Fortinet Fortimanager successful brute force login

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects successful brute force attacks against Fortinet FortiManager administrative accounts.

Strategy

This rule monitors Fortinet FortiManager authentication logs for patterns indicating brute force attacks followed by successful compromise. The detection triggers when more than 4 failed admin login attempts are followed by at least one successful login for the same user account. This pattern suggests an attacker has successfully compromised an administrative account after multiple failed authentication attempts.

Triage & Response

  • Verify if the successful login for {{@usr.name}} was legitimate by checking with the account owner or reviewing scheduled administrative activities.
  • Examine the source IP addresses of both failed and successful login attempts to determine if they originated from expected locations.
  • Review the timing between failed attempts and successful login to assess if the pattern indicates automated brute force activity.
  • Check for any administrative actions performed by {{@usr.name}} immediately after the successful login to identify potential malicious activity.
  • Determine if the compromised account has elevated privileges and assess the potential impact of unauthorized access.