FortiRecon 23.1 User - Guide
FortiRecon 23.1 User - Guide
FortiRecon 23.1 User - Guide
FortiRecon 23.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 7
Introduction 8
Requirements 8
Acceptable FortiRecon use cases 9
Licensing 9
Getting started 10
Registering the FortiRecon license 10
Subscribing to FortiRecon 11
Accessing FortiRecon portal 14
EASM 15
Dashboard 15
Viewing discovered assets summary 16
Viewing security issues summary 16
Viewing a map of assets 17
Downloading the EASM dashboard details 18
Asset Discovery 18
Viewing asset details 19
Marking assets as false positives 21
Adding assets manually 21
Removing assets manually 22
Assigning tags 22
Security Issues 23
Viewing security issues 24
Filtering security issues 25
Changing the status of security issues 27
Adding a comment to a security issue 27
Asset Management 28
Creating a tag 28
Adding assets to a tag 29
Managing tags 30
Creating a group 31
Adding assets to a group 31
Managing groups 32
Filtering by group 33
Leaked Credentials 34
Viewing leaked credentials by year 34
Viewing breached datasets 34
Viewing leaked credential details 35
Exporting leaked accounts 36
Integrations 36
Adding integrations 36
Editing integrations 37
FortiRecon is a Digital Risk Protection (DRP) service that operates alongside existing security solutions to provide you
with the visibility that an adversary can have of your infrastructure. This early warning of any malicious activity targeted at
your organization enables swift detection and mitigation. Operating purely from outside the organizational boundary, the
service maps an organization’s digital footprint and monitors it for abnormal activity. The service gives organizations the
intelligence to mitigate credible security threats in a controlled manner as part of ongoing security efforts.
FortiRecon scans the organization's attack surface and identifies risks to assets while FortiGuard Threat Intelligence
delivers early warning of risks to the organization through targeted, curated intelligence to provide an early warning of
any malicious activity targeted to the organization.
The FortiRecon portal includes the following modules:
Brand Protection The Brand Protection module continually monitors the organization’s public-
facing visibility for unauthorized changes, including web-based phishing attacks,
typo-squatting, rogue applications, credential leaks, and brand impersonation in
social media, which may impact brand value, integrity, and trust. See Brand
Protection on page 39.
ACI The Adversary Centric Intelligence (ACI) module leverages FortiGuard Threat
Analysts to provide comprehensive coverage of dark web, open source, and
technical threat intelligence, including threat actor insights. This information
enables administrators to proactively assess risks, respond faster to incidents,
better understand their attackers, and protect assets. See Adversary Centric
Intelligence on page 59.
Profile Settings The Profile Settings module allows you to personalize your FortiRecon account
and provide information on your organization. See Profile settings on page 94.
FortiRecon APIs are available on the Fortinet Developer Network (FNDN). You must first
register an account on FNDN to gain access.
Requirements
A FortiCloud account is required to access the FortiRecon portal. The FortiRecon Admin for your organization also
needs to create an account within FortiRecon. If either of these accounts is not created, you will not be able to log in to
the FortiRecon portal. See the FortiCloud New Account Onboarding document and Getting started on page 10 for more
information on registering your accounts.
If you need to create a support ticket, the FortiCloud account must be linked to your entitled
license. There are two methods to link the FortiCloud account to your license:
l The account owner must create sub user accounts for all of the users in your
When using FortiRecon, there are certain acceptable use case requirements that must be followed to properly leverage
FortiRecon's capabilities. FortiRecon use case requirements include the following:
l The FortiRecon solution must only be used for the licensed entity and its brands. See Requirements on page 8 and
Licensing on page 9.
l Domains that are added for scanning and monitoring must be owned by the licensed entity.
l The licensed entity may not add the domains and apps of its customers, partners, or vendors to Profile Settings >
Seeds or the EASM module for monitoring. However, up to 25 of these assets may be added for vendor monitoring
in the Adversary Centric Intelligence module. See Vendor Risk Assessment on page 88.
l Bank identification numbers (BINs) should only be added for the licensed entity and brand. See Card Fraud on page
69.
Customer monitoring
Organizations, such as MSSPs, that want to set up monitoring for their customers can reach out to our account and sales
team for suitable options.
Licensing
FortiRecon requires a license. You can choose to purchase a license for one, two, or all three of the following FortiRecon
modules:
l External Attack Surface Management (EASM)
l Brand Protection (BP)
l Adversary Centric Intelligence (ACI)
In addition to the desired modules, the license also indicates the maximum number of assets to be monitored by
FortiRecon.
For details about the different modules and solution bundles, see the FortiRecon data sheet.
You must purchase and register a FortiRecon license before you can subscribe to FortiRecon. After you purchase the
license, register the license using FortiCloud Account Services. For more information about registering products on
FortiCloud, see the FortiCloud Account Services > Registering products documentation.
This section describes how to subscribe to FortiRecon and start the service. Before you can subscribe to FortiRecon,
you must register the license. See Registering the FortiRecon license on page 10.
To subscribe to FortiRecon:
Fields marked with a red asterisks are required information. Other fields are considered
optional although it is suggested that you complete all of the fields provided to receive the
most accurate service.
5. Enter the email addresses of members of your organization in the Other Authorized Contacts and Service
Notification Contacts fields.
6. Enter the contact information of the billing contact in the Billing Contact fields.
7. Select the Company Information and External Attack Surface Management dropdowns. New information fields are
displayed.
11. Wait for the FortiRecon team to analyze your assets and populate the FortiRecon portal for you.
After you have subscribed to FortiRecon and received an email from the FortiRecon team, you are ready to access the
FortiRecon portal.
To access FortiRecon:
1. Go to FortiRecon at https://fortirecon.forticloud.com.
The External Attack Surface Management (EASM) module provides information about your digital assets, potential
security issues, and leaked credentials. You can use the EASM module to identify exposed known and unknown assets,
learn about associated vulnerabilities, and prioritize the remediation of critical issues.
FortiRecon scans your digital assets on a schedule and displays the results.
The EASM module displays scan results for your organization on the following tabs :
Dashboard Displays widgets that summarize your discovered assets and potential security
issues related to your assets. You can click some widgets to display more details
on the other tabs. See Dashboard on page 15.
Asset Discovery Displays a summary of all discovered assets and details about each asset. You
can mark assets as false positives, manually add assets, and manually remove
assets. See Asset Discovery on page 18.
Security Issues Displays a summary of all potential security issues and details about each issue.
You can filter security issues and change the status of security issues to reflect
action taken at your organization. See Security Issues on page 23.
Asset Management Displays tags and groups used to filter and link assets. See Asset Management
on page 28.
Leaked Credentials Displays a summary of leaked credentials by year and details about each
breached dataset or leaked credential incident. See Leaked Credentials on page
34.
Integrations Displays Azure and AWS integration that are tracked in Asset Discovery and
Security Issues. See Integrations on page 36.
Dashboard
The EASM > Dashboard page displays a number of widgets that summarize your discovered digital assets and potential
security issues. From the EASM > Dashboard page, you can:
l View a summary of your discovered digital assets. See Viewing discovered assets summary on page 16.
l View a summary of potential security issues related to your organization. See Viewing security issues summary on
page 16.
l View a global map of your assets and the number of potential security issues affecting your organization. See
Viewing a map of assets on page 17.
l Download the dashboard content to your hard drive. See Downloading the EASM dashboard details on page 18.
The EASM > Dashboard page displays the following widgets that summarize your discovered digital assets in the
Discovery section:
l Overall Entities
l Exposed Services
l Technologies Discovered
1. Go to the EASM > Dashboard page. The list of assets discovered by FortiRecon is displayed in the Discovery
section.
scan.
l Org name: number of organizations found by the latest scan.
Exposed Services Displays all the exposed services discovered by FortiRecon, including
exposed ports.
3. Click the Overall Entities widget or the Exposed Services widget to display more details on the Asset Discovery
page. See Asset Discovery on page 18.
The EASM > Dashboard page displays the following widgets that summarize potential security issues in the Issues
section:
l Total Issues
l Severe Issues
l Widely Exploited Vulnerabilities
Use the Severe Issues tooltip to review information on the count of unique High and Critical
issues.
1. Go to the EASM > Dashboard page, and scroll to the Issues section. The list of potential security issues is
displayed.
Total Issues Displays the total number of issues discovered by the latest scan compared to
the results of the previous scan.
Severe Issues Displays the number of severe issues, and then lists the name, affected
assets, and severity rating of the issues.
Widely Exploited Vulnerabilities Displays the number of widely exploited vulnerabilities discovered, and then
lists the name, affected assets, and severity rating of the issues.
Credential Breaches Displays the number of exposed credentials and the number of indexed
credentials.
3. Click an issue or vulnerability to display more details on the Security Issues page. See Security Issues on page 23.
The EASM > Dashboard page displays a global map of your digital assets in the Asset Distribution section. The color of
the country aligns with the highest severity level of potential issues. If the country is blue, no issues are recorded.
1. Go to the EASM > Dashboard page, and scroll to the Asset Distribution section. A global map of your discovered
assets is displayed.
2. Use the table to view the number of assets and potential security issues in each country.
Column Description
Issues Displays the number of potential security issues and indicates the severity
rating of the issues by color:
l Red indicates critical.
The colors on the map align with the severity level of the issues.
3. Click a country or issue in the table to display more details on the Security Issues page. See Security Issues on
page 23.
The EASM dashboard details can be downloaded to your hard drive. The process downloads a zip file named
EASM Dashboard.zip that contains the following items:
l List of discovered assets in Microsoft Excel format
l List of issues in Microsoft Excel format
l An attack surface summary dashboard in PDF
Asset Discovery
The EASM > Asset Discovery page provides a summary of all discovered assets and details about each asset. From the
Asset Discovery page, you can:
l View a summary about and details of your assets. See Viewing asset details on page 19.
l Mark discovered assets as false positives to remove them from the next scheduled FortiRecon scan. See Marking
assets as false positives on page 21.
l Manually add assets to FortiRecon to include them in the next scheduled scan. See Adding assets manually on
page 21.
l Manually remove assets from the next scheduled FortiRecon scan. See Removing assets manually on page 22.
l Assign tags to assets for focused filtering. See Assigning tags on page 22.
Tags are created in EASM > Asset Management. Assets can also be assigned to tags in
bulk in the Asset Management page. See Asset Management on page 28.
The EASM > Asset Discovery page displays the number of assets in an Overview section and in an Assets Discovered
list.
You can display details about an asset by clicking a number in the Overview section or a category in the Assets
Discovered list. When you are reviewing asset details, you can mark assets as False Positive as needed to remove them
from future FortiRecon scans.
1. Go to EASM > Asset Discovery. The number of discovered assets display in an Overview section across the top and
in an Assets Discovered list on the left side of the page.
Organizations The number of organizations that have been detected as belonging to you.
ASN The number of autonomous system numbers (ASNs) that are linked to the
detected organizations.
2. In the Overview bar, click a number, or in the Assets Discovered list, click an asset category. Details about the
selected item are displayed on the right side of the page.
For example, click Domains. On the right side of the page, the names of the discovered domains are displayed.
a. Select Appeared Assets to show assets that appeared in the latest scan.
b. Select Disappeared Assets to show assets that disappeared in the latest scan.
c. Select Cloud Assets to show cloud-based assets.
Cloud assets can only be filtered if the AWS cloud environment has been integrated.
See Integrations on page 36.
4. Select Filter to define ports, technology, country, tag, and group filters.
5. Click the Expand icon. Details about the domain are displayed.
6. If an asset should be removed from the next scheduled FortiRecon scan, mark the asset as False Positive. See also
Marking assets as false positives on page 21.
You can manually mark any of the following discovered assets as false positives to remove them from the next
scheduled FortiRecon scan:
l ASN
l IP blocks
l IP addresses
l Domains
l Sub-domains
l IP Blocks
l IP Address
l Domains
l Sub-domains
You can also select the Multiselect checkbox to select all or some assets, and then mark
them as false positives.
FortiRecon discovers assets for you. You can also manually add assets to FortiRecon scans.
When you manually add assets to FortiRecon, results for the assets are visible after the next scheduled FortiRecon
scan.
To add assets:
FortiRecon discovers assets for you. You can also manually remove assets from FortiRecon scans.
When you manually remove assets from FortiRecon, any associated assets are also removed. The changes are visible
within minutes or hours, depending on the change.
To remove assets:
Assigning tags
Tags can be assigned to assets for focused filtering in the EASM > Asset Discovery page. For more information on tags,
see Asset Management on page 28.
To create a new tag, click Create in the Add Tags dialog or go to EASM > Asset
Management page. See Creating a tag on page 28.
Security Issues
The EASM > Security Issues page provides a summary of all potential security issues and details about each issue.
From the Security Issues page, you can:
l View a summary about and details of all potential security issues related to your assets. See Viewing security issues
on page 24.
l Apply filters to the list of security issues to hone in on specific issues. See Filtering security issues on page 25.
l Change the status of security issues to reflect changes made at your organization to address the issues. See
Changing the status of security issues on page 27.
l Add a comment to explain status changes made to security issues. See Adding a comment to a security issue on
page 27.
The EASM > Security Issues page displays the number of active security issues and how many of the active security
issues are rated critical, high, medium, and low. Color indicates the severity of a security issue:
You can use search and filters to change the list of reports that are displayed, and then click each report to display its
details.
2. In the Issues section, click the number under Critical, High, Medium, or Low. The corresponding filter is selected
and only those reports are displayed.
3. For each report, click the i icon to display a description of the issue and suggested remediation steps.
Edit Click to change the status of a security issue to reflect action taken by your
organization to address the issue. See Changing the status of security issues
on page 27.
By default, the EASM > Asset Discovery page displays all potential security issues, starting with critical security issues.
You can use filters to display specific types of issues.
Filter Options
l Resolved
l Risk accepted
l False positive
l High
l Medium
l Low
Category Select one or more of the categories. The list of categories changes based on
the displayed security issues.
5. Click Edit in the top-right corner to change the status by selecting one of the following options:
l Mark as Resolved
l Risk Accepted
l False Positive
As you review and address security issues reported by FortiRecon, you can change the status of each issue to reflect
your understanding and actions:
Mark as Active Available only after you change the status of a security issue from active to
another status.
Select to move an issue back to the active status.
Mark as Resolved Select to indicate actions taken at your organization have resolved the security
issue.
Risk Accepted Select to indicate actions taken at your organization have not fully resolved the
security issue, but the current level of risk is acceptable.
False Positive Select to indicate that the security issue is not an issue for your organization. The
issue is considered a False Positive issue.
4. Click Edit in the top-right corner to change the status by selecting one of the following options:
l Mark as Resolved
l Risk Accepted
l False Positive
When editing a security issue on EASM > Security Issues, the client can leave a comment to describe the changes and
why they were made.
Selecting the comment button will open all comments for that issue. This allows you to review
all changes and discussions related to the issue.
Asset Management
You can create and manage asset tags and groups in the EASM > Asset Management page. From the Asset
Management page, you can:
l Create a new asset tag. See Creating a tag on page 28.
l Assign individual and bulk assets to an asset tag. See Adding assets to a tag on page 29.
l Manage, edit, and delete asset tags. See Managing tags on page 30.
l Create a new asset group. See Creating a group on page 31.
l Assign individual and bulk assets to an asset group. See Adding assets to a group on page 31.
l Manage, edit, and delete asset groups. See Managing groups on page 32.
l Filter EASM pages by group. See Filtering by group on page 33.
Tags and groups are integrated throughout the EASM pages. You can filter by tags in the
Asset Discovery and Security Issues pages; see Viewing asset details on page 19. Groups
can be filtered in all EASM pages.
Creating a tag
Asset tags can be used to mark specific assets for focused filtering in the Security Issues and Asset Discovery pages.
When creating a tag, a tag color is selected so that assets can be differentiated by tag. Tags must be configured in the
Tag Management tab before assets can be assigned.
To create a tag:
You can add individual or bulk assets to a tag from the Tag Management tab.
Assets must be included in EASM > Asset Discovery before they can be tagged. See Adding
assets manually on page 21.
Tags can also be assigned to assets in EASM > Asset Discovery. See Assigning tags on page
22.
Managing tags
Asset tags can be managed from the Tag Management tab. You can remove assets from a tag, edit a tag, or delete a
tag.
To edit a tag:
To delete a tag:
4. Click Yes.
Creating a group
Asset groups can be used to consolidate related assets. Groups can be viewed in the Dashboard, Asset Discovery, and
Security Issues pages. An asset group must be created in the Group Management tab before assets can be assigned.
Assets can also be grouped based on subsidiary hierarchy. This allows for separate reporting
and delegation of remediation responsibilities.
To create a group:
You can add individual or bulk assets to a group from the Group Management tab.
Assets must be included in Asset Discovery before they can be tagged. See Adding assets
manually on page 21.
Managing groups
Asset tags can be managed from the Group Management tab. You can remove assets from a group, edit a group, or
delete a group.
To edit a group:
To delete a group:
4. Click Yes.
Filtering by group
Once a group has been created, you can filter by group in the EASM > Security Issues and EASM > Asset Discovery
pages using the Groups dropdown menu. The Groups filter will be set to all assets of the organization by default.
The following example demonstrates filtering by group in the EASM > Security Issues page.
To filter by group:
3. Select the group you want to filter by. The page will displayed information related to the selected group.
Leaked Credentials
The FortiRecon team continually monitors for credential leaks and provides alerts to you through the FortiRecon portal. If
any leaked or breached credentials that involve email addresses of the organizations or the users of their systems are
detected, the FortiRecon portal automatically displays the information.
As part of consolidated collection, the leaked credentials are gathered from multiple sources:
l Publicly leaked or breached databases
l Privately shared databases
l Paste sites
l Malware infections
Leaked credentials are the primary source of Password Re-Use Attacks. It is important for any organization to quickly
neutralize leaked credentials.
On the EASM > Leaked Credentials page, you can:
l View leaked credentials by year. See Viewing leaked credentials by year on page 34.
l View breached datasets. See Viewing breached datasets on page 34.
l View leaked credential details. See Viewing leaked credential details on page 35.
l Export a list of leaked accounts. See Exporting leaked accounts on page 36.
The EASM > Leaked Credentials page provides a calendar year of all breaches. You can change the year to view
previous year data.
On the EASM > Leaked Credentials page, you can click the Breach Dataset tab to view results displayed on the following
tabs:
l The Relevant tab displays breach information that contains email addresses related to your organization's domains.
l The Other tab displays all breach information indexed in FortiRecon's database, including breach information
related to third-parties that does not contain email addresses related to your organization's domains.
You can filter the list of breached datasets by date, and you can search for keywords.
1. Go to EASM > Leaked Credentials. The Breach Dataset tab is displayed with the Relevant tab selected. The
following columns of information are available:
Breach Name Displays the name of the breach. A red Includes passwords is displayed when
the breach includes passwords.
Added On Displays the date that the information was made available to other malicious
actors.
On the EASM > Leaked Credentials page, click the Leaked Credentials tab to view the results.
You can filter the list of leaked credentials by date and domain, and you can search for keywords.
Integrations
You can enable read only access to your environments and discover their cloud assets. Once assets are discovered,
they are added to the EASM > Asset Discovery and Security Issues pages. Click the i on the Integrations page for more
information.
On the EASM > Integrations page, you can:
l Add new integrations for AWS and Azure. See Adding integrations on page 36.
l Edit and delete existing integrations. See Editing integrations on page 37.
Adding integrations
The EASM > Integrations page displays all existing AWS and Azure integrations. You can manually add new integrations
as needed.
For more information on creating an AWS IAM policy and role, click Need Help?.
4. Enter the relevant values in the Subscription ID, Client ID, Tenant ID, and Client Secret fields.
These four values are necessary to create read-only access for your Azure cloud account.
For information on generating these values, click Need Help?.
Editing integrations
You can edit and delete existing integrations from the EASM > Integrations page.
To edit an integration:
You cannot edit the External ID field for an AWS integration. You cannot edit the Account
ID, Subscription ID, or Tenant ID for an Azure integration.
4. Click Save.
To delete an integration:
3. Select Yes.
The Brand Protection (BP) module uses proprietary algorithms to detect common techniques used by cyber threat
actors, such as web-based phishing attacks, typo-squatting, defacements, rogue apps, credential leaks, and brand
impersonation in social media. You can use the Brand Protection module to detect activity early and take action, such as
web site or application takedown, to protect your brand value, trust, integrity, and reputation.
The Brand Protection module contains the following tabs:
Dashboard Displays a summary of typo-squatting domains, flash alerts and reports, rogue
apps, phishing campaigns, and takedown requests. See Dashboard on page 39.
Alerts Displays a list of flash reports. You can review reports for more details, download
threat intelligence reports and observable Microsoft Excel files, and share links.
See Alerts on page 42.
Domains Typo-Squatting Displays all discovered domains that may be impersonating your organization's
domain. You can filter domains, initiate domain takedown or the suspension of
monitoring, and export a Microsoft Excel file containing domain details. See
Domains Typo-squatting on page 47.
Phishing Displays campaign information and phished users. You can export phishing
details and create digital watermarks for your assets. See Phishing on page 50.
Rogue Mobile Apps Displays all discovered apps that may be impersonating your organization's
assets. You can filter apps, assign status, initiate app takedown, and export a
Microsoft Excel file with app details. See Rogue Mobile Apps on page 54.
Take Down Displays a list of takedown request tickets and their current status. See Take
Down on page 57.
Dashboard
The Brand Protection > Dashboard page provides a history of flash alerts and flash reports about the latest threats that
are specific to your organization. From the Brand Protection > Dashboard page, you can:
l View a summary of domains that are potentially typo-squatting a domain of your organization. See Viewing typo-
squatting domains summary on page 40.
l View a summary of the most recent flash reports and the total number of alerts. See Viewing total alerts summary
on page 40.
l View a summary of the distribution of Official, Unofficial, and Rogue apps that may be impersonating your
organization. SeeViewing rogue apps summary on page 41.
l View a summary the current status of takedown requests. See Viewing takedown status summary on page 41.
l View a summary of current phishing campaigns against your organization. See Viewing phishing summary on page
42.
The Brand Protection > Dashboard page displays a summary of typo-squatting domains related to your organization in
the Typo Squatted Domains section.
1. Go to Brand Protection > Dashboard page and scroll to Typo Squatted Domains. The typo-squatting domains
discovered by FortiRecon are displayed.
The Brand Protection > Dashboard page displays a summary of the total number of alerts and the most recent flash
reports.
1. Go to Brand Protection > Dashboard page and scroll to Total Alerts. The most recent, important alerts created by
FortiRecon are displayed.
The Brand Protection > Dashboard page displays a summary of rogue mobile apps that may be impersonating your
organization.
Select the Apps value to see more information in the Rogue Mobile Apps tab.
1. Go to Brand Protection > Dashboard page and scroll to Rogue Apps. The total rogue mobile applications detected
by FortiRecon are displayed.
The Brand Protection > Dashboard page displays a summary of the current status of takedown requests made and the
associated tracking Ticket.
1. Go to Brand Protection > Dashboard page and scroll to Take Down Status. The status of takedown requests are
displayed.
The Brand Protection > Dashboard page displays a summary of current phishing campaigns detected against your
organization, including potentially compromised employee and user accounts. Select a campaign to see more
information in the Phishing tab.
1. Go to Brand Protection > Dashboard page and scroll to Phishing. Current phishing campaigns are displayed.
Alerts
FortiRecon lists flash reports on the Brand Protection > Alerts page. Flash reports are generated specifically for your
organization based on flash alerts. Flash alerts are reported as soon as they are discovered, but contain limited
information. Flash reports are developed following flash alerts to provide more detailed information on the threat
discovered by FortiRecon. The threat is also assessed and recommendations are made in the flash report.
From the Alerts page, you can:
l View flash reports. See Viewing flash reports on page 42.
l Filter through all flash reports available. See Filtering reports on page 43.
l Download flash reports as threat intelligence reports in PDF or as an observable Microsoft Excel file. See
Downloading reports on page 43.
l Email and share links to flash reports with others. SeeSharing reports on page 45
l Rate flash reports for relevance. See Rating reports on page 46.
l Review reports and send queries to FortiRecon. See Reviewing reports on page 46.
The Brand Protection > Alerts tab displays all the flash reports available to you. By default all reports are displayed,
starting with the latest report. Reports include in depth information, such as:
l Threat summary
l Threat detail
l Assessment
A Takedown button is included in the report details of reports related to brand abuse. Select
the button to begin the takedown process.
1. Go to Brand Protection > Alerts. The All Reports tab displays all flash reports.
2. Click a report title to open the report details.
Filtering reports
You can adjust the reports that display on the Alerts tab.
To filter reports:
Downloading reports
You can download reports from the Alerts tab as brand protection alerts in PDF or as an observable Microsoft Excel file.
Brand protection alerts provide information from a flash report whereas observables outline any Indicators of
Compromise (IOCs) highlighted in the flash report.
Downloaded reports can be set to include:
l All reports available
l Several, specific reports
l Single reports
1. Go to Brand Protection > Alerts, and select Downloads. A confirmation dialog is displayed.
2. Enter a name for the downloaded file in the File Name text box.
3. Select the format of the downloaded file:
l Select Generate PDF to download a brand protection alert in PDF.
l Select Generate Observable to download details in Microsoft Excel format.
The following message is displayed:
4. Click OK.
5. Retrieve the report. See Retrieving downloads on page 104.
5. Enter a name for the downloaded file in the File Name text box.
6. Select the format of the downloaded file:
l Select Generate PDF to download a brand protection alert in PDF.
l Select Generate Observable to download details in Microsoft Excel format.
The following message is displayed:
7. Click OK.
8. Retrieve the report. See Retrieving downloads on page 104.
1. Go to Brand Protection > Alerts and click the desired report. The report details open in a new tab.
Sharing reports
You can share a link so that other users can access details of the report without needing to download a file. You can
email the link or copy the link to share in a format of your choice.
Only recipients who have a FortiRecon account can access reports through a shared link.
The Traffic Light Protocol (TLP) level dictates who you can share a report with:
l TLP Red: The report cannot be shared outside of your organization and should be restricted only to personnel who
need to know.
l TLP Amber: The report can only be shared with members of your organization and clients who need to know the
information to protect themselves.
l TLP Green: The report can be shared with peers and partner organizations but cannot be shared on publicly
accessible channels.
l TLP White: The report can be shared without restriction.
1. Go to Brand Protection > Alerts and select the report you want to share. The report details are displayed in a new
tab.
2. Hover your mouse over Share Link. Copy Link and Email display.
Rating reports
You can rate reports in a five star scale. The collection of ratings helps the FortiRecon team provide more relevant
reports.
The rating scale is based on five stars. The rating can range from one to five by moving left to
right along the stars, with the leftmost star representing one.
To rate a report:
1. Go to Brand Protection > Alerts and select the report you want to rate.
The report details are displayed in a new tab.
2. Hover your mouse over the stars in Ratings & Reviews.
The stars turn yellow as you move the mouse across them.
Reviewing reports
You can send reviews and queries to the FortiRecon team. Any questions or reviews on reports can be sent using the
write to us feature.
To review a report:
1. Go to Brand Protection > Alerts and select the report you want to review.
The report details are displayed in a new tab.
2. In Ratings & Reviews, select write to us.
Your personal email opens with a draft that is ready to be sent to the FortiRecon team.
Domains Typo-squatting
FortiRecon continuously monitors for typo squatting attacks on the Brand Protection > Domains Typo-squatting page to
detect when a threat actor registers domain names similar to the monitored organization and uses them for malicious
activity.
FortiRecon continuously monitors a domain, unless you take an action against the domain. If the detected domain is
determined to be fraudulent or malicious, you can initiate the takedown of the domain. If a domain is determined to
belong to your organization or another legitimate company, you can stop monitoring it.
From the Brand Protection > Domains Typo-squatting page, you can:
l View information on identified domains. See Viewing domain information on page 47.
l Filter for specific identified domains. See Filtering fraudulent domains on page 47.
l Initiate takedown of a rogue domain that is impersonating your organization. See Taking down fraudulent domains
on page 48.
l Stop monitoring domains that are safe or legitimate. See Stopping domain monitoring on page 49.
l Export a Microsoft Excel file that contains information on monitored domains. See Exporting domains on page 49.
You can view more information on monitored domains on the Domains Typo-squatting tab.
You can filter for specific domains being monitored on the Domains Typo-squatting tab. You can filter domains by:
To filter domains:
Potentially fraudulent sites with similar domains are monitored on the Domains Typo-squatting tab. If a site is determined
to be fraudulent or damaging to the company, you can initiate the takedown of the site. Once takedown is initiated, the
FortiRecon team works with external agencies to take corrective action.
