Fortinet white logo
Fortinet white logo

Administration Guide

Threat Hunting

Threat Hunting

FortiEDR’s Threat Hunting feature enables you to search for many types of Indicators of Compromise (IOCs) and malware across your entire environment in order to enable enhanced detection. Searching can be based on various attributes of files, registry keys and values, network, processes, event log and activity event types. Search operations apply to both Windows and Linux operating system activity.

Two versions of FortiEDR’s Threat Hunting feature are supported:

Note – Threat Hunting is a license-dependent add-on. You may contact Fortinet Support for more information.

Threat Hunting

Threat Hunting

FortiEDR’s Threat Hunting feature enables you to search for many types of Indicators of Compromise (IOCs) and malware across your entire environment in order to enable enhanced detection. Searching can be based on various attributes of files, registry keys and values, network, processes, event log and activity event types. Search operations apply to both Windows and Linux operating system activity.

Two versions of FortiEDR’s Threat Hunting feature are supported:

Note – Threat Hunting is a license-dependent add-on. You may contact Fortinet Support for more information.