Fortinet white logo
Fortinet white logo

External threat templates

External threat templates

Templates for building policies to protect against hostile external threats.

Chrome password store accessed by unauthorized process

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when an unauthorized process opens or modifies a user's Chrome saved password file.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. chrome.exe) authorized or unauthorized to read Chrome password files. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0006 (Credential Access)
attack.mitre.org/tactics/TA0006/
T1555 (Credentials from Password Stores)
attack.mitre.org/techniques/T1555/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Compressed file created

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Agent version 7.8.0 or later

Detects when a user compresses an unauthorized file using Explorer (Windows), Finder (macOS), or the zip command (Linux).

Note

Use the "File parameters" and "File origin parameters" to configure which files are authorized or unauthorized to be compressed. If the "File parameters" and "File origin parameters" are left empty, detections will be generated when any file is compressed.

Note

This policy only monitors the creation of ZIP files.

Parameter Type Description
File parameters
File paths Advanced asset list A list of file path expressions that users are authorized or unauthorized to compress. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would match all files in the Shared folder under users' home directories and **\*.pdf would match all PDF files). Case-insensitive matching is used.
File types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 9.1.0+.
File extensions Advanced asset list A list of file extensions (e.g. .doc, .docx, .pdf) that users are authorized or unauthorized to compress. The dot can be omitted, and case-insensitive matching is used.
File origin parameters (Windows and macOS only)
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/
T1560 (Archive Collected Data)
attack.mitre.org/techniques/T1560/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Connection made to malicious Wi-Fi network

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a user connects to a malicious Wi-Fi network.

Malicious networks are determined by the network BSSID. The following Wi-Fi networks are considered to be malicious:

  • Pineapple Wi-Fi, with BSSID starting 00:13:37, 00:aa:ff.
  • Alfa Wireless, with BSSID starting 00:c0:ca.
  • Generic spoofed Wi-Fi with BSSID starting 00:1c:3f, 00:00:00, 00:11:22, 11:22:33, ff:ff:ff.
Tactic Technique Sub-technique
TA0001 (Initial Access)
attack.mitre.org/tactics/TA0001/
T1200 (Hardware Additions)
attack.mitre.org/techniques/T1200/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by Wi-Fi SSID Disabled
Cluster by Wi-Fi BSSID Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Dangerous file downloaded using Chrome

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when a user downloads an unsafe file, as identified by Chrome's Safe Browsing feature.

Parameter Type Description
Website parameters
SaaS apps SaaS app filter A list of SaaS apps on which dangerous downloads are authorized or unauthorized. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for websites on which dangerous downloads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login".
URL regex patterns Advanced asset list A list of URLs from which dangerous downloads are authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead.
File parameters
File names Advanced asset list A list of regular expressions matching file names that users are authorized or unauthorized to download. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0042 (Resource Development)
attack.mitre.org/tactics/TA0042/
T1588 (Obtain Capabilities)
attack.mitre.org/techniques/T1588/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by domain name Enabled
Cluster by filename Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

DSRM account password changed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user changes a Directory Service Restore Mode account password.

Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

ETW event detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when an Event Tracing for Windows (ETW) event with a specified provider GUID and event ID is logged.

Note

Certain events are only logged when enabled in Windows Group Policy settings or other third party software.

Parameter Type Description
Event parameters
ETW trace provider GUID String The GUID of the event source to monitor. For example, entering "{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}" would monitor events from Microsoft Windows Defender.
Event IDs Integer list A list of event IDs to monitor.

No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

ETW settings modified

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user executes a command to tamper with Event Tracing for Windows settings.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.006 (Indicator Blocking)
attack.mitre.org/techniques/T1562/006/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Executable run with invalid signature

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 5.2.3 or later

Detects when a user runs an executable file or binary that has an invalid signature.

Note

Subsequent detections and actions for the same binary will not be generated until at least 30 seconds after the first detection/action.

Parameter Type Description
Signature parameters
Prohibit unsigned binaries Boolean The toggle to prohibit unsigned binaries. If this is enabled and the name of the unsigned binary is not in the "Authorized binary names" list, a detection will be generated.
Prohibit unverified binaries Boolean The toggle to prohibit signed but unverified binaries. If this is enabled and the name of the unverified binary is not in the "Authorized binary names" list, a detection will be generated.
Certificate signers Advanced asset list A list of authorized or unauthorized certificate signers' Common Names (CN). If the certificate signer is unauthorized and the binary name is not in the "Authorized binary names" list, a detection will be generated. Case-insensitive matching is used.
Process parameters
Authorized binary names Advanced asset list A list of binary names (e.g. chrome.exe) authorized to run with an invalid signature. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1036.001 (Invalid Code Signature)
attack.mitre.org/techniques/T1036/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Incoming port scan performed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when an excessive number of unexpected TCP packets (defined by the transmission of a RST packet) arrive at a host within a given time window, indicating an incoming port scan attack.

Note

Subsequent detections and actions for the same local and remote address will not be generated until the configured time window has elapsed.

Parameter Type Description
Remote address parameters
IP addresses Advanced asset list A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to perform port scans on host.
Local port parameters
Local port number upper bound Integer The upper bound on local port numbers to consider when detecting incoming port scanning. For example, to consider ports 1-1024, you would enter 1024.
Maximum permitted local ports Integer The maximum number of local ports that can be connected to during the given time window.
Time window parameters
Time window (in seconds) Integer The number of seconds during which port usage is counted.
Packet parameters
Maximum permitted TCP Reset (RST) packets Integer The maximum number of RST packets that can be transmitted from local ports within the specified range during the given time window.
Maximum permitted dropped TCP packets Integer The maximum number of dropped packets that can be transmitted to local ports within the specified range during the given time window.
Tactic Technique Sub-technique
T1046 (Network Service Discovery)
attack.mitre.org/techniques/T1046/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by source IP Disabled
Cluster by destination IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Linux FortiDLP Agent tampered with

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Linux, Agent version 7.4.3 or later

Detects when a user tampers with the Linux FortiDLP Agent or FortiDLP Browser Extension.

Note

Subsequent detections and actions for the same FortiDLP component will not be generated until at least one week after the first detection/action.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. gedit) authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
Binary paths Advanced asset list A list of binary paths authorized or unauthorized to read or modify FortiDLP Agent data. The match can use glob-style pattern matching rules (e.g. /home/*/Downloads/** would match all applications under the Downloads folder or all users). Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of processes that are authorized or unauthorized to read or modify FortiDLP Agent data (e.g. .*compattelrunner\.exe -maintenance).
Tampering parameters
Tampering actions to monitor String list A list of tampering actions to monitor for both the FortiDLP Agent and FortiDLP Browser Extension.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

MacOS FortiDLP Agent tampered with

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: macOS, Agent version 7.7.4 or later

Detects when a user tampers with the MacOS FortiDLP Agent or FortiDLP Browser Extension.

Note

Subsequent detections and actions for the same FortiDLP component will not be generated until at least one week after the first detection/action.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. TextEdit.app) authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
Binary paths Advanced asset list A list of binary paths authorized or unauthorized to read or modify FortiDLP Agent data. The match can use glob-style pattern matching rules (e.g. /Users/*/Downloads/** would match all applications under the Downloads folder or all users). Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of processes that are authorized or unauthorized to read or modify FortiDLP Agent data (e.g. .*compattelrunner\.exe -maintenance).
Tampering parameters
Tampering actions to monitor String list A list of tampering actions to monitor for both the FortiDLP Agent and FortiDLP Browser Extension.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Malicious PowerShell script executed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when a user executes a malicious PowerShell script.

Note

To use this policy you must enable the Windows "PowerShell Script Block Logging" group policy, see https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.1#enabling-script-block-logging for details.

Malicious scripts are determined by the presence of commands frequently found in hacking tools such as Nishang and Mimikatz. The following PowerShell commands are considered to be malicious:

  • add-exfiltration found in Nishang, data exfiltration.
  • add-persistence found in Nishang, persistence.
  • add-scrnsavebackdoor found in Nishang, added screen saver debugger.
  • copy-vss found in Nishang, credential dumping.
  • create-multiplesessions found in Nishang, credential spraying.
  • create-remotethread found in process embedding, shellcode injection.
  • disable-securitysettings found in Powershell Empire, security settings changed.
  • dns_txt_pwnage found in Nishang, backdoor attack.
  • execute-ontime found in Nishang, execution at specific time.
  • find-trusteddocuments found in Powershell Empire, file reconnaissance.
  • get-browserinformation found in Powershell Empire, browser enumeration.
  • get-chromedump found in Powershell Empire, Google Chrome password enumeration.
  • get-foxdump found in Powershell Empire, Firefox password enumeration.
  • get-gpppassword found in Powershell Empire, credential dumping.
  • get-modifiableservice found in PowerUp, privilege escalation.
  • get-modifiableservicefile found in PowerUp, privilege escalation.
  • get-keystrokes found in Powershell Empire, keylogging.
  • get-lsasecret found in Nishang, Windows Local Security Authority (LSA) secret extraction.
  • get-passhashes found in Nishang, credential dumping.
  • get-passhints found in Nishang, credential dumping.
  • get-passpol found in Discovery, getting password policy.
  • get-screenshot found in Powershell Empire, screen capture.
  • get-serviceunquoted found in PowerUp, privilege escalation.
  • get-sitelistpassword found in Powershell Empire, credential dumping.
  • get-system found in Powershell Empire, privilege escalation.
  • get-usbkeystrokes found in Powershell Empire, keylogging.
  • get-vaultcredential found in Powershell Empire, Windows Vault credential dumping.
  • get-webcredentials found in Nishang, Windows Vault credential dumping.
  • get-wlan-keys found in Nishang, wireless credential dumping.
  • gupt-backdoor found in Nishang, backdoor attack.
  • http-backdoor found in Nishang, backdoor attack.
  • invoke-adsbackdoor found in Nishang, alternate data stream persistence.
  • invoke-allchecks found in PowerUp, privilege escalation.
  • invoke-amsibypass found in Nishang, Windows Anti-Malware Scan Interface (AMSI) bypass.
  • invoke-bloodhound found in Bloodhound, network reconnaissance.
  • invoke-bypassuac found in Powershell Empire, privilege escalation.
  • invoke-bypassuactokenmanipulation found in Powershell Empire, privilege escalation.
  • invoke-credentialinjection found in Powershell Empire, credential injection.
  • invoke-credentialsphish found in Nishang, credential phishing.
  • invoke-dcom found in Powershell Empire, lateral movement.
  • invoke-dcsync found in Powershell Empire, credential dumping.
  • invoke-dllinjection found in Powershell Empire, Windows Dynamic Link Library (DLL) injection.
  • invoke-egresscheck found in Powershell Empire, firewall testing.
  • invoke-enumeratelocaladmin found in PowerView, user reconnaissance.
  • invoke-envbypass found in Powershell Empire, Windows User Account Control (UAC) bypass.
  • invoke-eventvwrbypass found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-executemsbuild found in Powershell Empire, lateral movement.
  • invoke-exfildatatogithub found in Powershell Empire, data exfiltration.
  • invoke-filefinder found in PowerView, file reconnaissance.
  • invoke-fodhelperbypass found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-inveigh found in Powershell Empire, man-in-the-middle (MITM) attack.
  • invoke-inveighrelay found in Powershell Empire, lateral movement.
  • invoke-kerberoast found in Powerview, credential dumping.
  • invoke-mimikatz found in Mimikatz, credential dumping.
  • invoke-mimikatzwdigestdowngrade found in Mimikatz, credential dumping.
  • invoke-mimikittenz found in Mimikittenz, credential dumping.
  • invoke-ms16032 found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-ms16135 found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-netripper found in Powershell Empire, network traffic interceptor.
  • invoke-networkrelay found in Nishang, port forwarding.
  • invoke-ninjacopy found in Powershell Empire, data exfiltration.
  • invoke-postexfil found in Powershell Empire, data exfiltration.
  • invoke-powerdump found in Powershell Empire, credential dumping.
  • invoke-powershellwmi found in Nishang, Windows Management Instrumentation (WMI) shell.
  • invoke-psexec found in Powershell Empire, lateral movement.
  • invoke-psinject found in Powershell Empire, Windows Dynamic Link Library (DLL) injection.
  • invoke-psuacme found in Nishang, User Account Control (UAC) bypass.
  • invoke-reflectivepeinjection found in process reflective loading, PowerSploit embedding.
  • invoke-runas found in Powershell Empire, run as clone without Microsoft Group Policy Object (GPO) path restrictions.
  • invoke-sdcltbypass found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-sessiongopher found in SessionGopher, application credential dumping.
  • invoke-sharefinder found in PowerView, share reconnaissance.
  • invoke-shellcode found in Powershell Empire, shellcode injection.
  • invoke-shellcodemsil found in Powershell Empire, shellcode injection.
  • invoke-smbexec found in Powershell Empire, lateral movement.
  • invoke-sqloscmd found in Powershell Empire, lateral movement.
  • invoke-sshcommand found in Powershell Empire, lateral movement.
  • invoke-ssidexfil found in Nishang, credential dumping.
  • invoke-tater found in Powershell Empire, privilege escalation.
  • invoke-tokenmanipulation found in Powershell Empire, user impersonation.
  • invoke-vnc found in Powershell Empire, Virtual Network Computing (VNC) sideloading.
  • invoke-wscriptbypassuac found in Powershell Empire, User Account Control (UAC) bypass.
  • keylogger found in Nishang, keylogging.
  • out-minidump found in Powershell Empire, memory minidump.
  • run-exeonremote found in Nishang, executable dropper.
  • set-dcshadowpermissions found in Nishang, privilege escalation.
  • set-powerstego found in exfiltration steganography.
  • set-remotepsremoting found in Nishang, PSRemoting backdoor attack.
  • set-remotewmi found in Nishang, Windows Management Instrumentation (WMI) backdoor attack.
  • show-targetscreen found in Nishang, screen capture.
  • start-tcpmonitor found in Powershell Empire, network traffic monitoring.
  • unblock-file found in unblocking internet downloaded files.
Parameter Type Description
File parameters
Script paths Advanced asset list A list of script file paths that are authorized or unauthorized to run all Powershell commands. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would ignore all files in the Shared folder under users' home directories). Case-insensitive matching is used.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run any Powershell command. Case-insensitive matching is used.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
T1059 (Command and Scripting Interpreter)
attack.mitre.org/techniques/T1059/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by filename Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Malicious USB device inserted

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a user inserts a malicious USB device.

Malicious devices are determined by the USB device serial number, VID, and PID. The following devices are considered to be malicious:

  • Bash Bunny, with serial number 12345678 or VID:PID f000:fff0, f000:ff01, f000:ff02, f000:ff03, f000:ff04, f000:ff05, f000:ff06, f000:ff07, f000:ff08, f000:ff09, f000:ff10, f000:ff11, f000:ff12, f000:ff13, f000:ff14, f000:ff20, f000:ff21, f000:1234, 05ac:021e.
  • LAN Turtle, with VID:PID 0bda:8152.
  • Rubber Ducky, with VID:PID 0bda:8152.
  • Teensy device, with VID:PID 16c0:047c, 16c0:047d, 16c0:047e, 16c0:047f, 16c0:0480, 16c0:0481, 16c0:0482, 16c0:0486, 16c0:0487.
Tactic Technique Sub-technique
TA0001 (Initial Access)
attack.mitre.org/tactics/TA0001/
T1091 (Replication Through Removable Media)
attack.mitre.org/techniques/T1091/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by USB identifier Enabled
Cluster by USB serial number Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Multiple user account modifications

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a single user account makes multiple account modifications in a configurable time window

Parameter Type Description
Event type parameters
Monitor event types String list A list of user account event types to monitor.
Monitor only new accounts Boolean The toggle to enable/disable monitoring only those events created by recently created accounts.
New accounts time window (in minutes) Integer The number of minutes after creation for which an account is considered new.
Responsible user parameters
Ignore modifications to own account Boolean The toggle to enable/disable monitoring events where the modifying account is also the target account.
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Time window parameters
Modification count threshold Integer The maximum number of user account modification events authorized during the given time window.
Time window (in minutes) Integer The number of minutes during which user account modifications are counted.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

New application installed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a new application is installed.

Parameter Type Description
Application parameters
Application names Advanced asset list A list of application names (e.g. Office) that are authorized or unauthorized to be installed. Case-insensitive matching is used. Full regular expression (regex) grammar is supported.
Publishers Advanced asset list A list of application publishers (e.g. Microsoft Corporation), from which all application are authorized or unauthorized to be installed. Case-insensitive matching is used. Full regular expression (regex) grammar is supported.
Registry key parameters
Registry key subscriptions String list A list of monitored registry keys related to installing applications.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

New application run

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Agent version 6.0.3 or later

Detects when an application is run for the first time.

Parameter Type Description
Process parameters
Authorized binary names Advanced asset list A list of binary names (e.g. chrome.exe) that are allowed to run. Case-insensitive matching is used. Populate this list with the names of new applications that can be run after the training period concludes without generating a detection.
Machine learning parameters
Training period (days) Integer The time period (in days) during which a list of applications typically run on a node are learned. No detections will be generated during this period. The FortiDLP Agent will continue to learn from application activity after this period.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

New DNS server used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Agent version 7.7.1 or later

Detects when a node uses a new DNS server.

Parameter Type Description
DNS server parameters
IP addresses Advanced asset list A list of DNS server IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) that the node is authorized to query.
Machine learning parameters
Training period (days) Integer The time period (in days) during which the list of DNS servers typically used by a node are learned. No detections will be generated during this period. The FortiDLP Agent will continue to learn from DNS activity after this period.
Ignore agents that frequently change DNS server Boolean The toggle to enable/disable reporting nodes that frequently use new DNS servers. If enabled, detections will not be generated during periods of transient DNS server use.
Tactic Technique Sub-technique
TA0011 (Command and Control)
attack.mitre.org/tactics/TA0011/
T1071 (Application Layer Protocol)
attack.mitre.org/techniques/T1071/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by destination IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Outgoing port scan performed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when an excessive number of remote ports are connected to within a given time window, indicating an outgoing port scan attack.

Note

Subsequent detections and actions for the same local and remote address will not be generated until until the configured time window has elapsed.

Parameter Type Description
Remote address parameters
IP addresses Advanced asset list A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to have port scans performed.
Remote port parameters
Remote port number upper bound Integer The upper bound on remote port numbers to consider when detecting outgoing port scanning. For example, to consider ports 1-1024, you would enter 1024.
Maximum permitted remote ports Integer The maximum number of remote ports that can be connected to during the given time window.
Time window parameters
Time window (in seconds) Integer The number of seconds during which port usage is counted.
Tactic Technique Sub-technique
T1046 (Network Service Discovery)
attack.mitre.org/techniques/T1046/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by destination IP Disabled
Cluster by source IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential AD reconnaissance attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when reconnaissance is performed against a privileged user or group in Active Directory (AD).

Tactic Technique Sub-technique
T1087 (Account Discovery)
attack.mitre.org/techniques/T1087/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential Pass-the-Hash attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects a login that is symptomatic of a Pass-the-Hash (PtH) attack.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1550 (Use Alternate Authentication Material)
attack.mitre.org/techniques/T1550/
T1550.002 (Pass the Hash)
attack.mitre.org/techniques/T1550/002/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential privilege escalation attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user runs an application with administrator privileges.

Note

To use this policy, you must enable the Windows "Audit Process Creation" group policy and select the "Success" option.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. consent.exe) for which privilege escalation is authorized or unauthorized. Case-insensitive matching is used.
Parent binary names Advanced asset list A list of parent process binary names (e.g. consent.exe) for which child processes are authorized or unauthorized for privilege escalation. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1078 (Valid Accounts)
attack.mitre.org/techniques/T1078/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential Sticky Key backdoor attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a user changes the Windows Sticky Keys registry.

Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1546 (Event Triggered Execution)
attack.mitre.org/techniques/T1546/
T1546.008 (Accessibility Features)
attack.mitre.org/techniques/T1546/008/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential WCE Pass-the-Hash attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects a login using Windows Credential Editor that is symptomatic of a Pass-the-Hash (PtH) attack.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1550 (Use Alternate Authentication Material)
attack.mitre.org/techniques/T1550/
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1550 (Use Alternate Authentication Material)
attack.mitre.org/techniques/T1550/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential Windows RDP BlueKeep attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects indicators of a Windows Remote Desktop Protocol BlueKeep attack (CVE-2019-0708).

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1210 (Exploitation of Remote Services)
attack.mitre.org/techniques/T1210/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

PowerShell script block logging disabled

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a user disables PowerShell script block logging.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.003 (Impair Command History Logging)
attack.mitre.org/techniques/T1562/003/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Process run with unauthorized called path

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a process is run with an unauthorized called path.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. cmd.exe) users are authorized or unauthorized to run. Case-insensitive matching is used. If this is left empty, no detections will be generated and all processes will be allowed.
Called paths Advanced asset list A list of regular expressions matching binary called paths (e.g. rm -rf .*) that are authorized or unauthorized to run. If this is left empty, no detections will be generated and all processes will be allowed.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run unauthorized processes. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to run unauthorized processes. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run unauthorized processes. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by called path Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Kill process

Profiles tool used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: macOS, Agent version 7.2.0 or later

Detects when the /usr/bin/profiles command is used to install, remove, or otherwise handle configuration profiles.

Parameter Type Description
Process parameters
Called paths Advanced asset list A list of regular expressions matching authorized or unauthorized usage of the profiles tool if they match the called path. For example, to prohibit the "/usr/bin/profiles install -path /example.mobileconfig" command, enter "install" (without the double quotes) and selected the "Prohibit listed called paths" behavior. The match is case-sensitive. Note: An empty list matches all uses of the profiles tool.
Parent process parameters
Binary names Advanced asset list A list of binary names that are authorized or unauthorized to run the profiles tool (e.g. jamf-pro.exe). Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1546 (Event Triggered Execution)
attack.mitre.org/techniques/T1546/
T1546.004 (Unix Shell Configuration Modification)
attack.mitre.org/techniques/T1546/004/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1546 (Event Triggered Execution)
attack.mitre.org/techniques/T1546/
T1546.004 (Unix Shell Configuration Modification)
attack.mitre.org/techniques/T1546/004/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by called path Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

RDP connection made over reverse SSH tunnel

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a Remote Desktop Protocol connection is made over a reverse SSH tunnel.

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/
T1021.001 (Remote Desktop Protocol)
attack.mitre.org/techniques/T1021/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by destination IP Enabled
Cluster by source IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

RDP login made from localhost

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects a localhost tunneled Remote Desktop Protocol login.

Parameter Type Description
Responsible user parameters
Responsible usernames Advanced asset list A list of usernames authorized or unauthorized to use Windows Remote Desktop. Case-insensitive matching is used.
Responsible username patterns Advanced asset list A list of patterns for matching usernames authorized or unauthorized to use Windows Remote Desktop. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Target user parameters
Target usernames Advanced asset list A list of usernames authorized or unauthorized be the target of Windows Remote Desktop. Case-insensitive matching is used.
Target username patterns Advanced asset list A list of patterns for matching usernames authorized or unauthorized to be the target of Windows Remote Desktop. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Registry startup items added

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a process adds a registry startup item.

Parameter Type Description
Startup item parameters
Startup items Advanced asset list A list of startup items that are authorized or unauthorized to be installed. Case-insensitive matching is used. Full regular expression (regex) grammar is supported.
Responsible process parameters
Binary names Advanced asset list A list of binary names (e.g. MsMpEng.exe) authorized or unauthorized to add startup items. Case-insensitive matching is used.
Registry key parameters
Registry key subscriptions Advanced asset list A list of registry keys to monitor related to startup item changes.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1547 (Boot or Logon Autostart Execution)
attack.mitre.org/techniques/T1547/
T1547.001 (Registry Run Keys / Startup Folder)
attack.mitre.org/techniques/T1547/001/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1547 (Boot or Logon Autostart Execution)
attack.mitre.org/techniques/T1547/
T1547.001 (Registry Run Keys / Startup Folder)
attack.mitre.org/techniques/T1547/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by called path Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Registry value changed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a process modifies a registry value.

Parameter Type Description
Registry key parameters
Registry key value subscriptions Advanced asset list A list of registry key values to monitor. To monitor all values at a given key use "*", for example, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\* would monitor all values in the Run subkey, and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Example would monitor only the Example value.
Registry value data Advanced asset list A list of value data, in <value name>=<value data> format, that is authorized or unauthorized to be configured. For example DisplayName=Example would match the registry value with name DisplayName and data Example. To match all value names use "*", for example *=Example would match any registry value with data Example.
Registry action parameters
Monitor creation Boolean The toggle to enable/disable detection of registry value creation.
Monitor modification Boolean The toggle to enable/disable detection of registry value changes.
Monitor deletion Boolean The toggle to enable/disable detection of registry value deletion.
Responsible process parameters
Binary names Advanced asset list A list of binary names (e.g. MsMpEng.exe) authorized or unauthorized to modify registry values. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1112 (Modify Registry)
attack.mitre.org/techniques/T1112/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Remote Desktop connection received

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a node receives a Windows Remote Desktop connection.

Parameter Type Description
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to use Windows Remote Desktop. Case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to use Windows Remote Desktop. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Connection parameters
IP addresses Advanced asset list A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to use Windows Remote Desktop on host.
Detection parameters
Rate limit (minutes) Integer The minimum time (in minutes) between consecutive detections for Remote Desktop sessions from the same source and user. Set to 0 to disable.
Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by source IP Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Remote Desktop session enabled

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a user enables a Windows Remote Desktop service.

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Root certificate installed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.5 or later

Detects when a user adds a root certificate to the system.

Note

Subsequent detections and actions for the same signature will not be generated until at least 30 seconds after the first detection/action.

Parameter Type Description
Certificate parameters
Certificate signatures Advanced asset list A list of certificate signatures that are authorized or unauthorized to be added to the system. Case-insensitive matching is used.
Certificate subjects Advanced asset list A list of certificate subjects that are authorized or unauthorized to be added to the system. Full regular expression (regex) grammar is supported.
Registry key parameters
Registry key subscriptions String list A list of monitored registry keys related to installing root certificates.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1553 (Subvert Trust Controls)
attack.mitre.org/techniques/T1553/
T1553.004 (Install Root Certificate)
attack.mitre.org/techniques/T1553/004/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by certificate name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Root certificate security settings changed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a user changes root certificate security settings.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1553 (Subvert Trust Controls)
attack.mitre.org/techniques/T1553/
T1553.004 (Install Root Certificate)
attack.mitre.org/techniques/T1553/004/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Ruler hacking tool used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user uses the Ruler hacking tool.

Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1137 (Office Application Startup)
attack.mitre.org/techniques/T1137/
T1087 (Account Discovery)
attack.mitre.org/techniques/T1087/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Suspicious Windows commands executed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user executes multiple suspicious commands within a given time period.

Note

Subsequent detections and actions for the same user will not be generated until at least one hour after the first detection.

Parameter Type Description
Execution count parameters
Time window (in minutes) Integer The number of minutes during which the maximum suspicious command execution count is applied.
Maximum permitted suspicious command executions Integer The maximum number of suspicious command executions allowed during the given time period.
Process parameters
Suspicious binary names Advanced asset list A list of suspicious binary names. Case-insensitive matching is used.
Suspicious binary SHA-256 hashes Advanced asset list A list of suspicious binary SHA-256 hashes. Case-insensitive matching is used.
Suspicious application IDs Advanced asset list A list of suspicious binary application identifiers. Case-insensitive matching is used.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run unauthorized suspicious commands. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to run suspicious commands. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run suspicious commands. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Parent process parameters
Binary names Advanced asset list A list of binary names that are authorized or unauthorized to run suspicious commands (e.g. chrome.exe). Case-insensitive matching is used.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

System time modified

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user modifies the system time.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. chrome.exe) authorized or unauthorized to modify system time. Case-insensitive matching is used.
Binary paths Advanced asset list A list of file path expressions matching binaries authorized or unauthorized to modify system time. The match can use glob-style pattern matching rules (e.g. C:\Windows\** would match all files in the Windows folder). Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1070 (Indicator Removal)
attack.mitre.org/techniques/T1070/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Unauthorized application used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when an unauthorized application is run. A detection will be generated if an unauthorized child process is run by an unauthorized parent process, unless the "Allow admin to run application" toggle is enabled and it is run with admin privileges.

