Viewing Events in Splunk SOAR
You can view events polled from FortiNDR Cloud service on the Home page in the Events widget. This widget shows the number of events that were ingested during the specified time frame in the upper-left corner of the page. Events are grouped by Label, Severity, Sensitivity (confidence) or Status.
To get the list of events:
- Click the widget, or
- Go to Sources > Events.
The list may be filtered depending on how you opened the list. The filter options are displayed on the left side of the page above the events list. You can modify the filters as needed.
All the events generated by this integration are prefixed with Fortinet FortiNDR Cloud. You can use this prefix to filter the event list to only show events from this integration. Each of these events, contains an artifact with the detections details.
The following table shows all the fields contained in the artifact.
Field Name |
Require on Resolve |
---|---|
created |
Detection’s creation date and time |
fnc_category |
Detection’s rule category |
fnc_first_seen |
The date and time the detection was first seen |
fnc_last_seen |
The date and time the detection was last seen |
fnc_severity |
Detection’s rule severity |
xfnc_confidence |
Detection’s rule confidence |
fnc_status |
Detection’s status |
fnc_detection_id |
Detection’s id |
fnc_device_ip |
Detection’s affected device IP |
fnc_primary_attack_id |
Rule’s primary attack id |
fnc_secondary_attack_id |
Rule’s secondary attack ID |
fnc_rule_url |
Rule’s url in the FortiNDR Cloud Portal |
fnc_detection |
Detection’s raw json |