What's New in 7.4.0
This release contains the following features, bug fixes and enhancements.
- System Updates
- Features
- Key Enhancements
- Bug Fixes and Enhancements
- Known Issues
- Implementation Notes
|
|
|
System Updates
This release includes Rocky Linux OS 8.10 patches until May 28, 2025. Details can be found at https://rockylinux.org/news/rocky-linux-8-10-ga-release. FortiSIEM Rocky Linux Repositories (os-pkgs-cdn.fortisiem.fortinet.com and os-pkgs-r8.fortisiem.fortinet.com) have also been updated to include Rocky Linux 8.10. FortiSIEM customers in versions 6.4.1 and above, can upgrade their Rocky Linux versions by following the FortiSIEM OS Update Procedure.
Features
New Dashboard Framework
This release provides a new widget dashboard framework.
-
A new widget layout method where the size and position of each widget can be freely chosen, and the layout can be re-arranged and re-sized. This contrasts with the fixed 3x3, 3x6 etc. format choices in earlier releases.
-
A button to globally modify the report window of all widgets in the dashboard.
-
Ability to modify the report definitions within the widget interface.
-
Streamlined widget setting dialog.
-
Gradient options for Bar charts, Tables and Single Column charts.
-
Enhance Single Column chart to display multiple data points (rows) within one widget.
-
Ability to save Table column width modifications by user.
-
For Bar Charts: Provides Category and Value selection and Clustered/Stacked Views to display multiple Values.
Global FortiSIEM Dashboard
This release provides a custom Home Dashboard that summarizes FortiSIEM findings and Data Sources in a few important visuals. The Risk Summary tab shows Overall Risk for the Organization along Top Risky Devices/Users and Incident and Case Status. The Data Source tab shows the Reporting Devices, Agents, Event Pulling Integrations and Storage usage.
This Dashboard can be found under the Dashboard tab for Enterprise Deployments and Super/Global logins in Service Provider Deployments.
Automation Service
Prior to 7.4.0, when an Incident triggers, the user can run a FortiSIEM Remediation script or run a FortiSOAR Playbook via API. The FortiSOAR playbooks need to be defined on a separate FortiSOAR system.
This release enables you create and run playbooks natively within FortiSIEM. Additional Automation Service license is needed to enable this feature. After deploying the license, you need to provision the Automation Service. Then you need to assign Automation Read/Modify/Execute Role to FortiSIEM users. Full admin user has Automation Read/Modify/Execute Role. User with Modify role can create and edit playbooks. User with Execute Role can execute playbooks, either directly from an Incident or by creating an Automation Policy. Playbooks are executed via Automation Agents included with Supervisor and Collectors. On a Supervisor node, Automation Agent is automatically configured during Automation Service provisioning. On Collectors, user will need to manually install Automation agent from FortiSIEM GUI.
To provision, see here.
To create an Agent on a Collector, see here.
To create a playbook, see here.
To execute playbooks on an Incident, see here.
To execute playbooks via Automation Policy, see here.
|
|
Note: The FortiSIEM Automation Service is in Beta, with planned general availability in early Q3 2025. Contact your Fortinet or partner account manager for updates. |
Rules using Advanced Search
Advanced Search feature in Release 7.3.0 enabled users to run complex SQL queries on ClickHouse events, CMDB Groups, CMDB Custom Device Properties and Lookup Tables. These queries can now be scheduled as a Rule to run periodically and create Incidents. You can quickly create a Schedule Rule after running an Advanced Search. Alternatively, you can create a Schedule Rule from scratch from Resources > Rules. The Filter and Group By condition in a traditional Rule is replaced by an Advanced Search SQL Query.
This feature works in ClickHouse deployments. Also Scheduled Rules can only be written from Super/Global accounts in Service Provider deployments.
Four system defined Advanced Search Rules are provided. They can be found under Resources > Rules by searching for Evaluation Mode set to Scheduled SQL.
-
Spike in Events from a Host
-
Spike in Unknown Events from a Host
-
Spike in inbound denied network traffic to a destination host
-
Spike in outbound denied network traffic from an internal host
For details on creating an Advanced Search Rule from Advanced Search, see here.
For details on creating an Advanced Search Rule from Resources > Rules, see here.
Incident Tags
This release includes a set of system defined Tags and associates them to built-in Rules. User can create their own Tags and associate them to Rules and optionally disable the system defined Tags. Incidents and cases display the currently enabled Tags for the associated Rules. User can search Rules, Incidents, and Cases by Tags. When a rule is selected under Resources > Rules, the Summary sidebar shows all linked tags under Tags.
To view all existing tags, navigate to Admin > Settings > Analytics > Rule Tags.
To add a tag for a Rule, go to Resources > Rules > Edit > Define Action > Tag.
Advanced Search Queries using FortiAI
This release enables users to write queries in natural language and ask FortiAI to generate the formal Advanced Search SQL query. This approach has some limitations for creating very complex SQL queries. See Creating a Query through FortiAI for detailed steps.
Incident Categorization using FortiAI
This release enables you to categorize Incidents occurring in a specific time intervals. For example, High CPU, Memory, Disk issues are categorized as Resource issues; various Login related issues are categorized as Access Issues. This rule similarity-based Categorization provides a way to get a big picture summary of all the all the Incidents triggering in your environment. Depending on your environment, potentially thousands of Incidents can easily boil down to tens of groups.
Incidents > List by Category (FortiAI) shows the Incident Categories for the selected period. You can drill down into each Category to see the related Incidents. A Risk score for the whole Category is provided.
By selecting List by Category (FortiAI) on the Incidents page, the user is provided with categorized incident groups containing incidents organized by semantic similarity, listed in order of a generated evaluated severity score. To view the incidents under the incident category, click
to expand the Incident group.
Generate Query Result Analysis using FortiAI
After running a report, you can use FortiAI to do a statistical analysis of the report results:
-
Categorical Column Analysis
-
Categorical Column Pair Frequency Analysis
-
Statistical Measures for Numerical Columns
-
Anomalies Detected
-
Correlation Between the Continuous Columns
This analysis can be invoked from Analytics > Search > Actions > FortiAI > Summarize, Analytics > Advanced Search > FortiAI > Summarize Results, and Analytics > Machine Learning > Actions > FortiAI > Summarize.
Support Azure OpenAI for FortiAI
FortiSIEM now supports Azure OpenAI for running FortiAI analysis.
For information on configuring Azure OpenAI services for FortiAI, see here.
For information on configuring Azure OpenAI on FortiSIEM, see Configuring FortiAI here.
Automated FortiSIEM Cluster Upgrade
Prior to this release, it is possible to upgrade the FortiSIEM Supervisor HA/DR Cluster by running one script. This release extends this automated upgrade by including the Worker nodes. So the entire Supervisor and Worker node cluster for both HA and DR scenarios can be upgraded by running one script.
Users running FortiSIEM 7.3.2 can use this upgrade method.
|
|
If you are upgrading from 7.3.x to 7.4.0 and have worker nodes in the cluster, ensure that the HA User Public Key on the licensed Supervisor is propagated to all other nodes by following the steps here first. |
To run this cluster upgrade, run this command from the Licensed Supervisor node
python fsm_cluster_upgrade.py
Nodes are upgraded in the following order
-
Licensed Supervisor
-
All Primary Nodes running PostGreSQL Database
-
Secondary Supervisor
-
All Primary Supervisor nodes without PostGreSQL Database
-
Primary Worker nodes
-
Secondary Worker nodes
First, the licensed Supervisor node will be upgraded. Then the node will reboot, and remaining nodes will be upgraded from this node in the order specified above.
Upgrade Status of various nodes can be found in this file on the Licensed Supervisor node
/var/tmp/upgrade_status_management.json
Upgrade logs can be found in this file on the Licensed Supervisor node
/var/log/fsm_cluster_upgrade.log
Key Enhancements
General Enhancements
-
Support RADIUS for GUI external authentication.
-
IP/Domain/Hash Reputation check from VirusTotal now uses VirusTotal v3 API
-
FortiSIEM installation on XEN Server
-
Two new Search Filter operators are added for ClickHouse deployments - STARTS_WITH and NOT STARTS_WITH
-
Security Enhancement: On these ports TCP 7900-7950,27900-27950 only FortiSIEM Supervisor and Worker nodes can communicate. For example, a random node cannot communicate to Supervisor or Worker on TCP port 7900-7900-7950,27900-27950.
-
Audit logs are added for Org rule activation/deactivation: PH_AUDIT_RULE_ACTIVATED and PH_AUDIT_RULE_DEACTIVATED
ClickHouse Enhancements
-
In ClickHouse, events in Hot, Warm, Cold and Archive partitions must maintain time order. This means Archives events must have earlier timestamp than Cold events, Cold events must have earlier timestamp than Warm events, etc. This condition may be violated when a new (Replica) Worker is added to a Shard, and there is another Worker in the shard with data. This situation may result in performance degradation and more importantly, newer data may be incorrectly archived or purged.