Parameter Type Description
Application parameters
Binary names Advanced asset list A list of binary names (e.g. chrome.exe) users are authorized or unauthorized to run. Case-insensitive matching is used.
Application IDs Advanced asset list A list of process metadata application identifiers (e.g. v1.com.google.Chrome) users are authorized or unauthorized to run. Case-insensitive matching is used.
Applications rule String The rule to apply for monitoring application usage. For example, choosing "Allow listed applications" would allow users to run all applications except those specified in the "Applications" list. Choosing "Prohibit listed applications" would only prohibit applications specified in the "Applications" list parameter.
Applications Asset list A list of predefined applications to which the "Applications rule" is applied.
User parameters
Ignore administrator accounts Boolean A toggle to enabled/disable reporting local or system administrator accounts. If enabled, a detection will not be generated if a local or system administrator account runs an unauthorized application. Note: This toggle only checks for admin privileges on Windows platforms.
Usernames Advanced asset list A list of usernames authorized or unauthorized to run unauthorized applications. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to run unauthorized applications. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run unauthorized applications. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Parent process parameters
Binary names Advanced asset list A list of parent process binary names (e.g. explorer.exe) authorized or unauthorized to run unauthorized applications. Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of parent processes that are authorized or unauthorized to run unauthorized applications (e.g. .*compattelrunner\.exe -maintenance).
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Kill process

Unauthorized PowerShell command executed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when an unauthorized PowerShell command is executed.

Note

Subsequent detections and actions for repeated executions of the same command will not be generated until at least 30 seconds after the first detection/action.

Note

To use this policy you must enable the Windows "PowerShell Script Block Logging" group policy, see https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.1#enabling-script-block-logging for details.

Parameter Type Description
Command parameters
Unauthorized command patterns Advanced asset list A list of command patterns that users are unauthorized to run in Powershell. Full regular expression (regex) grammar is supported. For example, entering "Read-S3Object (.* )?-BucketName Confidential( .*)?" would match Read-S3Object commands that read from an S3 bucket named Confidential.
File parameters
Script paths Advanced asset list A list of script file paths that are authorized or unauthorized to run all Powershell commands. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would ignore all files in the Shared folder under users' home directories). Case-insensitive matching is used.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run any Powershell command. Case-insensitive matching is used.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
T1059 (Command and Scripting Interpreter)
attack.mitre.org/techniques/T1059/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User account created and deleted in the same session

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a user account creates and deletes another account during the same session.

Parameter Type Description
Responsible user parameters
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Session parameters
Session duration (in minutes) Integer The maximum number of minutes between account creation and deletion events for them to be considered to have happened in the same session. Note: If set to 0 then the session length will not be determined by a fixed duration, instead the start and end of a session will be determined by user login and logout events.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1136 (Create Account)
attack.mitre.org/techniques/T1136/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User account modified

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a user account is modified.

Parameter Type Description
Event type parameters
Monitor event types String list A list of user account event types to monitor.
Monitor only new accounts Boolean The toggle to enable/disable monitoring only those events created by recently created accounts.
New accounts time window (in minutes) Integer The number of minutes after creation for which an account is considered new.
Monitor only first account modification Boolean The toggle to enable/disable monitoring only those accounts that have not previously modified any accounts.
First account modification training period (in days) Integer The time period (in days) during which no first account modification detections will be generated.
Inactivity limit (in days) Integer The maximum time between consecutive account modifications before an account is treated like it has never made any previous account modifications. Once this time has elapsed, any further account modifications will result in a detection. If set to 0 then this behavior is ignored and only the first account modification will result in a detection.
Responsible user parameters
Ignore modifications to own account Boolean The toggle to enable/disable monitoring events where the modifying account is also the target account.
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User account modified outside office hours

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a user account is modified outside of expected working hours.

Parameter Type Description
Event type parameters
Monitor event types String list A list of user account event types to monitor.
Monitor only new accounts Boolean The toggle to enable/disable monitoring only those events created by recently created accounts.
New accounts time window (in minutes) Integer The number of minutes after creation for which an account is considered new.
Responsible user parameters
Ignore modifications to own account Boolean The toggle to enable/disable monitoring events where the modifying account is also the target account.
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Expected hours parameters
List of days off String list A list of non-working days. This list can be empty, which would indicate that every day of the week is a working day.
Start time String The start time of the work day in 24-hour format (HH:MM). Times are in the FortiDLP Agent's local timezone.
End time String The end time of the work day in 24-hour format (HH:MM). Times are in the FortiDLP Agent's local timezone.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User added to local security-enabled group

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user is added to a local security-enabled group, which could indicate privilege abuse.

Parameter Type Description
Group parameters
Groups Advanced asset list A list of groups in Domain\Groupname format to which users are authorized or unauthorized to be added. Case-insensitive matching is used.
Group patterns Advanced asset list A list of patterns for matching groups in Domain\Groupname format to which users are authorized or unauthorized to be added. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Responsible user parameters
Usernames Advanced asset list A list of usernames in Domain\Username format authorized or unauthorized to make changes to a group. Case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames in Domain\Username format that are authorized or unauthorized to make changes to a group. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1548 (Abuse Elevation Control Mechanism)
attack.mitre.org/techniques/T1548/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows audit policy removed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user removes a Windows audit policy.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.002 (Disable Windows Event Logging)
attack.mitre.org/techniques/T1562/002/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows FortiDLP Agent tampered with

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.6.2 or later

Detects when a user tampers with the Windows FortiDLP Agent or FortiDLP Browser Extension.

Note

Subsequent detections and actions for the same FortiDLP component will not be generated until at least one week after the first detection/action.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. notepad.exe) authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
Binary paths Advanced asset list A list of binary paths authorized or unauthorized to read or modify FortiDLP Agent data. The match can use glob-style pattern matching rules (e.g. C:\Program Files (x86)\Google\** would match all applications under the Google folder). Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of processes that are authorized or unauthorized to read or modify FortiDLP Agent data (e.g. .*compattelrunner\.exe -maintenance).
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to read or modify FortiDLP Agent data. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to read or modify FortiDLP Agent data. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tampering parameters
Tampering activity to monitor String list A list of tampering activities to monitor for both the FortiDLP Agent and FortiDLP Browser Extension. Note: The "Service tampering" option enables monitoring of the Agent service being stopped and requires Agent anti-tampering to be enabled. For instructions, refer to the FortiDLP Administration Guide. Additionally, service tampering detection via PowerShell commands requires the "PowerShell Script Block Logging" group policy to be enabled. For instructions, go to https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.1#enabling-script-block-logging.
File and registry tampering operations to monitor String list A list of tampering operations to monitor for both the FortiDLP Agent and FortiDLP Browser Extension, applicable to files and registry data. Note: If Agent anti-tampering is enabled, delete operations will be reported as write operations in detections. For this reason, if you want to monitor "Delete" operations, ensure the "Write" value is also selected.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows PSRemoting enabled

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a user enables PSRemoting.

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows PSRemoting used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a user uses PSRemoting.

Parameter Type Description
User parameters
Usernames Advanced asset list A list of usernames (in Domain\Username format) authorized or unauthorized to use PSRemoting. Case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames in Domain\Username format that are authorized or unauthorized to use PSRemoting. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
IP parameters
IP addresses Advanced asset list The IPv4 or IPv6 address in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to use PSRemoting on the node.
Tactic Technique Sub-technique
T1059 (Command and Scripting Interpreter)
attack.mitre.org/techniques/T1059/
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/
T1021.006 (Windows Remote Management)
attack.mitre.org/techniques/T1021/006/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by source IP Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows security event logs cleared

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user clears Windows security event logs.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1070 (Indicator Removal)
attack.mitre.org/techniques/T1070/
T1070.001 (Clear Windows Event Logs)
attack.mitre.org/techniques/T1070/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Enabled
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows unauthorized service added

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.2 or later

Detects when a user adds a well-known malicious Windows service.

Malicious services are determined by observing Windows event tracing audit logs. The following Windows services are considered to be malicious:

  • WCE SERVICE
  • WCESERVICE
  • DumpSvc.
Parameter Type Description
Service parameters
Service names Advanced asset list A list of keywords appearing in authorized or unauthorized services.
Tactic Technique Sub-technique
TA0006 (Credential Access)
attack.mitre.org/tactics/TA0006/
T1003 (OS Credential Dumping)
attack.mitre.org/techniques/T1003/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by filename Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

External threat templates

External threat templates

Templates for building policies to protect against hostile external threats.

Chrome password store accessed by unauthorized process

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when an unauthorized process opens or modifies a user's Chrome saved password file.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. chrome.exe) authorized or unauthorized to read Chrome password files. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0006 (Credential Access)
attack.mitre.org/tactics/TA0006/
T1555 (Credentials from Password Stores)
attack.mitre.org/techniques/T1555/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Compressed file created

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Agent version 7.8.0 or later

Detects when a user compresses an unauthorized file using Explorer (Windows), Finder (macOS), or the zip command (Linux).

Note

Use the "File parameters" and "File origin parameters" to configure which files are authorized or unauthorized to be compressed. If the "File parameters" and "File origin parameters" are left empty, detections will be generated when any file is compressed.

Note

This policy only monitors the creation of ZIP files.