Takedown can be initiated when the domain hosts content infringing on your organization's
intellectual property, such as a logo, or is impersonating your organization's website. A domain
cannot be taken down if the domain is similar to that of your organization but there is no
content infringement.
To initiate takedown:
1. Go to Brand Protection > Domain Typo-squatting and find the domain you want to take down.
2. Select Takedown. A confirmation message is displayed.
3. Click Yes.
The FortiRecon team initiates the takedown process, and a tracking Ticket with the domain information is displayed.
4. Go to Brand Protection > Take Down to review the status of the domain takedown.
If a site listed on the Domain Typo-squatting tab is determined to be legitimate or safe, you can stop monitoring it with the
other domains.
1. Go to Brand Protection > Domain Typo-squatting and find the domain you want to stop monitoring.
2. Select Stop Monitoring. A confirmation message is displayed.
3. Click Yes.
The FortiRecon team no longer monitors the domain.
You can restore domain monitoring using Start Monitoring button. Likewise, the domain can be
marked for takedown using the Takedown button. See Taking down fraudulent domains on
page 48
Exporting domains
You can export a Microsoft Excel file that lists information on domains that are being monitored. The Microsoft Excel file
includes the:
l Similar Domain name
l DNS A
l Registration Date
l Online Status
l Original Domain
l Suspicious Status
l Suspicious Category
l Suspicious Keyword
6. Click OK.
7. Retrieve the download. See Retrieving downloads on page 104.
Phishing
FortiRecon tracks potential phishing campaigns on the Brand Protection > Phishing page. When a phishing attempt is
detected against your organization, a campaign is created to track potentially compromised employees and clients.
Through the use of digital watermarks, FortiRecon can track when a web page has been cloned and hosted on another
IP address. Therefore, information can be gathered on potentially compromised users and the web page clone can be
taken down.
From the Brand Protection > Phishing page, you can:
l Create digital watermarks to add to your organization's assets. See Adding watermarks on page 50.
l Edit existing digital watermarks. See Editing watermarks on page 51.
l Delete existing digital watermarks. See Deleting watermarks on page 52.
l Export a Microsoft Excel file with information on the phishing campaign. See Exporting phishing results on page 52.
l Export a list of employees and customers who may have been victimized by the phishing campaign. See Exporting
phished users on page 53.
l Add comments to the potentially compromised employees and clients for internal notetaking. See Adding
comments to compromised users on page 53.
Digital watermark
FortiRecon uses digital watermarks on official login and sensitive pages to track cloning and re-hosting of the web pages
as phishing sites on another IP address. A small script that helps the FortiRecon research team track the cloning or re-
hosting of the site is provided for you to embed into your website. This process also helps you identify whether any of
your customers have been victims of phishing on any cloned pages, and then take remedial actions.
Adding watermarks
You can create a digital watermark to be embedded into your website on the Phishing tab. You can download the digital
watermark in two formats:
l CDN Link: The JavaScript code is hosted on Fortinet's server, and you must embed the link into the index or login
page of your web application using the <script> tag.
l JavaScript file: The code is hosted on your own server, and you must embed the file using the <script> tag, or
paste the code into the index or login page of your web application.
1. Go to Brand Protection > Phishing and select Digital Watermark. A list of current watermarks are displayed.
2. Click Add Watermark. The Code Preview pane is displayed.
3. Enter a name for the watermark in the Digital Watermark Name text box.
4. Under Select Domains, select the domains you want to include. The Generate button is displayed.
5. Review the code in Code Preview and click Generate. The list of watermarks is displayed after the new watermark is
generated.
6. Download the watermark:
a. Click Copy CDN Link to copy the CDN Link to your computer's clipboard.
b. Click Download Digital Watermark to download the JavaScript file to your computer.
The digital watermark can be added to your website.
Editing watermarks
You can edit digital watermarks through the Brand Protection > Phishing tab.
1. Go to Brand Protection > Phishing and select Digital Watermark. A list of current watermarks is displayed.
2. Find the watermark you want to edit and select View & Regenerate. The Code Preview is displayed.
4. Click Yes.
Deleting watermarks
You can delete digital watermarks through the Brand Protection > Phishing tab.
1. Go to Brand Protection > Phishing and select Digital Watermark. A list of current watermarks is displayed.
2. Find the watermark you want to remove and click Delete. A confirmation message is displayed.
3. Click Yes.
When FortiRecon detects that your web page has been cloned and hosted on a new IP address, a campaign is
automatically created on the Phishing tab. A campaign tracks information on compromised users and allows you to add
notes for internal tracking as needed.
You can download a Microsoft Excel file to your computer with information on the phishing campaign. Campaign
information includes details on the URL and IP address where the phishing page is hosted. This information is important
for initiating web page takedown.
iv. Click the Date Range box, and click X to remove the date range filter.
b. Search for email addresses:
i. In the Type and hit Enter to Search box, type a full or partial email address, and press Enter.
The users are filtered to display only users with the email address information provided.
ii. Click the X beside the email address to remove the filter.
3. Select the Compromised Users you want to include in the report.
4. Click the Export Result dropdown.
5. Select Export Campaign IOC. A Microsoft Excel file is downloaded to your computer.
You can also export the file using the Export Result button.
You can download a list of email addresses of potentially victimized users. This information is important for contacting
the listed users to inform them of the phishing campaign and any suggested next steps.
1. Go to Brand Protection > Phishing and select the campaign you want.
2. Filter for the information you want:
a. Filter users by a date range:
i. Click Date Range. Two calendars are displayed.
ii. In the left calendar, select a month, year, and day to specify the start date of the range.
iii. In the right calendar, select a month, year, and day to specify the end date of the range.
Only users from the date range are displayed.
iv. Click the Date Range box, and click X to remove the date range filter.
b. Search for email addresses:
i. In the Type and hit Enter to Search box, type a full or partial email address, and press Enter.
The users are filtered to display only users with the email address information provided.
ii. Click the X beside the email address to remove the filter.
3. Select the Compromised Users to include in the report.
4. Click the Export Result dropdown.
5. Select Export Phished Users. A Microsoft Excel file is downloaded to your computer.
Notes can be added to individual users or a group of users. You can review the most recent note in the Comment section
or all notes in View History.
1. Go to Brand Protection > Phishing and select the campaign you want.
2. Find the Compromised User you want to add a comment to and select Add Comment. The Add Comment window
opens.
3. Enter your comment in the Add Comment text box.
4. Click Save. The comment is added to View History.
1. Go to Brand Protection > Phishing and select the campaign you want.
2. Select Multiselect to select all Compromised Users, or select specific Compromised Users.
3. Select Add Comment. The Add Comment dialog is displayed.
4. Enter your comment in the Add Comment text box.
5. Click Save. The comment is added to View History.
On the Brand Protection > Rogue Mobile Apps page, the FortiRecon research team continuously monitors a number of
application stores to identify newly created applications that appear similar to your organization's official application.
From the Brand Protection > Rogue Mobile Apps page, you can:
l View information on monitored applications. See Viewing rogue applications on page 54.
l Filter for specific mobile applications. See Filtering rogue applications on page 55.
l Assign an app status. See Assigning application status on page 55.
l Initiate takedown of a rogue application. See Taking down rogue apps on page 56.
l Export information on applications. See Exporting rogue applications on page 56.
You can view more information on monitored applications on the Rogue Mobile Apps tab.
3. Select the application you want to review. The app information is displayed in a new tab.
You can filter the apps that appear on the Rogue Mobile Apps tab by App Status and Start & End Date.
To filter apps:
You can use the following status designations to define app status on the Rogue Mobile Apps tab:
l Official: The app is published by officially recognized users.
l Unofficial: The app is not published by officially recognized users.
l Rogue: The app is unofficial and potentially malicious. If an application is marked as Rogue, the Takedown function
becomes available.
1. Go to Brand Protection > Rogue Mobile Apps and find the app.
2. Click the dropdown and select the new application status. A confirmation message is displayed.
3. Click Yes.
If an app is determined to be malicious and rogue, you can initiate the takedown process in the Rogue Mobile Apps tab.
1. Go to Brand Protection > Rogue Mobile Apps and find the app.
2. If the application is assigned to Official or Unofficial, change the application status to Rogue. See Assigning
application status on page 55.
3. Click Takedown. A confirmation message is displayed.
You can export details on potentially rogue mobile applications in the Rogue Mobile Apps tab. Information included in
exported file includes:
l App name and size
l Description
l Developer name and URL
l Download count and URL
l Date the app was discovered
l Listing URL
l Package name
l Source name
l Status
4. Enter a name for the export file in the File Name text box.
5. Select Generate Excel. A confirmation message is displayed.
6. Click the menu in the top-right corner and select Profile Settings.
7. Go to the Downloads tab. The list of available downloads are displayed.
8. Click the download. A file with the name you set is downloaded to your computer in Microsoft Excel format.
Take Down
The FortiRecon team uses a proprietary Digital Millennium Copyright Act (DMCA) process to execute the takedown.
During the takedown process, notices are sent to the offending parties, hosting providers, and registrars with provisions
of local and international laws to demand that the account be taken down on account of impersonation, phishing, and so
on.
You can review the current status of takedown requests in the Brand Protection > Take Down page.
From the Brand Protection > Take Down page, you can:
l Filter for specific takedown requests by date, category, status, and ticket number. See Filtering takedown requests
on page 57.
You can filter the takedown requests or search for specific Ticket numbers on the Take Down tab.
The Adversary Centric Intelligence (ACI) module leverages FortiGuard Threat Analysts to provide comprehensive
coverage of dark web, open source, and technical threat intelligence, including threat actor insights. This information
enables administrators to proactively assess risks, respond faster to incidents, better understand their attackers, and
protect assets
The Adversary Centric Intelligence module contains the following tabs:
Dashboard Displays a summary of your organization's risk exposure to overall global threats.
See Dashboard on page 59.
Reports Displays all the intelligence reports available to you. See Reports on page 63.
Card Fraud Displays information about credit or debit cards that are for sale on darknet
marketplaces. See Card Fraud on page 69.
Stealer Infections Displays information about possible infected systems that are affiliated with your
employees or end-users and are for sale on darknet market places. See Stealer
Infections on page 71.
OSINT - Cyber Threats Displays OSINT-based intelligence reports about threat events. See OSINT
Cyber Threats on page 75.
Vulnerability Intelligence Displays information on monitored CVEs. See Vulnerability Intelligence on page
79.
Ransomware Intelligence Displays information on total and potential ransomware incidents. See
Ransomware Intelligence on page 83.
Vendor Risk Assessment Displays information on a vendor watchlist and the vendor's security hygiene. See
Vendor Risk Assessment on page 88.
Investigation Displays tabs to let you search for and investigate the reputation of an IPv4
address, domain, file hash, or CVE. See Investigation on page 92.
Dashboard
The Adversary Centric Intelligence > Dashboard page provides a summary of your organization's risk exposure to global
threats. From the Adversary Centric Intelligence > Dashboard page, you can:
l Change the date range for the dashboard content. See Changing the dashboard date range on page 60.
l View your organization's risk exposure. See Viewing risk exposure summary on page 60.
l View global threat reports. See Viewing global threat report summary on page 61.
By default, the Adversary Centric Intelligence > Dashboard page displays information for the last 90 days. You can
change the date range.
The Adversary Centric Intelligence > Dashboard page displays the following widgets in the Risk Exposure section that
summarize the risk exposure of your organization to global threats:
l Credential Exposure
l Stealer Infection
l Associated Threats
l Global Event Exposure
l Card Fraud
1. Go to the Adversary Centric Intelligence > Dashboard page, and scroll to the Risk Exposure section. A summary of
your organization's risk exposure is displayed.
Credential Exposure Displays the number of email addresses related to your organization's
domains that are part of third-party credential breaches.
The number of exposed credentials and the number of indexed credentials are
displayed.
Hover your mouse over a dot on the chart to view the number of exposed email
addresses on a specific date.
Stealer Infection Displays data from potentially infected systems that are affiliated with your
employees or end-users and are for sale on credential stealer marketplaces
on the darknet.
The number of compromised systems and the number of stealers found are
displayed.
Hover your mouse over a dot on the chart to view the number of compromised
systems on a specific date.
Hover your mouse over a section of the Top Affiliated Domains circle to view
the name of the affiliated domain.
Associated Threats Displays information about threats reported against your industry and
geographical area.
The number of reported threats that are specific to your industry and the
number of reported threats in your geographic area are displayed.
Click the widget to display more details on the Adversary Centric Intelligence >
Reports page.
High Relevance Reports Displays the reports that are flagged as highly relevant to your organization.
Reports must meet certain criteria to be considered relevant. The newest
reports are displayed at the top.
Click a report to display more details on the Adversary Centric Intelligence >
Reports page.
Global Event Exposure Displays the latest, published intelligence reports related to notable cyber
events from around the globe.
Automatically scrolls through the reports, or click the blue bars at the bottom of
the widget to view specific reports.
Card Fraud Displays statistics related to credit or debit cards that are listed for sale on
This widget is only displayed for darknet marketplaces.
banking organizations that The number of cards for sale is displayed as well as how many of the cards are
issue credit or debit cards. credit cards and how many are debit cards. Click the Cards for Sale number to
display more details on the Adversary Centric Intelligence > Card Fraud page.
Hover your mouse over the bars in the chart to view the number of card frauds
on a specific date.
The top card bin numbers are also displayed.
The Adversary Centric Intelligence > Dashboard page displays the following widgets in the Global Threats section that
summarize latest intelligence reports related to ongoing, notable, global cyber events:
l Relevance
l Categories
l Motivational Tags
l Latest Intelligence
l Actively Exploited CVEs
l Top Actors
l Notable Category Reporting
1. Go to the Adversary Centric Intelligence > Dashboard page, and scroll to the Global Threats section. The number of
global threat reports is displayed as well as several widgets.
2. Use the following widgets to review the global threat intelligence reports:
Relevance Displays the number of reports that are relevant to your organization and are
rated high, medium, or low risk. Reports must meet certain criteria to be
considered high, medium, or low risk.
Click the widget to display more details on the Adversary Centric Intelligence >
Reports page.
Categories Displays the number of reports for each category, such as Darknet, TechINT,
OSINT, and HUMINT.
Click a category to display more details on the Adversary Centric Intelligence >
Reports page.
Motivational Tags Displays the available motivational tag filters for reports.
Click a tag to display the Adversary Centric Intelligence > Reports page filtered
on the tag.
Latest Intelligence Displays the latest, published intelligence reports organized into the following
categories:
l Flash Alert
l Flash Report
l Threat Alert
l Threat Report
Automatically scrolls through the reports, or you can click the blue bars at the
bottom of the widget to view specific reports.
Actively Exploited CVEs Displays the number of currently and previously exploited CVEs and identifies
a list of newly exploited CVEs.
Click the widget to display more details on the Adversary Centric Intelligence >
Investigation page.
Top Actors Displays the number of actors being tracked as well as the number of reports
on the actors.
Displays a summary of top actors. Click the name of a top actor to display
more details on the Adversary Centric Intelligence > Reports page.
Notable Category Reporting Click a report to display more details on the Adversary Centric Intelligence >
Reports page.
Reports
The Adversary Centric Intelligence > Reports page displays all the intelligence reports available to you. By default all
reports are displayed, starting with the latest report. From the Adversary Centric Intelligence > Reports page, you can:
l View the details of each report. See Viewing reports on page 63.
l Apply filters to the list of reports to hone in on specific reports. See Filtering reports on page 65.
l Download a PDF of reports. See Downloading reports and observables on page 66.
l Share reports. See Sharing reports on page 67.
l Export observables to Microsoft Excel format. See Exporting observables on page 68.
Viewing reports
The Adversary Centric Intelligence > Reports page displays all the reports available to you on the All Reports tab. By
default all reports are displayed, starting with the latest report.
You can filter the list of reports, and search the list of reports using a keyword. See Filtering reports on page 65.
When you open a report, its details are displayed on a separate tab, and you can download a PDF of the report, share
the report with another person, and access related reports. When the report contains associated observables, you can
download them in Microsoft Excel format.
From an open report, you can also click associated tags to filter the list of reports on the All Reports tab, and then access
additional related reports.
See also Rating reports on page 46.
To view reports:
1. Go to Adversary Centric Intelligence > Reports. All reports are displayed in the All Reports tab.
2. On the All Reports tab, toggle between Grid View and Table View.
In the following example, Table View is selected, and you can click the Grid View button to change to Grid View.
Filtering reports
Reports can by filtered by date range, keywords, categories of filters, and relevance to your organization.
To filter reports:
b. In the left calendar, select a month, year, and day to specify the start date of the range.
c. In the right calendar, select a month, year, and day to specify the end date of the range.
Only reports from the date range are displayed.
d. Click the Filter Report by Date Range box, and click X to remove the date range filter.
3. Search for keywords:
a. In the Type and hit Enter to Search box, type a keyword, and press Enter.
The reports are filtered to display only reports with the keyword.
b. Click the X beside the keyword to remove the filter.
4. Filter reports by categories:
a. On the right side, click the Filters button. The following filter categories are displayed:
l Target Industry
l Motivation & Tags
l Actors
l Target Geography
l Category
l Report Type
b. Under the Target Industry, Motivation & Tags, Actors, and Target Geography categories, click Filter <category
name>, and select one or more filters.
c. Under Category and Report Types, select checkboxes to enable the filters, and clear checkboxes to disable
filters.
d. Under Report Type > Relevance, click High, Medium, and/or Low to enable the filters, and clear the filters to
disable them.
You can download a PDF of the reports displayed on the Adversary Centric Intelligence > Reports page to your hard
drive. A maximum of 300 reports can be downloaded at one time.
When the report includes Indicators of Compromise (IOCs), you can click the Generate Observable button to download
the IOCs in Microsoft Excel format.
When you open a report, you can download a PDF of the open report.
To download reports:
6. (Optional) If the report contains IOC information, you can click Generate Observable to download IOC information in
Microsoft Excel format.
7. Click Generate PDF.
A dialog is displayed.
8. Click OK.
9. Retrieve the download. See Retrieving downloads on page 104.
Sharing reports
To share a report:
Exporting observables
When a report has associated observables, they are displayed at the bottom of the report in the Associated Observables
section.
You can download the list of observables in Microsoft Excel format. The downloaded file is password protected.
FortiRecon provides the password you need to open the file in Microsoft Excel.
To export observables:
Card Fraud
The Adversary Centric Intelligence > Card Fraud page widget is only displayed for banking
organizations that issue credit or debit cards.
The Adversary Centric Intelligence > Card Fraud page displays information about credit or debit cards that are for sale
on darknet marketplaces. From the Card Fraud page, you can:
l View a summary of the total number of leaked cards as well as information about each leaked card. See Viewing
leaked card information on page 69.
l Filter the information. See Filtering leaked card information on page 70.
l Download the list of leaked cards to Microsoft Excel format. See Exporting a list of leaked cards on page 70.
The Adversary Centric Intelligence > Card Fraud page displays information about the number of leaked cards as well as
details about the leaked cards for a specific date range.
1. Go to Adversary Centric Intelligence > Card Fraud. The Card Fraud page is displayed.
The Total Leaked Card, Credit Cards, and Debit Cards numbers are for the default date range. Details about the
leaked cards are displayed below.