In this release, FortiSIEM detects this situation and
-
A GUI system error (ClickHouse Partitions Order: ClickHouse data partitions are not in order) is generated.
-
A log: ClickHouse data partitions are not in order (PH_CLICKHOUSE_DATA_PARTITIONS_OUT_OF_ORDER) is generated.
When this happens, you need to run this command on the node with out-of-order issue:
/opt/phoenix/bin/clickhouse-rebalance-partitionsThe GUI system error (ClickHouse Partitions Order: ClickHouse data partitions are not in order) should go away.
-
-
Two rules are created when a ClickHouse shard is unbalanced (more than 10 GB difference).
-
FortiSIEM Inter-shard ClickHouse Storage Gap High
-
FortiSIEM Intra-shard ClickHouse Storage Gap High
-
Dashboard Enhancements
FortiSIEM 7.4.0 has revamped most default system dashboards and added a few new ones. The layout has been improved, and update report data feeding widgets have been updated for accuracy.
Modified Dashboards
-
Application Server Dashboard
-
AWS Dashboard
-
Database Dashboard
-
FortiSIEM Dashboard
-
Fortinet Security Fabric Dashboard
Notes:
-
SaaS based product dashboard tabs moved to Fortinet Cloud Security Dashboard
-
Merged FortiGate/FortiProxy dashboards together
-
-
GCP Dashboard
-
Google Workspace Dashboard
-
Mimecast Dashboard
-
Network Dashboard
-
Nutanix Dashboard
-
Office365 Dashboard
-
Oracle Cloud Dashboard
-
Salesforce Dashboard
-
Security Dashboard
-
Server Dashboard
-
Trend Vision One Dashboard
-
VMWare Dashboard
-
Web Server Dashboard
New Dashboards
|
Dashboard |
Description |
|---|---|
| Crowdstrike Dashboard |
This dashboard is fed by the following integrations:
|
| Microsoft Azure Dashboard |
This dashboard is fed by the following integrations:
|
| Microsoft Windows Dashboard |
Windows now has a dedicated dashboard separate from the Server dashboard. This dashboard is fed by the following integrations:
|
| Fortinet Cloud Security Dashboard |
This dashboard contains tabs for the following SaaS based products: FortiCNAPP (New) This dashboard is fed by the following integrations:
FortiNDR Cloud (Moved from Security Fabric Dashboard) This dashboard is fed by the following integrations:
FortiRecon - Moved from Security Fabric Dashboard This dashboard is fed by the following integrations:
FortiDLP (New) This dashboard is fed by the following integrations:
|
| OT/IOT Dashboard |
This dashboard contains the following new tabs: Armis This dashboard is fed by the following integrations:
Nozomi Scada Guardian This dashboard is fed by the following integrations:
|
Rules and Reports
Changes to Rules and Reports, which include new, modified, and deleted rules and reports, from FortiSIEM 7.3.0 to FortiSIEM 7.4.0 are provided as .csv files
See here for rule changes.
See here for report changes.
REST API Enhancements
For details, logon to the Fortinet Developers Network (https://fndn.fortinet.net/index.php?/fortiapi/2627-fortisiem/).
-
Risk Score
Risk information is added to response of the following APIs.
/rest/context/ip/rest/context/hostname/rest/context/user -
New Case API
The following APIs are added.
-
Get Analysts -
GET pub/case/analysts -
Create a Case -
POST /pub/case -
Update a Case -
PUT /pub/case/{caseId} -
Upload Attachment to a Case -
POST pub/case/{caseId}/attachment
-
-
New Entity Reputation API
The following APIs provide reputation for an entity, based on information available in FortiSIEM and external threat intelligence lookups. In GUI, the information is available in Incidents > List View, by selecting an incident and viewing the Threat tab in the Incident slide in.
/pub/reputation/ip/{ip}/pub/reputation/domain/{domain}/pub/reputation/url{url}/pub/reputation/hash{hash} -
Enhanced Triggering Event API
Prior to 7.4.0 release, the following API returned the list of incident triggering events in a synchronous manner. The caller had to wait for the response containing the triggering events.
/pub/incident/triggeringEvents?incidentId={id}&timeFrom={from}&timeTo={to}In this release, a new API is introduced that returns the
queryId./pub/incident/triggeringEvents/start?incidentId={id}&timeFrom={from}&timeTo={to}The caller then uses the
queryIdto get progress./pub/incident/triggeringEvents/progress/{queryId}When progress reaches 100%, the caller gets the triggering events.
