Configuring the FortiNDR Cloud App
Use the Configuration tab to configure the global parameters. These global parameters should only have to be set once after installation, during the initial configuration. There are three tabs on the configuration page:
Updating the Proxy Configuration
Use the Proxy tab to enable and configure a web proxy to send API requests to. The configuration settings include:
Enable | Enable/Disable proxy usage for the add-on. |
Proxy Type | Set the proxy type: http, socks4, socks5. |
Host | IP or hostname of the proxy. |
Port | Port number of the proxy. |
Username | Username for proxy authentication (if required). |
Password | Password for proxy authentication (if required). |
Remote DNS resolution | Perform DNS resolution through proxy. |
Updating the Logging Configuration
Use the Logging tab to set the log level for logs generated by the add-on. By default, the add-on sends all its logs at the INFO logging level.
Updating the Add-on Settings (FortiNDR Cloud API Token)
Use the Add-on settings tab to configure the add-on global parameters. There is one (1) global parameter that must be configured for any of the input types to work:
- API Token: This is a required global parameter and must be provided for the integration to work. All FortiNDR Cloud API calls require this token for authentication. Tokens never expire and will remain valid until revoked. For instructions on setting up a token , see the API Getting Started Guide.
- Domain: This is an optional parameter. If no value is entered, FortiNDR Cloud will connect to the default US region (icebrg.io). If you are connecting to a version of FortiNDR Cloud in a different region, the domain may be found in the API Getting Started Guide.
To configure the API Token and the API Domain:
- In the Apps list, select the FortiNDR Cloud app.
- Click the Configuration tab and then click Add-on Settings.
- Enter the API token you generated in the FortiNDR Cloud portal.
-
Enter the appropriate API domain as per the API Getting Started Guide.
- Click Save. This token will be used for all API calls from the app.
Setting up FortiNDR Cloud Inputs
Use the Inputs tab to setup the available data inputs. The following sections provide detailed descriptions for each input type and the steps to create and configure each. There are three (3) distinct input types associated with the app that can be configured to pull data into Splunk from the FortiNDR Cloud backend:
FortiNDR Cloud Detections | Polls the FortiNDR Cloud Detections API at the specified interval for new detections since the last poll and creates Splunk events with the tg. |
FortiNDR Cloud Events | Polls Observation and/or Suricata events from AWS S3 Buckets at the specified interval for new events since the last poll and create Splunk events with the results. |
FortiNDR Cloud Entities | Polls the FortiNDR Cloud Entity API for particular entities’ information. New Splunk events are created with the results. This particular input is executed once and it can be deleted after the information is imported into Splunk. |
FortiNDR Cloud Detections
The FortiNDR Cloud Detections input type polls the FortiNDR Cloud Detections API at the specified interval for new detections and creates events with the results. Detections are searched between the last poll and the configured delay from the current date. This delay is required to allow time for the detections to be processed by the FortiNDR Cloud service backend. The default and recommended values for the interval and the delay are (interval = 300 seconds (5 mins) and delay = 10 minutes).
To create and configure the Detections input type:
- In the Splunk Apps list, select the FortiNDR Cloud app.
- Click Create New Input and select FortiNDR Cloud Detections from the drop-down list.
- Configure the data input Parameters.
Name
Description
Example
Name*
Unique name for the input type
My_Detections
Interval*
Interval to poll API to query for detections (in seconds). It is recommended to set the interval to no less than 300 seconds (5 minutes).
300
Index*
Splunk location to store collected events
default
Start Date (Optional)
This define if historical data is required. It could be relative (‘1 day’) or explicit (‘2024-08-01T00:00:00.000000Z’). By default, no historical data is retrieved.
2 days
Polling Delay
Polling delay (in minute). This is required to allow time for the detections to be processed by the FortiNDR Cloud service before polling them. (Default 10 minutes)
10
Account UUID (Optional)
Filter results to show only detections for the specified account UUID. If none is entered, detections will be shown for all accounts you have access to. Your Account UUID can be found on your user profile page of the portal.
0a7dae9g-6f74-4c75-78ef-856483763e1d4
Status (Optional)
Choose to pull detections that are active, resolved, or all (detections of any status).
Active
Severity (Optional)
Choose to pull detections for rules of a particular severity level. Default is to pull detections for all severities (high, moderate, and low)
High, Moderate, Low
Confidence (Optional)
Choose to pull detections for rules of a particular confidence level. Default is to pull detections for all confidences (high, moderate, and low)
High, Moderate, Low
Muted Rules (Optional)
Choose to pull detections for rules that are muted, unmuted, or all (both muted and unmuted rules). Default is to pull only detections for unmuted rules.
Unmuted
Muted Devices (Optional)
Choose to pull detections for devices that are muted for the account, unmuted devices, or all (both muted and unmuted devices for the account). Default is to pull only detections for unmuted devices.
Unmuted
Muted Detections (Optional)
Choose to pull detections that are muted, unmuted, or all (both muted and unmuted detections). Default is to pull only unmuted detections.
Unmuted
Include Description (Optional)
Enable this option if you want to include the detection description with the results. (Default is unchecked)
Include Signature (Optional)
Enable this option if you want to include the detection signature with the results. (Default is unchecked)
Include Events
Enable this option if you want to import the events associated with each detection. NOTE: This may pull a large amount of events into Splunk (up to 1000).
Filter Training Detections
Filter out detections from the training environment. This is enabled by default and recommended.
enabled
- Click Add.
FortiNDR Cloud Events
The FortiNDR Cloud Events input type polls Observation and/or Suricata events from AWS S3 Buckets at the specified interval for new events since the last poll and create Splunk events with the results. The FortiNDR Cloud Entity API is targeted for entity enrichment information. The default and recommended collection interval is 900 seconds (15 mins).
Create MetaStream credentials and Retrieve AWS S3 Credentials from the FNC Portal for configuring a FortiNDR Cloud Events input. For more information, see Create MetaStream credentials and Retrieve S3 credentials.
To configure the Events input type:
- In the Splunk Apps list, select the FortiNDR Cloud App.
- Click Create New Input and select FortiNDR Cloud Events from the drop-down menu.
- Configure the data input Parameters.
Name
Description
Example
Name*
Unique name for the input type
My_Detections
Interval*
Interval to poll API to query for detections (in seconds). It is recommended to set the interval to no less than 900 seconds (15 minutes).
900
Index*
Splunk location to store collected events
default
AWS Access Key*
AWS Access Key required to connect to the AWS S3 Buckets.
AWS Secret Key*
AWS Secret Key required to connect to the AWS S3 Buckets.
AWS Bucket Name
Name of the AWS S3 Bucket where the events are stored. Defaults to fortindr-cloud-metastream.
fortindr-cloud-metastream
Account Code*
Customer account code. This is required to determine the buckets we need to search for events.
Event Types
Event types to be retrieved. Either Observation, Suricata or both.
Days to Collect (Optional)
The amount of days (maximum 7) worth of historical data to be retrieved. By default, no historical data is retrieved.
5
*Required
- Click Add.
The Account Code, Bucket Name, AWS Secret and Access keys are required and can be retrieved from the FortiNDR Cloud Portal. For information, see Retrieve S3 credentials |
FortiNDR Cloud Entities
The FortiNDR Cloud Entities input type polls the Entity API for entity enrichment information. This input is executed just one time and can be deleted after the information is retrieved.
The interval argument is required by Splunk but it will be ignored by this input. Any instance of this input will retrieve the information the first time it is triggered; but, any subsequent time Splunk triggers it no information will be retrieved. The instance can be deleted once the information has been imported. |
Editing this input’s instance won’t have any effect. Once the input instance retrieves the information can be deleted. A new instance can be created if additionals entities need to be retrieved. |
To create the Entities input type:
- In the Splunk Apps list, select the FortiNDR Cloud App.
- Click Create New Input and select FortiNDR Cloud Entities from the drop-down menu.
- Configure the data input Parameters.
Name
Description
Example
Name*
Unique name for the input type
My_Reports
Interval*
Interval to poll API to query for detections (in seconds). It is recommended to set the interval to no less than 900 seconds (15 minutes).
900
Index*
Splunk location to store collected events
default
Entity(s)*
Enter one or more entities (IP address or domain) separated by commas to search for entity enrichment information.
192.168.1.100, 1.1.1.1, domain.com
Fetch Passive DNS (Optional)
Include passive DNS enrichment data in the response (default is unchecked).
Disabled
Fetch DHCP (Optional)
Include DHCP enrichment data in the response (default is unchecked).
Disabled
Fetch Virus Total (Optional)
Include Virus Total enrichment data in the response (default is unchecked).
Disabled
Filter Training Data
Filter data from the training environment. This is checked by default and recommended.
Enabled
*Required
- Click Add.
Deleting or Disabling an Input
To delete or disable a previously defined input, you need to look for it on the Inputs tab.
To disable an input:
Look for the input value in the Status column and turn it off to disable the input. Turn it back on to re-enable it.
To delete an input:
In the Actions column, look for the allowed actions for the input and click on the delete icon.