D:7A:71,[osVersion]=Linux
Kernel 2.6,[hostName]=target-cent7.lxd,[hostIpAddr]=10.238.64.9,
[startTime]=1580538643,[appPort]=0,[appTransportProto]=tcp,[eventSeverity]=0,
[nessusPluginId]=35081,[nessusPluginName]=Xen Guest Detection,[categoryType]=Misc.,
[vulnDesc]=According to the MAC address of its network adapter, the remote host is
a Xen virtual machine.,[fileName]=xen_detect.nasl,[vulnType]=combined,
[threatLevel]=None,[vulnSolution]=Ensure that the host's configuration is in
agreement with your organization's security policy.,[vulnCVESummary]=The remote
host is a Xen virtual machine.
Configuration in FortiSIEM
Settings Description
Port 0
FortiSIEM supports these wide area network accelerators for discovery and monitoring.
l Cisco Wide Area Application Server
l Riverbed SteelHead WAN Accelerator
SNMP Host name, Software Uptime, CPU and Memory utilization, Network Interface Availability and
version, Hardware metrics (utilization, bytes sent and received, packets sent and Performance
model, Network received, errors, discards and queue lengths), Disk space Monitoring
interfaces utilization, Process cpu/memory utilization
Event Types
l PH_DEV_MON_SYS_CPU_UTIL
[PH_DEV_MON_SYS_UPTIME]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=1053,[hostName]=edge.bank.com,[hostIpAddr]=10.19.1.5,[sysUpTime]=13256948,
[sysUpTimePct]=100.000000,[sysDownTime]=0,[pollIntv]=56,[phLogDetail]=
l PH_DEV_MON_SYS_MEM_UTIL
[PH_DEV_MON_SYS_MEM_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9822,[memName]=Physical Memory,[hostName]=edge.bank.com,
[hostIpAddr]=10.19.1.5,[memUtil]=93.438328,[pollIntv]=176,[phLogDetail]=
l PH_DEV_MON_SYS_DISK_UTIL
[PH_DEV_MON_SYS_DISK_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=9902,[diskName]=/swstore,[hostName]=edge.bank.com,[hostIpAddr]=10.19.1.5,
[appTransportProto]=SNMP (hrStorage),[diskUtil]=56.931633,[totalDiskMB]=992,
[usedDiskMB]=565,[freeDiskMB]=427,[pollIntv]=176,[phLogDetail]=
l PH_DEV_MON_SYS_PROC_COUNT
[PH_DEV_MON_SYS_PROC_COUNT]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=11710,[hostName]=edge.bank.com,[hostIpAddr]=10.19.1.5,[procCount]=429,
[pollIntv]=176,[phLogDetail]=
l PH_DEV_MON_NET_INTF_UTIL
[PH_DEV_MON_NET_INTF_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phIntfFilter.cpp,
[lineNumber]=323,[intfName]=GigabitEthernet 1/0,[intfAlias]=,[hostName]=edge.bank.com,
[hostIpAddr]=10.19.1.5,[pollIntv]=56,[recvBytes64]=0,[recvBitsPerSec]=0.000000,
[inIntfUtil]=0.000000,[sentBytes64]=0,[sentBitsPerSec]=0.000000,[outIntfUtil]=0.000000,
[recvPkts64]=0,[sentPkts64]=0,[inIntfPktErr]=0,[inIntfPktErrPct]=0.000000,
[outIntfPktErr]=0,[outIntfPktErrPct]=0.000000,[inIntfPktDiscarded]=0,
[inIntfPktDiscardedPct]=0.000000,[outIntfPktDiscarded]=0,[outIntfPktDiscardedPct]=0.000000,
[outQLen64]=0,[intfInSpeed64]=100000000,[intfOutSpeed64]=100000000,[intfAdminStatus]=,
[intfOperStatus]=,[daysSinceLastUse]=0,[totIntfPktErr]=0,[totBitsPerSec]=0.000000,
[phLogDetail]=
l PH_DEV_MON_PROC_RESOURCE_UTIL
[PH_DEV_MON_PROC_RESOURCE_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=phPerfJob.cpp,
[lineNumber]=4320,[swProcName]=syslogd,[hostName]=edge.bank.com,[hostIpAddr]=10.19.1.5,
[procOwner]=,[memUtil]=0.038191,[cpuUtil]=0.000000,[appName]=Syslog Server,
[appGroupName]=Unix Syslog Server,[pollIntv]=116,[swParam]=-s -f /etc/syslog.conf-diamond,
[phLogDetail]=
Rules
Reports
Configuration
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Setting Value
SNMP Host name, Software Uptime, CPU and Memory utilization, Network Interface Availability and
version, Hardware metrics (utilization, bytes sent and received, packets sent and Performance
model, Network received, errors, discards and queue lengths), Disk space Monitoring
interfaces utilization, Process cpu/memory utilization
SNMP Bandwidth metrics: Inbound Optimized Bytes - LAN side, Availability and
WAN side, Outbound optimized bytes - LAN side and WAN Performance
side Monitoring
Connection metrics: Optimized connections, Passthrough
connections, Half-open optimized connections, Half-closed
Optimized connections, Established optimized connections,
Active optimized connections
Top Usage metrics: Top source (Source IP, Total Bytes), Top
destination (Destination IP, Total Bytes), Top Application
(TCP/UDP port, Total Bytes), Top Talker (Source IP, Source
Port, Destination IP, Destination Port, Total Bytes)
Peer status: For every peer: State, Connection failures,
Request timeouts, Max latency
SNMP All traps: software errors, hardware errors, admin login, Availability,
Trap performance issues - cpu, memory, peer latency issues. About Security and
115 traps defined in ADMIN > Device Support > Event. The Compliance
mapped event types start with "Riverbed-".
Event Types
In ADMIN > Device Support > Event, search for "steelhead" in the Description and Device Type columns to see
the event types associated with this device.
Rules
In RESOURCE > Rules, search for "steelhead" in the Name column to see the rules associated with this device.
Reports
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its
product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the
User Guide.
SNMP Trap
FortiSIEM processes events from this device via SNMP traps sent by the device. Configure the device to send send
SNMP traps to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
FortiSIEM supports these wireless local area network devices for discovery and monitoring.
l Aruba Networks Wireless LAN
l Cisco Wireless LAN
l CradlePoint
l FortiAP
l FortiWLC
l Motorola WiNG WLAN AP
l Ruckus Wireless LAN
FortiSIEM uses SNMP and NMAP to discover the device and to collect logs and performance metrics. FortiSIEM
communicates to the WLAN Controller only and discovers all information from the Controller. FortiSIEM does not
communicate to the WLAN Access points directly.
SNMP Controller host Controller Uptime, Controller Network Interface metrics Availability and
name, Controller (utilization, bytes sent and received, packets sent and Performance
hardware model, received, errors, discards and queue lengths), Radio interface Monitoring
Controller network performance metrics
interfaces,
Associated WLAN
Access Points
SNMP Controller device All system logs: User authentication, Admin authentication, Availability,
Trap type WLAN attacks, Wireless link health Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "aruba" in the Description and Device Type columns to see the
event types associated with this device.
Rules
Reports
In RESOURCE > Reports , search for "aruba" in the Name column to see the reports associated with this device.
Configuration
SNMP V1/V2c
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Controller host Controller Uptime, Controller CPU and Memory utilization, Availability and
name, Controller Controller Network Interface metrics (utilization, bytes sent and Performance
hardware model, received, packets sent and received, errors, discards and Monitoring
Controller network queue lengths)
interfaces,
Associated WLAN
Access Points
SNMP Controller device All system logs: User authentication, Admin authentication, Availability,
Trap type WLAN attacks, Wireless link health Security and
Compliance
Event Types
In ADMIN > Device Support > Event, search for "cisco wireless" in the Description column to see the event types
associated with this device.
Rules
Reports
Configuration
2010-11-01 12:59:57 0.0.0.0(via UDP: [172.22.2.25]:32769) TRAP2, SNMP v2c, community 1n3t3ng .
Cold Start Trap (0) Uptime: 0:00:00.00 DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(9165100) 1 day, 1:27:31.00 SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-
SMI::enterprises.9.9.599.0.4 SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.1.0 = Hex-STRING: 00 24
D7 36 A0 00 SNMPv2-SMI::enterprises.9.9.513.1.1.1.1.5.0 = STRING: "AP-2" SNMPv2-
SMI::enterprises.9.9.599.1.3.1.1.8.0 = Hex-STRING: 00 25 45 B7 66 70 SNMPv2-
SMI::enterprises.9.9.513.1.2.1.1.1.0 = INTEGER: 0 SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.10.0
= IpAddress: 172.22.4.54 SNMPv2-SMI::enterprises.9.9.599.1.2.1.0 = STRING: "IE\brouse" SNMPv2-
SMI::enterprises.9.9.599.1.2.2.0 = STRING: "IE"2011-04-05 10:37:42 0.0.0.0(via UDP:
[10.10.81.240]:32768) TRAP2, SNMP v2c, community FortiSIEM . Cold Start Trap (0) Uptime:
0:00:00.00 DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1672429600) 193 days, 13:38:16.00
SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-SMI::enterprises.9.9.615.0.1 SNMPv2-
SMI::enterprises.9.9.599.1.3.1.1.1.0 = Hex-STRING: 00 25 BC 80 E8 77 SNMPv2-
SMI::enterprises.9.9.599.1.3.1.1.8.0 = Hex-STRING: 6C 50 4D 7D AC 50 SNMPv2-
SMI::enterprises.9.9.599.1.3.1.1.9.0 = INTEGER: 1 SNMPv2-SMI::enterprises.9.9.513.1.1.1.1.5.0
= STRING: "AP03-3.rdu2" SNMPv2-SMI::enterprises.9.9.615.1.2.1.0 = INTEGER: 1 SNMPv2-
SMI::enterprises.9.9.615.1.2.2.0 = INTEGER: 5000 SNMPv2-SMI::enterprises.9.9.615.1.2.3.0 =
INTEGER: 1 SNMPv2-SMI::enterprises.9.9.615.1.2.4.0 = INTEGER: 31 SNMPv2-
SMI::enterprises.9.9.615.1.2.5.0 = INTEGER: -60 SNMPv2-SMI::enterprises.9.9.615.1.2.6.0 =
INTEGER: -90 SNMPv2-SMI::enterprises.9.9.615.1.2.7.0 = STRING:
"0,0,0,0,1,20,24,28,3,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0" SNMPv2-
SMI::enterprises.9.9.615.1.2.8.0 = INTEGER: 2 SNMPv2-SMI::enterprises.9.9.615.1.2.9.0 =
STRING: "6c:50:4d:7d:ac:50,e8:04:62:0b:b5:f0" SNMPv2-SMI::enterprises.9.9.615.1.2.10.0 =
STRING: "-83,-85" SNMPv2-SMI::enterprises.9.9.615.1.2.11.0 = STRING: "1,1" SNMPv2-
SMI::enterprises.9.9.512.1.1.1.1.11.5 = INTEGER: 1
Setting Value
CradlePoint
Syslog
Event Types
In ADMIN > Device Support > Event, search for "CradlePoint" in the Description column to see the event types
associated with this application or device.
Rules
No specific rules are written for CradlePoint but generic rules for Firewall, VPN Gateway, WLAN AP, Router Switch
apply where there are matching event types.
Reports
No specific reports are written for CradlePoint but generic reports for Firewall, VPN Gateway, WLAN AP, Router Switch
apply where there are matching event types.
Configuration
None required.
Sample Events
FortiAP
SNMP (to Access point – FortiAP CPU, Memory, Clients, Sent/Received traffic Performance
FortiGate) Name, OS, and Availability
Interfaces, Controller Monitoring
(FortiGate)
FortiAPs are discovered from FortiGate firewalls via SNMP. FortiAP logs are received via FortiGate firewalls.
Event Types
In ADMIN > Device Support > Event, search for "FortiGate-Wireless" and “FortiGate-event” in the Description
column to see the event types associated with this device.
Rules
There are generic rules that trigger for this device as event types are mapped to specific event type groups.
Reports
Generic reports are written for this device as event types are mapped to specific event type groups.
Configuration
Sample Events
[PH_DEV_MON_SYS_CPU_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=deviceFortinet.cpp,
[lineNumber]=698,[cpuName]=FAP320C-default_WTP_CPU,[hostName]=FAP320C-default,
[hostIpAddr]=,[cpuUtil]=0.000000,[pollIntv]=0,[phLogDetail]=
[PH_DEV_MON_SYS_MEM_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=deviceFortinet.cpp,
[lineNumber]=707,[memName]=FAP320C-default_WTP_MEM,[hostName]=FAP320C-default,
[hostIpAddr]=,[memUtil]=34,[totalMemKB]= 254256 ,[freeMemKB]=254256,[usedMemKB]=0,
[phLogDetail]=
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
FortiWLC
SNMP Controller – Name, OS, Controller – CPU, Memory, Disk, Throughput, QoS Performance
Serial Number, Interfaces, statistics, Station count and Availability
Associated Access Points – Monitoring
name, OS, Interfaces
Event Types
In ADMIN > Device Support > Event, search for "FortiWLC" in the Description column to see the event types
associated with this device.
Rules
Reports
Configuration
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
Sample events
[PH_DEV_MON_SYS_MEM_UTIL]:[eventSeverity]=PHL_INFO,[fileName]=deviceFortiWLCWLAN.cpp,
[lineNumber]=284,[memName]=PhysicalMemory,[hostName]=FWLCDemo,[hostIpAddr]=172.30.72.40,
[memUtil]=9.000000,[totalMemKB]=3922244,[freeMemKB]=3538244,[usedMemKB]=384000,
[phLogDetail]=
[PH_DEV_MON_FORTIWLC_SYS_THRUPUT]:[eventSeverity]=PHL_INFO,
[fileName]=deviceFortiWLCWLAN.cpp,[lineNumber]=343,[hostIpAddr]=172.30.72.40,
[pollIntv]=180,[recvBytes]=3940593459,[sentBytes]=4002693999,[recvBitsPerSec]=0.000000,
[sentBitsPerSec]=0.000000,[wlanRecvBytes]=10851874907433110752,
[wlanSentBytes]=9983789733519268498,[wlanRecvBitsPerSec]=0.000000,
[wlanSentBitsPerSec]=0.000000,[phLogDetail]=
[PH_DEV_MON_FORTIWLC_QOS_STAT]:[eventSeverity]=PHL_INFO,[fileName]=deviceFortiWLCWLAN.cpp,
[lineNumber]=426,[hostIpAddr]=172.30.72.40,[pollIntv]=176,[qosSessionCount]=1,
[qosH323SessionCount]=2,[qosSipSessionCount]=3,[qosSccpSessionCount]=4,
[qosRejectedSessionCount]=5,[qosRejectedH323SessionCount]=6,
[qosRejectedSipSessionCount]=7,[qosRejectedSccpSessionCount]=8,[qosPendingSessionCount]=9,
[qosH323PendingSessionCount]=10,[qosSipPendingSessionCount]=11,
[qosSccpPendingSessionCount]=12,[qosActiveFlowCount]=13,[qosPendingFlowCount]=14,
[phLogDetail]=
[PH_DEV_MON_FORTIWLC_STATIONS]:[eventSeverity]=PHL_INFO,[fileName]=deviceFortiWLCWLAN.cpp,
[lineNumber]=511,[hostIpAddr]=172.30.72.40,[pollIntv]=176,[station11a]=1,[station11an1]=2,
[station11an2]=3,[station11an3]=4,[station11b]=5,[station11bg]=6,[station11gn1]=7,
[station11gn2]=8,[station11gn3]=9,[stationData]=10,[stationPhone]=11,[stationWired]=12,
[station11ac1]=13,[station11ac2]=14,[station11ac3]=15,[stationUnknown]=16,[phLogDetail]=
FortiWLC Syslog
Apr 09 15:07:54 172.18.37.203 ALARM: 1270826655l | system | info | ALR | RADIUS SERVER
SWITCHOVER FAILED MAJOR Primary RADIUS Server <172.18.1.3> failed. No valid Secondary
RADIUS Server present. Switchover FAILED for Profile <4089wpa2>
Event Types
Over 127 event types - In ADMIN > Device Support > Event, search for "Motorola-WiNG" to see the event types
associated with this device.
Rules
Reports
Configuration
Configure devices to send syslog to FortiSIEM - make sure that the version matches the format below
2015-11-11T13:00:16.720960-06:00 co-ap01 %DOT11-5-EAP_FAILED: Client 'FC-C2-DE-B1-43-81'
failed 802.1x/EAP authentication on wlan 'OFFICE-WAREHOUSE-RADIUS-WLAN' radio 'co-ap01:R1'
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
SNMP Controller host Controller Uptime, Controller Network Interface metrics Availability and
name, Controller (utilization, bytes sent and received, packets sent and Performance
hardware model, received, errors, discards and queue lengths), Controller WLAN Monitoring
Controller network Statistics, Access Point Statistics, SSID performance Stats
interfaces,
Associated WLAN
Access Points
Event Types
l PH_DEV_MON_RUCKUS_CONTROLLER_STAT
[PH_DEV_MON_RUCKUS_CONTROLLER_STAT]:[eventSeverity]=PHL_INFO,
[fileName]=deviceRuckusWLAN.cpp,[lineNumber]=555,[hostName]=guest-zd-01,
[hostIpAddr]=172.17.0.250,[numAp]=41,[numWlanClient]=121,[newRogueAP]=0,[knownRogueAP]=0,
[wlanSentBytes]=0,[wlanRecvBytes]=0,[wlanSentBitsPerSec]=0.000000,
[wlanRecvBitsPerSec]=0.000000,[lanSentBytes]=166848,[lanRecvBytes]=154704,
[lanSentBitsPerSec]=7584.000000,[lanSentBitsPerSec]=7032.000000,[phLogDetail]=
l PH_DEV_MON_RUCKUS_ACCESS_POINT_STAT
[PH_DEV_MON_RUCKUS_ACCESS_POINT_STAT]:[eventSeverity]=PHL_INFO,
[fileName]=deviceRuckusWLAN.cpp,[lineNumber]=470,[hostName]=AP-10.20.30.3,
[hostIpAddr]=10.20.30.3,[description]=,[numRadio]=0,[numWlanClient]=0,[knownRogueAP]=0,
[connMode]=layer3,[firstJoinTime]=140467251729776,[lastBootTime]=140467251729776,
[lastUpgradeTime]=140467251729776,[sentBytes]=0,[recvBytes]=0,[sentBitsPerSec]=0.000000,
[recvBitsPerSec]=0.000000,[phLogDetail]=
l PH_DEV_MON_RUCKUS_SSID_PERF
[PH_DEV_MON_RUCKUS_SSID_PERF]:[eventSeverity]=PHL_INFO,[fileName]=deviceRuckusWLAN.cpp,
[lineNumber]=807,[hostName]=c1cs-guestpoint-zd-01,[hostIpAddr]=172.17.0.250,
[wlanSsid]=GuestPoint,[description]=Welcome SSID for not yet authorized APs.,
[wlanName]=Welcome SSID,[authenMethod]=open,[encryptAlgo]=none,[isGuest]=1,[srcVLAN]=598,
[sentBytes]=0,[recvBytes]=0,[sentBitsPerSec]=0.000000,[recvBitsPerSec]=0.000000,
[authSuccess]=0,[authFailure]=0,[assocSuccess]=0,[assocFailure]=0,[assocDeny]=0,
[disassocAbnormal]=0,[disassocLeave]=0,[disassocMisc]=0,[phLogDetail]=
Rules
Reports
Configuration
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
Setting Value
FortiSIEM communicates to devices and applications using multiple protocols. In many instances, access credentials
for discovery protocols such as SNMP and WMI must be associated to the real IP address (assigned to a network
interface) of the device, while application performance or synthetic transaction monitoring protocols (such as JDBC) will
need the Virtual IP (VIP) assigned to the cluster. Since FortiSIEM uses a single access IP to communicate to a device,
you must create an address translation for the Virtual IPs.
1. Log into your FortiSIEM virtual appliance as root.
2. Update the mapping in your IP table to map the IP address used in setting up your access credentials to the virtual
IP.
iptables -t nat -A OUTPUT -p tcp --destination <access-ip> --dport <destPort> -j DNAT --to-
destination <virtual-ip>:<destPort>'
As an example, suppose an Oracle database server is running on a server with a network address of 10.1.1.1, which
is in a cluster with a VIP of 192.168.1.1. The port used to communicate with Oracle over JDBC is 1521. In this case,
the update command would be:
iptables -t nat -A OUTPUT -p tcp --destination 10.1.1.1 --dport 1521 -j DNAT --to-destination
192.168.1.1:1521
To receive syslog over TLS, a port must be enabled and certificates must be defined. The following configurations are
already added to phoenix_config.txt in Super/Worker and Collector nodes.
listen_tls_port_list=6514
ls_certificate_file=/etc/pki/tls/certs/tls_self_
signed.crt tls_key_file=/etc/pki/tls/private/tls_self_signed.key
Note: the syslog over TLS client must be configured to communicate properly with FortiSIEM.
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:text>;Issuer="</xsl:text>
<xsl:value-of select="Issuer" />
<xsl:text>"</xsl:text>
<xsl:choose>
<xsl:when test="Station!=''">
<xsl:text>;Station="</xsl:text>
<xsl:value-of select="Station" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="File!=''">
<xsl:text>;File="</xsl:text>
<xsl:value-of select="File" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="Safe!=''">
<xsl:text>;Safe="</xsl:text>
<xsl:value-of select="Safe" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="Category!=''">
<xsl:text>;Category="</xsl:text>
<xsl:value-of select="Category" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="RequestId!=''">
<xsl:text>;RequestId="</xsl:text>
<xsl:value-of select="RequestId" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="Reason!=''">
<xsl:text>;Reason="</xsl:text>
<xsl:value-of select="Reason" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="SeverityCategory!=''">
<xsl:text>;Severity="</xsl:text>
<xsl:value-of select="Severity" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="GatewayStation!=''">
<xsl:text>;GatewayStation="</xsl:text>
<xsl:value-of select="GatewayStation" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="SourceUser!=''">
<xsl:text>;SourceUser="</xsl:text>
<xsl:value-of select="SourceUser" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="TargetUser!=''">
<xsl:text>;TargetUser="</xsl:text>
<xsl:value-of select="TargetUser" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="TicketID!=''">
<xsl:text>;TicketID="</xsl:text>
<xsl:value-of select="TicketID" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="LogonDomain!=''">
<xsl:text>;LogonDomain="</xsl:text>
<xsl:for-each select="CAProperties/CAProperty">
<xsl:if test="@Name='LogonDomain'">
<xsl:value-of select="@Value" />
</xsl:if>
</xsl:for-each>
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="Address!=''">
<xsl:text>;Address="</xsl:text>
<xsl:for-each select="CAProperties/CAProperty">
<xsl:if test="@Name='Address'">
<xsl:value-of select="@Value" />
</xsl:if>
</xsl:for-each>
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="CPMStatus!=''">
<xsl:text>;CPMStatus="</xsl:text>
<xsl:for-each select="CAProperties/CAProperty">
<xsl:if test="@Name='CPMStatus'">
<xsl:value-of select="@Value" />
</xsl:if>
</xsl:for-each>
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="Database!=''">
<xsl:text>;Database="</xsl:text>
<xsl:for-each select="CAProperties/CAProperty">
<xsl:if test="@Name='Database'">
<xsl:value-of select="@Value" />
</xsl:if>
</xsl:for-each>
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="DeviceType!=''">
<xsl:text>;DeviceType="</xsl:text>
<xsl:for-each select="CAProperties/CAProperty">
<xsl:if test="@Name='DeviceType'">
<xsl:value-of select="@Value" />
</xsl:if>
</xsl:for-each>
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
<xsl:choose>
<xsl:when test="ExtraDetails!=''">
<xsl:text>;ExtraDetails="</xsl:text>
<xsl:value-of select="ExtraDetails" />
<xsl:text>"</xsl:text>
</xsl:when>
</xsl:choose>
</xsl:for-each>
<xsl:text> </xsl:text>
</xsl:template>
</xsl:stylesheet>
Access Credentials
Set these Access Method Definition values to allow FortiSIEM to communicate with your device over SNMP.
Setting Value
These are the generic settings for providing SSH access to your device from FortiSIEM.
Setting Value
Port 22
User Name A user who has permission to access the device over SSH
Setting Value
Super Password Enter the super password for the system, if required
These are the generic settings for providing Telnet access to your device from FortiSIEM
Setting Value
Port 23
User Name A user who has permission to access the device over Telnet
Super Password Enter the super password for the system, if required
Setting Value
Port 443
User Name A user who has permission to access the device over HTTPS
Password Configuration
Settings Description
Settings Description
Settings Description