Fortinet black logo

Importing Azure settings into FortiSandbox

Importing Azure settings into FortiSandbox

When the FSA instance is deployed, you can import your Azure settings into FortiSandbox.

Uploading rating engine

After upgrading FortiSandbox, you must manually upload the rating engine.

To manually upload the rating engine:
  1. In FortiSandbox, go to System > FortiGuard.
  2. Beside Upload Package File, click Choose file and locate the rating engine to be uploaded.

To import Azure settings into FSA:
  1. Go to the FortiSandbox GUI.
  2. Click System > Azure Config.

    If you get a warning that the rating engine is not available or up-to-date, manually upload the rating engine before doing this procedure.

  3. FortiSandbox v3.2.0 and higher supports service principal and Azure account authentication methods.
    1. If you choose service principal, get the service principal information by going to the Azure portal to the Azure Active Directory > App registrations to find the service principal information in the application you created.

    2. Enter the following Azure configuration settings and then click Submit.

      Client id

      Application (client) ID.

      Client Secret

      Client secret value.

      Location

      The location you used to set up the resource group.

      Tenant id

      Directory (tenant) ID.

      Subscription ID

      Your subscription ID.

      Resource group

      Resource group.

      Storage account

      Storage account name.

      Storage account access key

      Storage account access key.

      Monitor storage account

      Monitor account name.

      Monitor account access key

      Monitor account access key.

      Network security group

      The security group created. If you created multiple security groups, use the one that allows RDP and FTP.

      Virtual network

      Name of the virtual network you created.

      Subnet

      The subnet you created for the FSA port2 interface.

      VM Type

      Standard_B1s, the minimum size. Standard_B4ms recommended.

  4. FortiSandbox v3.2.0 and higher supports service principal and Azure account authentication methods.
    1. If you choose Azure account authentication, click System > Azure Config.

      Screenshot of FortiSandbox dashboard showing importing of Azure settings

    2. Enter the following information:

      Microsoft Azure account email

      Your user ID.

      Microsoft Azure account password

      Your user password.

      Location

      Select the location you used to set up the resource group.

      Subscription ID

      Your subscription ID.

      Resource group

      Resource group.

      Storage account

      Storage account name.

      Storage account access key

      Storage account access key.

      Monitor storage account

      Monitor account name.

      Monitor account access key

      Monitor account access key.

      Network security group

      The security group created. If you created multiple security groups, use the one that allows RDP and FTP.

      Virtual network

      Name of the virtual network you created.

      Subnet

      The subnet you created for the FSA port2 interface.

      VM type

      Standard_B1s, the minimum size. Standard_B4ms recommended.

    3. Click Test Connection to verify the connection is accessible and authentication is valid. Then click Submit.
  5. When completed, upload your BYOL license if provided.

    The Azure FortiSandbox will fetch the licensing information which can take up to three hours.

Importing Azure settings into FortiSandbox

When the FSA instance is deployed, you can import your Azure settings into FortiSandbox.

Uploading rating engine

After upgrading FortiSandbox, you must manually upload the rating engine.

To manually upload the rating engine:
  1. In FortiSandbox, go to System > FortiGuard.
  2. Beside Upload Package File, click Choose file and locate the rating engine to be uploaded.

To import Azure settings into FSA:
  1. Go to the FortiSandbox GUI.
  2. Click System > Azure Config.

    If you get a warning that the rating engine is not available or up-to-date, manually upload the rating engine before doing this procedure.

  3. FortiSandbox v3.2.0 and higher supports service principal and Azure account authentication methods.
    1. If you choose service principal, get the service principal information by going to the Azure portal to the Azure Active Directory > App registrations to find the service principal information in the application you created.

    2. Enter the following Azure configuration settings and then click Submit.

      Client id

      Application (client) ID.

      Client Secret

      Client secret value.

      Location

      The location you used to set up the resource group.

      Tenant id

      Directory (tenant) ID.

      Subscription ID

      Your subscription ID.

      Resource group

      Resource group.

      Storage account

      Storage account name.

      Storage account access key

      Storage account access key.

      Monitor storage account

      Monitor account name.

      Monitor account access key

      Monitor account access key.

      Network security group

      The security group created. If you created multiple security groups, use the one that allows RDP and FTP.

      Virtual network

      Name of the virtual network you created.

      Subnet

      The subnet you created for the FSA port2 interface.

      VM Type

      Standard_B1s, the minimum size. Standard_B4ms recommended.

  4. FortiSandbox v3.2.0 and higher supports service principal and Azure account authentication methods.
    1. If you choose Azure account authentication, click System > Azure Config.

      Screenshot of FortiSandbox dashboard showing importing of Azure settings

    2. Enter the following information:

      Microsoft Azure account email

      Your user ID.

      Microsoft Azure account password

      Your user password.

      Location

      Select the location you used to set up the resource group.

      Subscription ID

      Your subscription ID.

      Resource group

      Resource group.

      Storage account

      Storage account name.

      Storage account access key

      Storage account access key.

      Monitor storage account

      Monitor account name.

      Monitor account access key

      Monitor account access key.

      Network security group

      The security group created. If you created multiple security groups, use the one that allows RDP and FTP.

      Virtual network

      Name of the virtual network you created.

      Subnet

      The subnet you created for the FSA port2 interface.

      VM type

      Standard_B1s, the minimum size. Standard_B4ms recommended.

    3. Click Test Connection to verify the connection is accessible and authentication is valid. Then click Submit.
  5. When completed, upload your BYOL license if provided.

    The Azure FortiSandbox will fetch the licensing information which can take up to three hours.