/pub/incident/triggeringEvents/result/{queryId}
GUI Enhancements
-
In Incidents tab:
-
Incidents Overview page is re-designed.
-
Incidents List View > By Device and By Rule are re-designed.
-
In the Explorer page, the Incident, Host, IP and User areas are paginated to support many entries without losing performance.
-
In the List View, a Related Incidents column is provided showing the count of Related Incidents. An Incident is related to the main Incident if it has same IP or host name as the main Incident or has the same IP or host name as another related Incident. Clicking the Related Incidents column takes you to a tab in the right slide-in that shows a timeline view of all the Related Incidents.
-
The Investigate action provides a graphical view of all Related Incidents and you can play the Incidents in time ordered manner to gather more Insight into the Related Incidents.
-
The FortiAI Incident Analysis is sharpened to create a timeline analysis of the Related Incidents, identify the attack chain, root cause and provide remediation suggestion.
-
Investigation View is streamlined to have only 1 informational slide in display.
-
Raw logs in JSON and XML are formatted to show the document structure.
-
Visualization added for Sudden User Location Change Incident to show the activity on a Geo Map.
-
-
In Resources tab, Rule and Report Search are enhanced to have same functionality as Incident Search, Case Search and CMDB Search.
-
In CMDB tab:
-
CMDB Search is streamlined.
-
A Global view of all devices across all Organizations is provided.
-
Two metrics are provided for Active and Inactive Devices. A device is considered Active if either Event Status or Monitor Status is Normal or Warning. A device is considered Inactive if both Event Status and Monitor Status are Critical. You can click these metrics to get a filtered view of the related devices.
-
Tooltip to explain Device Event Status and Monitor Status.
-
-
New CMDB Report Categories
-
Case Report
-
Risk Report
-
Agent Policy and Status
-
Device Support
-
Armis Centrix– Discovery, log collection
-
Fortinet Lacework FortiCNAPP (Cloud-Native Protection Platform) – Log collection
-
Fortinet FortiDLP – Log collection
Windows Agent 7.4.0 Updates
-
Windows Agent no longer needs the Windows .NET Framework.
-
The osquery version is upgraded to 5.14.1.
-
User log monitoring now monitors a file, even if it is created after the policy is applied.
-
Agent discovery correctly populates CMDB > Applications > Running On.
Bug Fixes and Enhancements
This release contains all the bug fixes in 7.3.2. In addition, the following bugs are resolved in this release.
|
Bug ID |
Severity |
Module |
Description |
|---|---|---|---|
|
1165944 |
Major |
App Server |
With more than 10 Workers, Content Update on Workers stops at 10 Workers and does not finish on the other Workers. |
|
1133459 |
Major |
App Server |
Optimize Appserver code to handle REST API calls requesting system configuration data (ph_sys_conf table). This can lead to slow database calls. |
|
1132585, 1125877 |
Major |
App Server |
Sometimes failed to delete Org from GUI due to foreign key constraint errors. |
|
1108212 |
Major |
App Server |
Optimize CMDB Device Property for multiple devices. Sometimes, GUI may become unusable if user attempts this operation. |
|
1151227 |
Minor |
App Server |
After upgrading to 7.3.2, Custom Parsers and Custom Event Attributes become inactive. |
|
1144975 |
Minor |
App Server |
External authentication based on Duo Security 2FA is not working for FSM Manager after upgrading to 7.3.2. |
|
1142200 |
Minor |
App Server |
Rule Exception does not work when symbols such as single quote and period are included in Value field. |
|
1138152 |
Minor |
App Server |
Cannot delete an Organization when a report has been scheduled for an organization. |
|
1126988 |
Minor |
App Server |
Issue in adding STM performance monitoring job because collectorID is null. |
|
1125874 |
Minor |
App Server |
Incident export to PDF may fail if incident Detail contains special characters. |
|
1125575 |
Minor |
App Server |
