- What is Discovered and Monitored
- Event Types
- Settings for Access Credentials
- Example Syslog
|Protocol||Information Discovered||Metrics Collected||Used For|
|SNMP||Host Name, OS, version, Hardware||CPU, Memory, Disk, Interface utilization||Performance Monitoring|
|HTTP(S)||Host Name, OS, version, Hardware||Log Management, Security Compliance, SIEM|
|Syslog||Threat feed - Malware URL, Malware Hash||Malware found/cleaned, Botnet, Malware URL, System Events||Log Management, Security Compliance, SIEM|
In ADMIN > Device Support > Event Types, search for "fortisandbox-" to see the event types associated with this device.
In RESOURCES > Rules, search for "fortisandbox" in the main content panel Search... field to see the rules associated with this device.
Also, basic availability rules in RESOURCES > Rules > Availability > Network and performance rules in RESOURCES > Rules> Performance > Network also trigger.
In RESOURCES > Reports, search for "fortisandbox" in the main content panel Search... field to see the reports associated with this device.
FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
For FortiSandbox log server documentation, see https://docs.fortinet.com/document/fortisandbox/4.0.0/administration-guide/323679/log-servers.
- For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
- For Port, enter 514.
- Make sure that the syslog format should be the same as that shown in the example.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
|Device Type||Fortinet FortiSandbox|
|Access Protocol||See Access Credentials|
|Port||See Access Credentials|
|Password config||See Password Configuration|
Oct 12 14:35:12 172.16.69.142 devname=turnoff-2016-10-11-18-46-05-172.16.69.142 device_
id=FSA3KE3A13000011 logid=0106000001 type=event subtype=system pri=debug user=system
ui=system action= status=success reason=none letype=9 msg="Malware package: urlrel version
2.88897 successfully released, total 1000"
devid=FSA35D0000000006 tzone=-25200 tz=PDT date=2016-08-19 time=06:48:51 logid=0106000001
type=event subtype=system level=information user=admin ui=GUI action=update status=success
reason=none letype=9 msg="Remote log server was successfully added"