Fortinet FortiAuthenticator
What is Discovered and Monitored
Protocol | Information Discovered | Data Collected | Used for |
---|---|---|---|
SNMP | Vendor, OS, Model, Network Interfaces | Interface Stat, Authentication Stat | Performance Monitoring |
Syslog | LOG Discovery | Over 150 event types | Security and Compliance |
Event Types
In RESOURCES > Event Types, search for "FortiAuthenticator" in the main content panel Search... field.
Sample Event Type:
<14>Aug 14 22:32:52 db[16987]: category="Event" subcategory="Authentication" typeid=20995 level="information" user="admin" nas="" action="Logout" status="" Administrator 'admin' logged out
Configuration
FortiAuthenticator logging instructions can be found here: https://docs.fortinet.com/document/fortiauthenticator/6.3.1/administration-guide/964220/log-configuration
Configure FortiAuthenticator to send logs to FortiSIEM by taking the following steps:
Create a Syslog Server
-
From FortiAuthenticator, navigate to Logging > Log Config > Syslog Servers.
-
Click Create New.
-
In the Name field, enter a name such as "FortiSIEM Collector".
-
In the Server name/IP field, enter the FortiSIEM Collector IP address.
-
In the Port field, ensure 514 is configured.
-
Click OK to add the syslog server.
Configure Remote Logging
-
Navigate to Logging > Log Config > Log Settings.
-
Go to Remote Syslog and make sure Send system logs to remote Syslog servers is enabled.
-
Move the "FortiSIEM Collector" syslog server to which logs will be sent from the Available Syslog Servers box to the Chosen Syslog Servers box.
-
Select OK to save your settings.
FortiSIEM Access Credentials
For Device Type, select Fortinet FortiAuthenticator from the drop-down list. See Access Credentials for more information on configuration.