Sometimes, Health status fails to show because of 255 character size limit. |
|
1122238 |
Minor |
App Server |
ServiceNow integration fails when there is a space in the beginning of Host/URL. |
|
1114813 |
Minor |
App Server |
HTTP 403 Error on the GUI when changing local user password. |
|
1110449 |
Minor |
App Server |
In Summary Dashboard, the metrics do not show if you add columns from PH_DEV_MON_NET_INTF_UTIL, PH_DEV_MON_EC2_MET. |
|
1104846 |
Minor |
App Server |
Deleting one collector from the org in Collector HA group causes log ingestion failure from other collectors in the HA Group. |
|
1100102 |
Minor |
App Server |
CMDB report 'Rules with Exceptions' displays wrong result on the exported PDF of report bundle. |
|
1046719 |
Minor |
App Server |
Sometimes, Analytics query with custom attribute shows 'Invalid query XML' . This happens after you delete duplicate custom event attributes. |
|
796599 |
Minor |
App Server |
Missing Rule audit events when editing/activating/deactivating multiple rules. |
|
1126533 |
Minor |
ClickHouse Backend |
Query does not work if rawEventMsg is longer than 64KB. |
|
1091275 |
Minor |
ClickHouse Query |
Advance queries throw DB exception error when ClickHouse function is base64 encoded. |
|
1087970 |
Minor |
ClickHouse Query |
Queries using empty Lookup table returns no data. |
|
1141199 |
Minor |
Data work |
For FortiDeceptor Parser, set ReportingDevice correctly (instead of always 'local') and parse more event types. |
|
1074586 |
Minor |
Data work |
Windows parser assumes that by default, destIp/destName for all events is the reporting device. |
|
1062372 |
Minor |
Data work |
Rule: Domain Controller User or Group Modification maps to incorrect MITRE Technique. |
|
1149252 |
Minor |
Event Pulling Agents |
Akamai Connected Cloud Test connectivity failed. |
|
1139082 |
Minor |
Event Pulling Agents |
More than one event pulling update tasks may be created after test connectivity with cloud service credential. |
|
1135719 |
Minor |
Event Pulling Agents |
Duplicate logs from FortiEDR via Generic Log API Poller (HTTPS_ADVANCED) Integration. |
|
1086809 |
Minor |
Event Pulling Agents |
Sometimes same FortiRecon events are pulled repeatedly using FortiRecon API. |
|
1083580 |
Minor |
Event Pulling Agents |
Office365 event pulling does not report status when Supervisor or Collector is unable to reach manage.office.com. |
|
1151469 |
Minor |
GUI |
FortiAI anonymization failed in certain cases. |
|
1142995 |
Minor |
GUI |
For Credential > Event Hub - Consumer Group - allow $ character. |
|
1131997 |
Minor |
GUI |
Dashboard access can't be restored to User if the User deletes dashboard which is owned by another Owner. |
|
1120672 |
Minor |
GUI |
Analytic results > Trend chart when SHIFT+CLICK and select a region does not use the correct time. |
|
1120184 |
Minor |
GUI |
Queries with filter System event category = 1 show 100k rows max even if configured to 200k. |
|
1108565 |
Minor |
GUI |
HTTPS ADVANCED Log API polling does not save 'Right Key Value Postfix'. |
|
1106420 |
Minor |
GUI |
Testing in Admin > Settings > Scheduled Report > Scheduled Report Copy shows failure even if it succeeds. |
|
1079963 |
Minor |
GUI |
Incident view by Time no longer has a direct column to display the 'Case User'. |
|
1142595 |
Minor |
Linux Agent |
User is unknown in Linux agent file monitoring events for Debian 12. |
|
1098535 |
Minor |
Linux Agent |
Adding an invalid IP Address to Collector Cluster config will cause Linux agent status to be DISCONNECTED, even if the address is later removed. |
|
1150034 |
Minor |
Parser |
Event forwarding truncates raw log message to 4KB. The new limit is 64KB. |
|
1141840 |
Minor |
Parser |
Unnecessary PH_SYSTEM_DROP_UNKNOWN_ORG log is generated for custId = 0, 2, 3. |
|
1137164 |
Minor |
Parser |
For Windows Event Forwarding (WEF) forwarded events, hostname in CMDB is not correct. |
|
1132073 |
Minor |
Parser |
Some FortiGate event type groups are incorrect. |
|
1092900 |
Minor |
Performance Monitoring |
SNMPv3 Discovery of FSM nodes does not collect disk, running processes, and memory. |
|
1091299 |
Minor |
Performance Monitoring |
