Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

External Systems Configuration Guide

Fortinet FortiSandbox

What is Discovered and Monitored

Protocol Information Discovered Metrics Collected Used For
SNMP Host Name, OS, version, Hardware CPU, Memory, Disk, Interface utilization Performance Monitoring
HTTP(S) Host Name, OS, version, Hardware   Log Management, Security Compliance, SIEM
Syslog Threat feed - Malware URL, Malware Hash Malware found/cleaned, Botnet, Malware URL, System Events Log Management, Security Compliance, SIEM

Event Types

In ADMIN > Device Support > Event, search for "fortisandbox-" to see the event types associated with this device.

Rules

In RESOURCE > Rules, search for "fortisandbox-" to see the rules associated with this device.

Also, basic availability rules in RESOURCE > Rules > Availability > Network and performance rules in RESOURCE > Rules> Performance > Network also trigger.

Reports

In RESOURCE > Reports, search for "fortisandbox-" to see the rules associated with this device.

Configuration

Syslog

FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual appliance.

For Port, enter 514.

Make sure that the syslog format is the same as that shown in the example.

Example Syslog:

Oct 12 14:35:12 172.16.69.142 devname=turnoff-2016-10-11-18-46-05-172.16.69.142 device_

id=FSA3KE3A13000011 logid=0106000001 type=event subtype=system pri=debug user=system

ui=system action= status=success reason=none letype=9 msg="Malware package: urlrel version

2.88897 successfully released, total 1000"

<14>2016-08-19T06:48:51 devhost=turnoff-2016-08-15-19-24-55-172.16.69.55

devid=FSA35D0000000006 tzone=-25200 tz=PDT date=2016-08-19 time=06:48:51 logid=0106000001

type=event subtype=system level=information user=admin ui=GUI action=update status=success

reason=none letype=9 msg="Remote log server was successfully added"

Settings for Access Credentials

Set these Access Method Definition values to allow FortiSIEM to communicate with your device.

Setting Value
Name <set name>
Device Type Fortinet FortiSandbox
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration

Fortinet FortiSandbox

What is Discovered and Monitored

Protocol Information Discovered Metrics Collected Used For
SNMP Host Name, OS, version, Hardware CPU, Memory, Disk, Interface utilization Performance Monitoring
HTTP(S) Host Name, OS, version, Hardware   Log Management, Security Compliance, SIEM
Syslog Threat feed - Malware URL, Malware Hash Malware found/cleaned, Botnet, Malware URL, System Events Log Management, Security Compliance, SIEM

Event Types

In ADMIN > Device Support > Event, search for "fortisandbox-" to see the event types associated with this device.

Rules

In RESOURCE > Rules, search for "fortisandbox-" to see the rules associated with this device.

Also, basic availability rules in RESOURCE > Rules > Availability > Network and performance rules in RESOURCE > Rules> Performance > Network also trigger.

Reports

In RESOURCE > Reports, search for "fortisandbox-" to see the rules associated with this device.

Configuration

Syslog

FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual appliance.

For Port, enter 514.

Make sure that the syslog format is the same as that shown in the example.

Example Syslog:

Oct 12 14:35:12 172.16.69.142 devname=turnoff-2016-10-11-18-46-05-172.16.69.142 device_

id=FSA3KE3A13000011 logid=0106000001 type=event subtype=system pri=debug user=system

ui=system action= status=success reason=none letype=9 msg="Malware package: urlrel version

2.88897 successfully released, total 1000"

<14>2016-08-19T06:48:51 devhost=turnoff-2016-08-15-19-24-55-172.16.69.55

devid=FSA35D0000000006 tzone=-25200 tz=PDT date=2016-08-19 time=06:48:51 logid=0106000001

type=event subtype=system level=information user=admin ui=GUI action=update status=success

reason=none letype=9 msg="Remote log server was successfully added"

Settings for Access Credentials

Set these Access Method Definition values to allow FortiSIEM to communicate with your device.

Setting Value
Name <set name>
Device Type Fortinet FortiSandbox
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration