Fortinet Fortimanager alert

This rule is part of a beta feature. To learn more, contact Support.
fortinet-fortimanager

Classification:

attack

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects security threats identified by Fortinet FortiManager UTM security products including malware infections, intrusion attempts, network anomalies, and data loss prevention violations.

Strategy

This rule monitors Fortinet FortiManager UTM security events where protective actions were not automatically taken. It aggregates security alerts from multiple FortiManager security modules including antivirus, intrusion prevention system, anomaly detection, and data loss prevention. The detection focuses on events where threats were detected but not blocked, dropped, or cleared, indicating potential security incidents that require investigation.

Triage & Response

  • Examine the specific threat type detected by reviewing the {{@eventtype}} and {{@subtype}} fields to understand the nature of the security event.
  • Investigate the affected systems by analyzing traffic patterns to and from {{@network.destination.ip}} or {{@network.client.ip}} depending on the event type.
  • Validate the legitimacy of the flagged activity by examining the specific signatures, files, or data involved in the security event.
  • Check for additional security events involving the same IP addresses or hosts to identify potential compromise or ongoing attack campaigns.
  • Assess the potential impact based on the severity level and implement appropriate containment measures if malicious activity is confirmed.
  • Review why the FortiManager security control did not automatically block or mitigate the detected threat.