Parameter Type Description
File parameters
File paths Advanced asset list A list of file path expressions that users are authorized or unauthorized to compress. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would match all files in the Shared folder under users' home directories and **\*.pdf would match all PDF files). Case-insensitive matching is used.
File types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 9.1.0+.
File extensions Advanced asset list A list of file extensions (e.g. .doc, .docx, .pdf) that users are authorized or unauthorized to compress. The dot can be omitted, and case-insensitive matching is used.
File origin parameters (Windows and macOS only)
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/
T1560 (Archive Collected Data)
attack.mitre.org/techniques/T1560/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Connection made to malicious Wi-Fi network

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a user connects to a malicious Wi-Fi network.

Malicious networks are determined by the network BSSID. The following Wi-Fi networks are considered to be malicious:

  • Pineapple Wi-Fi, with BSSID starting 00:13:37, 00:aa:ff.
  • Alfa Wireless, with BSSID starting 00:c0:ca.
  • Generic spoofed Wi-Fi with BSSID starting 00:1c:3f, 00:00:00, 00:11:22, 11:22:33, ff:ff:ff.
Tactic Technique Sub-technique
TA0001 (Initial Access)
attack.mitre.org/tactics/TA0001/
T1200 (Hardware Additions)
attack.mitre.org/techniques/T1200/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by Wi-Fi SSID Disabled
Cluster by Wi-Fi BSSID Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Dangerous file downloaded using Chrome

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when a user downloads an unsafe file, as identified by Chrome's Safe Browsing feature.

Parameter Type Description
Website parameters
SaaS apps SaaS app filter A list of SaaS apps on which dangerous downloads are authorized or unauthorized. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for websites on which dangerous downloads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login".
URL regex patterns Advanced asset list A list of URLs from which dangerous downloads are authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead.
File parameters
File names Advanced asset list A list of regular expressions matching file names that users are authorized or unauthorized to download. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0042 (Resource Development)
attack.mitre.org/tactics/TA0042/
T1588 (Obtain Capabilities)
attack.mitre.org/techniques/T1588/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by domain name Enabled
Cluster by filename Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

DSRM account password changed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user changes a Directory Service Restore Mode account password.

Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

ETW event detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when an Event Tracing for Windows (ETW) event with a specified provider GUID and event ID is logged.

Note

Certain events are only logged when enabled in Windows Group Policy settings or other third party software.

Parameter Type Description
Event parameters
ETW trace provider GUID String The GUID of the event source to monitor. For example, entering "{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}" would monitor events from Microsoft Windows Defender.
Event IDs Integer list A list of event IDs to monitor.

No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

ETW settings modified

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user executes a command to tamper with Event Tracing for Windows settings.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.006 (Indicator Blocking)
attack.mitre.org/techniques/T1562/006/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Executable run with invalid signature

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 5.2.3 or later

Detects when a user runs an executable file or binary that has an invalid signature.

Note

Subsequent detections and actions for the same binary will not be generated until at least 30 seconds after the first detection/action.

Parameter Type Description
Signature parameters
Prohibit unsigned binaries Boolean The toggle to prohibit unsigned binaries. If this is enabled and the name of the unsigned binary is not in the "Authorized binary names" list, a detection will be generated.
Prohibit unverified binaries Boolean The toggle to prohibit signed but unverified binaries. If this is enabled and the name of the unverified binary is not in the "Authorized binary names" list, a detection will be generated.
Certificate signers Advanced asset list A list of authorized or unauthorized certificate signers' Common Names (CN). If the certificate signer is unauthorized and the binary name is not in the "Authorized binary names" list, a detection will be generated. Case-insensitive matching is used.
Process parameters
Authorized binary names Advanced asset list A list of binary names (e.g. chrome.exe) authorized to run with an invalid signature. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1036.001 (Invalid Code Signature)
attack.mitre.org/techniques/T1036/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Incoming port scan performed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when an excessive number of unexpected TCP packets (defined by the transmission of a RST packet) arrive at a host within a given time window, indicating an incoming port scan attack.

Note

Subsequent detections and actions for the same local and remote address will not be generated until the configured time window has elapsed.

Parameter Type Description
Remote address parameters
IP addresses Advanced asset list A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to perform port scans on host.
Local port parameters
Local port number upper bound Integer The upper bound on local port numbers to consider when detecting incoming port scanning. For example, to consider ports 1-1024, you would enter 1024.
Maximum permitted local ports Integer The maximum number of local ports that can be connected to during the given time window.
Time window parameters
Time window (in seconds) Integer The number of seconds during which port usage is counted.
Packet parameters
Maximum permitted TCP Reset (RST) packets Integer The maximum number of RST packets that can be transmitted from local ports within the specified range during the given time window.
Maximum permitted dropped TCP packets Integer The maximum number of dropped packets that can be transmitted to local ports within the specified range during the given time window.
Tactic Technique Sub-technique
T1046 (Network Service Discovery)
attack.mitre.org/techniques/T1046/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by source IP Disabled
Cluster by destination IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Linux FortiDLP Agent tampered with

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Linux, Agent version 7.4.3 or later

Detects when a user tampers with the Linux FortiDLP Agent or FortiDLP Browser Extension.

Note

Subsequent detections and actions for the same FortiDLP component will not be generated until at least one week after the first detection/action.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. gedit) authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
Binary paths Advanced asset list A list of binary paths authorized or unauthorized to read or modify FortiDLP Agent data. The match can use glob-style pattern matching rules (e.g. /home/*/Downloads/** would match all applications under the Downloads folder or all users). Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of processes that are authorized or unauthorized to read or modify FortiDLP Agent data (e.g. .*compattelrunner\.exe -maintenance).
Tampering parameters
Tampering actions to monitor String list A list of tampering actions to monitor for both the FortiDLP Agent and FortiDLP Browser Extension.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

MacOS FortiDLP Agent tampered with

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: macOS, Agent version 7.7.4 or later

Detects when a user tampers with the MacOS FortiDLP Agent or FortiDLP Browser Extension.

Note

Subsequent detections and actions for the same FortiDLP component will not be generated until at least one week after the first detection/action.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. TextEdit.app) authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
Binary paths Advanced asset list A list of binary paths authorized or unauthorized to read or modify FortiDLP Agent data. The match can use glob-style pattern matching rules (e.g. /Users/*/Downloads/** would match all applications under the Downloads folder or all users). Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of processes that are authorized or unauthorized to read or modify FortiDLP Agent data (e.g. .*compattelrunner\.exe -maintenance).
Tampering parameters
Tampering actions to monitor String list A list of tampering actions to monitor for both the FortiDLP Agent and FortiDLP Browser Extension.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Malicious PowerShell script executed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when a user executes a malicious PowerShell script.

Note

To use this policy you must enable the Windows "PowerShell Script Block Logging" group policy, see https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.1#enabling-script-block-logging for details.

Malicious scripts are determined by the presence of commands frequently found in hacking tools such as Nishang and Mimikatz. The following PowerShell commands are considered to be malicious:

  • add-exfiltration found in Nishang, data exfiltration.
  • add-persistence found in Nishang, persistence.
  • add-scrnsavebackdoor found in Nishang, added screen saver debugger.
  • copy-vss found in Nishang, credential dumping.
  • create-multiplesessions found in Nishang, credential spraying.
  • create-remotethread found in process embedding, shellcode injection.
  • disable-securitysettings found in Powershell Empire, security settings changed.
  • dns_txt_pwnage found in Nishang, backdoor attack.
  • execute-ontime found in Nishang, execution at specific time.
  • find-trusteddocuments found in Powershell Empire, file reconnaissance.
  • get-browserinformation found in Powershell Empire, browser enumeration.
  • get-chromedump found in Powershell Empire, Google Chrome password enumeration.
  • get-foxdump found in Powershell Empire, Firefox password enumeration.
  • get-gpppassword found in Powershell Empire, credential dumping.
  • get-modifiableservice found in PowerUp, privilege escalation.
  • get-modifiableservicefile found in PowerUp, privilege escalation.
  • get-keystrokes found in Powershell Empire, keylogging.
  • get-lsasecret found in Nishang, Windows Local Security Authority (LSA) secret extraction.
  • get-passhashes found in Nishang, credential dumping.
  • get-passhints found in Nishang, credential dumping.
  • get-passpol found in Discovery, getting password policy.
  • get-screenshot found in Powershell Empire, screen capture.
  • get-serviceunquoted found in PowerUp, privilege escalation.
  • get-sitelistpassword found in Powershell Empire, credential dumping.
  • get-system found in Powershell Empire, privilege escalation.
  • get-usbkeystrokes found in Powershell Empire, keylogging.
  • get-vaultcredential found in Powershell Empire, Windows Vault credential dumping.
  • get-webcredentials found in Nishang, Windows Vault credential dumping.
  • get-wlan-keys found in Nishang, wireless credential dumping.
  • gupt-backdoor found in Nishang, backdoor attack.
  • http-backdoor found in Nishang, backdoor attack.
  • invoke-adsbackdoor found in Nishang, alternate data stream persistence.
  • invoke-allchecks found in PowerUp, privilege escalation.
  • invoke-amsibypass found in Nishang, Windows Anti-Malware Scan Interface (AMSI) bypass.
  • invoke-bloodhound found in Bloodhound, network reconnaissance.
  • invoke-bypassuac found in Powershell Empire, privilege escalation.
  • invoke-bypassuactokenmanipulation found in Powershell Empire, privilege escalation.
  • invoke-credentialinjection found in Powershell Empire, credential injection.
  • invoke-credentialsphish found in Nishang, credential phishing.
  • invoke-dcom found in Powershell Empire, lateral movement.
  • invoke-dcsync found in Powershell Empire, credential dumping.
  • invoke-dllinjection found in Powershell Empire, Windows Dynamic Link Library (DLL) injection.
  • invoke-egresscheck found in Powershell Empire, firewall testing.
  • invoke-enumeratelocaladmin found in PowerView, user reconnaissance.
  • invoke-envbypass found in Powershell Empire, Windows User Account Control (UAC) bypass.
  • invoke-eventvwrbypass found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-executemsbuild found in Powershell Empire, lateral movement.
  • invoke-exfildatatogithub found in Powershell Empire, data exfiltration.
  • invoke-filefinder found in PowerView, file reconnaissance.
  • invoke-fodhelperbypass found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-inveigh found in Powershell Empire, man-in-the-middle (MITM) attack.
  • invoke-inveighrelay found in Powershell Empire, lateral movement.
  • invoke-kerberoast found in Powerview, credential dumping.
  • invoke-mimikatz found in Mimikatz, credential dumping.
  • invoke-mimikatzwdigestdowngrade found in Mimikatz, credential dumping.
  • invoke-mimikittenz found in Mimikittenz, credential dumping.
  • invoke-ms16032 found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-ms16135 found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-netripper found in Powershell Empire, network traffic interceptor.
  • invoke-networkrelay found in Nishang, port forwarding.
  • invoke-ninjacopy found in Powershell Empire, data exfiltration.
  • invoke-postexfil found in Powershell Empire, data exfiltration.
  • invoke-powerdump found in Powershell Empire, credential dumping.
  • invoke-powershellwmi found in Nishang, Windows Management Instrumentation (WMI) shell.
  • invoke-psexec found in Powershell Empire, lateral movement.
  • invoke-psinject found in Powershell Empire, Windows Dynamic Link Library (DLL) injection.
  • invoke-psuacme found in Nishang, User Account Control (UAC) bypass.
  • invoke-reflectivepeinjection found in process reflective loading, PowerSploit embedding.
  • invoke-runas found in Powershell Empire, run as clone without Microsoft Group Policy Object (GPO) path restrictions.
  • invoke-sdcltbypass found in Powershell Empire, User Account Control (UAC) bypass.
  • invoke-sessiongopher found in SessionGopher, application credential dumping.
  • invoke-sharefinder found in PowerView, share reconnaissance.
  • invoke-shellcode found in Powershell Empire, shellcode injection.
  • invoke-shellcodemsil found in Powershell Empire, shellcode injection.
  • invoke-smbexec found in Powershell Empire, lateral movement.
  • invoke-sqloscmd found in Powershell Empire, lateral movement.
  • invoke-sshcommand found in Powershell Empire, lateral movement.
  • invoke-ssidexfil found in Nishang, credential dumping.
  • invoke-tater found in Powershell Empire, privilege escalation.
  • invoke-tokenmanipulation found in Powershell Empire, user impersonation.
  • invoke-vnc found in Powershell Empire, Virtual Network Computing (VNC) sideloading.
  • invoke-wscriptbypassuac found in Powershell Empire, User Account Control (UAC) bypass.
  • keylogger found in Nishang, keylogging.
  • out-minidump found in Powershell Empire, memory minidump.
  • run-exeonremote found in Nishang, executable dropper.
  • set-dcshadowpermissions found in Nishang, privilege escalation.
  • set-powerstego found in exfiltration steganography.
  • set-remotepsremoting found in Nishang, PSRemoting backdoor attack.
  • set-remotewmi found in Nishang, Windows Management Instrumentation (WMI) backdoor attack.
  • show-targetscreen found in Nishang, screen capture.
  • start-tcpmonitor found in Powershell Empire, network traffic monitoring.
  • unblock-file found in unblocking internet downloaded files.
Parameter Type Description
File parameters
Script paths Advanced asset list A list of script file paths that are authorized or unauthorized to run all Powershell commands. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would ignore all files in the Shared folder under users' home directories). Case-insensitive matching is used.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run any Powershell command. Case-insensitive matching is used.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
T1059 (Command and Scripting Interpreter)
attack.mitre.org/techniques/T1059/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by filename Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Malicious USB device inserted

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a user inserts a malicious USB device.

Malicious devices are determined by the USB device serial number, VID, and PID. The following devices are considered to be malicious:

  • Bash Bunny, with serial number 12345678 or VID:PID f000:fff0, f000:ff01, f000:ff02, f000:ff03, f000:ff04, f000:ff05, f000:ff06, f000:ff07, f000:ff08, f000:ff09, f000:ff10, f000:ff11, f000:ff12, f000:ff13, f000:ff14, f000:ff20, f000:ff21, f000:1234, 05ac:021e.
  • LAN Turtle, with VID:PID 0bda:8152.
  • Rubber Ducky, with VID:PID 0bda:8152.
  • Teensy device, with VID:PID 16c0:047c, 16c0:047d, 16c0:047e, 16c0:047f, 16c0:0480, 16c0:0481, 16c0:0482, 16c0:0486, 16c0:0487.
Tactic Technique Sub-technique
TA0001 (Initial Access)
attack.mitre.org/tactics/TA0001/
T1091 (Replication Through Removable Media)
attack.mitre.org/techniques/T1091/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by USB identifier Enabled
Cluster by USB serial number Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Multiple user account modifications

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a single user account makes multiple account modifications in a configurable time window

Parameter Type Description
Event type parameters
Monitor event types String list A list of user account event types to monitor.
Monitor only new accounts Boolean The toggle to enable/disable monitoring only those events created by recently created accounts.
New accounts time window (in minutes) Integer The number of minutes after creation for which an account is considered new.
Responsible user parameters
Ignore modifications to own account Boolean The toggle to enable/disable monitoring events where the modifying account is also the target account.
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Time window parameters
Modification count threshold Integer The maximum number of user account modification events authorized during the given time window.
Time window (in minutes) Integer The number of minutes during which user account modifications are counted.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

New application installed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a new application is installed.

Parameter Type Description
Application parameters
Application names Advanced asset list A list of application names (e.g. Office) that are authorized or unauthorized to be installed. Case-insensitive matching is used. Full regular expression (regex) grammar is supported.
Publishers Advanced asset list A list of application publishers (e.g. Microsoft Corporation), from which all application are authorized or unauthorized to be installed. Case-insensitive matching is used. Full regular expression (regex) grammar is supported.
Registry key parameters
Registry key subscriptions String list A list of monitored registry keys related to installing applications.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

New application run

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Agent version 6.0.3 or later

Detects when an application is run for the first time.

Parameter Type Description
Process parameters
Authorized binary names Advanced asset list A list of binary names (e.g. chrome.exe) that are allowed to run. Case-insensitive matching is used. Populate this list with the names of new applications that can be run after the training period concludes without generating a detection.
Machine learning parameters
Training period (days) Integer The time period (in days) during which a list of applications typically run on a node are learned. No detections will be generated during this period. The FortiDLP Agent will continue to learn from application activity after this period.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

New DNS server used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Agent version 7.7.1 or later

Detects when a node uses a new DNS server.

Parameter Type Description
DNS server parameters
IP addresses Advanced asset list A list of DNS server IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) that the node is authorized to query.
Machine learning parameters
Training period (days) Integer The time period (in days) during which the list of DNS servers typically used by a node are learned. No detections will be generated during this period. The FortiDLP Agent will continue to learn from DNS activity after this period.
Ignore agents that frequently change DNS server Boolean The toggle to enable/disable reporting nodes that frequently use new DNS servers. If enabled, detections will not be generated during periods of transient DNS server use.
Tactic Technique Sub-technique
TA0011 (Command and Control)
attack.mitre.org/tactics/TA0011/
T1071 (Application Layer Protocol)
attack.mitre.org/techniques/T1071/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by destination IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Outgoing port scan performed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when an excessive number of remote ports are connected to within a given time window, indicating an outgoing port scan attack.

Note

Subsequent detections and actions for the same local and remote address will not be generated until until the configured time window has elapsed.

Parameter Type Description
Remote address parameters
IP addresses Advanced asset list A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to have port scans performed.
Remote port parameters
Remote port number upper bound Integer The upper bound on remote port numbers to consider when detecting outgoing port scanning. For example, to consider ports 1-1024, you would enter 1024.
Maximum permitted remote ports Integer The maximum number of remote ports that can be connected to during the given time window.
Time window parameters
Time window (in seconds) Integer The number of seconds during which port usage is counted.
Tactic Technique Sub-technique
T1046 (Network Service Discovery)
attack.mitre.org/techniques/T1046/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by destination IP Disabled
Cluster by source IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential AD reconnaissance attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when reconnaissance is performed against a privileged user or group in Active Directory (AD).

Tactic Technique Sub-technique
T1087 (Account Discovery)
attack.mitre.org/techniques/T1087/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential Pass-the-Hash attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects a login that is symptomatic of a Pass-the-Hash (PtH) attack.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1550 (Use Alternate Authentication Material)
attack.mitre.org/techniques/T1550/
T1550.002 (Pass the Hash)
attack.mitre.org/techniques/T1550/002/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential privilege escalation attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user runs an application with administrator privileges.

Note

To use this policy, you must enable the Windows "Audit Process Creation" group policy and select the "Success" option.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. consent.exe) for which privilege escalation is authorized or unauthorized. Case-insensitive matching is used.
Parent binary names Advanced asset list A list of parent process binary names (e.g. consent.exe) for which child processes are authorized or unauthorized for privilege escalation. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1078 (Valid Accounts)
attack.mitre.org/techniques/T1078/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential Sticky Key backdoor attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a user changes the Windows Sticky Keys registry.

Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1546 (Event Triggered Execution)
attack.mitre.org/techniques/T1546/
T1546.008 (Accessibility Features)
attack.mitre.org/techniques/T1546/008/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential WCE Pass-the-Hash attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects a login using Windows Credential Editor that is symptomatic of a Pass-the-Hash (PtH) attack.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1550 (Use Alternate Authentication Material)
attack.mitre.org/techniques/T1550/
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1550 (Use Alternate Authentication Material)
attack.mitre.org/techniques/T1550/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Potential Windows RDP BlueKeep attack detected

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects indicators of a Windows Remote Desktop Protocol BlueKeep attack (CVE-2019-0708).

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1210 (Exploitation of Remote Services)
attack.mitre.org/techniques/T1210/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

PowerShell script block logging disabled

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a user disables PowerShell script block logging.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.003 (Impair Command History Logging)
attack.mitre.org/techniques/T1562/003/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Process run with unauthorized called path

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a process is run with an unauthorized called path.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. cmd.exe) users are authorized or unauthorized to run. Case-insensitive matching is used. If this is left empty, no detections will be generated and all processes will be allowed.
Called paths Advanced asset list A list of regular expressions matching binary called paths (e.g. rm -rf .*) that are authorized or unauthorized to run. If this is left empty, no detections will be generated and all processes will be allowed.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run unauthorized processes. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to run unauthorized processes. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run unauthorized processes. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by called path Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Kill process

Profiles tool used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: macOS, Agent version 7.2.0 or later

Detects when the /usr/bin/profiles command is used to install, remove, or otherwise handle configuration profiles.

Parameter Type Description
Process parameters
Called paths Advanced asset list A list of regular expressions matching authorized or unauthorized usage of the profiles tool if they match the called path. For example, to prohibit the "/usr/bin/profiles install -path /example.mobileconfig" command, enter "install" (without the double quotes) and selected the "Prohibit listed called paths" behavior. The match is case-sensitive. Note: An empty list matches all uses of the profiles tool.
Parent process parameters
Binary names Advanced asset list A list of binary names that are authorized or unauthorized to run the profiles tool (e.g. jamf-pro.exe). Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1546 (Event Triggered Execution)
attack.mitre.org/techniques/T1546/
T1546.004 (Unix Shell Configuration Modification)
attack.mitre.org/techniques/T1546/004/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1546 (Event Triggered Execution)
attack.mitre.org/techniques/T1546/
T1546.004 (Unix Shell Configuration Modification)
attack.mitre.org/techniques/T1546/004/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by called path Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

RDP connection made over reverse SSH tunnel

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a Remote Desktop Protocol connection is made over a reverse SSH tunnel.

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/
T1021.001 (Remote Desktop Protocol)
attack.mitre.org/techniques/T1021/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by destination IP Enabled
Cluster by source IP Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

RDP login made from localhost

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects a localhost tunneled Remote Desktop Protocol login.

Parameter Type Description
Responsible user parameters
Responsible usernames Advanced asset list A list of usernames authorized or unauthorized to use Windows Remote Desktop. Case-insensitive matching is used.
Responsible username patterns Advanced asset list A list of patterns for matching usernames authorized or unauthorized to use Windows Remote Desktop. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Target user parameters
Target usernames Advanced asset list A list of usernames authorized or unauthorized be the target of Windows Remote Desktop. Case-insensitive matching is used.
Target username patterns Advanced asset list A list of patterns for matching usernames authorized or unauthorized to be the target of Windows Remote Desktop. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Registry startup items added

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a process adds a registry startup item.

Parameter Type Description
Startup item parameters
Startup items Advanced asset list A list of startup items that are authorized or unauthorized to be installed. Case-insensitive matching is used. Full regular expression (regex) grammar is supported.
Responsible process parameters
Binary names Advanced asset list A list of binary names (e.g. MsMpEng.exe) authorized or unauthorized to add startup items. Case-insensitive matching is used.
Registry key parameters
Registry key subscriptions Advanced asset list A list of registry keys to monitor related to startup item changes.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1547 (Boot or Logon Autostart Execution)
attack.mitre.org/techniques/T1547/
T1547.001 (Registry Run Keys / Startup Folder)
attack.mitre.org/techniques/T1547/001/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1547 (Boot or Logon Autostart Execution)
attack.mitre.org/techniques/T1547/
T1547.001 (Registry Run Keys / Startup Folder)
attack.mitre.org/techniques/T1547/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by called path Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Registry value changed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a process modifies a registry value.

Parameter Type Description
Registry key parameters
Registry key value subscriptions Advanced asset list A list of registry key values to monitor. To monitor all values at a given key use "*", for example, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\* would monitor all values in the Run subkey, and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Example would monitor only the Example value.
Registry value data Advanced asset list A list of value data, in <value name>=<value data> format, that is authorized or unauthorized to be configured. For example DisplayName=Example would match the registry value with name DisplayName and data Example. To match all value names use "*", for example *=Example would match any registry value with data Example.
Registry action parameters
Monitor creation Boolean The toggle to enable/disable detection of registry value creation.
Monitor modification Boolean The toggle to enable/disable detection of registry value changes.
Monitor deletion Boolean The toggle to enable/disable detection of registry value deletion.
Responsible process parameters
Binary names Advanced asset list A list of binary names (e.g. MsMpEng.exe) authorized or unauthorized to modify registry values. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1112 (Modify Registry)
attack.mitre.org/techniques/T1112/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Remote Desktop connection received

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a node receives a Windows Remote Desktop connection.

Parameter Type Description
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to use Windows Remote Desktop. Case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to use Windows Remote Desktop. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Connection parameters
IP addresses Advanced asset list A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to use Windows Remote Desktop on host.
Detection parameters
Rate limit (minutes) Integer The minimum time (in minutes) between consecutive detections for Remote Desktop sessions from the same source and user. Set to 0 to disable.
Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by source IP Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Remote Desktop session enabled

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a user enables a Windows Remote Desktop service.

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Root certificate installed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.5 or later

Detects when a user adds a root certificate to the system.

Note

Subsequent detections and actions for the same signature will not be generated until at least 30 seconds after the first detection/action.

Parameter Type Description
Certificate parameters
Certificate signatures Advanced asset list A list of certificate signatures that are authorized or unauthorized to be added to the system. Case-insensitive matching is used.
Certificate subjects Advanced asset list A list of certificate subjects that are authorized or unauthorized to be added to the system. Full regular expression (regex) grammar is supported.
Registry key parameters
Registry key subscriptions String list A list of monitored registry keys related to installing root certificates.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1553 (Subvert Trust Controls)
attack.mitre.org/techniques/T1553/
T1553.004 (Install Root Certificate)
attack.mitre.org/techniques/T1553/004/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by certificate name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Root certificate security settings changed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.0 or later

Detects when a user changes root certificate security settings.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1553 (Subvert Trust Controls)
attack.mitre.org/techniques/T1553/
T1553.004 (Install Root Certificate)
attack.mitre.org/techniques/T1553/004/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Ruler hacking tool used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user uses the Ruler hacking tool.

Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1137 (Office Application Startup)
attack.mitre.org/techniques/T1137/
T1087 (Account Discovery)
attack.mitre.org/techniques/T1087/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Suspicious Windows commands executed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user executes multiple suspicious commands within a given time period.

Note

Subsequent detections and actions for the same user will not be generated until at least one hour after the first detection.

Parameter Type Description
Execution count parameters
Time window (in minutes) Integer The number of minutes during which the maximum suspicious command execution count is applied.
Maximum permitted suspicious command executions Integer The maximum number of suspicious command executions allowed during the given time period.
Process parameters
Suspicious binary names Advanced asset list A list of suspicious binary names. Case-insensitive matching is used.
Suspicious binary SHA-256 hashes Advanced asset list A list of suspicious binary SHA-256 hashes. Case-insensitive matching is used.
Suspicious application IDs Advanced asset list A list of suspicious binary application identifiers. Case-insensitive matching is used.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run unauthorized suspicious commands. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to run suspicious commands. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run suspicious commands. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Parent process parameters
Binary names Advanced asset list A list of binary names that are authorized or unauthorized to run suspicious commands (e.g. chrome.exe). Case-insensitive matching is used.
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

System time modified

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user modifies the system time.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. chrome.exe) authorized or unauthorized to modify system time. Case-insensitive matching is used.
Binary paths Advanced asset list A list of file path expressions matching binaries authorized or unauthorized to modify system time. The match can use glob-style pattern matching rules (e.g. C:\Windows\** would match all files in the Windows folder). Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1070 (Indicator Removal)
attack.mitre.org/techniques/T1070/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Unauthorized application used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when an unauthorized application is run. A detection will be generated if an unauthorized child process is run by an unauthorized parent process, unless the "Allow admin to run application" toggle is enabled and it is run with admin privileges.