2. You can filter the displayed information. See Filtering leaked card information on page 70.
You can filter information about leaked cards by year, date range, and bank identification number (BIN).
b. In the left calendar, select a month, year, and day to specify the start date of the range.
c. In the right calendar, select a month, year, and day to specify the end date of the range.
Only reports from the date range are displayed.
d. Click the Filter Report by Date Range box, and click X to remove the date range filter.
3. Filter by year:
a. In the Leaked Cards widget, select a year from the dropdown list.
You can download the list of leaked cards to a Microsoft Excel file.
Stealer Infections
The Adversary Centric Intelligence > Stealer Infection page includes information about possible infected systems that
are affiliated with your employees or end-users that are listed for sale on credential stealer darknet marketplaces.
On the Stealer Infection page, you can:
l View information about stealer infections. See Viewing stealer infection information on page 71.
l Filter stealer infection information. See Filtering stealer infection information on page 72.
l Export market place data. See Exporting market place data on page 73.
l Move affiliated domains to the hidden tab. See Hiding affiliated domains on page 74.
l Unsubscribe from affiliated domain notifications. See Unsubscribing from affiliated domain notifications on page 74.
The Adversary Centric Intelligence > Stealer Infections page displays information about possible infected systems that
are affiliated with your employees or end-users and are for sale on darknet market places.
1. Go to Adversary Centric Intelligence > Stealer Infections. The Stealer Infections page is displayed.
Total compromised systems Displays the total number of compromised systems affiliated with your
affiliated with <organization organization.
name>
Stealers Found Display the number of stealers found and the names of the stealers.
Latest Displays the latest number of stealer events and the date that the event was
discovered.
Market Place Calendar Displays a summary of the stealer events in the selected calendar year.
Colored blocked indicate a stealer event. Light colors blocks indicate few
affected credentials, and dark colored blocks indicate many affected
credentials.
Hover your mouse over each block to view the discovery date and the number
of affected credentials.
Affiliated Domains Lists the domain names affiliated with the stealer events and the number of
affected systems.
Click the Click to Hide icon to move the affiliated domain to the hidden tab.
Systems Infected Displays a list of infected systems. Expand the affiliated domain to view a list of
identified sites.
You can use several methods to filter information in the Stealer Infections tab.
b. In the left calendar, select a month, year, and day to specify the start date of the range.
c. In the right calendar, select a month, year, and day to specify the end date of the range.
Only information from the date range is displayed.
d. Click the X in the Start & End Date box to remove the date range filter.
3. Search for keywords:
a. In the Type and hit Enter to Search box, type a keyword, and press Enter.
The information is filtered.
b. Click the X beside the keyword to remove the filter.
l Stealer
l Country
l State
l ISP
l MarketPlace
b. Click Filter <category> , and select one or more filters.
6. Filter the Market Place Calendar by year:
You can download all the market place information to download an All Market Place.xlsx file in Microsoft Excel format.
Alternately you can limit the export to infected systems and download a Market Place.xlsx file.
1. Go to Adversary Centric Intelligence > Stealer Infections, and scroll down to the Systems Infected widget.
2. Select the checkmark for the systems to include in the export. The Export Market Place button becomes available.
You can move affiliated domains to the Hidden tab. You can view the Hidden tab by clicking Hidden at the top-right of the
page.
Open Source Intelligence (OSINT) is method of gathering threat intelligence from publicly available sources. Over time,
OSINT coverage has changed to a great extent. Previously, it only covered sources such as Blogs, news, business
websites, social networks, and so on.
The Adversary Centric Intelligence > OSINT - Cyber Threats page provides you the ability to stay up to date with
information published in open source platforms, such as social media, GitHub repositories, and so on. Information for
review is based on specific criteria, including:
l Exploited vulnerabilities
l Zero day vulnerabilities
l Global events
On the OSINT - Cyber Threats page, you can:
l Review threat events. See Reviewing threats on page 75.
l Pin threat events to the top of the list. See Pinning events on page 76.
l Subscribe to threat event notifications. See Subscribing to event notifications on page 77.
l Subscribe other FortiRecon users to event notifications. See Adding subscriptions on page 78.
Reviewing threats
To review threats:
1. Go to Adversary Centric Intelligence > OSINT - Cyber Threats. The list of events is displayed.
2. Click an event title, such as Cyber-Crime. The list of events is displayed on the right side.
In the following example, Cyber-Crime is selected:
3. On the right, click the event to display more information about it outside the FortiRecon portal.
A confirmation dialog is displayed.
Pinning events
You can pin events to the top of the list. Pinned events have an orange Pin icon. Unpinned events have a white Pin icon.
To pin events:
1. Go to Adversary Centric Intelligence > OSINT - Cyber Threats. The list of events is displayed.
2. Click the Pin icon beside an event to turn the pin orange and pin the event to the top of the list.
In the following example, Cyber-Crime is pinned to the top of the list.
Click the Pin icon again to turn the pin white and unpin the event from the top of the list.
You can enable subscriptions to receive notifications for one or more threat events. You can also change subscriptions
and unsubscribe.
1. Go to Adversary Centric Intelligence > OSINT - Cyber Threats. The list of events is displayed.
2. For an event, click the Subscribe icon. The subscription options are displayed for the event.
In the following example, subscription options are displayed for the Advisory event:
3. Select one of the following options to specify when to receive the notification:
Real time Select to receive a notification when a new threat event is published.
Daily Select to specify the time each day to receive a notification about new threat
events.
4. Click Subscribe.
The Subscribe icon turns blue.
1. Go to Adversary Centric Intelligence > OSINT - Cyber Threats. The list of events is displayed.
2. Click a blue Subscribe icon. The subscription options are displayed.
1. Go to Adversary Centric Intelligence > OSINT - Cyber Threats. The list of events is displayed.
2. Click a blue Subscribe icon. The subscription options are displayed.
3. Click Unsubscribe.
The Subscribe icon turns white, and notifications are turned off.
Adding subscriptions
FortiRecon users with Admin privilege can set up subscriptions for other FortiRecon users to receive notifications about
events.
To add subscriptions:
1. Go to Adversary Centric Intelligence > OSINT - Cyber Threats, and click the Add Subscription button. The Cyber
Threats Get Notified dialog is displayed.
The Daily check box is displayed. By default users receive notifications in real-time as events occur.
4. Select Daily specify what time each day the user should receive the notification.
Clear the Daily check box to receive notifications in real time.
5. Click Subscribe.
Vulnerability Intelligence
The Adversary Centric Intelligence > Vulnerability Intelligence page displays information on vulnerability exposure to
help prioritize vulnerability patching. From the Vulnerability Intelligence page, you can:
l Review known CVEs. See Vulnerability exposure on page 79.
l Review the notable global CVEs. See Global notable vulnerabilities on page 81.
l View specific CVE reports. See Viewing and filtering CVE reports on page 81.
l Export a list of CVEs. See Exporting CVEs on page 83.
l Bulk add CVEs to monitor. See Manually adding CVEs on page 83.
Vulnerability exposure
Monitored CVEs can be reviewed at a high level from the Adversary Centric Intelligence > Vulnerability Intelligence page
in the Vulnerability exposure section:
l Total CVEs Monitored: This tile displays the total count of monitored CVEs.
When the severity status of a CVE is changed, a flash tile will appear to show the updates.
l Distribution of CVEs by severity: This tile displays a graph of CVEs to show the total count of CVEs per rating, from
Low to Critical.
l Top 10 vendors by CVEs: Displays a list of the vendors with the most CVEs monitored and the severity range from
Low to Critical. Select a Vendor Name or Severity to view more information.
l CVEs from EASM Module: Displays a list of automatically monitored CVEs. Select the CVE ID or Show More button
to view more information.
Monitored CVEs can be reviewed at a high level from the Adversary Centric Intelligence > Vulnerability Intelligence page
in the Global notable vulnerabilities section:
l Total Notable CVEs: This tile displays the total count of notable CVEs.
l Top 5 vendors by CVEs: Displays a list of the vendors with the most notable CVEs monitored and the severity range
from Low to Critical. Select a Vendor Name to view more information.
l Top 10 Notable CVEs: Displays a list of the notable CVE monitored and the severity range from Low to Critical.
Select the CVE ID or Show More button to view more information.
You can review detailed CVE reports in the Adversary Centric Intelligence > Vulnerability Intelligence page by:
l Selecting the CVE ID from the Vulnerability exposure > CVEs from EASM Module and CVEs added Manually tabs.
l Selecting the CVE ID from the Global notable vulnerabilities > Top 10 Notable CVEs.
l Filtering the vendor reports from Vulnerability exposure > Top 10 vendor by CVEs or Global notable vulnerabilities >
Top 5 vendor by CVEs.
l Filtering all reports with the Show More button.
To filter reports:
b. In the left calendar, select a month, year, and day to specify the start date of the range.
c. In the right calendar, select a month, year, and day to specify the end date of the range.
d. Click the X to remove the date range filter.
4. Search for keywords:
a. In the Search box, type a keyword.
5. Enable Elevated to search for CVEs that have had the severity increased.
6. Filter reports by information:
a. Select the information dropdown menus:
l By Category
l By Addition
l By Severity
l By CVE Year
l By Vendor
l By Products
b. Select one or more filters.
7. Click Search. The CVE reports that match the filters are displayed.
8. Select the CVE ID to view the full, detailed report.
Exporting CVEs
You can export a list of all or specific CVEs from the CVE cards page to an Excel file. Information in the file includes:
l CVE ID
l Truview Score
l Truview Severity
l NVD Severity
l Description
l Published date
To export CVEs:
You can bulk add CVEs to monitor in the Vulnerability Exposure > CVEs added Manually tab on the Adversary Centric
Intelligence > Vulnerability Intelligence page.
