Device Support Advanced Operations
FortiSIEM enables you to perform the following advanced operations:
- Checking Device Monitoring Status and Health
- Setting Devices Under Maintenance
- Creating Custom Monitors
- Setting Important Interfaces and Processes
- Modifying System Parsers
- Creating Custom Parsers
- Handling Multi-line Syslog
- Creating Synthetic Transaction Monitors
- Mapping Events to Organizations
- Adding Windows Agents
- Adding Linux Agents
- Forwarding Events to External Systems
Checking Device Monitoring Status and Health
For Performance Monitoring scenarios, you would like to know:
- Is FortiSIEM is able to monitor the devices on time? Is FortiSIEM falling behind?
- Are there monitoring errors?
- What is the current health of monitored devices?
To check whether FortiSIEM is able to collect monitoring data on time:
- Go to CMDB.
- Search for the device and by typing in a string in the search window.
- Check the Monitor Status column.
- If Monitor Status Warning or Critical, then select the Device and check the Monitor sub-tab in the bottom pane to find out the reason.
FortiSIEM is an optimized multi-threaded solution. If one node is given too many devices to monitor, each device with many metrics, then it may not be able to keep up. If FortiSIEM is not able to keep up (e.g. polling interval is 1 minute and last poll was 3 minutes ago), then you can do one of the following:
- Check the Monitored Device resources (CPU, memory) and the network between FortiSIEM and the Monitored Device. Many monitoring protocols such as SNMP, WMI will not operate under WAN type latencies (greater than 10 msec).
- Increase the polling intervals by visiting ADMIN > Setup > Monitor Performance > More > Edit Intervals.
Note: If you increase polling intervals, some performance monitoring rules that require a certain number of polls in a time window may not trigger. Please adjust those rules either by reducing the number of polls or increasing the time window. For example, if a rule needs 3 events (polls) for a 10 min time window with original polling interval as 3 min, the rule will not trigger if polling interval is changed to 4 min or higher. To make the rule trigger again, either reduce the number of events needed (for example, from 3 to 2) or increase the time window (for example, from 10 min to 15 min). - Turn off some other jobs by visiting ADMIN > Setup > Monitor Performance > More > Edit Intervals.
- Deploy Collectors close to the Monitored Devices or deploy more Collectors and distribute performance monitoring jobs to Collectors by doing re-discovery.
To check for Monitoring errors:
- Go to ADMIN > Setup > Monitor Performance > More > Errors.
For details see here.
To see current health of a monitored device:
- Go to CMDB.
- Search for the device and by typing in a string in search window.
- Choose Actions > Device Health.
For details, see here.
Setting Devices Under Maintenance
If a device will undergo maintenance and you do not want to trigger performance and availability rules while the device is in maintenance, then
- Go to ADMIN > Setup > Maintenance.
- Select the Maintenance Schedule.
- Select the Group of Devices or Synthetic Transaction Monitors (STM) for maintenance.
- Make sure the Generate Incidents for Devices under Maintenance is checked.
For details, see here
Creating Custom Monitors
Although FortiSIEM provides out of the box monitoring for many devices and applications, user can add monitoring for custom device types or add monitoring for supported device types.
- Go to ADMIN > Device Support > Monitoring.
- Click Enter Performance Object > New and enter the specification of the Performance Object.
- Select the Performance Object and click Test.
- Click Enter Device Type to Performance Object Association > New and choose a set of Device Types and associated Performance Objects.
- Go to ADMIN > Setup > Credentials and enter the Device Credentials for a set of device types specified in Step 4.
- Go to ADMIN > Setup > Discovery and discover these devices.
- FortiSIEM will pick the customer monitors defined in Step 2 if the Tests in Step 3 succeeded.
- Go to ADMIN > Setup > Monitor Performance and see the monitors
From the same tab, Select one or more devices and Click More > Report and check whether the monitoring events are generated correctly.
Steps 1-4 are described here.
Steps 5 is described here.
Steps 6 is described here.
Step 8-9 are here.
Setting Important Interfaces and Processes
A network may have hundreds of interfaces and you have may have hundreds of network devices. Not all interfaces may not be interesting for up/down and utilization monitoring. For example, you may only want to monitor WAN links and trunk ports and leave out Access Ports. This saves you lots of CPU and storage. Similar logic applies to critical processes on servers.
Since FortiSIEM discovers interfaces and processes, it is easy to select Critical Interfaces and Processes for Monitoring.
