Fortinet white logo
Fortinet white logo

User Guide

Triage detections

Triage detections

The Triage Detections page displays all Active detectors in your account. Use this page to review and respond to detections triggered by the detector. Each row in the page displays a single detector with at least one active detection. Once all detections for a detector are resolved or muted, the detector's status is automatically updated from Active to Idle. You can create a filter to view all detectors and detections regardless of their status.

Table view is the default layout for displaying detections. Table View presents detections in a compact, row‑and‑column format for easier sorting and comparison. Each detection appears as a single row with detailed fields such as name, category, severity, confidence, timestamps, author, mute status, and impacted devices. This view is useful when you need to quickly scan large amounts of data, sort by specific columns, or perform detailed analysis across multiple detections.

Gallery view presents each detection as a card in a grid, showing key information such as the detection name, severity, category, last‑seen time, and impacted devices. This view makes it easy to scan multiple detections quickly and identify the most important items at a glance.

When the All accounts view is enabled, the Accounts column appears and shows all accounts a detector is running on. For detectors that run on a single account, the column displays that account name. For detectors running across multiple accounts, hovering over the value opens a tooltip listing all associated accounts.

The Triage Detections page displays the following information:

Name The detector name.
Category

There are three categories for detectors: Attack, Potentially Unwanted Application (PUA), and Posture. Each category contains a more detailed subcategory. For more information, see Detector Categories.

Severity

The severity measures the potential impact to the confidentiality, integrity, or availability of information systems and resources if the activity is confirmed to be a true positive. Severity can be assigned to one of the following values:

Severity Description Examples
High Significant to fair impact with the potential to spread or escalate Malicious code execution, C2 communications, lateral movement, data exfiltration.
Moderate Fair impact with minimal potential to spread or escalate Activity that could indicate malicious intent, untargeted attacks with unknown success, data leakage, subversion of security or monitoring tools
Low Little to no impact expected Potentially unauthorized software, devices, or resource use, untargeted adware or spyware, compromise of a personal device or device on an untrusted network, insecure configurations
Confidence

Confidence measures how likely events matching the detector’s query are indicative of the activity specified in the detector description. A detector's confidence indicates its minimum true-positive detection rate.

Confidence Minimum True-Positive Rate
High 90%
Moderate 75%
Low 50%

FortiGuard Lab assigns a detector's initial confidence based on its performance during testing. Once deployed, detectors are monitored for changes in their true-positive detection rate, which is based on the resolution state chosen by an analyst when resolving a detection. Once a detector crosses a higher or lower threshold, it is reviewed to determine whether it should be tuned or whether the confidence should be modified.

Last Seen The UTC date and time when the last known event tied to the detector was observed. This is useful when determining when the most recent change to a detector has occurred.
Author The account that authored the detector.
Impacted Devices The internal IP address in the src.ip or dst.ip fields used to generate detections. This field is configurable.
Status

By default, every detection is in an Active state upon creation. Active detections generate a notification (see Email notifications), but Muted detections will not. Detections remain Active until they are resolved manually by an analyst or automatically based on the detector's Resolution Period. Once resolved, their status changes to Resolved.

Detection State Description
Active When an event matching a detector is observed, a detection is generated and set to Active by default. A notification is triggered for Active detections.
Muted When an event matching a detector is observed, but some aspect of it is muted. A notification is not triggered for muted detections.
Resolved When a detection is resolved, either manually by an analyst or automatically, and is no longer Active.

Toolbar

Option

Description

View the page as a gallery.
View the page as a table.
Create a detector

Settings:

  • Show Muted Devices
  • Show Detail View

Actions:

  • Manage Detectors
  • Muted Devices
  • Excluded Devices
  • Email Notifications

Detector Categories

Category Subcategory Description
Attack Infection Vector Attacks in the initial stages before an exploit attempt has been made or malicious code has been executed. Examples include downloading a malicious executable file, navigating to a web site that is known to redirect to exploitation servers, or an attempt to authenticate to an SSH server from a malicious host.
Attack Exploitation Attacks in the process of exploiting known vulnerabilities such as those listed in MITRE’s Common Vulnerabilities and Exposures (CVE) list. While FortiNDR Cloud may be unable to determine the success of a launched exploit, any hosts attempting exploits (that are not approved internal scanners) should be investigated for signs of compromise.
Attack Installation Installation of malicious software (staging) for persistence in an environment. For example, the Cobalt Strike staging tool downloading a Beacon backdoor over HTTP in order to provide persistence on a compromised host and run further post-exploitation commands.
Attack Lateral Movement Tools and techniques commonly used by attackers to pivot from a compromised host to other assets within the environment. Such tools may also be legitimately used by system administrators but should be investigated, especially for hosts from which this activity has not be observed before.
Attack Command and Control Command and control traffic between compromised hosts and attacker infrastructure.
Attack Exfiltration Data exfiltration from compromised assets to external entities.
Attack Discovery Tools and techniques commonly used by attackers to identify accesible hosts and services. Such tools may also be legitimately used by system administrators but should be investigated, especially for hosts from which this activity has not be observed before.
Attack Impact Malware or behavior intended to disrupt the business, such as distributed denial of service (DDoS) and ransomware attacks.
PUA Adware Malware characterized by its use of advertisements to generate revenue for the author. Adware is often installed alongside third-party applications and remains on a system as a browser add-on or self-proclaimed optimization software. Most adware is considered low risk due to its innocuous nature.
PUA Spyware Malware characterized by its focus on gathering device and user information without the user’s knowledge. This information is usually sent back to the authors for a variety of purposes, ranging from market research to targeted monitoring. Spyware is usually installed alongside third-party applications and persists on a system as a backdoor or as software that purports to be useful. Most spyware is considered low risk due to its historical use for low-impact data collection and advertising.
PUA Unauthorized Resource Use Applications that utilize system resources without a user’s knowledge or consent. Such applications are usually installed alongside third-party applications or as a component of malware in order to monetize a successfully compromised host (for example, via click fraud or cryptocurrency mining).
Posture Potentially Unauthorized Software of Device Applications or devices that circumvent organizational policies or increase the attack surface of an organization. These detectors cover various applications that may be used to bypass monitoring tools and access controls, or store sensitive information in unauthorized locations. This category also includes tools that may be legitimately used for system administration, development, or penetration testing, but are also commonly used by attackers to enumerate access and pivot within a compromised environment.
Posture Insecure Configuration Configurations within an environment that make it more vulnerable to exploitation or post-exploitation techniques used by attackers. Such configurations include outdated software, use of deprecated cryptographic standards, or configurations resulting in data leakage.
Posture Anomalous Activity Network activity that is abnormal and should be investigated to determine its cause. The activity may be malicious in nature or a misconfiguration that may or may not have security implications.

Viewing and filtering detections

To view the Triage detections page:
  1. Go to Detections > Triage detections. The Detections page opens.
  2. (Optional) Filter the detections on the page.

    Search

    Enter the technique ID, technique name or technique description.

    Detectors are filtered based on the prefix matching the selected technique ID. If Technique T1234 is entered, the detectors returned include its sub-techniques T1234.001, T1234.002, T1234.003, etc.

    Severity

    Select High (H), Medium (M), or Low (L).

    Additional Filters

    Click the filter icon to view additional filters.

    Filter

    Description

    CategoryFilter the detectors by category. See, Detector Categories.

    Assigned to

    Filter by assigned detections. See, Assigning detections.

    Created ByFilter by the account that created the detector.

    Sensors

    This filter displays all sensors in the account. The dropdown is divided into two groups: online sensors appear at the top, while other statuses are listed below.

    TechniqueFilter by the technique used for the detection.
    Confidence

    Select High (H), Medium (M), or Low (L).

    Detector Stat

    Select All, Active or Idle.

    All

    Returns all detections the user has access to regardless of whether or not it was triggered in the current account.

    ActiveReturns all active detections.
    Idle Returns all detections that have been triggered in the current account but are not currently active.
    MutedSelect Unmuted or Muted. See, Muting .
    DisabledSelect Enabled or Disabled. See, Disabling detectors.

    Custom Filters

    Finds detectors with a custom filter in the query.

    Custom Resolution Method

    Filter by the Automatic Resolution Period.

    Order ByOrder the detectors by Impacted Devices, Muted Devices, Severity, Confidence, Category, or Last Seen.
  3. Click a detector to open the Details page. The following information is displayed:

    Category

    The attack category.

    First Seen

    The UTC date and time the first event associated with the detection occurred.

    Last Seen

    The UTC date and time of the last known event tied to the detector was observed.

    Updated

    The UTC date and time the detector was modified.

    Resolution Method

    • Automatic: The detection will be resolved if events containing the same host and sensor ID are not observed for the specified time period.

    • Manual: The detection will remain active until an analyst resolves the detection.

    MITRE ATT&CK

    The MITRE ATT&CK ID.

    Primary Technique

    The primary attack name and ID.

    Specificity

    Behaviors

    The behavior coverage.

    Description

    A description of the detection. You can use this description to search for detections. See, Searching for detections with the detector description

    Next StepsRecommendations to resolve the detection.
    Show Matching EventsClick to view the Entity Lookup.
    AuthorThe detector author.
    Impacted DeviceThe fields used to generate the detection. The internal IP address in the src.ip or dst.ip fields is the default.
    Indicator Fields

    The indicators the detector uses to generate the detection.

    This information is useful for identifying related activity and tracking indicators over time.

    Detectors can define up to five fields to extract indicators from, and each detection can store up to five unique indicators for each indicator field.

    Impacted devices

    The active detections for the detector. All Active defections are displayed by default. You can create a filter to view Muted or Resolved detections. See, Impacted Devices.

    You can use this tab to resolve detections or to search for a device by IP.

    Query

    This tab displays the IQL query defined for the detector. You can use a query string to create a custom detector. See, Adding custom filters to detectors.

    Events

    This tab displays all of the events that have matched the detector's query.

    • Left-click on an entity to open the Entity Panel.

    • Right-click a field to open its menu (for example, Search Events, Targeted Search and Copy to Clipboard).

    • Hover a column header to lock, sort or arrange the columns.

    These events are duplicates of the original matching event. When an event matches a detector's query, a copy is created and added to the detector's list of Latest Events so the event remains associated with the detector.

    This list can display up to the last 1000 matching events. Events could remain in the list in perpetuity if the detector rarely fires.

    Indicators

    This tab displays the field value extracted from a detection's event(s) as defined by the detector.

    This information is useful for identifying related activity and tracking indicators over time. Detectors can define up to five fields to extract indicators from and each detection can store up to five unique indicators for each indicator field.

Searching for detections with the detector description

You can use text of the detector description to search for detections. Copy and paste the description text into and Global Search field and click Enter.

Search results will be highlighted in the Detection Description column of the in the Detections section of results.

Impacted Devices

Column

Description

Device IP

The device IP address.

DHCP Hostname

The DHCP lease hostname.

Username

The device username.

Hostname

The device hostname.

MAC Address

The device MAC address

Lifetime Events

The number of events over the device lifetime. Click the link to drill down to the earliest events.

Indicators

The number of indicators of compromise. Click the link to view the indicators associated with the device IP.

First Seen

The date the event was first seen.

Last Seen

The date the event was last seen.

Created

The date the event was created.

Updated

The date the event was updated.

Sensor ID

The sensor ID. Hover over the ID to view the sensor information and annotations. Tags associated with the sensor are displayed within the column. Click the ID to open the Sensor Details page.

Account

The account the device belongs to.

Status

The detection status (Active, Muted or Resolved). See Detections.

Muted by

The user who muted the detector.

Date Muted

The date the detector was muted.

Resolved by

The user who resolved the detection.

Resolution

The resolution description.

Date Resolved

The date the detection was resolved.

Overriding the default resolution method and time

You can override the default resolution method and resolution time for detectors that were created by another account. Each detector includes an edit option that lets you update the resolution method (automatic or manual) and adjust the resolution time. You can also restore the original settings defined by the detector’s creator if needed.

This option is available only for detectors your account did not create. For detectors created by your account, the override option is hidden.

When a detector has a overridden resolution method, an override indicator appears both in the detector header and in the list view, similar to the existing custom filter icon.

To override the resolution method:
  1. Go to Detections > Triage detections and open a detector created by another account.
  2. Next to Resolution Method, click the pencil icon. The Override Resolution Method dialog opens.
  3. Configure the Resolution Style and click Apply.

Related Videos

sidebar video

FortiNDR Cloud: DCSync Attack Coverage

  • 59 views
  • 3 months ago
sidebar video

FortiNDR Cloud: Malleable C2 Attack Coverage

  • 23 views
  • 3 months ago
sidebar video

FortiNDR Cloud: Kerberoasting Attack Coverage

  • 42 views
  • 3 months ago

Triage detections

Triage detections

The Triage Detections page displays all Active detectors in your account. Use this page to review and respond to detections triggered by the detector. Each row in the page displays a single detector with at least one active detection. Once all detections for a detector are resolved or muted, the detector's status is automatically updated from Active to Idle. You can create a filter to view all detectors and detections regardless of their status.

Table view is the default layout for displaying detections. Table View presents detections in a compact, row‑and‑column format for easier sorting and comparison. Each detection appears as a single row with detailed fields such as name, category, severity, confidence, timestamps, author, mute status, and impacted devices. This view is useful when you need to quickly scan large amounts of data, sort by specific columns, or perform detailed analysis across multiple detections.

Gallery view presents each detection as a card in a grid, showing key information such as the detection name, severity, category, last‑seen time, and impacted devices. This view makes it easy to scan multiple detections quickly and identify the most important items at a glance.

When the All accounts view is enabled, the Accounts column appears and shows all accounts a detector is running on. For detectors that run on a single account, the column displays that account name. For detectors running across multiple accounts, hovering over the value opens a tooltip listing all associated accounts.

The Triage Detections page displays the following information:

Name The detector name.
Category

There are three categories for detectors: Attack, Potentially Unwanted Application (PUA), and Posture. Each category contains a more detailed subcategory. For more information, see Detector Categories.

Severity

The severity measures the potential impact to the confidentiality, integrity, or availability of information systems and resources if the activity is confirmed to be a true positive. Severity can be assigned to one of the following values:

Severity Description Examples
High Significant to fair impact with the potential to spread or escalate Malicious code execution, C2 communications, lateral movement, data exfiltration.
Moderate Fair impact with minimal potential to spread or escalate Activity that could indicate malicious intent, untargeted attacks with unknown success, data leakage, subversion of security or monitoring tools
Low Little to no impact expected Potentially unauthorized software, devices, or resource use, untargeted adware or spyware, compromise of a personal device or device on an untrusted network, insecure configurations
Confidence

Confidence measures how likely events matching the detector’s query are indicative of the activity specified in the detector description. A detector's confidence indicates its minimum true-positive detection rate.

Confidence Minimum True-Positive Rate
High 90%
Moderate 75%
Low 50%

FortiGuard Lab assigns a detector's initial confidence based on its performance during testing. Once deployed, detectors are monitored for changes in their true-positive detection rate, which is based on the resolution state chosen by an analyst when resolving a detection. Once a detector crosses a higher or lower threshold, it is reviewed to determine whether it should be tuned or whether the confidence should be modified.

Last Seen The UTC date and time when the last known event tied to the detector was observed. This is useful when determining when the most recent change to a detector has occurred.
Author The account that authored the detector.
Impacted Devices The internal IP address in the src.ip or dst.ip fields used to generate detections. This field is configurable.
Status

By default, every detection is in an Active state upon creation. Active detections generate a notification (see Email notifications), but Muted detections will not. Detections remain Active until they are resolved manually by an analyst or automatically based on the detector's Resolution Period. Once resolved, their status changes to Resolved.

Detection State Description
Active When an event matching a detector is observed, a detection is generated and set to Active by default. A notification is triggered for Active detections.
Muted When an event matching a detector is observed, but some aspect of it is muted. A notification is not triggered for muted detections.
Resolved When a detection is resolved, either manually by an analyst or automatically, and is no longer Active.

Toolbar

Option

Description

View the page as a gallery.
View the page as a table.
Create a detector

Settings:

  • Show Muted Devices
  • Show Detail View

Actions:

  • Manage Detectors
  • Muted Devices
  • Excluded Devices
  • Email Notifications

Detector Categories

Category Subcategory Description
Attack Infection Vector Attacks in the initial stages before an exploit attempt has been made or malicious code has been executed. Examples include downloading a malicious executable file, navigating to a web site that is known to redirect to exploitation servers, or an attempt to authenticate to an SSH server from a malicious host.
Attack Exploitation Attacks in the process of exploiting known vulnerabilities such as those listed in MITRE’s Common Vulnerabilities and Exposures (CVE) list. While FortiNDR Cloud may be unable to determine the success of a launched exploit, any hosts attempting exploits (that are not approved internal scanners) should be investigated for signs of compromise.
Attack Installation Installation of malicious software (staging) for persistence in an environment. For example, the Cobalt Strike staging tool downloading a Beacon backdoor over HTTP in order to provide persistence on a compromised host and run further post-exploitation commands.
Attack Lateral Movement Tools and techniques commonly used by attackers to pivot from a compromised host to other assets within the environment. Such tools may also be legitimately used by system administrators but should be investigated, especially for hosts from which this activity has not be observed before.
Attack Command and Control Command and control traffic between compromised hosts and attacker infrastructure.
Attack Exfiltration Data exfiltration from compromised assets to external entities.
Attack Discovery Tools and techniques commonly used by attackers to identify accesible hosts and services. Such tools may also be legitimately used by system administrators but should be investigated, especially for hosts from which this activity has not be observed before.
Attack Impact Malware or behavior intended to disrupt the business, such as distributed denial of service (DDoS) and ransomware attacks.
PUA Adware Malware characterized by its use of advertisements to generate revenue for the author. Adware is often installed alongside third-party applications and remains on a system as a browser add-on or self-proclaimed optimization software. Most adware is considered low risk due to its innocuous nature.
PUA Spyware Malware characterized by its focus on gathering device and user information without the user’s knowledge. This information is usually sent back to the authors for a variety of purposes, ranging from market research to targeted monitoring. Spyware is usually installed alongside third-party applications and persists on a system as a backdoor or as software that purports to be useful. Most spyware is considered low risk due to its historical use for low-impact data collection and advertising.
PUA Unauthorized Resource Use Applications that utilize system resources without a user’s knowledge or consent. Such applications are usually installed alongside third-party applications or as a component of malware in order to monetize a successfully compromised host (for example, via click fraud or cryptocurrency mining).
Posture Potentially Unauthorized Software of Device Applications or devices that circumvent organizational policies or increase the attack surface of an organization. These detectors cover various applications that may be used to bypass monitoring tools and access controls, or store sensitive information in unauthorized locations. This category also includes tools that may be legitimately used for system administration, development, or penetration testing, but are also commonly used by attackers to enumerate access and pivot within a compromised environment.
Posture Insecure Configuration Configurations within an environment that make it more vulnerable to exploitation or post-exploitation techniques used by attackers. Such configurations include outdated software, use of deprecated cryptographic standards, or configurations resulting in data leakage.
Posture Anomalous Activity Network activity that is abnormal and should be investigated to determine its cause. The activity may be malicious in nature or a misconfiguration that may or may not have security implications.

Viewing and filtering detections

To view the Triage detections page:
  1. Go to Detections > Triage detections. The Detections page opens.
  2. (Optional) Filter the detections on the page.

    Search

    Enter the technique ID, technique name or technique description.

    Detectors are filtered based on the prefix matching the selected technique ID. If Technique T1234 is entered, the detectors returned include its sub-techniques T1234.001, T1234.002, T1234.003, etc.

    Severity

    Select High (H), Medium (M), or Low (L).

    Additional Filters

    Click the filter icon to view additional filters.

    Filter

    Description

    CategoryFilter the detectors by category. See, Detector Categories.

    Assigned to

    Filter by assigned detections. See, Assigning detections.

    Created ByFilter by the account that created the detector.

    Sensors

    This filter displays all sensors in the account. The dropdown is divided into two groups: online sensors appear at the top, while other statuses are listed below.

    TechniqueFilter by the technique used for the detection.
    Confidence

    Select High (H), Medium (M), or Low (L).

    Detector Stat

    Select All, Active or Idle.

    All

    Returns all detections the user has access to regardless of whether or not it was triggered in the current account.

    ActiveReturns all active detections.
    Idle Returns all detections that have been triggered in the current account but are not currently active.
    MutedSelect Unmuted or Muted. See, Muting .
    DisabledSelect Enabled or Disabled. See, Disabling detectors.

    Custom Filters

    Finds detectors with a custom filter in the query.

    Custom Resolution Method

    Filter by the Automatic Resolution Period.

    Order ByOrder the detectors by Impacted Devices, Muted Devices, Severity, Confidence, Category, or Last Seen.
  3. Click a detector to open the Details page. The following information is displayed:

    Category

    The attack category.

    First Seen

    The UTC date and time the first event associated with the detection occurred.

    Last Seen

    The UTC date and time of the last known event tied to the detector was observed.

    Updated

    The UTC date and time the detector was modified.

    Resolution Method

    • Automatic: The detection will be resolved if events containing the same host and sensor ID are not observed for the specified time period.

    • Manual: The detection will remain active until an analyst resolves the detection.

    MITRE ATT&CK

    The MITRE ATT&CK ID.

    Primary Technique

    The primary attack name and ID.

    Specificity

    Behaviors

    The behavior coverage.

    Description

    A description of the detection. You can use this description to search for detections. See, Searching for detections with the detector description

    Next StepsRecommendations to resolve the detection.
    Show Matching EventsClick to view the Entity Lookup.
    AuthorThe detector author.
    Impacted DeviceThe fields used to generate the detection. The internal IP address in the src.ip or dst.ip fields is the default.
    Indicator Fields

    The indicators the detector uses to generate the detection.

    This information is useful for identifying related activity and tracking indicators over time.

    Detectors can define up to five fields to extract indicators from, and each detection can store up to five unique indicators for each indicator field.

    Impacted devices

    The active detections for the detector. All Active defections are displayed by default. You can create a filter to view Muted or Resolved detections. See, Impacted Devices.

    You can use this tab to resolve detections or to search for a device by IP.

    Query

    This tab displays the IQL query defined for the detector. You can use a query string to create a custom detector. See, Adding custom filters to detectors.

    Events

    This tab displays all of the events that have matched the detector's query.

    • Left-click on an entity to open the Entity Panel.

    • Right-click a field to open its menu (for example, Search Events, Targeted Search and Copy to Clipboard).

    • Hover a column header to lock, sort or arrange the columns.

    These events are duplicates of the original matching event. When an event matches a detector's query, a copy is created and added to the detector's list of Latest Events so the event remains associated with the detector.

    This list can display up to the last 1000 matching events. Events could remain in the list in perpetuity if the detector rarely fires.

    Indicators

    This tab displays the field value extracted from a detection's event(s) as defined by the detector.

    This information is useful for identifying related activity and tracking indicators over time. Detectors can define up to five fields to extract indicators from and each detection can store up to five unique indicators for each indicator field.

Searching for detections with the detector description

You can use text of the detector description to search for detections. Copy and paste the description text into and Global Search field and click Enter.

Search results will be highlighted in the Detection Description column of the in the Detections section of results.

Impacted Devices

Column

Description

Device IP

The device IP address.

DHCP Hostname

The DHCP lease hostname.

Username

The device username.

Hostname

The device hostname.

MAC Address

The device MAC address

Lifetime Events

The number of events over the device lifetime. Click the link to drill down to the earliest events.

Indicators

The number of indicators of compromise. Click the link to view the indicators associated with the device IP.

First Seen

The date the event was first seen.

Last Seen

The date the event was last seen.

Created

The date the event was created.

Updated

The date the event was updated.

Sensor ID

The sensor ID. Hover over the ID to view the sensor information and annotations. Tags associated with the sensor are displayed within the column. Click the ID to open the Sensor Details page.

Account

The account the device belongs to.

Status

The detection status (Active, Muted or Resolved). See Detections.

Muted by

The user who muted the detector.

Date Muted

The date the detector was muted.

Resolved by

The user who resolved the detection.

Resolution

The resolution description.

Date Resolved

The date the detection was resolved.

Overriding the default resolution method and time

You can override the default resolution method and resolution time for detectors that were created by another account. Each detector includes an edit option that lets you update the resolution method (automatic or manual) and adjust the resolution time. You can also restore the original settings defined by the detector’s creator if needed.

This option is available only for detectors your account did not create. For detectors created by your account, the override option is hidden.

When a detector has a overridden resolution method, an override indicator appears both in the detector header and in the list view, similar to the existing custom filter icon.

To override the resolution method:
  1. Go to Detections > Triage detections and open a detector created by another account.
  2. Next to Resolution Method, click the pencil icon. The Override Resolution Method dialog opens.
  3. Configure the Resolution Style and click Apply.