Ransomware Intelligence
The Adversary Centric Intelligence > Ransomware Intelligence page helps with supply chain monitoring and displays
information on past and potential ransomware incidents. From the Ransomware Intelligence page, you can:
l View past and potential ransomware incidents. See Viewing ransomware intelligence on page 84.
l Filter ransomware incident information. See Filtering ransomware intelligence on page 85.
l Export information on ransomware incidents to an Excel file. See Exporting ransomware information on page 86.
l Create, edit, and monitor a ransomware watchlist. See Managing My Watchlist on page 87.
The Ransomware Intelligence page contains multiple sections that display high level information on the ransomware
threat landscape. Sections include:
l Summary: A summary to total incidents, groups currently being tracked, and the top sector, country, and active
ransomware. Select a card to view more information in the Ransomware Trends.
l Ransomware Trends: Graphical representations of ransomware trends, including top targeted sectors and
victimized countries. The trends will adjust to reflect a particular trend if a card is selected in the Summary.
l Watchlist: A list of monitored organization and vendors. If an asset matches a monitor, an alert will be triggered. Add
or edit your watchlist by selecting Manage.
l Active Ransomware: A list of known, active ransomware and the current victim count for each.
l Latest Ransomware Victims: A list of the most recent victims of ransomware victims, including information on the
victim revenue, sector, and country. Select an entry for more information on a specific victim. Click Show More to
view more victims.
l Potential Ransomware Victims: A list of targets identified as potential victims of ransomware, including information
on revenue, sector, and country. Select an entry for more information on a specific target. Click Show More to view
more potential targets.
You can filter the information displayed on the Ransomware Intelligence, Ransomware Intelligence > Latest
Ransomware Victims, Ransomware Intelligence > Potential Ransomware Victims, and My Watchlist pages.
You can export a list of recent ransomware victims into an Excel file. The spreadsheet will include information on:
l Victim Name
l Affected Domains
l Revenue
l Sector
l Country
l Date
l Description
Managing My Watchlist
Users can monitor certain vendor and organization names in the My Watchlist page in the Vendor Watchlist and
Organization Watchlist, respectively. If a match for a monitored asset appears, it triggers an alert. Vendors and
organizations can be added to the watchlist manually by users or automatically by EASM.
To filter the monitored assets, see Filtering ransomware intelligence on page 85.
4. Select Delete.
The Adversary Centric Intelligence > Vendor Risk Assessment page is designed to create a watchlist of vendors that
allows you to assess the security hygiene level of each vendor. From the Vendor Risk Assessment page, you can:
l Add new vendors to the watchlist. See Adding a new vendor to the watchlist on page 89.
l View the security hygiene assessment of a vendor. See Viewing the vendor risk assessment on page 89.
You can add new vendors to the watchlist to generate a risk assessment report and identify the overall estimate risk
exposure rating. Vendors can be added to the watchlist using the primary domain. Once the domain name has been
submitted, collecting data and generating the risk assessment can take up to 24 hours.
If the overall estimated risk exposure rating of a vendor changes to High, an alert notification
will be sent.
You can have a maximum of 25 individual vendors in the watchlist. To remove a vendor from the watchlist, click Remove
on its watchlist card.
The vendor risk assessment organizes the generated vendors data into:
l Attack Surface Exposure: Provides an overview of the vendor company's assets and current security hygiene to
assess the estimated risk exposure.
l Darknet Exposure: Provides an overview of potential activity in hacker communities and darkweb marketplaces
toward the vendor company. The estimated risk can be used to assess the likelihood of threat actors' interest in
targeting the vendor company.
l Security Incidents: Provides an overview of ransomware incidences and intelligence reporting so that action can be
taken if the vendor company suffers a ransomware attack or is targeted by a threat actor.
Each of these sections is further divided into widgets that allow you to review detailed risk data in order to make informed
decisions.
2. Select the vendor that you want to review. The Vendor Risk Assessment opens.
3. Review the banner for high-level information on the vendor and the Overall Estimated Risk Exposure.
Issue by Severity The distribution of security issues by severity on the vendor's attack surface.
Security Issues The type of security issues identified and the assets affected, distributed by
severity. Select a dropdown arrow in the Issue Category for further breakdown
of the assets.
Commonly Targeted Services The services on the vendor's attack surface that are commonly targeted and
the number of assets exposing the service.
Darknet Mentions The number of mentions of the vendor's name or domain on platforms where
threat actors perform active discussions.
Dataleak Mentions The number of mentions of the vendors name or domain on datasets leaked
by threat actors.
Credential Breaches An overview of credentials affiliated with the vendor's domain that have been
identified in third party data breaches.
Botnet Infections An overview of botnet campaigns used to steal credentials from end users:
l Compromised Employee Systems: The number of usernames from the
Ransomware Incident The vendor name or domain appeared on the victim list by a ransomware
group.
FortiRecon Intelligence FortiRecon ACI reporting contains mention of the vendor's name or domain.
Reporting
Investigation
The Adversary Centric Intelligence > Investigation page displays information about investigations into security events.
From the Investigation page, you can:
l Review the reputation of IPv4 addresses. See Reviewing IP address reputation on page 92.
l Review the reputation of a domain. See Reviewing domain reputation on page 93.
l Review a file hash. See Reviewing a file hash on page 93.
l Review a CVE. See Reviewing a CVE on page 93.
You can use the IP Reputation search bar to search for IPv4 addresses.
1. Go to Adversary Centric Intelligence > Investigation > IP Reputation. The IP Reputation tab is displayed.
You can use the Domain Reputation search bar to search for domains.
1. Go to Adversary Centric Intelligence > Investigation > Domain Reputation. The Domain Reputation tab is displayed.
You can use the File Hash search bar to search for a file hash.
1. Go to Adversary Centric Intelligence > Investigation > Hash Lookup. The Hash Lookup tab is displayed.
2. Type the file hash, and press Enter. The results are displayed.
Reviewing a CVE
You can use the CVE search bar to search for a CVE.
To review a CVE:
1. Go to Adversary Centric Intelligence > Investigation > CVE. The CVE tab is displayed.
2. Type the CVE, and press Enter. Information about the CVE is displayed.
The Profile Settings page allows you to personalize your FortiRecon account and provide information on your
organization.
You can access Profile Settings from the menu in the top-right corner of FortiRecon. See Accessing profile settings on
page 94. The menu appears as three vertical dots:
From the menu, you can also change the color theme of the FortiRecon pages. See Changing the color theme on page
95.
The Profile Settings module contains the following tabs:
Profile Displays information about your personal FortiRecon account. You can edit
details of your account, configure daily digest reports, and enable custom email
alerts. See Profile on page 96.
Access Templates Allows the creation and editing of access templates. Access templates control the
modules and sub modules available to users on FortiRecon. See Access
templates on page 101.
Change Password Allows you to change your personal account password. See Change password on
page 103.
Downloads Displays a list of all the files downloaded from FortiRecon in that last 30 days. You
can download the files to your computer or delete unnecessary files. See
Downloads on page 104.
Integrations Displays the webhook integrations with Microsoft Teams and Slack. You can
create, edit, disable, and delete integrations. See Integrations on page 105.
Seeds Displays the domains, card BINs, and mobile applications of your organization
that are being monitored by FortiRecon. See Seeds on page 108.
You can access the Profile Settings from any page by selecting the menu in the top-right corner.
1. Hover over the profile menu in the top-right corner, and select Profile Settings.
You can choose between a light and dark color for the pages of the FortiRecon portal.
Following is an example of the dark theme:
1. Click the menu in the top-right corner, and select Change Theme.
Profile
The Profile tab provides information on your personal account information and allows you to customize settings. From
the Profile Settings > Profile tab, you can:
l Edit personal account information. See Editing user information on page 96.
l Configure daily reports on recent FortiRecon activity. See Opting in to daily digest reports on page 96.
l Opt-out of daily reports on recent FortiRecon activity. See Opting out of daily digest reports on page 97.
l View information about your subscription, such as registered domains, target industries and geography, keywords,
and your API key. See Viewing subscription details on page 97.
l Copy your API key for sharing. See Sharing the API key on page 98.
l Configure personalized email notifications when specific keywords occur in FortiRecon reports. See Receiving
custom email alerts on page 98.
You can edit your personal user information on the Profile tab. To edit other FortiRecon account users, see Editing users
on page 100.
You can receive emailed daily digest reports that include important information and highlights on reports and alerts that
occurred in the past 24 hours.
3. Select the options to include, and clear the options to exclude from the daily digest report.
4. Use the up and down Daily At arrows, or manually enter the hour you want to receive the daily digest report.
5. Toggle AM and PM to decide the hour in the 12-hour time convention.
6. Click Save. The daily digest report is sent to your email each day at the time specified.
The Daily At feature uses the 12-hour time convention by default. If you enter a time in 24-hour
format, the time is automatically adjusted to the 12-hour format. For example, if you enter 15
AM, the time is adjusted to 3 PM.
Daily digest reports are enabled by default, but you can stop the emails by opting-out in the Profile tab.
Subscription Details provides information on your subscription, including domains, license serial number, contract
information, and your API key.
You can copy your API key to your clipboard to share with others or use in other software.
You can configure custom email alerts so that you receive email notifications whenever there is a report that relates to
the categories you set.
Users
Multiple FortiRecon accounts can be created for an organization in the Users tabs. The following roles are available for
FortiRecon accounts:
l User: Has access limited to what is included in the assigned access template.
l Admin: Has administrative access over other accounts.
You can view all of the current users for your organization on the Users tab. User information listed for all users includes:
l Name
l Role
l Email
l Phone Number
The user accounts are filtered to display only accounts with the keyword.
b. Click the X beside the keyword to remove the filter.