- Go to ADMIN > Settings > Monitoring.
- Click Important Interfaces> Enable > New and select the Interfaces.
- Click Important Processes> Enable> New and select the Processes.
Note that once you select Important Interfaces and Processes, only these Interfaces and Processes will be monitored for availability and performance.
For details, see here.
Modifying System Parsers
If you want to modify a built-in log parser, then do the following steps:
- Go to ADMIN > Device Support > Parsers.
- Select a Parser and click Disable since you have two parsers for the same device.
- Select the same Parser and click Clone.
- Make the required modifications to the parser.
- Click Validate to check the modified Parser syntax.
- Click Test to check the semantics of the modified Parser.
- If both Validate and Test pass, then click Enable and then Save.
The modified Parser should show Enabled - Click Apply to deploy the modified Parser to all the nodes.
For details, see here.
Creating Custom Parsers
If you want to create a completely new log parser, then do the following steps:
- Go to ADMIN > Device Support > Parsers.
- Parsers are evaluated serially from top to bottom in the list. Select the parser just before the current custom parser and click New.
- Fill in the parser details – Name, Device Type, test Events and the parser itself.
- Click Validate to check the syntax
- Click Test to check the semantics of the modified parser.
- If all passes, then click Enable and then click Save.
The newly added parser should show Enabled. - Click Apply to deploy the change to all the nodes.
For details, see here.
Handling Multi-line Syslog
When devices send the same log in multiple log messages, you can combine them into one log in FortiSIEM to facilitate analysis and correlation.
- Go to ADMIN > Settings > Event Handling > Multiline Syslog.
- Click New to begin a multi-line syslog handling rule.
- Enter a Protocol – TCP or UDP.
- Enter a Begin Pattern and End Pattern regular expressions.
All the logs matching a begin pattern and an end pattern are combined into a single log - Click Save.
For details, see here.
Creating Synthetic Transaction Monitors
You can define a Synthetic Transaction Monitor to monitor the health an application or a web service. To do this:
- Go to ADMIN > Setup > STM.
- Step 1: Create a monitoring definition, click New and enter the required fields. When the protocol is HTTP, then a Selenium script can be input. Specify the timeout values for detecting STM failures.
- Step 2: Apply the monitoring definition to a host
- Step 3: Make sure it is working correctly - click Monitor Status.
For details, see here.
Mapping Events to Organizations
In most cases, the events received by a Collector is tagged with the Organization to which the Collector belongs. In some cases, events for multiple Organizations are aggregated by an upstream device and then forwarded to FortiSIEM. In this case, FortiSIEM needs to map events to organizations based on some parsed event attribute. An example is the FortiGate VDOM attribute.
This is accomplished as follows:
- Go to ADMIN > Settings > Event Handling > Event Org Mapping.
- Click New to create an Event Org mapping definition.
- Select a Device Type from the drop-down list.
- Specify the Event Attribute that contains the Organization information.
- Specify the Collector that will do this Event Org Mapping.
- Specify an IP or IP Range.
- Specify the mapping rules by clicking the edit icon next to Org mapping. In the Event Organization Mapping dialog box, map Event Attribute values to Organizations.
For details, see here.
Adding Windows Agents
FortiSIEM Windows Agents provides a scalable way to collect performance metrics, logs and other audit violations from a large number of Windows servers. Windows Agents (version 3.1 onwards) can be configured and managed from the FortiSIEM GUI. Windows Agent Manager is not required. As long as license is available, you can install Windows Agents and register to the FortiSIEM Supervisor node.
For details about Installing Windows Agents, see the latest Windows Agent Installation Guide.
For details about Configuring Windows Agent in FortiSIEM, see here.
Adding Linux Agents
Starting release 5.2.1, Linux Agent requires a license. Install a Linux Agent and register to the FortiSIEM Supervisor node. As long as the license is available, you can install Linux Agent and register to the FortiSIEM Supervisor node. Linux Agents can be configured and managed from the FortiSIEM GUI.
For details about Installing Linux Agents, see Linux Agent Installation Guide.
For details about Configuring Linux Agent in FortiSIEM, see here.
Forwarding Events to External Systems
Events received by FortiSIEM can be forwarded to external systems. FortiSIEM provides a flexible way to define forwarding criteria and forwarding mechanism such as syslog, Kafka and Netflow.
For details, see here.