Parameter Type Description
Application parameters
Binary names Advanced asset list A list of binary names (e.g. chrome.exe) users are authorized or unauthorized to run. Case-insensitive matching is used.
Application IDs Advanced asset list A list of process metadata application identifiers (e.g. v1.com.google.Chrome) users are authorized or unauthorized to run. Case-insensitive matching is used.
Applications rule String The rule to apply for monitoring application usage. For example, choosing "Allow listed applications" would allow users to run all applications except those specified in the "Applications" list. Choosing "Prohibit listed applications" would only prohibit applications specified in the "Applications" list parameter.
Applications Asset list A list of predefined applications to which the "Applications rule" is applied.
User parameters
Ignore administrator accounts Boolean A toggle to enabled/disable reporting local or system administrator accounts. If enabled, a detection will not be generated if a local or system administrator account runs an unauthorized application. Note: This toggle only checks for admin privileges on Windows platforms.
Usernames Advanced asset list A list of usernames authorized or unauthorized to run unauthorized applications. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to run unauthorized applications. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run unauthorized applications. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Parent process parameters
Binary names Advanced asset list A list of parent process binary names (e.g. explorer.exe) authorized or unauthorized to run unauthorized applications. Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of parent processes that are authorized or unauthorized to run unauthorized applications (e.g. .*compattelrunner\.exe -maintenance).
Tactic Technique Sub-technique

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Kill process

Unauthorized PowerShell command executed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 6.0.3 or later

Detects when an unauthorized PowerShell command is executed.

Note

Subsequent detections and actions for repeated executions of the same command will not be generated until at least 30 seconds after the first detection/action.

Note

To use this policy you must enable the Windows "PowerShell Script Block Logging" group policy, see https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.1#enabling-script-block-logging for details.

Parameter Type Description
Command parameters
Unauthorized command patterns Advanced asset list A list of command patterns that users are unauthorized to run in Powershell. Full regular expression (regex) grammar is supported. For example, entering "Read-S3Object (.* )?-BucketName Confidential( .*)?" would match Read-S3Object commands that read from an S3 bucket named Confidential.
File parameters
Script paths Advanced asset list A list of script file paths that are authorized or unauthorized to run all Powershell commands. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would ignore all files in the Shared folder under users' home directories). Case-insensitive matching is used.
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to run any Powershell command. Case-insensitive matching is used.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to run any Powershell command. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
T1059 (Command and Scripting Interpreter)
attack.mitre.org/techniques/T1059/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User account created and deleted in the same session

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a user account creates and deletes another account during the same session.

Parameter Type Description
Responsible user parameters
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Session parameters
Session duration (in minutes) Integer The maximum number of minutes between account creation and deletion events for them to be considered to have happened in the same session. Note: If set to 0 then the session length will not be determined by a fixed duration, instead the start and end of a session will be determined by user login and logout events.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1136 (Create Account)
attack.mitre.org/techniques/T1136/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User account modified

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a user account is modified.

Parameter Type Description
Event type parameters
Monitor event types String list A list of user account event types to monitor.
Monitor only new accounts Boolean The toggle to enable/disable monitoring only those events created by recently created accounts.
New accounts time window (in minutes) Integer The number of minutes after creation for which an account is considered new.
Monitor only first account modification Boolean The toggle to enable/disable monitoring only those accounts that have not previously modified any accounts.
First account modification training period (in days) Integer The time period (in days) during which no first account modification detections will be generated.
Inactivity limit (in days) Integer The maximum time between consecutive account modifications before an account is treated like it has never made any previous account modifications. Once this time has elapsed, any further account modifications will result in a detection. If set to 0 then this behavior is ignored and only the first account modification will result in a detection.
Responsible user parameters
Ignore modifications to own account Boolean The toggle to enable/disable monitoring events where the modifying account is also the target account.
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User account modified outside office hours

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.0 or later

Detects when a user account is modified outside of expected working hours.

Parameter Type Description
Event type parameters
Monitor event types String list A list of user account event types to monitor.
Monitor only new accounts Boolean The toggle to enable/disable monitoring only those events created by recently created accounts.
New accounts time window (in minutes) Integer The number of minutes after creation for which an account is considered new.
Responsible user parameters
Ignore modifications to own account Boolean The toggle to enable/disable monitoring events where the modifying account is also the target account.
Account types String list A list of user account types to monitor. This parameter specifies the type of the responsible account, not the target account.
Usernames Advanced asset list A list of usernames authorized or unauthorized to modify user accounts. Case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
User security identifiers (SID) Advanced asset list A list of patterns for matching UIDs authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the UID of the responsible account, not the target account.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to modify user accounts. Full regular expression (regex) grammar is supported and case-insensitive matching is used. This parameter specifies the username of the responsible account, not the target account.
Expected hours parameters
List of days off String list A list of non-working days. This list can be empty, which would indicate that every day of the week is a working day.
Start time String The start time of the work day in 24-hour format (HH:MM). Times are in the FortiDLP Agent's local timezone.
End time String The end time of the work day in 24-hour format (HH:MM). Times are in the FortiDLP Agent's local timezone.
Tactic Technique Sub-technique
TA0003 (Persistence)
attack.mitre.org/tactics/TA0003/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1098 (Account Manipulation)
attack.mitre.org/techniques/T1098/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

User added to local security-enabled group

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user is added to a local security-enabled group, which could indicate privilege abuse.

Parameter Type Description
Group parameters
Groups Advanced asset list A list of groups in Domain\Groupname format to which users are authorized or unauthorized to be added. Case-insensitive matching is used.
Group patterns Advanced asset list A list of patterns for matching groups in Domain\Groupname format to which users are authorized or unauthorized to be added. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Responsible user parameters
Usernames Advanced asset list A list of usernames in Domain\Username format authorized or unauthorized to make changes to a group. Case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames in Domain\Username format that are authorized or unauthorized to make changes to a group. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tactic Technique Sub-technique
TA0004 (Privilege Escalation)
attack.mitre.org/tactics/TA0004/
T1548 (Abuse Elevation Control Mechanism)
attack.mitre.org/techniques/T1548/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows audit policy removed

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user removes a Windows audit policy.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.002 (Disable Windows Event Logging)
attack.mitre.org/techniques/T1562/002/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows FortiDLP Agent tampered with

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.6.2 or later

Detects when a user tampers with the Windows FortiDLP Agent or FortiDLP Browser Extension.

Note

Subsequent detections and actions for the same FortiDLP component will not be generated until at least one week after the first detection/action.

Parameter Type Description
Process parameters
Binary names Advanced asset list A list of binary names (e.g. notepad.exe) authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
Binary paths Advanced asset list A list of binary paths authorized or unauthorized to read or modify FortiDLP Agent data. The match can use glob-style pattern matching rules (e.g. C:\Program Files (x86)\Google\** would match all applications under the Google folder). Case-insensitive matching is used.
Called paths Advanced asset list A list of regular expressions matching called paths of processes that are authorized or unauthorized to read or modify FortiDLP Agent data (e.g. .*compattelrunner\.exe -maintenance).
User parameters
Usernames Advanced asset list A list of usernames authorized or unauthorized to read or modify FortiDLP Agent data. Case-insensitive matching is used.
User identifier patterns Advanced asset list A list of patterns for matching user identifiers (SID on Windows and UID on Linux and macOS) that are authorized or unauthorized to read or modify FortiDLP Agent data. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames that are authorized or unauthorized to read or modify FortiDLP Agent data. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
Tampering parameters
Tampering activity to monitor String list A list of tampering activities to monitor for both the FortiDLP Agent and FortiDLP Browser Extension. Note: The "Service tampering" option enables monitoring of the Agent service being stopped and requires Agent anti-tampering to be enabled. For instructions, refer to the FortiDLP Administration Guide. Additionally, service tampering detection via PowerShell commands requires the "PowerShell Script Block Logging" group policy to be enabled. For instructions, go to https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.1#enabling-script-block-logging.
File and registry tampering operations to monitor String list A list of tampering operations to monitor for both the FortiDLP Agent and FortiDLP Browser Extension, applicable to files and registry data. Note: If Agent anti-tampering is enabled, delete operations will be reported as write operations in detections. For this reason, if you want to monitor "Delete" operations, ensure the "Write" value is also selected.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows PSRemoting enabled

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a user enables PSRemoting.

Tactic Technique Sub-technique
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by policy Enabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows PSRemoting used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.2.5 or later

Detects when a user uses PSRemoting.

Parameter Type Description
User parameters
Usernames Advanced asset list A list of usernames (in Domain\Username format) authorized or unauthorized to use PSRemoting. Case-insensitive matching is used.
Username patterns Advanced asset list A list of patterns for matching usernames in Domain\Username format that are authorized or unauthorized to use PSRemoting. Full regular expression (regex) grammar is supported and case-insensitive matching is used.
IP parameters
IP addresses Advanced asset list The IPv4 or IPv6 address in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized to use PSRemoting on the node.
Tactic Technique Sub-technique
T1059 (Command and Scripting Interpreter)
attack.mitre.org/techniques/T1059/
TA0008 (Lateral Movement)
attack.mitre.org/tactics/TA0008/
T1021 (Remote Services)
attack.mitre.org/techniques/T1021/
T1021.006 (Windows Remote Management)
attack.mitre.org/techniques/T1021/006/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by source IP Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows security event logs cleared

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 4.1.0 or later

Detects when a user clears Windows security event logs.

Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1070 (Indicator Removal)
attack.mitre.org/techniques/T1070/
T1070.001 (Clear Windows Event Logs)
attack.mitre.org/techniques/T1070/001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by account name Enabled
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Windows unauthorized service added

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 7.2.2 or later

Detects when a user adds a well-known malicious Windows service.

Malicious services are determined by observing Windows event tracing audit logs. The following Windows services are considered to be malicious:

  • WCE SERVICE
  • WCESERVICE
  • DumpSvc.
Parameter Type Description
Service parameters
Service names Advanced asset list A list of keywords appearing in authorized or unauthorized services.
Tactic Technique Sub-technique
TA0006 (Credential Access)
attack.mitre.org/tactics/TA0006/
T1003 (OS Credential Dumping)
attack.mitre.org/techniques/T1003/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by filename Enabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot