Version:

Version:


Table of Contents

Download PDF
Copy Link

FortiGuard Outbreak Alerts support for tagging endpoints for specific vulnerabilities 7.0.4

The FortiGuard Outbreak Alerts service has added support for rules that include common vulnerabilities and exposures (CVE) IDs. You can now also configure Common Vulnerabilities and Exposures Zero Trust tagging rules. This makes it more convenient for you to check and patch an endpoint that has the critical known vulnerabilities.

The following shows a FortiGuard Outbreak rule that EMS has downloaded from FortiGuard. You can view the configured CVE IDs when viewing the rule details in EMS. You can also read more details about these vulnerabilities in the information that the Comments field provides. In this example, the rule is applicable to an endpoint where CVE-2022-24508, CVE-2021-34523, or CVE-2021-31207 is present.

When FortiClient detects one of the configured CVEs on an endpoint, the endpoint summary in EMS shows that EMS has tagged the endpoint with the appropriate FortiGuard outbreak tag.

You can also go to Zero Trust Tags > Zero Trust Tag Monitor and filter by Outbreak Tags to view the endpoint.

To configure a CVE Zero Trust tagging rule:
  1. Go to Zero Trust Tags > Zero Trust Tagging Rules.
  2. Click Add.
  3. Click Add Rule.
  4. From the Rule Type dropdown list, select Common Vulnerabilities and Exposures.
  5. In the CVEs field, enter the desired CVE ID in the format CVE-xxxx-xxxxx. If desired, click the + button to configure multiple CVE IDs.
  6. Click Save.
  7. Configure other fields as desired, then save the rule.

When FortiClient detects one of the configured CVEs on an endpoint, the endpoint summary in EMS shows that EMS has tagged the endpoint with the appropriate Zero Trust tag.

You can also go to Zero Trust Tags > Zero Trust Tag Monitor and filter by Zero Trust Tags to view the endpoint.

FortiGuard Outbreak Alerts support for tagging endpoints for specific vulnerabilities 7.0.4

The FortiGuard Outbreak Alerts service has added support for rules that include common vulnerabilities and exposures (CVE) IDs. You can now also configure Common Vulnerabilities and Exposures Zero Trust tagging rules. This makes it more convenient for you to check and patch an endpoint that has the critical known vulnerabilities.

The following shows a FortiGuard Outbreak rule that EMS has downloaded from FortiGuard. You can view the configured CVE IDs when viewing the rule details in EMS. You can also read more details about these vulnerabilities in the information that the Comments field provides. In this example, the rule is applicable to an endpoint where CVE-2022-24508, CVE-2021-34523, or CVE-2021-31207 is present.

When FortiClient detects one of the configured CVEs on an endpoint, the endpoint summary in EMS shows that EMS has tagged the endpoint with the appropriate FortiGuard outbreak tag.

You can also go to Zero Trust Tags > Zero Trust Tag Monitor and filter by Outbreak Tags to view the endpoint.

To configure a CVE Zero Trust tagging rule:
  1. Go to Zero Trust Tags > Zero Trust Tagging Rules.
  2. Click Add.
  3. Click Add Rule.
  4. From the Rule Type dropdown list, select Common Vulnerabilities and Exposures.
  5. In the CVEs field, enter the desired CVE ID in the format CVE-xxxx-xxxxx. If desired, click the + button to configure multiple CVE IDs.
  6. Click Save.
  7. Configure other fields as desired, then save the rule.

When FortiClient detects one of the configured CVEs on an endpoint, the endpoint summary in EMS shows that EMS has tagged the endpoint with the appropriate Zero Trust tag.

You can also go to Zero Trust Tags > Zero Trust Tag Monitor and filter by Zero Trust Tags to view the endpoint.