Adding users
Administrators can add new user accounts. Before you add new users, define access templates to select in the user
accounts. See Access templates on page 101.
1. Access Profile Settings, and click the Users tab. The users are displayed.
2. Click the Add User button. The Client Info page is displayed.
3. On the Client Info page, complete the following options, and click Next.
API Key Displays the automatically generated API key for the user.
Email Type the email address, and select the domain for the user.
l Admin: gives the user access to the modules defined to their account and
Editing users
All organization members with FortiRecon accounts are listed on the Users tab. Administrators can edit the information
of other members.
1. Go to Profile Settings > Users and find the account you want to edit.
2. Click Edit. The Client Info page is displayed.
3. On the Client Info page, complete any of the following options as needed, and click Next.
API Key Select Re-generate API to create a new API Key. This can be done when it is suspected
that the API Key has been compromised or leaked.
Deleting users
Administrators can delete the account of another member on the Users tab.
1. Go to Profile Settings > Users and find the account you want to delete.
2. Click Delete. A confirmation message is displayed.
Access templates
Access templates are used for controlling user accounts. When you create an access template, you can define what
modules and sub modules a user can access, and then you can assign the access template to user accounts. See
Adding users on page 100
From the Profile Settings > Access Template tab, you can:
l View available access templates. See Viewing access templates on page 102.
l Add a new access template. See Adding a template on page 102.
l Edit an existing access template. See Editing a template on page 103.
You can view the settings assigned to an access template in the Access Templates tab. Assigned Main Modules, Sub
Modules, and Access settings appear in the following formats:
l Grey: The Sub Module is a default setting that is always included if the Main Module is selected.
l Blue: The feature has been intentionally selected from the optional features.
Adding a template
You can create new templates in the Access Templates tab, and they can include any of the Main Modules, specific Sub
Modules, and Access settings.
While all Access settings are optional, the following Sub Modules are mandatory when the associated Main Module has
been selected:
EASM Dashboard
Editing a template
You can edit a template that has previously been created to add or remove Modules, Sub Modules, and Access settings.
Change password
You can change your personal account password. The new password must:
l Contain at least one lower case letter
l Contain at least one upper case letter
l Contain at least one special character
l Be at least 10 characters long
Passwords entered into New password and Confirm password boxes must match. The fields
are case sensitive. If the passwords do not match, the Set Password button remains
unavailable.
Downloads
Files downloaded from EASM, Brand Protection, and Adversary Centric Intelligence are saved in the Downloads tab.
Files are saved in a list with the most recently downloaded files at the top.
From the Profile Settings > Downloads tab, you can:
l View all downloads from the past 30 days. See Viewing downloads on page 104.
l Retrieve downloads from the past 30 days. See Retrieving downloads on page 104.
l Delete downloads. See Deleting downloads on page 105.
Viewing downloads
You can view all of your downloads from the past 30 days.
To view downloads:
1. Go to Profile Settings > Downloads. The most recent downloads are displayed.
2. From the Records per page dropdown list, select the number of downloads to display on the page.
Retrieving downloads
1. Go to Profile Settings > Downloads and find the file you want.
2. Click the file in the Download column. The file is downloaded to your computer.
If a file is not finished downloading, an update message is displayed when you hover your
mouse over the file. You cannot click the file until it is finished downloading.
Deleting downloads
Downloaded files are automatically deleted after 30 days. However, you can manually delete files if needed.
Integrations
You can use webhook integration to receive automated alert and report notifications over Microsoft Teams and Slack.
For example, if you have flash reports configured for a Slack integration, when a flash report appears on FortiRecon, you
receive an automated notification on your Slack account.
From the Profile Settings > Integrations tab, you can:
l View the details of existing integrations. See Viewing integration details on page 105.
l Create new integrations. See Adding integrations on page 106.
l Edit existing integrations. See Editing integrations on page 107.
l Disable integrations. See Disabling integrations on page 107.
l Delete integrations. See Deleting and disabling integrations on page 107.
Adding integrations
You must retrieve the webhook URL from Microsoft Teams and Slack before adding an
integration to FortiRecon. See Microsoft Teams Webhooks and Connectors and Slack API
Sending messages using Incoming Webhooks for more information.
To add an integration:
3. Select the software you want to integrate with. The Add Integration page is displayed.
7. Clear any fields that you want to exclude from the integration.
8. Click Save. The integration is added.
Editing integrations
You can change the features and details of a webhook integration from the Integrations tab.
To edit an integration:
Disabling integrations
You can temporarily disable unused integrations, and then enable them again in the future. The integration toggle allows
you to enable and disable an integration as needed.
To disable an integration:
2. Select the toggle to disable the integration. The notifications are no longer sent to the software.
To delete an integration:
Seeds
You can input your organization's information in the Seeds tab to enable FortiRecon to track any malicious activity
against your assets or impersonating your assets.
From the Profile Settings > Seeds tab, you can:
l View your organization's registered assets. See Viewing your assets on page 108.
l Download a sample Microsoft Excel file to determine the format needed to upload data. See Downloading a sample
data file on page 109.
l Upload a Microsoft Excel file to simultaneously upload your organization's data in bulk. See Uploading a data file on
page 109.
l Export a global master file containing all of your organization's registered assets. See Exporting global masters on
page 110.
l Add, edit, and delete domain names. See Domains on page 110.
l Add, edit, and delete all BIN numbers used by your organization to issue credit, debit, and gift cards. See Card BIN
on page 112.
l Add, edit, and delete all mobile applications belonging to your company. See Owned mobile applications on page
114.
On the Seeds tab, you can view the domain names, card BINs, and mobile apps of your organization that are being
monitored by FortiRecon. You can toggle between the following tabs to view your organization's assets:
l Domains
l Card BIN
l Owned Mobile Applications
You can use a Microsoft Excel file to upload bulk information to the Seeds tab. The Microsoft Excel file requires a specific
format, and you can download a sample file to review the needed format.
If you intend to upload data for Domains, Card BIN, and Owned Mobile Applications
simultaneously, select the global sample file.
You can upload a Microsoft Excel file of your organization's information to FortiRecon. You can upload information in one
global file for all entry types, or you can upload multiple, individual files.
The Microsoft Excel file requires a specific format. See Downloading a sample data file on
page 109.
You can download a master list in Microsoft Excel format from FortiRecon that contains all domains, card BINs, and
owned mobile applications. The file contains three tabs, with each tab dedicated to one of the three Seeds tabs.
Domains
Providing domains allows FortiRecon to monitor for typo-squatting and phishing by actors that may be trying to
impersonate your organization. See Domains Typo-squatting on page 47 and Phishing on page 50.
From the Profile Settings > Seeds > Domains tab, you can:
l Add new domain names. See Adding domains on page 111.
l Edit existing domain names. See Editing domains on page 111.
l Delete domain names. See Deleting domains on page 111.
Adding domains
You must include a top-level domain when entering the domain name, such as .com or .org.
Editing domains
1. Go to Profile Settings > Seeds > Domains and find the domain name.
2. Click the edit icon in the Actions column. The Edit Domains dialog is displayed.
Deleting domains
You can delete domain names from the Domains tab. You can delete single domain names or groups of domain names.
1. Go to Profile Settings > Seeds > Domains and find the domain name.
2. Click the delete icon in the Actions column. A confirmation message is displayed.
4. Click Yes. The domain names are deleted from the list.
Card BIN
Providing your organization's card bank identification numbers (BINs) allows FortiRecon to monitor for card fraud by
actors that may be trying to steal credit, debit, or gift card information. See Card Fraud on page 69.
Card BIN information is needed only when your organization issues credit, debit, or gift cards.
From the Profile Settings > Seeds > Card BIN tab, you can:
l Add new card BINs. See Adding a card BIN on page 112.
l Edit existing card BINs. See Editing a card BIN on page 113.
l Delete existing card BINs. See Deleting a card BIN on page 113.
You can add new BINs in the Card BIN tab, as needed. BINs must be at least six characters long.
You can edit a pre-existing card BIN in the Card BIN tab.
1. Go to Profile Settings > Seeds > Card BIN and find the card BIN.
2. Click the edit icon in the Actions column. The Edit Card BIN window is displayed.
You can delete BINs from the Card BIN tab. You can delete a single BIN or groups of BINs.
1. Go to Profile Settings > Seeds > Card BIN and find the BIN.
2. Click the delete icon in the Actions column. A confirmation message is displayed.
l Select the checkbox next to specific BINs to mark them for deletion.
The Delete Rows icon becomes available.
3. Click Delete Rows. A confirmation message is displayed and lists the number of selected BINs.
Providing app information allows FortiRecon to monitor for rogue mobile apps that are trying to impersonate your
organization. See Rogue Mobile Apps on page 54.
From the Profile Settings > Seeds > Owned Mobile Applications tab, you can:
l Add new mobile apps. See Adding an owned mobile application on page 114.
l Edit existing mobile apps. See Editing an owned mobile application on page 114.
l Delete mobile apps. See Deleting an owned mobile application on page 115.
You can add new apps in the Owned Mobile Applications tab, as needed.
3. Click the text boxes to enter text for Name, Developer, Hosted On, and URL.
4. Click Save. The app is added.
You can edit app information in the Owned Mobile Applications tab.
To edit an app:
1. Go to Profile Settings > Seeds > Owned Mobile Applications and find the app.
2. Click the edit icon in the Actions column. The Owned Mobile Applications dialog is displayed.
You can delete apps from the Owned Mobile Applications tab. You can delete a single app or groups of apps.
1. Go to Profile Settings > Seeds > Owned Mobile Applications and find the app.
2. Click the delete icon in the Actions column. A confirmation message is displayed.
Copyright© 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.