No Ping monitoring events from Hosts running Windows Agent. |
|
1132630 |
Minor |
Query |
ClickHouse Queries fail when a searched value contains backslash (e.g. an URL). |
|
1104508 |
Minor |
Query |
For EventDB, Analytics Queries may not return full results if for some reason, event size is large (> 64KB). |
|
1140285 |
Minor |
Rest API |
Improve the performance of '/phoenix/rest/pub/incident/triggeringEvents' API. |
|
1144647 |
Minor |
System |
Remediate Virtual Machine doesn't work. |
|
1143648 |
Enhancement |
App Server |
Admin > Setup > Discovery page takes long time to display when there are too many entries. Solution is to have a paginated display. |
|
1125911 |
Enhancement |
App Server |
Enable Summary mode display for triggering events in Incident PDF export. |
|
1056708 |
Enhancement |
App Server |
Add Audit logs missing for org rule activation/deactivation. The new audit logs are PH_AUDIT_RULE_ACTIVATED and PH_AUDIT_RULE_DEACTIVATED. |
|
1086559 |
Enhancement |
App Server,GUI |
Remove support of Cisco Talos Threat Feed as it requires paid credential. |
|
1152381 |
Enhancement |
Data work |
Additional parsing and categorization for some Office365 events. |
|
1149871 |
Enhancement |
Data work |
Admin user performing operation for Windows Event ID 4729, 4733, 4762 not parsed in event. |
|
1148519 |
Enhancement |
Data work |
BindDNS Parser fails to recognize certain Logs, defaulting to BIND_DNS_Generic. |
|
1147127 |
Enhancement |
Data work |
Improve parsing for Windows Security EventID 4698. |
|
1145905 |
Enhancement |
Data work |
Certain FortiGate Event Types are mapped to wrong Event Type groups. |
|
1145265 |
Enhancement |
Data work |
Parse 'forwardedfor' values for FortiGate logs. |
|
1144482 |
Enhancement |
Data work |
New Device support, Omicron - OT. |
|
1142157 |
Enhancement |
Data work |
For some Cisco ASA event types, full CN user is not parsed. |
|
1140318 |
Enhancement |
Data work |
Parse additional VMware NSX events. |
|
1140268 |
Enhancement |
Data work |
Enhance FortiAuthenticator parser to parse new logs with userip to determine impossible travel auth issues. |
|
1139855 |
Enhancement |
Data work |
Rule: Logon Time Restriction Violation Needs Update for Win 2012+ Events. |
|
1137184 |
Enhancement |
Data work |
For Office365Parser, parse the hostName attribute using the value for DisplayName from DeviceProperties. |
|
1136161 |
Enhancement |
Data work |
Additional Palo Alto events need to be parsed. |
|
1135070 |
Enhancement |
Data work |
FortiNAC Parser update to handle negative event IDs. |
|
1134213 |
Enhancement |
Data work |
Parse additional Cisco IronPort Mail Gateway logs. |
|
1134179 |
Enhancement |
Data work |
Support Azure Entra via Event Hub and Add Azure Dashboard. |
|
1127528 |
Enhancement |
Data work |
Enhance McAfeeAVParser to parse more ePO events. |
|
1124679 |
Enhancement |
Data work |
Parse organization field in FortiEDR events. |
|
1124533 |
Enhancement |
Data work |
Some Citrix NetScaler events are not parsed correctly. |
|
1123888 |
Enhancement |
Data work |
Cisco ASA and FTD - parse more unknown events. |
|
1120259 |
Enhancement |
Data work |
SonicwallFirewallParser fails when the 'pri' attribute is missing. |
|
1118794 |
Enhancement |
Data work |
Few Cisco NX-OS events cannot be parsed using Cisco NX-OS parser. |
|
1116622 |
Enhancement |
Data work |
Support syslog for Barracuda Email Gateway Defense. |
|
1093756 |
Enhancement |
Data work |
SophosCentralParser incorrectly parses attributes like UserName/AppName/Action/RuleNam into a single attribute 'Notification Action Name'. |
|
870123 |
Enhancement |
Data work |
RFE: Support Microsoft-IIS-Configuration/Operational Event Log. |
|
772351 |
Enhancement |
Data work |
RFE: Create Windows Rule for CrashOnAuditFail Change. |
|
1129725 |
Enhancement |
Device Support |
OPNsense Firewall log collection via Syslog. |
|
1129687 |
Enhancement |
Device Support |
FortiCNAPP log collection via API. |
|
1129685 |
Enhancement |
Device Support |
FortiDLP log collection via API. |
|
1129301 |
Enhancement |
Device Support |
