Fortinet white logo
Fortinet white logo

Alert correlations

Alert correlations

SOCaaS includes the following correlations in the alert details.

Events

The security events detected from logs triaged by SOC analysts and resulted in the alert escalation.

Click on the name of an event to view the event details page.

Customers can retrieve sample event logs for events to help them with the alert investigation. See Getting logs from an event for instructions.

Indicators

The indicators or signs of compromise that are extracted from the security events. This can include IP addresses, domain names, file hashes, and URLs.

Alert Indicators can include links to enriched FortiGuard data when available. Clicking the link will open the FortiGuard page in a new dialog window, with details about affected products, impact, recommended actions, and more.

Find these links in the alert details, under Correlations > Indicators, and click on the highlighted value of the event to view the FortiGuard Labs data.

Assets

The Fabric device(s) from which logs were collected and security events were detected.

Endpoints

The endpoint(s) associated with this alert that are extracted from the security event.
Users

The user(s) associated with this alert that are extracted from the security event.

Tooltip

This field will not contain information if the fields related to user privacy have been excluded from logs when configuring FortiAnalyzer log forwarding.

If you do not want user information to be included due to privacy concerns or related compliance requirements, please ensure that user identifiable information has been removed from the logs before sending them to SOCaaS. See Sending logs from an on-premise FortiAnalyzer.

Attachments

Triage artifacts such as raw log and triage reports. This also includes customer attachments that can be added directly in the tab.

Note

Users can share files related to the alert with the Fortinet SOC team by clicking the Add option. PDF, PNG, JPEG, text, and CSV files are supported.

Alerts

Displays correlated alerts that include the same endpoint(s) that are affected by this alert.

You can click on an alert to view its details. When you click on another alert, the previous alert's ID is displayed in the navigation breadcrumb at the top of the page so that you can easily navigate back to previous alerts. Click the back button to return to the last alert viewed.

Forensic Analysis

Displays forensic analysis requests associated with endpoints included in this alert.

You can click on a forensic analysis request to view its details.

For more information, see View forensic analysis request details and Request forensic analysis.

Alert correlations

Alert correlations

SOCaaS includes the following correlations in the alert details.

Events

The security events detected from logs triaged by SOC analysts and resulted in the alert escalation.

Click on the name of an event to view the event details page.

Customers can retrieve sample event logs for events to help them with the alert investigation. See Getting logs from an event for instructions.

Indicators

The indicators or signs of compromise that are extracted from the security events. This can include IP addresses, domain names, file hashes, and URLs.

Alert Indicators can include links to enriched FortiGuard data when available. Clicking the link will open the FortiGuard page in a new dialog window, with details about affected products, impact, recommended actions, and more.

Find these links in the alert details, under Correlations > Indicators, and click on the highlighted value of the event to view the FortiGuard Labs data.

Assets

The Fabric device(s) from which logs were collected and security events were detected.

Endpoints

The endpoint(s) associated with this alert that are extracted from the security event.
Users

The user(s) associated with this alert that are extracted from the security event.

Tooltip

This field will not contain information if the fields related to user privacy have been excluded from logs when configuring FortiAnalyzer log forwarding.

If you do not want user information to be included due to privacy concerns or related compliance requirements, please ensure that user identifiable information has been removed from the logs before sending them to SOCaaS. See Sending logs from an on-premise FortiAnalyzer.

Attachments

Triage artifacts such as raw log and triage reports. This also includes customer attachments that can be added directly in the tab.

Note

Users can share files related to the alert with the Fortinet SOC team by clicking the Add option. PDF, PNG, JPEG, text, and CSV files are supported.

Alerts

Displays correlated alerts that include the same endpoint(s) that are affected by this alert.

You can click on an alert to view its details. When you click on another alert, the previous alert's ID is displayed in the navigation breadcrumb at the top of the page so that you can easily navigate back to previous alerts. Click the back button to return to the last alert viewed.

Forensic Analysis

Displays forensic analysis requests associated with endpoints included in this alert.

You can click on a forensic analysis request to view its details.

For more information, see View forensic analysis request details and Request forensic analysis.