Fortinet white logo
Fortinet white logo

External Systems Configuration Guide

External Systems Configuration Guide TOC

External Systems Configuration Guide TOC

Change Log

Overview

FortiSIEM Port Usage

Supported Devices and Applications by Vendor

Application Performance Management

Applications

Application Server

Authentication Server/Cloud Platform

Database Server

DHCP and DNS Server

Directory Server

Document Management Server

Healthcare IT

Mail Server

Management Server/Appliance

Remote Desktop

Source Code Control

Unified Communication Server

Web Server

Blade Servers

Cloud Access Security Broker (CASB)

Cloud Applications

Cloud Email Security

Console Access Devices

Container Management Platform

Customer Relationship Management (CRM)

Digital Risk Protection (DRP)

End Point Security Software

Firewalls

Internet of Things (IoT) / Operational Technology (OT)

Load Balancers and Application Firewalls

Log Aggregators

Network Access Control

Network Compliance Management Applications

Network Detection and Response (NDR)

Network Intrusion Detection System

Network Intrusion Prevention System

Privileged Access Management

Routers and Switches

Secure Access Service Edge

Security Gateways

Security Information and Event Management (SIEM)

Security Orchestration (SOAR)

Servers and Workstations

Storage

Threat Intelligence

Virtualization

VPN Gateways

Vulnerability Scanners

WAN Accelerators

Wireless LANs

Configuring FortiSIEM to Receive Events via Webhook

Generic Log API Poller (HTTPS Advanced) Integration

Ingesting JSON Formatted Events Received via HTTP(S) POST

Configuring FortiSIEM to Receive Syslog/TLS

Configuring FortiSIEM to Receive SNMP V3 Traps

Using Virtual IPs to Access Devices in Clustered Environments

Flow Support in FortiSIEM

Appendix

External Systems Configuration Guide TOC

External Systems Configuration Guide TOC

Change Log

Overview

FortiSIEM Port Usage

Supported Devices and Applications by Vendor

Application Performance Management

Applications

Application Server

Authentication Server/Cloud Platform

Database Server

DHCP and DNS Server

Directory Server

Document Management Server

Healthcare IT

Mail Server

Management Server/Appliance

Remote Desktop

Source Code Control

Unified Communication Server

Web Server

Blade Servers

Cloud Access Security Broker (CASB)

Cloud Applications

Cloud Email Security

Console Access Devices

Container Management Platform

Customer Relationship Management (CRM)

Digital Risk Protection (DRP)

End Point Security Software

Firewalls

Internet of Things (IoT) / Operational Technology (OT)

Load Balancers and Application Firewalls

Log Aggregators

Network Access Control

Network Compliance Management Applications

Network Detection and Response (NDR)

Network Intrusion Detection System

Network Intrusion Prevention System

Privileged Access Management

Routers and Switches

Secure Access Service Edge

Security Gateways

Security Information and Event Management (SIEM)

Security Orchestration (SOAR)

Servers and Workstations

Storage

Threat Intelligence

Virtualization

VPN Gateways

Vulnerability Scanners

WAN Accelerators

Wireless LANs

Configuring FortiSIEM to Receive Events via Webhook

Generic Log API Poller (HTTPS Advanced) Integration

Ingesting JSON Formatted Events Received via HTTP(S) POST

Configuring FortiSIEM to Receive Syslog/TLS

Configuring FortiSIEM to Receive SNMP V3 Traps

Using Virtual IPs to Access Devices in Clustered Environments

Flow Support in FortiSIEM

Appendix