Dell PowerSwitch - discovery, availability monitoring and performance monitoring support. |
|
1056393 |
Enhancement |
Device Support |
New device support, Armis integration (OT device). |
|
1080747 |
Enhancement |
Discovery |
Interfaces with APIPA IP addresses are not discovered though snmpwalk. |
|
1129306 |
Enhancement |
Discovery, Performance Mo nitoring |
New device support, FS Switch - discovery and performance monitoring. |
|
1140871 |
Enhancement |
Event Pulling Agents |
For HTTPS Advanced Poller, need to support Offset and Limit pagination via HTTP body. Current support is via URL parameter. |
|
1131523 |
Enhancement |
Event Pulling Agents |
Add new log collection for Sophos Central API via client id and secret. |
|
1126981 |
Enhancement |
Event Pulling Agents |
For Windows log pulling, enable OMI to use port 5986 (HTTPS) when winrm over HTTPS is enabled. |
|
1095356 |
Enhancement |
GUI |
GB per day License is not highlighted as a Warning or Red when expiration date is close. |
|
1088383 |
Enhancement |
Linux Agent |
Enable Linux Agent install on Ubuntu 14.04. |
|
1045746 |
Enhancement |
Linux Agent |
Enable Linux Agent install on LXC (Debian host with Ubuntu container). |
|
1030922 |
Enhancement |
Parser |
Enhance NetFlow parser to parse BGP AS numbers. |
|
988033 |
Enhancement |
Report |
For Incidents not yet cleared, Incident Cleared Time shows as 0 in exported PDF/CSV. |
|
1137882 |
Enhancement |
System |
Support FortiSIEM installation on Fortinet Integrated Openstack. |
|
1026119 |
Enhancement |
Windows Agent |
No FIM events for files stored on ISCSI drive. |
Known Issues
-
For Rules written using Advanced Search, the column re-name as part of the SQL function AS needs to begin with a character (a-z, A-Z) and contain only alphanumeric characters.
-
In the enhanced Search functionality for Rules, Reports and CMDB Devices, Search and Filtering do not work together. That means, if you have filters set and then you do a Search, the Filters will be ignored.
-
You cannot set the phRecvTime attribute in custom parsers. That attribute records the time when an event is first received by FortiSIEM, and is a special attribute that key FortiSIEM functionality depends on.
-
If you are running an HA+DR environment, and you have failed over to DR site and promoted the DR site to Primary, then you cannot run the Automated Cluster Upgrade on the DR Supervisor. Your choices are
-
Bring back the original Primary, fail back, and then run Automated Cluster Upgrade on the original Primary.
-
If original Primary is not recoverable, then do the node-by-node upgrade on new Primary site.
-
-
Automation Service does not work when FIPS is enabled.
-
Upgrade from FortiSIEM 6.1.0 to 7.4.0 requires 32GB memory on Supervisor. If you are running FortiSIEM 6.1.0 and have less than 32GB of memory on Supervisor, then increase the memory to 32GB and then upgrade to 7.4.0.
Implementation Notes
Please read these notes before installing or upgrading to FortiSIEM 7.4.0.
- Collector HA Related
- Identity and Location Related
- Linux Agent Related
- Post-Upgrade ClickHouse IP Index Rebuilding
- Upgrade Related
Collector HA Related
Collector High Availability (HA) Failover Triggers:
-
Logs are sent to a VIP in VRRP based Failover - In this case, when VRRP detects node failure, then Follower becomes a Leader and owns the VIP and events are sent to the new Leader. If a process is down on a node, then VRRP may not trigger a Failover.
-
Logs sent to Load Balancer - In this case, the Load balancing algorithm detects logs being sent to a different Collector. If a process is down on a node, then Failover may not trigger.
-
For event pulling and performance monitoring, App Server redistributes the jobs from a Collector if App Server failed to receive a task request in a 10 minute window.
Identity and Location Related
If you are upgrading to 7.4.0, then please update the following entry in the /opt/phoenix/config/identityDef.xml file in Supervisor and Workers to get Identity and location entries populated for Microsoft Office365 events. Then restart IdentityWorker and IdentityMaster processes on Supervisor and Workers.
Pre-7.4.0 Entry
<identityEvent>
<eventType>MS_OFFICE365_UserLoggedIn_Succeeded</eventType>
<eventAttributes>
<eventAttribute name="userId" identityAttrib="office365User" reqd="yes"/>
<eventAttribute name="srcDomain" identityAttrib="domain" reqd="no"/>
<eventAttribute name="srcIpAddr" identityAttrib="ipAddr" reqd="yes"/>
<eventAttribute name="srcGeoCountry" identityAttrib="geoCountry" reqd="no"/>
<eventAttribute name="srcGeoCountryCodeStr" identityAttrib="geoCountryCode" reqd="no"/>
<eventAttribute name="srcGeoState" identityAttrib="geoState" reqd="no"/>
<eventAttribute name="srcGeoCity" identityAttrib="geoCity" reqd="no"/>
<eventAttribute name="srcGeoLatitude" identityAttrib="geoLatitude" reqd="no"/>
<eventAttribute name="srcGeoLongitude" identityAttrib="geoLongitude" reqd="no"/>
</eventAttributes>
</identityEvent>
7.4.0 Entry
<identityEvent>
<eventType>MS_OFFICE365_UserLoggedIn_Succeeded,MS_OFFICE365_EntraID_UserLoggedIn,MS_OFFICE365_EntraID_StsLogon_UserLoggedIn</eventType>
<eventAttributes>
<eventAttribute name="user" identityAttrib="office365User" reqd="yes"/>
<eventAttribute name="srcDomain" identityAttrib="domain" reqd="no"/>
<eventAttribute name="srcIpAddr" identityAttrib="ipAddr" reqd="yes"/>
<eventAttribute name="srcGeoCountry" identityAttrib="geoCountry" reqd="no"/>
<eventAttribute name="srcGeoCountryCodeStr" identityAttrib="geoCountryCode" reqd="no"/>
<eventAttribute name="srcGeoState" identityAttrib="geoState" reqd="no"/>
<eventAttribute name="srcGeoCity" identityAttrib="geoCity" reqd="no"/>
<eventAttribute name="srcGeoLatitude" identityAttrib="geoLatitude" reqd="no"/>
<eventAttribute name="srcGeoLongitude" identityAttrib="geoLongitude" reqd="no"/>
</eventAttributes>
</identityEvent>
Linux Agent Related
If you are running Linux Agent on Ubuntu 24, then Custom Log File monitoring may not work because of App Armor configuration. Take the following steps to configure App Armor to enable FortiSIEM Linux Agent to monitor custom files.
-
Login as root user.
-
Check if
rsyslogdis protected by AppArmor by running the following command.aa-status | grep rsyslogdIf the output displays
rsyslogd, then you need to modify AppArmor configuration as follows. -
Verify that the following line exists in the file
/etc/apparmor.d/usr.sbin.rsyslogdinclude if exists <rsyslog.d>If it does not, then add the above line to the file.
-
Create or modify the file
/etc/apparmor.d/rsyslog.d/custom-rulesand add rules for the monitored log file as needed.Examples:
If you want to monitor
/testLinuxAgent/testLog.logfile, then add the following line that allows rsyslogd to read the file:/testLinuxAgent/testLog.log r,Always add the following line that allows rsyslogd to read the FortiSIEM log file. This is needed:
/opt/fortinet/fortisiem/linux-agent/log/phoenix.log r, -
Run the following command to reload the rsyslogd AppArmor profile and apply the changes above.
apparmor_parser -r /etc/apparmor.d/usr.sbin.rsyslogd
Post-Upgrade ClickHouse IP Index Rebuilding
If you are upgrading ClickHouse based deployment from pre-7.1.1 to 7.4.0, then after upgrading to 7.4.0, you need to run a script to rebuild ClickHouse indices. If you are running 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.2.x, or 7.3.x and have already executed the rebuilding steps, then nothing more needs to be done.
For details about this issue, see Release Notes 7.1.3 Known Issue.
The rebuilding steps are available in Release Notes 7.1.4 - Script for Rebuilding/Recreating pre-7.1.1 ClickHouse Database Indices Involving IP Fields.
Upgrade Related
If you encounter this error during App Server deployment part of upgrade process, then take the remediation steps below:
Error:
stderr: remote failure: Error occurred during deployment: Exception while loading the app : java.lang.IllegalStateException: ContainerBase.addChild: start: org.apache.catalina.LifecycleException: org.apache.catalina.LifecycleException: java.lang.StackOverflowError. Please see server.log for more details
Remediation Step
Option 1: Increase Java stack size to 2M.
-
Login to Supervisor via SSH.
-
su - admin -
vi /opt/glassfish/domains/domain1/config/domain.xmladd
-Xss2min jvm-options session:<jvm-options>-Xss2m</jvm-options> -
Re-run the upgrade process.
Option 2: Remove the Device to Parser association for Parsers that are towards the bottom of the Parser list, e.g. UnixParser.
-
Login to Supervisor GUI.
-
Go to CMDB and from the Columns drop-down list, add Parser Name.
-
If you see a Parser towards the bottom of the Parser list, e.g. UnixParser, then take the following steps:
-
Select the Device and click Edit.
-
Click the Parsers tab.
-
Remove the selected Parser.
-
-
Re-run the upgrade process.
-
Login to GUI and add back the Device to Parser association.