Microsoft Active Directory
- What is Discovered and Monitored
- Event Types
- Rules
- Reports
- Configuration
- Active Directory User Discovery
- Validating LDAP Credentials and Permissions
- Mapping Active Directory User Attributes to FortiSIEM User Attributes
What is Discovered and Monitored
Protocol |
Information discovered |
Metrics collected |
Used for |
---|---|---|---|
LDAP | User details, Password age | Security Monitoring, User meta data for log | |
WMI | Win32_PerfRawData_NTDS_NTDS class: Directory Search Rate, Read Rate, Write Rate, Browse Rate, LDAP search rate, LDAP Bind Rate, New LDAP Connection Rate, Successful LDAP Bind Rate, LDAP Active Threads, LDAP Bind Time, LDAP Client Sessions | Performance Monitoring | |
WMI | "dcdiag -e" command output - detect successful and failed domain controller diagnostic tests | Domain Controller Replication status | |
WMI | "repadmin /replsummary" command output - detect replication statistics | Domain Controller Replication status |
Event Types
- PH_DISCOV_ADS_ACCOUNT_TO_EXPIRE (Active Directory account to expire in 2 weeks)
- PH_DISCOV_ADS_ACCT_DISABLED (Accounts Disabled)
- PH_DISCOV_ADS_DORMANT_ACCT (Dormant User Accounts - not log on in last 30 days)
- PH_DISCOV_ADS_PASSWORD_NEVER_EXPIRES (Active Directory user password never expires)
- PH_DISCOV_ADS_PASSWORD_NOT_REQD (Active Directory user password not required)
- PH_DISCOV_ADS_PASSWORD_STALE (Active Directory user password stale - more than 90 days)
- PH_DISCOV_ADS_PASSWORD_TO_EXPIRE (Active Directory user password to expire in 2 weeks)
- PH_DEV_MON_DCDIAG (output of "dcdiag -e" command)
[PH_DEV_MON_DCDIAG]:[hostIpAddr]=10.1.20.59,[hostName]=WIN-IGO8O8M5JVT,[errReason]="",[testResult]="passed",[testSubject]="WIN-IGO8O8M5JVT",[testName]="NCSecDesc"
- PH_DEV_MON_SRC_AD_REPL_STAT (output of "repadmin /replsummary" command)
[PH_DEV_MON_SRC_AD_REPL_STAT]:[hostIpAddr]=10.1.20.59,[hostName]=WIN-IGO8O8M5JVT, [largestReplDelta]=">60 days",[failureCount]=0.00,[count]=5.00,[failurePct]=0.00,[srcName]="WIN-IGO8O8M5JVT",[errReason]=""
-
PH_DEV_MON_DST_AD_REPL_STAT (output of "repadmin /replsummary" command)
[PH_DEV_MON_DST_AD_REPL_STAT]:[hostIpAddr]=10.1.20.59,[hostName]=WIN-IGO8O8M5JVT, [largestReplDelta]=">60 days",[failureCount]=0.00,[count]=5.00,[failurePct]=0.00,[destName]="WIN-IGO8O8M5JVT",[errReason]=""
Rules
- Failed Windows DC Diagnostic Test
Reports
- Successful Windows Domain Controller Diagnostic Tests
- Failed Windows Domain Controller Diagnostic Tests
- Source Domain Controller Replication Status
- Destination Domain Controller Replication Status
Configuration
WMI
See WMI Configurations in the Microsoft Windows Server Configuration section.
Active Directory User Discovery
If you want to add Active Directory users to FortiSIEM, follow these steps in the FortiSIEM UI.
- Add the login credentials for Active Directory server and associate them to an IP range.
- Discover the Active Directory server.
If the Active Directory server is discovered successfully, then all of the users and their properties will be added to FortiSIEM.
After the users have been added to FortiSIEM, you can re-run discovery to get new changes from Active Directory. You cannot make changes in FortiSIEM as this will inevitably make FortiSIEM out of synch with Active Directory.
Since Active Directory can contain many users, it is possible to choose a sub-tree by specifying a base DN (see below).
Adding Active Directory Login Credentials to FortiSIEM
- Log in to your Supervisor UI.
- Go to ADMIN > Setup > Credentials.
- Click New to create an LDAP discovery credential by entering the following in the
Access Method Definition dialog box:
- Name: a name for the credential.
- Device Type: select Microsoft Windows.
- Access
Protocol:
- By default, LDAP servers listen on TCP port 389.
- LDAPS (LDAP with SSL) defaults to port 636.
- LDAP Start TLS defaults to port 389.
- Used For: select Microsoft Active Directory.
- Enter the root of the LDAP user tree that you want to discover. For example,
dc=companyABC,dc=com
orou=Org1,dc=companyABC,dc=com
- NetBIOS/Domain: enter the NetBIOS/Domain value.
- User Name: enter the user name for your LDAP directory.
The user should be a member of the Domain Users group in Active Directory. See the Validating LDAP Credentials and Permissions for information on how to validate this membership.
- Enter and confirm the Password for your User.
- Click Save. Your LDAP credentials will be added to the list of credentials.
- Under Enter IP Range to Credential Associations, click Add.
- Select your LDAP credentials from the list of Credentials. Click + to add more.
- Enter the IP/IP Range or host name for your Active Directory server.
- Click Save. Your LDAP credentials will appear in the list of credential/IP address associations.
- Click Test > Test Connectivity to make sure you can connect to the Active Directory server.
Discovering Users in FortiSIEM
- Go to ADMIN > Setup > Discovery and click New.
- For Name, enter Active Directory.
- For Include, enter the IP address or host name for your Active Directory server.
- Click Save. Active Directory will be added to the list of discoverable devices.
- Select the Active Directory device and click Discover.
- After discovery completes, go to CMDB > Users to view the discovered users. You may need to click the Refresh icon to load the user tree hierarchy.
To get user updates in Active Directory, simply re-run discovery.
Validating LDAP Credentials and Permissions
- Log in to your Active Directory server.
- Open the Active Directory console from the command prompt and execute the
dsa.msc
command. - From the Active Directory console, select the User that added in FortiSIEM Supervisor.
- Right click the selected User and check Properties.
- The User should be a member of Domain Users.
- On FortiSIEM Base DN should match, example:
DC=accelops,DC=net
.
Mapping Active Directory User Attributes to FortiSIEM User Attributes
The following table shows how user attributes in Microsoft Active Directory are shown in the FortiSIEM UI. To find Active Directory user attributes, take the following steps:
- Log in to Active Directory.
- Go to Active Directory Users and Computers.
- Click View > Enable Advanced Features.
- Find a user, and take the following steps:
- Double click user.
- Click Attribute Editor.
You will see a set of attributes and the values they are set to.
In FortiSIEM, user details can be found in CMDB > Users. First, click the tree node on the left that you have discovered, then locate the user in the right pane. Attributes are displayed on the main page and under Summary, Contact, and Member Of.
Microsoft Active Directory User Attribute | FortiSIEM User Attribute |
---|---|
sAMAccoutName | User Name |
name | Full Name |
userPrincipalName | <Not shown> |
telephoneNumber |
Work Phone |
mobile |
Mobile Phone |
title |
Job Title |
company |
Company |
department |
<Not shown> |
employeeID |
Employee ID |
manager |
Manager |
I |
<Not shown> |
postalCode |
ZIP |
streetAddress |
Address |
homePostalAddress |
<Not shown> |
c |
City |
st |
State |
co |
Country |
memberOf |
Member Of |