Connector actions
This topic provides details for the following connectors:
For more information about the uses of ITSM connectors, see Configuring ITSM connectors.
Local Connector
The local connector is the default connector for FortiAnalyzer and is available automatically. The local connector displays a set of predefined FortiAnalyzer actions to be used within playbooks.
Local connectors include the following actions:
|
Name |
Description |
|---|---|
|
Update Asset and Identity |
Update FortiAnalyzer's Asset and Identity. |
|
Get Events |
Get events. |
|
Get Endpoint Vulnerabilities |
Get endpoint vulnerabilities. |
|
Create Incident |
Create a new incident. |
|
Update Incident |
Update an existing incident. |
|
Attach Data to Incident |
Attach the specified data to an existing incident. |
|
Run Report |
Run the specified FortiAnalyzer report. |
|
Get EPEU from incidents |
Get the EPEU from an incident. |
|
Enrich Start |
Start indicator enrichment workflow. |
|
Enrich Aggregate |
Aggregate indicator enrichment results. |
|
Enrich Save |
Save indicator enrichment. |
|
Get Disk Usage |
Get FortiAnalyzer's disk usage. |
|
Get Virtual Memory |
Get FortiAnalyzer's virtual memory. |
|
Get CPU Usage |
Get FortiAnalyzer's CPU usage. |
FortiOS Connector
The FortiOS connector is added after the first FortiGate has been authorized on an ADOM. Additional devices authorized to the ADOM are displayed as separate entries within the same connector. FortiOS connectors are available in FortiGate and Fabric ADOMs.
Enabling FortiOS actions
The actions available with FortiOS connectors are determined by automation rules configured on each FortiGate. Automation rules using the Incoming Webhook trigger must be created in FortiOS before they are shown as actions in FortiAnalyzer. FortiOS automation rules are configured on FortiOS in Security Fabric > Automation. For information on creating FortiOS automation rules, see the FortiOS administration guide.
Rules for FortiOS actions:
-
Automation rules must use the Incoming Webhook trigger.
-
Automation rules are configured on FortiGate devices individually.
-
When multiple FortiOS connectors are configured, FortiAnalyzer decides which device to call based on the devid (serial number) identified in the task. FortiGate serial numbers can be manually entered or supplied by a preceding task.
-
Automation rules must have unique names to be displayed in the task's Action dropdown menu. Rules sharing the same name will appear only once, as they are considered to be the same automation rule configured on multiple FortiGate devices.
-
FortiOS automation rules are only displayed in Incidents & Events > Automation > Active Connectors when they are enabled in FortiOS.
FortiGuard Connector
The FortiGuard connector is automatically configured when a valid license has been applied to FortiAnalyzer.
FortiGuard connectors include the following actions:
|
Name |
Description |
|---|---|
|
Lookup Indicator |
Lookup indicators in FortiGuard to get threat intelligence. |
|
FGD Enrich |
Get the reputation report for indicator enrichment. |
|
|
The FortiGuard connector cannot be used in an air-gap environment. |
EMS Connector
FortiClient EMS connectors are configured as Security Fabric connectors. See Configuring security fabric connectors. Individual FortiClient EMS connector actions can be toggled on and off while editing the connector.
FortiClient EMS connectors include the following actions:
|
Name |
Description |
|---|---|
|
Get Endpoints |
Retrieve list of endpoints and all of the related information to enrich FortiAnalyzer asset and identity views. |
|
Quarantine |
Quarantines an endpoint. |
|
Unquarantine |
Unquarantines an endpoint. |
|
Vulnerability Scan |
Run a vulnerability scan on endpoints. |
|
AV Quick Scan |
Run a quick antivirus scan on endpoints. |
|
AV Full Scan |
Run a full antivirus scan on endpoints. |
|
Get Software Inventory |
Retrieve list of software and apps installed on an endpoint to enrich FortiAnalyzer asset view. |
|
Get Process List |
Retrieve list of running process on endpoints OS. |
|
Get Vulnerabilities |
Retrieve list of endpoint vulnerabilities on endpoints OS. |
|
Tag Endpoints |
Tag endpoints. |
|
Untag Endpoints |
Untag endpoints. |
FortiMail Connector
FortiMail connectors are configured as Security Fabric connectors. See Configuring security fabric connectors.
FortiMail connectors include the following actions:
|
Name |
Description |
|---|---|
|
Get Email Statistics |
Query a given email address. |
|
Get Sender Reputation |
Query a given sender's reputation information. |
|
Add Sender to Blocklist |
Update system and domain level blocklist. |
|
Get Session Profile |
Get the session profile from FortiMail. |
|
Delete Session Profile |
Delete the session profile from FortiMail. |
|
Get Sender Block List |
Get the list of blocked senders' email addresses from a session profile. |
|
Get Sender Safe List |
Get the list of safelisted senders' email addresses from a session profile. |
|
Get Recipient Block List |
Get the list of blocked recipients' email adddresses from a session profile. |
|
Get Recipient Safe List |
Get the list of safelisted recipients' email adddresses from a session profile. |
|
Block Sender Email with Session Profile |
Block sender's email address with a session profile. |
|
Unblock Sender Email with Session Profile |
Unblock sender's email address with a session profile. |
|
Block Recipient Email with Session Profile |
Block recipient's email address within a session profile. |
|
Unblock Recipient Email with Session Profile |
Unblock recipient's email address within a session profile. |
FortiCASB Connector
FortiCASB connectors are configured as Security Fabric connectors. See Configuring security fabric connectors.
Creating a FortiCASB connector will automatically create the Get Cloud Service Data (FortiCasb Connector) playbook, which must be enabled to use the predefined Default-Shadow-IT-Events event handler. For more information, see Predefined basic event handlers.
FortiCASB connectors include the following actions:
|
Name |
Description |
|---|---|
|
Get Cloud Data from FCASB |
Retrieve cloud application, user, and file information. |
FortiAuthenticator Connector
|
Name |
Description |
|---|---|
|
Get Schema |
Retrieves a report for all the endpoint actions within FortiAuthenticator. |
|
Get User List |
Retrieves a list of users from FortiAuthenticator. |
|
Get User |
Retrieves details of a specific user from FortiAuthenticator based on the user ID, username, or email you have specified. |
|
Update User Status |
Updates the user status of a specific user in FortiAuthenticator based on the user ID and status you have specified. |
|
Get User Lockout Policy |
Retrieves User Lockout Policy details from FortiAuthenticator. |
FortiWeb Connector
|
Name |
Description |
|---|---|
|
Get Anomaly Policy |
Retrieves the domain information of a specific Anomaly Detection policy from FortiWeb based on the policy name you have specified. |
|
Get Blocked IPs |
Retrieves all the blocked IPs from the FortiWeb server. |
|
Unblock IPs |
Release all IPs from the blocked IP list under a specific policy in FortiWeb or release one IP from the blocked IP list under a specific policy in FortiWeb based on the policy name and other input parameters you have specified. |
|
Get Blocked Users |
Retrieves all blocked users or specific blocked users from FortiWeb based on the input parameters you have specified. |
|
Unblock Users |
Releases users from the blocked user list in a server policy in FortiWeb based on the input parameters you have specified. |
|
Get Active Users |
Retrieves a list of active users by user tracking or site publish type from FortiWeb based on the input parameters you have specified. |
|
Delete Active Users |
Deletes active users from a specific policy from FortiWeb based on the policy ID and other input parameters you have specified. |
|
Get Client Info |
Retrieves client information in Client Management in FortiWeb based on the input parameters you have specified. |
|
Delete Client Information |
Deletes information for a specific client from Client Management in FortiWeb based on the client ID you have specified. |
|
Restore Client Threat Score |
Restores the threat score of a specific client to 0 in FortiWeb based on the client ID you have specified. |
|
Get All Virtual Servers |
Retrieves all virtual servers, virtual IP, and interfaces in each virtual server sub-table in the JSON format from FortiWeb. |
|
Get All Physical Servers |
Retrieves the IP addresses in the server pool of all physical servers in the JSON format from FortiWeb. |
|
Get Server Policy Status |
Retrieves the details including the status of a server policy from FortiWeb. |
|
Get Server Policy Traffic |
Retrieves traffic information for traffic on all the system server policies from FortiWeb, or traffic information for a specific system server policy based on the policy name you have specified from FortiWeb. |
FortiSandbox Connector
|
Name |
Description |
|---|---|
|
Get System Status |
Retrieves the status of the system from FortiSandbox. |
|
Get Scan Status |
Retrieves the scan stats for the last 7 days from FortiSandbox. |
|
Get Submission Job List |
Retrieves all job IDs associated with the submission ID you have specified from FortiSandbox. |
|
Get Job Verdict |
Retrieves job verdict detail for job ID you have specified from FortiSandbox. |
|
Get File Rating |
Retrieves file rating for the file type and filehash you have specified from FortiSandbox. |
|
Get URL Rating |
Get rating details for the URL you have specified from FortiSandbox. |
|
Get Job Behavior |
Retrieves job behavior details associated with the file type and filehash you have specified from FortiSandbox. |
|
Toggle FPN State |
Marks specified sample based on the Job ID you have specified as false negative or false positive in FortiSandbox. |
|
Get AV Rescan Result |
Retrieves AV-Rescan results for the time duration you have specified from FortiSandbox. |
|
Get File Verdict |
Retrieves the file verdict details for the file type and filehash you have specified from FortiSandbox. |
|
Get All Installed VM |
Retrieves the names and the clone numbers of all installed VMs on FortiSandbox. |
|
List Filehash or URL From Malware Package or URL Package |
Retrieves a list of file hashes or URLs based on the type you have specified from the Malware Package or URL Package in FortiSandbox. |
VirusTotal Connector
The VirusTotal connector is used as part of the indicator enrichment feature through the Indicator Enrichment playbook. For more information, see Indicator enrichment.
The VirusTotal connector includes the following actions:
|
Name |
Description |
|---|---|
|
Query IP |
Retrieves a report from VirusTotal for the IP address submitted to determine if it is suspicious based on the IP address you have specified. |
|
Query Domain |
Retrieves a report from VirusTotal for the domain submitted to determine if it is suspicious based on the domain name you have specified. |
|
Query URL |
Retrieves a report from VirusTotal for the URL submitted to determine if it is suspicious based on the URL you have specified. |
|
VIRUSTOTAL Enrich |
Enrich the indicator. |
vSphere Connector
|
Name |
Description |
|---|---|
|
Ingest vSphere Server Event Logs |
Retrieves event logs from vSphere and ingests into FortiAnalyzer. |
When you save a vSphere connector, a new playbook will automatically be added in the backend named, Ingest vSphere Server Event Logs. This playbook is run as per the schedule defined in the Data Ingestion tab. To configure Data Ingestion, see Configuring security fabric connectors. This playbook is not visible in the GUI, however its logs are available for troubleshooting under Playbook Monitor .
After the first time the playbook is run, it will pull all the logs from the vSphere server to FortiAnalyzer. It will also create a new External-SIEM-Events device in Device Manager; the device is automatically authorized and only one of such device is created per ADOM for all of the third-party connectors. Then the logs pulled from the server can be seen in Log View > Logs > All alongside other Fabric/SIEM logs; the logs are parsed by the predefined VMware Log Parser and assigned to the new external SIEM device. In Log Browse, the logs files will be available from the new device. The next time the playbook runs, only the new logs after the previous pull will be fetched and added to Log View.
The FortiAnalyzer CLI command "diagnose test application fazwatchd 10" can be used to check the ingestion stats or to manually trigger a playbook:
diagnose test application fazwatchd 10
Airflow Diag Usage:
info show generic airflow information
scheduler show airflow scheduler status
global-monitor show global monitor status
health-check-stat show health check status
ingestion-stat show data ingestion status
trigger-playbook execute a playbook
reset reset airflow database
logging-level set airflow logging level
reset-log-dir reset airflow log directory